Cloud Attack and Risk Assessment Taxonomy

被引:39
|
作者
Juliadotter, Nina Viktoria [1 ]
Choo, Kim-Kwang Raymond [2 ]
机构
[1] Univ New South Wales Canberra, Cybersecur, Canberra, ACT, Australia
[2] Univ S Australia, Sch Informat Technol & Math Sci, Adelaide, SA 5001, Australia
来源
IEEE CLOUD COMPUTING | 2015年 / 2卷 / 01期
关键词
attack taxonomy; cloud; cloud and the law; risk assessment; security;
D O I
10.1109/MCC.2015.2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As businesses' dependence on cloud services increases, these services are vulnerable to security incidents, data breaches, and other malicious activities. To mitigate risks to the confidentiality, integrity, and availability of assets, as well as to minimize losses to cloud service providers and users, particularly organizational users, the attack risk elements must be identified, classified, quantified, and prioritized. This column presents a conceptual cloud attack and risk assessment taxonomy. © 2015 IEEE.
引用
收藏
页码:14 / 20
页数:7
相关论文
共 50 条
  • [1] A Taxonomy for Cybercrime Attack in the Public Cloud
    Baror, Stacey Omeleze
    Venter, Hein
    PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2019), 2019, : 505 - 515
  • [2] Risk Assessment in a Sensor Cloud Framework Using Attack Graphs
    Sen, Amartya
    Madria, Sanjay
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2017, 10 (06) : 942 - 955
  • [3] Implementation approach for IDS based on risk assessment and attack pattern in cloud computing
    Ben Charhi, Youssef
    Bendriss, Elmehdi
    Mannane, Nada
    Regragui, Boubker
    2018 INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND DIAGNOSIS (ICCAD), 2018,
  • [4] Trust Assessment in Cloud Environment: Taxonomy and Analysis
    Deshpande, Shilpa
    Ingle, Rajesh
    2016 INTERNATIONAL CONFERENCE ON COMPUTING, ANALYTICS AND SECURITY TRENDS (CAST), 2016, : 627 - 631
  • [5] Behavioural analysis approach for IDS based on attack pattern and risk assessment in cloud computing
    Youssef B.C.
    Nada M.
    Boubker R.
    International Journal of Information and Computer Security, 2019, 11 (4-5) : 315 - 331
  • [6] Hardware Attack Risk Assessment
    Moein, Samer
    Gebali, Fayez
    Gulliver, T. Aaron
    El-Kharashi, M. Watheq
    2015 TENTH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2015, : 346 - 350
  • [7] Attack-Tree Based Risk Assessment on Cloud-Oriented Wireless Body Area Network
    Mavroeidakos, Theodoros
    Tsolis, Nikolaos
    Vergados, Dimitrios D.
    Kotsopoulos, Stavros
    INTERNATIONAL JOURNAL OF INTERDISCIPLINARY TELECOMMUNICATIONS AND NETWORKING, 2019, 11 (04) : 63 - 79
  • [8] Individual risk assessment for worm attack
    Schnieder, Thomas
    KLEINTIERPRAXIS, 2008, 53 (12): : 797 - 799
  • [9] Security and Risk Assessment in the Cloud
    Madria, Sanjay K.
    COMPUTER, 2016, 49 (09) : 110 - 113
  • [10] Scalable Attack Graph for Risk Assessment
    Lee, Jehyun
    Lee, Heejo
    In, Hoh Peter
    ICOIN: 2009 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, 2009, : 78 - 82