공격 그래프 상의 보안 메트릭 사용 방안 조사Survey on the use of security metrics on attack graph
- Other Titles
- Survey on the use of security metrics on attack graph
- Authors
- 이경민; 김휘강
- Issue Date
- 2018
- Publisher
- 한국컴퓨터정보학회
- Keywords
- Attack Graph; CVSS; Security Metric; Moving Target Defense; Survey
- Citation
- 한국컴퓨터정보학회논문지, v.23, no.12, pp.95 - 105
- Indexed
- KCI
- Journal Title
- 한국컴퓨터정보학회논문지
- Volume
- 23
- Number
- 12
- Start Page
- 95
- End Page
- 105
- URI
- https://scholar.korea.ac.kr/handle/2021.sw.korea/80280
- DOI
- 10.9708/jksci.2018.23.12.095
- ISSN
- 1598-849X
- Abstract
- As the IT industry developed, the information held by the company soon became a corporate asset.
As this information has value as an asset, the number and scale of various cyber attacks which targeting enterprises and institutions is increasing day by day. Therefore, research are being carried out to protect the assets from cyber attacks by using the attack graph to identify the possibility and risk of various attacks in advance and prepare countermeasures against the attacks. In the attack graph, security metric is used as a measure for determining the importance of each asset or the risk of an attack. This is a key element of the attack graph used as a criterion for determining which assets should be protected first or which attack path should be removed first. In this survey, we research trends of various security metrics used in attack graphs and classify the research according to application viewpoints, use of CVSS(Common Vulnerability Scoring System), and detail metrics.
Furthermore, we discussed how to graft the latest security technologies, such as MTD(Moving Target Defense) or SDN(Software Defined Network), onto the attack graphs.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - School of Cyber Security > Department of Information Security > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.