Information flow integrity measurement method using integrity threat tree

In order to avert the drawback of traditional information flow integrity analysis on ignoring the specific system architecture and associated attack events,an integrity threat tree to quantify the integrity of the system information flow,and the conditional trigger gate to model the associated attac...

Full description

Saved in:
Bibliographic Details
Main Authors: Qixuan WU, Jianfeng MA, Cong SUN
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2019-04-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2019016
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530055537197056
author Qixuan WU
Jianfeng MA
Cong SUN
author_facet Qixuan WU
Jianfeng MA
Cong SUN
author_sort Qixuan WU
collection DOAJ
description In order to avert the drawback of traditional information flow integrity analysis on ignoring the specific system architecture and associated attack events,an integrity threat tree to quantify the integrity of the system information flow,and the conditional trigger gate to model the associated attack events were proposed.The attack cost was used to quantify the degree of difficulty on attacking each channel.According to the architecture-related integrity threat tree,the minimum attack cost and corresponding target channel set required to achieve the attack target were solved by using the satisfiability modulo theories.The practicality of our approach was demonstrated by the modeling and analysis of the actual flight control system models,and the influence of the conditional trigger gate parameters on the system integrity was discussed.
format Article
id doaj-art-6130fdd1bda5480e9a76d1a17db5d5eb
institution Kabale University
issn 2096-109X
language English
publishDate 2019-04-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-6130fdd1bda5480e9a76d1a17db5d5eb2025-01-15T03:13:24ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2019-04-015505759555473Information flow integrity measurement method using integrity threat treeQixuan WUJianfeng MACong SUNIn order to avert the drawback of traditional information flow integrity analysis on ignoring the specific system architecture and associated attack events,an integrity threat tree to quantify the integrity of the system information flow,and the conditional trigger gate to model the associated attack events were proposed.The attack cost was used to quantify the degree of difficulty on attacking each channel.According to the architecture-related integrity threat tree,the minimum attack cost and corresponding target channel set required to achieve the attack target were solved by using the satisfiability modulo theories.The practicality of our approach was demonstrated by the modeling and analysis of the actual flight control system models,and the influence of the conditional trigger gate parameters on the system integrity was discussed.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2019016integrityinformation flowsatisfiability modulo theoriesattack tree
spellingShingle Qixuan WU
Jianfeng MA
Cong SUN
Information flow integrity measurement method using integrity threat tree
网络与信息安全学报
integrity
information flow
satisfiability modulo theories
attack tree
title Information flow integrity measurement method using integrity threat tree
title_full Information flow integrity measurement method using integrity threat tree
title_fullStr Information flow integrity measurement method using integrity threat tree
title_full_unstemmed Information flow integrity measurement method using integrity threat tree
title_short Information flow integrity measurement method using integrity threat tree
title_sort information flow integrity measurement method using integrity threat tree
topic integrity
information flow
satisfiability modulo theories
attack tree
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2019016
work_keys_str_mv AT qixuanwu informationflowintegritymeasurementmethodusingintegritythreattree
AT jianfengma informationflowintegritymeasurementmethodusingintegritythreattree
AT congsun informationflowintegritymeasurementmethodusingintegritythreattree