네트워크 취약성 분석을 위한 확장된 사이버 공격 트리에 관한 연구

We extended a general attack tree to apply cyber attack model for network vulnerability analysis. We defined an extended cyber attack tree (E-CAT) which extends the general attack tree by associating each node of the tree with a transition of attack that could have contributed to the cyber attack. T...

Full description

Saved in:
Bibliographic Details
Published in(사)디지털산업정보학회 논문지, 6(3) Vol. 6; no. 3; pp. 49 - 57
Main Authors 엄정호, 박선호, 정태명, Eom, Jung Ho, Park, Seon Ho, Chung, Tai M
Format Journal Article
LanguageKorean
Published (사)디지털산업정보학회 01.09.2010
Subjects
Online AccessGet full text
ISSN1738-6667
2713-9018

Cover

Abstract We extended a general attack tree to apply cyber attack model for network vulnerability analysis. We defined an extended cyber attack tree (E-CAT) which extends the general attack tree by associating each node of the tree with a transition of attack that could have contributed to the cyber attack. The E-CAT resolved the limitation that a general attack tree can not express complex and sophisticate attacks. Firstly, the Boolean expression can simply express attack scenario with symbols and codes. Secondary, An Attack Generation Probability is used to select attack method in an attack tree. A CONDITION-composition can express new and modified attack transition which a aeneral attack tree can not express. The E-CAT is possible to have attack's flexibility and improve attack success rate when it is applied to cyber attack model.
AbstractList We extended a general attack tree to apply cyber attack model for network vulnerability analysis. We defined an extended cyber attack tree (E-CAT) which extends the general attack tree by associating each node of the tree with a transition of attack that could have contributed to the cyber attack. The E-CAT resolved the limitation that a general attack tree can not express complex and sophisticate attacks. Firstly, the Boolean expression can simply express attack scenario with symbols and codes. Secondary, An Attack Generation Probability is used to select attack method in an attack tree. A CONDITION-composition can express new and modified attack transition which a aeneral attack tree can not express. The E-CAT is possible to have attack's flexibility and improve attack success rate when it is applied to cyber attack model. KCI Citation Count: 9
We extended a general attack tree to apply cyber attack model for network vulnerability analysis. We defined an extended cyber attack tree (E-CAT) which extends the general attack tree by associating each node of the tree with a transition of attack that could have contributed to the cyber attack. The E-CAT resolved the limitation that a general attack tree can not express complex and sophisticate attacks. Firstly, the Boolean expression can simply express attack scenario with symbols and codes. Secondary, An Attack Generation Probability is used to select attack method in an attack tree. A CONDITION-composition can express new and modified attack transition which a aeneral attack tree can not express. The E-CAT is possible to have attack's flexibility and improve attack success rate when it is applied to cyber attack model.
Author 엄정호
Park, Seon Ho
Eom, Jung Ho
Chung, Tai M
박선호
정태명
Author_xml – sequence: 1
  fullname: 엄정호
– sequence: 2
  fullname: 박선호
– sequence: 3
  fullname: 정태명
– sequence: 4
  fullname: Eom, Jung Ho
– sequence: 5
  fullname: Park, Seon Ho
– sequence: 6
  fullname: Chung, Tai M
BackLink https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001483538$$DAccess content in National Research Foundation of Korea (NRF)
BookMark eNotkMtKw0AARQepYK39h9kIbgIzmcxrWYrvQkG6chPylJCSQuMHqMxKXHRTiti6UlHIQmurbvyhZPIPRuvqbM69F-4mqCWDJFgDdZNjYkiERQ3UMSfCYIzxDdBM08hFhJlcUEHr4LRQD-X1l767KS8zqD-f9fhbqzdYfCitZnqmoJ6qcjyF5e1Y3z8WoynUV5meLYq5gvn7Mp-_wCpfPGV6MoL54uLX1ZPXfJltgfXQ6adB858N0Nvb7bUPjE53_7Dd6hgxI9LwkfAch3rYpQGhZiiFj3xOHVdKHAShYMJEiBOJkCelb7ke4hRzylxf0sBCLmmAnVVtMgzt2IvsgRP98Wxgx0O7ddI7tLkwLUtW6vZKjaP0PLITP-3bR63jrolwtcEI54zh6qwfTeB4TA
ContentType Journal Article
DBID JDI
ACYCR
DEWEY 621.382
DatabaseName KoreaScience
Korean Citation Index
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Engineering
DocumentTitleAlternate A Study on an Extended Cyber Attack Tree for an Analysis of Network Vulnerability
EISSN 2713-9018
EndPage 57
ExternalDocumentID oai_kci_go_kr_ARTI_782449
JAKO201007637766117
GroupedDBID .UV
JDI
ACYCR
M~E
ID FETCH-LOGICAL-k639-d08caa5c1b5e352f98d0d75ab991eef86820073900c99d4bc0751756bd95e40b3
ISSN 1738-6667
IngestDate Tue Nov 21 21:41:23 EST 2023
Fri Dec 22 11:59:02 EST 2023
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
Issue 3
Keywords Cyber attack model
Extended Attack Tree
Attack tree
Language Korean
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-k639-d08caa5c1b5e352f98d0d75ab991eef86820073900c99d4bc0751756bd95e40b3
Notes KISTI1.1003/JNL.JAKO201007637766117
G704-SER000010259.2010.6.3.019
OpenAccessLink http://click.ndsl.kr/servlet/LinkingDetailView?cn=JAKO201007637766117&dbt=JAKO&org_code=O481&site_code=SS1481&service_code=01
PageCount 9
ParticipantIDs nrf_kci_oai_kci_go_kr_ARTI_782449
kisti_ndsl_JAKO201007637766117
PublicationCentury 2000
PublicationDate 2010-09
PublicationDateYYYYMMDD 2010-09-01
PublicationDate_xml – month: 09
  year: 2010
  text: 2010-09
PublicationDecade 2010
PublicationTitle (사)디지털산업정보학회 논문지, 6(3)
PublicationTitleAlternate Journal of the Korea Society of Digital Industry and Information Management
PublicationYear 2010
Publisher (사)디지털산업정보학회
Publisher_xml – name: (사)디지털산업정보학회
SSID ssib036278585
ssib044734564
ssib008451690
ssib053377100
ssib026777133
Score 1.4543059
Snippet We extended a general attack tree to apply cyber attack model for network vulnerability analysis. We defined an extended cyber attack tree (E-CAT) which...
SourceID nrf
kisti
SourceType Open Website
Open Access Repository
StartPage 49
SubjectTerms 컴퓨터학
Title 네트워크 취약성 분석을 위한 확장된 사이버 공격 트리에 관한 연구
URI http://click.ndsl.kr/servlet/LinkingDetailView?cn=JAKO201007637766117&dbt=JAKO&org_code=O481&site_code=SS1481&service_code=01
https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001483538
Volume 6
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
ispartofPNX (사)디지털산업정보학회 논문지, 2010, 6(3), , pp.49-57
journalDatabaseRights – providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2713-9018
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssib044734564
  issn: 1738-6667
  databaseCode: M~E
  dateStart: 20050101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3NaxQxFA9tT15EUbF-lBHMqYxkZpNJcpxsV2pFvVQoXpadj5WysoV-XDyIypzEQy-liK0nFYU9aG3Vi3-A_8ru7P_ge5nZ7lQqVEFYhszLyy8veTOb38tkMoRcF37a9lMZuS0VKxdGvMDVNU-4gfbbLZEkSZDi1MCdu8H8fb6wJJYmJn9WVi1trEc34sfHvlfyL14FGfgV35L9C88egoIA0uBfOIKH4XgiH9OGoYrTkNPGHFUhNYo26lSDsG4lHg3rsygykoZFnqBmDhNQzHizCGACPClE2ubBUXFbTlspQEE5jVCQ0niCeQ0aCgTQrMgDXR8qLBEMt-B-AQW21agRNgFKerZisaFhMConAa1Q57gGo1KzzTTM5gla7hhZsmpgyePqfW2N4vgDYShLIGzxSA1xLKCyTQmZbZOxRh62V9tECJ1p-wlUTd1aWy-BCmi4RgMwoDpjPQLnFXCAUlBurGLQiqIr0YfsGJVKYcDXRe1gkKjO1eAyA12dq_nfvVEZxySMYxCZFlwmtTJfejVcjaMq41WxXWzJfIQck4LRQojfuMKRXck78XLz4Uqzs9qE2OtWE7gm53qSTMIQgmtonzQO_9gVP_I41g-klN44zgASJaufQeBc1nCbI_syc9kQCB4xoloGDthdbVc44OIZcroM3pywuBPPkonOyjnyYJC9Hb74nr9-OXzWc_JvH_KtH3n22Rl8zfJsN9_NnHwnG27tOMNXW_mbd4PNHSd_3st39wd7mdP_ctDf--hA-cH7Xr696fT3n6Juvv2pf9A7TxZvNhbr8275xRK3A0zfTZiKWy0Re5FIIbBpa5WwRIpWBEFYmrZVoHz7ZJyxWOuERzHwdaDvQZRokXIW1S6Qqe5KN71IHBaxRCjc7bemucBJA82SNu6tBQGEJ9NpMmO7o9lN1h41F8Lb9_B6Y8AWpATK7clpcg36yfroj766dAKdy-TU-Eq-QqbWVzfSq8DD16MZ6-Nfo6yrGA
linkProvider ISSN International Centre
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=%EB%84%A4%ED%8A%B8%EC%9B%8C%ED%81%AC+%EC%B7%A8%EC%95%BD%EC%84%B1+%EB%B6%84%EC%84%9D%EC%9D%84+%EC%9C%84%ED%95%9C+%ED%99%95%EC%9E%A5%EB%90%9C+%EC%82%AC%EC%9D%B4%EB%B2%84+%EA%B3%B5%EA%B2%A9+%ED%8A%B8%EB%A6%AC%EC%97%90+%EA%B4%80%ED%95%9C+%EC%97%B0%EA%B5%AC&rft.jtitle=%28%EC%82%AC%29%EB%94%94%EC%A7%80%ED%84%B8%EC%82%B0%EC%97%85%EC%A0%95%EB%B3%B4%ED%95%99%ED%9A%8C+%EB%85%BC%EB%AC%B8%EC%A7%80%2C+6%283%29&rft.au=%EC%97%84%EC%A0%95%ED%98%B8&rft.au=%EB%B0%95%EC%84%A0%ED%98%B8&rft.au=%EC%A0%95%ED%83%9C%EB%AA%85&rft.date=2010-09-01&rft.pub=%28%EC%82%AC%29%EB%94%94%EC%A7%80%ED%84%B8%EC%82%B0%EC%97%85%EC%A0%95%EB%B3%B4%ED%95%99%ED%9A%8C&rft.issn=1738-6667&rft.eissn=2713-9018&rft.spage=49&rft.epage=57&rft.externalDBID=n%2Fa&rft.externalDocID=oai_kci_go_kr_ARTI_782449
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1738-6667&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1738-6667&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1738-6667&client=summon