Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

보안 위험 평가를 위한 사회공학 공격 그래프 : Social Engineering Attack Graph framework(SEAG)

Full metadata record
DC Field Value Language
dc.contributor.author김준석-
dc.contributor.author강현재-
dc.contributor.author김진수-
dc.contributor.author김휘강-
dc.date.accessioned2021-09-02T19:03:45Z-
dc.date.available2021-09-02T19:03:45Z-
dc.date.created2021-06-17-
dc.date.issued2018-
dc.identifier.issn1598-849X-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/79635-
dc.description.abstractSocial engineering attack means to get information of Social engineering attack means to get information of opponent without technical attack or to induce opponent to provide information directly. In particular, social engineering does not approach opponents through technical attacks, so it is difficult to prevent all attacks with high-tech security equipment. Each company plans employee education and social training as a countermeasure to prevent social engineering. However, it is difficult for a security officer to obtain a practical education(training) effect, and it is also difficult to measure it visually. Therefore, to measure the social engineering threat, we use the results of social engineering training result to calculate the risk by system asset and propose a attack graph based probability. The security officer uses the results of social engineering training to analyze the security threats by asset and suggests a framework for quick security response. Through the framework presented in this paper, we measure the qualitative social engineering threats, collect system asset information, and calculate the asset risk to generate probability based attack graphs. As a result, the security officer can graphically monitor the degree of vulnerability of the asset's authority system, asset information and preferences along with social engineering training results. It aims to make it practical for companies to utilize as a key indicator for establishing a systematic security strategy in the enterprise.-
dc.languageKorean-
dc.language.isoko-
dc.publisher한국컴퓨터정보학회-
dc.title보안 위험 평가를 위한 사회공학 공격 그래프 : Social Engineering Attack Graph framework(SEAG)-
dc.title.alternativeSocial Engineering Attack Graph for Security Risk Assessment: Social Engineering Attack Graph framework(SEAG)-
dc.typeArticle-
dc.contributor.affiliatedAuthor김휘강-
dc.identifier.doi10.9708/jksci.2018.23.11.075-
dc.identifier.bibliographicCitation한국컴퓨터정보학회논문지, v.23, no.11, pp.75 - 84-
dc.relation.isPartOf한국컴퓨터정보학회논문지-
dc.citation.title한국컴퓨터정보학회논문지-
dc.citation.volume23-
dc.citation.number11-
dc.citation.startPage75-
dc.citation.endPage84-
dc.type.rimsART-
dc.identifier.kciidART002406755-
dc.description.journalClass2-
dc.description.journalRegisteredClasskci-
dc.subject.keywordAuthorAttack graph-
dc.subject.keywordAuthorSocial engineering-
dc.subject.keywordAuthorRisk assessment-
dc.subject.keywordAuthorNetwork security-
dc.subject.keywordAuthorAPT attack-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE