Information flow integrity measurement method using integrity threat tree
In order to avert the drawback of traditional information flow integrity analysis on ignoring the specific system architecture and associated attack events,an integrity threat tree to quantify the integrity of the system information flow,and the conditional trigger gate to model the associated attac...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2019-04-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2019016 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841530055537197056 |
---|---|
author | Qixuan WU Jianfeng MA Cong SUN |
author_facet | Qixuan WU Jianfeng MA Cong SUN |
author_sort | Qixuan WU |
collection | DOAJ |
description | In order to avert the drawback of traditional information flow integrity analysis on ignoring the specific system architecture and associated attack events,an integrity threat tree to quantify the integrity of the system information flow,and the conditional trigger gate to model the associated attack events were proposed.The attack cost was used to quantify the degree of difficulty on attacking each channel.According to the architecture-related integrity threat tree,the minimum attack cost and corresponding target channel set required to achieve the attack target were solved by using the satisfiability modulo theories.The practicality of our approach was demonstrated by the modeling and analysis of the actual flight control system models,and the influence of the conditional trigger gate parameters on the system integrity was discussed. |
format | Article |
id | doaj-art-6130fdd1bda5480e9a76d1a17db5d5eb |
institution | Kabale University |
issn | 2096-109X |
language | English |
publishDate | 2019-04-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj-art-6130fdd1bda5480e9a76d1a17db5d5eb2025-01-15T03:13:24ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2019-04-015505759555473Information flow integrity measurement method using integrity threat treeQixuan WUJianfeng MACong SUNIn order to avert the drawback of traditional information flow integrity analysis on ignoring the specific system architecture and associated attack events,an integrity threat tree to quantify the integrity of the system information flow,and the conditional trigger gate to model the associated attack events were proposed.The attack cost was used to quantify the degree of difficulty on attacking each channel.According to the architecture-related integrity threat tree,the minimum attack cost and corresponding target channel set required to achieve the attack target were solved by using the satisfiability modulo theories.The practicality of our approach was demonstrated by the modeling and analysis of the actual flight control system models,and the influence of the conditional trigger gate parameters on the system integrity was discussed.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2019016integrityinformation flowsatisfiability modulo theoriesattack tree |
spellingShingle | Qixuan WU Jianfeng MA Cong SUN Information flow integrity measurement method using integrity threat tree 网络与信息安全学报 integrity information flow satisfiability modulo theories attack tree |
title | Information flow integrity measurement method using integrity threat tree |
title_full | Information flow integrity measurement method using integrity threat tree |
title_fullStr | Information flow integrity measurement method using integrity threat tree |
title_full_unstemmed | Information flow integrity measurement method using integrity threat tree |
title_short | Information flow integrity measurement method using integrity threat tree |
title_sort | information flow integrity measurement method using integrity threat tree |
topic | integrity information flow satisfiability modulo theories attack tree |
url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2019016 |
work_keys_str_mv | AT qixuanwu informationflowintegritymeasurementmethodusingintegritythreattree AT jianfengma informationflowintegritymeasurementmethodusingintegritythreattree AT congsun informationflowintegritymeasurementmethodusingintegritythreattree |