Skip to main content

Cyber Security Modeling for the Operation of Virtualized Trusted Networks

  • Conference paper
  • First Online:
Advanced Multimedia and Ubiquitous Engineering

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 354))

  • 1418 Accesses

Abstract

The Virtualized Trusted Networks (VTN) is a novel network architecture which makes it possible to communicate in a secure manner between devices across unreliable networks. It provides confidentiality, availability, quality of service, mobility to users, anytime and anywhere. This paper presents the results of cyber security modeling for the reliable operation of the VTN. The security requirements are derived for security control of the system by analyzing threat elements and attack possibility in the security modeling procedure. By using STRIDE modeling, the threat elements are analyzed for each network component. Then an attack tree is constructed by analyzing attack examples for every threat. The security requirements and countermeasures are proposed to respond against cyber security attacks to the VTN.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gallagher, R.R.: A guide to understanding security modeling in trusted systems, NCSC-TG-010 (1992)

    Google Scholar 

  2. Jang, J.S., Kim, E.J., Jeon, Y.H.: Information security modeling for the operation of highly trusted networks, J. KIIT, 12(10) (2014)

    Google Scholar 

  3. Khand, P.A.: Attack tree based cyber security analysis of nuclear digital instrumentation and control systems. The Nucleus 46(4), 415–428 (2009)

    Google Scholar 

  4. IBM Virtualization White Paper, IBM (2006)

    Google Scholar 

  5. Schneier, B.: Attack trees. Dr. Dobb’s J. 24(12), 21–29 (1999)

    Google Scholar 

  6. Swiderski, F., Snyder, W.: Threat modeling, microsoft professional, MS, pp. 15 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yong-Hee Jeon .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jeon, YH. (2016). Cyber Security Modeling for the Operation of Virtualized Trusted Networks. In: Park, J., Chao, HC., Arabnia, H., Yen, N. (eds) Advanced Multimedia and Ubiquitous Engineering. Lecture Notes in Electrical Engineering, vol 354. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-47895-0_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-47895-0_14

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-47894-3

  • Online ISBN: 978-3-662-47895-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics