Visible to the public Studying cyber security threats to web platforms using attack tree diagrams

TitleStudying cyber security threats to web platforms using attack tree diagrams
Publication TypeConference Paper
Year of Publication2017
AuthorsPetrică, G., Axinte, S. D., Bacivarov, I. C., Firoiu, M., Mihai, I. C.
Conference Name2017 9th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)
Date Publishedjun
Keywordsartificial intelligence security, attack tree, attack tree diagrams, Attack Tree method, common vulnerabilities, computer security, computer security threats, computer system, Computers, cyber security threats, cyber-attack, global reference system, graphical analysis, Human Behavior, Information systems, information systems designers, information technology, Internet, Metrics, Open Source Software, Organizations, pubcrawl, Resiliency, Scalability, security of data, security personnel, security threats, trees (mathematics), Web platform, Web platforms, WordPress platform, WordPress vulnerabilities
Abstract

Used by both information systems designers and security personnel, the Attack Tree method provides a graphical analysis of the ways in which an entity (a computer system or network, an entire organization, etc.) can be attacked and indicates the countermeasures that can be taken to prevent the attackers to reach their objective. In this paper, we built an Attack Tree focused on the goal "compromising the security of a Web platform", considering the most common vulnerabilities of the WordPress platform identified by CVE (Common Vulnerabilities and Exposures), a global reference system for recording information regarding computer security threats. Finally, based on the likelihood of the attacks, we made a quantitative analysis of the probability that the security of the Web platform can be compromised.

URLhttp://ieeexplore.ieee.org/document/8166456/
DOI10.1109/ECAI.2017.8166456
Citation Keypetrica_studying_2017