Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 506714, 9 pages
http://dx.doi.org/10.1155/2014/506714
Research Article

Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets

Department of Management Sciences, R.O.C. Military Academy, Kaohsiung 830, Taiwan

Received 19 August 2014; Accepted 18 September 2014; Published 21 October 2014

Academic Editor: Ming-Hung Shu

Copyright © 2014 Kuei-Hu Chang. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. T. Tidwell, R. Larson, K. Fitch, and J. Hale, “Modeling internet attacks,” in Proceedings of the IEEE Workshop on Information Assurance and Security, pp. 54–59, United States Military Academy, 2001.
  2. G. Dhillon and G. Torkzadeh, “Value-focused assessment of information system security in organizations,” Information Systems Journal, vol. 16, no. 3, pp. 293–314, 2006. View at Publisher · View at Google Scholar · View at Scopus
  3. N. Satoh, H. Kumamoto, and Y. Kino, “Viewpoint of ISO GMITS and probabilistic risk assessment in information security,” International Journal of Systems Applications, Engineering and Development, vol. 2, no. 4, pp. 237–244, 2008. View at Google Scholar
  4. Symantec Corporation, “Full report: internet security threat report,” vol. 18, 2013.
  5. A. L. Opdahl and G. Sindre, “Experimental comparison of attack trees and misuse cases for security threat identification,” Information and Software Technology, vol. 51, no. 5, pp. 916–932, 2009. View at Publisher · View at Google Scholar · View at Scopus
  6. K. Wu and S. Ye, “An information security threat assessment model based on Bayesian network and OWA operator,” Applied Mathematics and Information Sciences, vol. 8, no. 2, pp. 833–838, 2014. View at Publisher · View at Google Scholar · View at Scopus
  7. Z. J. Lee and L. Y. Chang, “Apply fuzzy decision tree to information security risk assessment,” International Journal of Fuzzy Systems, vol. 16, no. 2, pp. 265–269, 2014. View at Google Scholar
  8. A. Blyth, “An architecture for an XML enabled firewall,” International Journal of Network Security, vol. 8, no. 1, pp. 31–36, 2009. View at Google Scholar · View at Scopus
  9. G. Helmer, J. Wong, M. Slagell et al., “Software fault tree and coloured Petri net–based specification, design and implementation of agent-based intrusion detection systems,” International Journal of Information and Computer Security, vol. 1, no. 1-2, pp. 109–142, 2007. View at Publisher · View at Google Scholar
  10. M. N. Azaiez and V. M. Bier, “Optimal resource allocation for security in reliability systems,” European Journal of Operational Research, vol. 181, no. 2, pp. 773–786, 2007. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  11. J. J. Zhao and S. Y. Zhao, “Opportunities and threats: a security assessment of state e-government websites,” Government Information Quarterly, vol. 27, no. 1, pp. 49–56, 2010. View at Publisher · View at Google Scholar · View at Scopus
  12. W.-L. Gau and D. J. Buehrer, “Vague sets,” IEEE Transactions on Systems, Man and Cybernetics, vol. 23, no. 2, pp. 610–614, 1993. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  13. Z. Wang, K. W. Li, and W. Wang, “An approach to multiattribute decision making with interval-valued intuitionistic fuzzy assessments and incomplete weights,” Information Sciences, vol. 179, no. 17, pp. 3026–3040, 2009. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  14. J.-R. Chang, K.-H. Chang, S.-H. Liao, and C.-H. Cheng, “The reliability of general vague fault-tree analysis on weapon systems fault diagnosis,” Soft Computing, vol. 10, no. 7, pp. 531–542, 2006. View at Publisher · View at Google Scholar · View at Scopus
  15. C.-N. Wang, G. K. Yang, K.-C. Hung, K.-H. Chang, and P. Chu, “Evaluating the manufacturing capability of a lithographic area by using a novel vague GERT,” Expert Systems with Applications, vol. 38, no. 1, pp. 923–932, 2011. View at Publisher · View at Google Scholar · View at Scopus
  16. J. Ye, “Fuzzy decision-making method based on the weighted correlation coefficient under intuitionistic fuzzy environment,” European Journal of Operational Research, vol. 205, no. 1, pp. 202–204, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  17. K. H. Chang and C. H. Cheng, “A novel general approach to evaluating the PCBA for components with different membership function,” Applied Soft Computing Journal, vol. 9, no. 3, pp. 1044–1056, 2009. View at Publisher · View at Google Scholar · View at Scopus
  18. G.-W. Wei, “GRA method for multiple attribute decision making with incomplete weight information in intuitionistic fuzzy setting,” Knowledge-Based Systems, vol. 23, no. 3, pp. 243–247, 2010. View at Publisher · View at Google Scholar · View at Scopus
  19. K.-H. Chang and C.-H. Cheng, “A risk assessment methodology using intuitionistic fuzzy set in FMEA,” International Journal of Systems Science, vol. 41, no. 12, pp. 1457–1471, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  20. B. Schneier, “Attack trees,” Dr. Dobb's Journal, vol. 24, no. 12, pp. 21–29, 1999. View at Google Scholar
  21. S. Gupta and J. Bhattacharya, “Reliability analysis of a conveyor system using hybrid data,” Quality and Reliability Engineering International, vol. 23, no. 7, pp. 867–882, 2007. View at Publisher · View at Google Scholar · View at Scopus
  22. H.-Z. Huang, X. Tong, and M. J. Zuo, “Posbist fault tree analysis of coherent systems,” Reliability Engineering and System Safety, vol. 84, no. 2, pp. 141–148, 2004. View at Publisher · View at Google Scholar · View at Scopus
  23. R. R. Yager, “OWA trees and their role in security modeling using attack trees,” Information Sciences, vol. 176, no. 20, pp. 2933–2959, 2006. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  24. K.-H. Chang, C.-H. Cheng, and Y.-C. Chang, “Reliability assessment of an aircraft propulsion system using IFS and OWA tree,” Engineering Optimization, vol. 40, no. 10, pp. 907–921, 2008. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  25. L. A. Zadeh, “Fuzzy sets,” Information and Computation, vol. 8, no. 3, pp. 338–353, 1965. View at Google Scholar · View at MathSciNet · View at Scopus
  26. K. T. Atanassov, “Intuitionistic fuzzy sets,” Report 1697/84, Central Tech Library, Bulgarian Academy Science, Sofia, Bulgaria, 1983. View at Google Scholar
  27. H. Bustince and P. Burillo, “Vague sets are intuitionistic fuzzy sets,” Fuzzy Sets and Systems, vol. 79, no. 3, pp. 403–405, 1996. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus