Model for evaluation of SOA security metrics using attack graphs

  • Authors:
  • Jan Magott;Marek Woda

  • Affiliations:
  • Institute of Computer Engineering, Control and Robotics, Wroclaw University of Technology, Janiszewskiego 11-17, 50-372 Wroclaw, Poland.;Institute of Computer Engineering, Control and Robotics, Wroclaw University of Technology, Janiszewskiego 11-17, 50-372 Wroclaw, Poland

  • Venue:
  • International Journal of Critical Computer-Based Systems
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

In the paper, a proposal of risk assessment for service oriented architecture (SOA) is given. The proposal is based on service availability metrics that is a probability that the service is available. Foundations for calculating this probability by simulation using attack graphs are given. The attack graph is a representation of actions that end in a state where an intruder achieved his/her goal. Resource consumption, in terms of host-processing time, bandwidth of physical connections utilisation are the new features of an atomic attack given in this paper. Taking into account, resources engaged during attacks have been divided into: resources charging attacks (performance attacks) and non-resources charging attacks (functional attacks). The attack graphs of the second type attacks are similar to the graph attacks presented in literature. The attack graphs of the first attack type are new. A model of intrusion detection system is also given.