Scalable Security Analysis Using a Partition and Merge Approach in an Infrastructure as a Service Cloud

Jin B. Hong, Taehoon Eom, Jong Sou Park, Dong Seong Kim

Research output: Chapter in Book/Conference paperConference paper

1 Citation (Scopus)

Abstract

Attack representation models (ARMs), such as an Attack Graph and Attack Tree, are widely used for security modeling and analysis. However, they suffer from a scalability problem if the size of a networked system becomes too large. Previous work focused on model simplifications (also known as pruning), but it may lose security information. To cope with the scalability problem without losing any security information, we propose to use a partition and merge approach (PMA) in an Infrastructure as a Service (IaaS) Cloud. The ARM is simplified into many sub-ARMs in the partition process, and the results obtained from them are combined in the merge process. We conduct a performance analysis using the PMA and we compare it against an exhaustive search method.

Original languageEnglish
Title of host publicationProceedings - 2014 IEEE International Conference on Ubiquitous Intelligence and Computing, 2014 IEEE International Conference on Autonomic and Trusted Computing, 2014 IEEE International Conference on Scalable Computing and Communications and Associated Symposia/Workshops, UIC-ATC-ScalCom 2014
EditorsBernady O. Apduhan, Yu Zheng, Yukikazu Nakamoto, Parimala Thulasiraman, Huansheng Ning, Yuqing Sun
Place of PublicationUnited States
PublisherIEEE, Institute of Electrical and Electronics Engineers
Pages50-57
Number of pages8
ISBN (Electronic)9781479976461
DOIs
Publication statusPublished - 1 Jan 2014
Externally publishedYes
Event11th IEEE International Conference on Ubiquitous Intelligence and Computing and 11th IEEE International Conference on Autonomic and Trusted Computing and 14th IEEE International Conference on Scalable Computing and Communications and Associated Symposia/Workshops, UIC-ATC-ScalCom 2014 - Denpasar, Bali, Indonesia
Duration: 9 Dec 201412 Dec 2014

Conference

Conference11th IEEE International Conference on Ubiquitous Intelligence and Computing and 11th IEEE International Conference on Autonomic and Trusted Computing and 14th IEEE International Conference on Scalable Computing and Communications and Associated Symposia/Workshops, UIC-ATC-ScalCom 2014
CountryIndonesia
CityDenpasar, Bali
Period9/12/1412/12/14

Fingerprint

Scalability

Cite this

Hong, J. B., Eom, T., Park, J. S., & Kim, D. S. (2014). Scalable Security Analysis Using a Partition and Merge Approach in an Infrastructure as a Service Cloud. In B. O. Apduhan, Y. Zheng, Y. Nakamoto, P. Thulasiraman, H. Ning, & Y. Sun (Eds.), Proceedings - 2014 IEEE International Conference on Ubiquitous Intelligence and Computing, 2014 IEEE International Conference on Autonomic and Trusted Computing, 2014 IEEE International Conference on Scalable Computing and Communications and Associated Symposia/Workshops, UIC-ATC-ScalCom 2014 (pp. 50-57). [7306933] United States: IEEE, Institute of Electrical and Electronics Engineers. https://doi.org/10.1109/UIC-ATC-ScalCom.2014.94
Hong, Jin B. ; Eom, Taehoon ; Park, Jong Sou ; Kim, Dong Seong. / Scalable Security Analysis Using a Partition and Merge Approach in an Infrastructure as a Service Cloud. Proceedings - 2014 IEEE International Conference on Ubiquitous Intelligence and Computing, 2014 IEEE International Conference on Autonomic and Trusted Computing, 2014 IEEE International Conference on Scalable Computing and Communications and Associated Symposia/Workshops, UIC-ATC-ScalCom 2014. editor / Bernady O. Apduhan ; Yu Zheng ; Yukikazu Nakamoto ; Parimala Thulasiraman ; Huansheng Ning ; Yuqing Sun. United States : IEEE, Institute of Electrical and Electronics Engineers, 2014. pp. 50-57
@inproceedings{25e74f2e07be46f28040e6f1dbe922c5,
title = "Scalable Security Analysis Using a Partition and Merge Approach in an Infrastructure as a Service Cloud",
abstract = "Attack representation models (ARMs), such as an Attack Graph and Attack Tree, are widely used for security modeling and analysis. However, they suffer from a scalability problem if the size of a networked system becomes too large. Previous work focused on model simplifications (also known as pruning), but it may lose security information. To cope with the scalability problem without losing any security information, we propose to use a partition and merge approach (PMA) in an Infrastructure as a Service (IaaS) Cloud. The ARM is simplified into many sub-ARMs in the partition process, and the results obtained from them are combined in the merge process. We conduct a performance analysis using the PMA and we compare it against an exhaustive search method.",
keywords = "Attack Representation Model, Cloud Computing, Partition, Scalability, Security Analysis",
author = "Hong, {Jin B.} and Taehoon Eom and Park, {Jong Sou} and Kim, {Dong Seong}",
year = "2014",
month = "1",
day = "1",
doi = "10.1109/UIC-ATC-ScalCom.2014.94",
language = "English",
pages = "50--57",
editor = "Apduhan, {Bernady O. } and Zheng, {Yu } and Nakamoto, {Yukikazu } and Thulasiraman, {Parimala } and Ning, {Huansheng } and Sun, {Yuqing }",
booktitle = "Proceedings - 2014 IEEE International Conference on Ubiquitous Intelligence and Computing, 2014 IEEE International Conference on Autonomic and Trusted Computing, 2014 IEEE International Conference on Scalable Computing and Communications and Associated Symposia/Workshops, UIC-ATC-ScalCom 2014",
publisher = "IEEE, Institute of Electrical and Electronics Engineers",
address = "United States",

}

Hong, JB, Eom, T, Park, JS & Kim, DS 2014, Scalable Security Analysis Using a Partition and Merge Approach in an Infrastructure as a Service Cloud. in BO Apduhan, Y Zheng, Y Nakamoto, P Thulasiraman, H Ning & Y Sun (eds), Proceedings - 2014 IEEE International Conference on Ubiquitous Intelligence and Computing, 2014 IEEE International Conference on Autonomic and Trusted Computing, 2014 IEEE International Conference on Scalable Computing and Communications and Associated Symposia/Workshops, UIC-ATC-ScalCom 2014., 7306933, IEEE, Institute of Electrical and Electronics Engineers, United States, pp. 50-57, 11th IEEE International Conference on Ubiquitous Intelligence and Computing and 11th IEEE International Conference on Autonomic and Trusted Computing and 14th IEEE International Conference on Scalable Computing and Communications and Associated Symposia/Workshops, UIC-ATC-ScalCom 2014, Denpasar, Bali, Indonesia, 9/12/14. https://doi.org/10.1109/UIC-ATC-ScalCom.2014.94

Scalable Security Analysis Using a Partition and Merge Approach in an Infrastructure as a Service Cloud. / Hong, Jin B.; Eom, Taehoon; Park, Jong Sou; Kim, Dong Seong.

Proceedings - 2014 IEEE International Conference on Ubiquitous Intelligence and Computing, 2014 IEEE International Conference on Autonomic and Trusted Computing, 2014 IEEE International Conference on Scalable Computing and Communications and Associated Symposia/Workshops, UIC-ATC-ScalCom 2014. ed. / Bernady O. Apduhan; Yu Zheng; Yukikazu Nakamoto; Parimala Thulasiraman; Huansheng Ning; Yuqing Sun. United States : IEEE, Institute of Electrical and Electronics Engineers, 2014. p. 50-57 7306933.

Research output: Chapter in Book/Conference paperConference paper

TY - GEN

T1 - Scalable Security Analysis Using a Partition and Merge Approach in an Infrastructure as a Service Cloud

AU - Hong, Jin B.

AU - Eom, Taehoon

AU - Park, Jong Sou

AU - Kim, Dong Seong

PY - 2014/1/1

Y1 - 2014/1/1

N2 - Attack representation models (ARMs), such as an Attack Graph and Attack Tree, are widely used for security modeling and analysis. However, they suffer from a scalability problem if the size of a networked system becomes too large. Previous work focused on model simplifications (also known as pruning), but it may lose security information. To cope with the scalability problem without losing any security information, we propose to use a partition and merge approach (PMA) in an Infrastructure as a Service (IaaS) Cloud. The ARM is simplified into many sub-ARMs in the partition process, and the results obtained from them are combined in the merge process. We conduct a performance analysis using the PMA and we compare it against an exhaustive search method.

AB - Attack representation models (ARMs), such as an Attack Graph and Attack Tree, are widely used for security modeling and analysis. However, they suffer from a scalability problem if the size of a networked system becomes too large. Previous work focused on model simplifications (also known as pruning), but it may lose security information. To cope with the scalability problem without losing any security information, we propose to use a partition and merge approach (PMA) in an Infrastructure as a Service (IaaS) Cloud. The ARM is simplified into many sub-ARMs in the partition process, and the results obtained from them are combined in the merge process. We conduct a performance analysis using the PMA and we compare it against an exhaustive search method.

KW - Attack Representation Model

KW - Cloud Computing

KW - Partition

KW - Scalability

KW - Security Analysis

UR - http://www.scopus.com/inward/record.url?scp=84949559381&partnerID=8YFLogxK

U2 - 10.1109/UIC-ATC-ScalCom.2014.94

DO - 10.1109/UIC-ATC-ScalCom.2014.94

M3 - Conference paper

SP - 50

EP - 57

BT - Proceedings - 2014 IEEE International Conference on Ubiquitous Intelligence and Computing, 2014 IEEE International Conference on Autonomic and Trusted Computing, 2014 IEEE International Conference on Scalable Computing and Communications and Associated Symposia/Workshops, UIC-ATC-ScalCom 2014

A2 - Apduhan, Bernady O.

A2 - Zheng, Yu

A2 - Nakamoto, Yukikazu

A2 - Thulasiraman, Parimala

A2 - Ning, Huansheng

A2 - Sun, Yuqing

PB - IEEE, Institute of Electrical and Electronics Engineers

CY - United States

ER -

Hong JB, Eom T, Park JS, Kim DS. Scalable Security Analysis Using a Partition and Merge Approach in an Infrastructure as a Service Cloud. In Apduhan BO, Zheng Y, Nakamoto Y, Thulasiraman P, Ning H, Sun Y, editors, Proceedings - 2014 IEEE International Conference on Ubiquitous Intelligence and Computing, 2014 IEEE International Conference on Autonomic and Trusted Computing, 2014 IEEE International Conference on Scalable Computing and Communications and Associated Symposia/Workshops, UIC-ATC-ScalCom 2014. United States: IEEE, Institute of Electrical and Electronics Engineers. 2014. p. 50-57. 7306933 https://doi.org/10.1109/UIC-ATC-ScalCom.2014.94