네트워크 취약성 분석을 위한 확장된 사이버 공격 트리에 관한 연구
We extended a general attack tree to apply cyber attack model for network vulnerability analysis. We defined an extended cyber attack tree (E-CAT) which extends the general attack tree by associating each node of the tree with a transition of attack that could have contributed to the cyber attack. T...
Saved in:
Published in | (사)디지털산업정보학회 논문지, 6(3) Vol. 6; no. 3; pp. 49 - 57 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | Korean |
Published |
(사)디지털산업정보학회
01.09.2010
|
Subjects | |
Online Access | Get full text |
ISSN | 1738-6667 2713-9018 |
Cover
Abstract | We extended a general attack tree to apply cyber attack model for network vulnerability analysis. We defined an extended cyber attack tree (E-CAT) which extends the general attack tree by associating each node of the tree with a transition of attack that could have contributed to the cyber attack. The E-CAT resolved the limitation that a general attack tree can not express complex and sophisticate attacks. Firstly, the Boolean expression can simply express attack scenario with symbols and codes. Secondary, An Attack Generation Probability is used to select attack method in an attack tree. A CONDITION-composition can express new and modified attack transition which a aeneral attack tree can not express. The E-CAT is possible to have attack's flexibility and improve attack success rate when it is applied to cyber attack model. |
---|---|
AbstractList | We extended a general attack tree to apply cyber attack model for network vulnerability analysis. We defined an extended cyber attack tree (E-CAT) which extends the general attack tree by associating each node of the tree with a transition of attack that could have contributed to the cyber attack. The E-CAT resolved the limitation that a general attack tree can not express complex and sophisticate attacks. Firstly, the Boolean expression can simply express attack scenario with symbols and codes. Secondary, An Attack Generation Probability is used to select attack method in an attack tree. A CONDITION-composition can express new and modified attack transition which a aeneral attack tree can not express. The E-CAT is possible to have attack's flexibility and improve attack success rate when it is applied to cyber attack model. KCI Citation Count: 9 We extended a general attack tree to apply cyber attack model for network vulnerability analysis. We defined an extended cyber attack tree (E-CAT) which extends the general attack tree by associating each node of the tree with a transition of attack that could have contributed to the cyber attack. The E-CAT resolved the limitation that a general attack tree can not express complex and sophisticate attacks. Firstly, the Boolean expression can simply express attack scenario with symbols and codes. Secondary, An Attack Generation Probability is used to select attack method in an attack tree. A CONDITION-composition can express new and modified attack transition which a aeneral attack tree can not express. The E-CAT is possible to have attack's flexibility and improve attack success rate when it is applied to cyber attack model. |
Author | 엄정호 Park, Seon Ho Eom, Jung Ho Chung, Tai M 박선호 정태명 |
Author_xml | – sequence: 1 fullname: 엄정호 – sequence: 2 fullname: 박선호 – sequence: 3 fullname: 정태명 – sequence: 4 fullname: Eom, Jung Ho – sequence: 5 fullname: Park, Seon Ho – sequence: 6 fullname: Chung, Tai M |
BackLink | https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001483538$$DAccess content in National Research Foundation of Korea (NRF) |
BookMark | eNotkMtKw0AARQepYK39h9kIbgIzmcxrWYrvQkG6chPylJCSQuMHqMxKXHRTiti6UlHIQmurbvyhZPIPRuvqbM69F-4mqCWDJFgDdZNjYkiERQ3UMSfCYIzxDdBM08hFhJlcUEHr4LRQD-X1l767KS8zqD-f9fhbqzdYfCitZnqmoJ6qcjyF5e1Y3z8WoynUV5meLYq5gvn7Mp-_wCpfPGV6MoL54uLX1ZPXfJltgfXQ6adB858N0Nvb7bUPjE53_7Dd6hgxI9LwkfAch3rYpQGhZiiFj3xOHVdKHAShYMJEiBOJkCelb7ke4hRzylxf0sBCLmmAnVVtMgzt2IvsgRP98Wxgx0O7ddI7tLkwLUtW6vZKjaP0PLITP-3bR63jrolwtcEI54zh6qwfTeB4TA |
ContentType | Journal Article |
DBID | JDI ACYCR |
DEWEY | 621.382 |
DatabaseName | KoreaScience Korean Citation Index |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
DocumentTitleAlternate | A Study on an Extended Cyber Attack Tree for an Analysis of Network Vulnerability |
EISSN | 2713-9018 |
EndPage | 57 |
ExternalDocumentID | oai_kci_go_kr_ARTI_782449 JAKO201007637766117 |
GroupedDBID | .UV JDI ACYCR M~E |
ID | FETCH-LOGICAL-k639-d08caa5c1b5e352f98d0d75ab991eef86820073900c99d4bc0751756bd95e40b3 |
ISSN | 1738-6667 |
IngestDate | Tue Nov 21 21:41:23 EST 2023 Fri Dec 22 11:59:02 EST 2023 |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | false |
Issue | 3 |
Keywords | Cyber attack model Extended Attack Tree Attack tree |
Language | Korean |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-k639-d08caa5c1b5e352f98d0d75ab991eef86820073900c99d4bc0751756bd95e40b3 |
Notes | KISTI1.1003/JNL.JAKO201007637766117 G704-SER000010259.2010.6.3.019 |
OpenAccessLink | http://click.ndsl.kr/servlet/LinkingDetailView?cn=JAKO201007637766117&dbt=JAKO&org_code=O481&site_code=SS1481&service_code=01 |
PageCount | 9 |
ParticipantIDs | nrf_kci_oai_kci_go_kr_ARTI_782449 kisti_ndsl_JAKO201007637766117 |
PublicationCentury | 2000 |
PublicationDate | 2010-09 |
PublicationDateYYYYMMDD | 2010-09-01 |
PublicationDate_xml | – month: 09 year: 2010 text: 2010-09 |
PublicationDecade | 2010 |
PublicationTitle | (사)디지털산업정보학회 논문지, 6(3) |
PublicationTitleAlternate | Journal of the Korea Society of Digital Industry and Information Management |
PublicationYear | 2010 |
Publisher | (사)디지털산업정보학회 |
Publisher_xml | – name: (사)디지털산업정보학회 |
SSID | ssib036278585 ssib044734564 ssib008451690 ssib053377100 ssib026777133 |
Score | 1.4543059 |
Snippet | We extended a general attack tree to apply cyber attack model for network vulnerability analysis. We defined an extended cyber attack tree (E-CAT) which... |
SourceID | nrf kisti |
SourceType | Open Website Open Access Repository |
StartPage | 49 |
SubjectTerms | 컴퓨터학 |
Title | 네트워크 취약성 분석을 위한 확장된 사이버 공격 트리에 관한 연구 |
URI | http://click.ndsl.kr/servlet/LinkingDetailView?cn=JAKO201007637766117&dbt=JAKO&org_code=O481&site_code=SS1481&service_code=01 https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001483538 |
Volume | 6 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
ispartofPNX | (사)디지털산업정보학회 논문지, 2010, 6(3), , pp.49-57 |
journalDatabaseRights | – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2713-9018 dateEnd: 99991231 omitProxy: true ssIdentifier: ssib044734564 issn: 1738-6667 databaseCode: M~E dateStart: 20050101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3NaxQxFA9tT15EUbF-lBHMqYxkZpNJcpxsV2pFvVQoXpadj5WysoV-XDyIypzEQy-liK0nFYU9aG3Vi3-A_8ru7P_ge5nZ7lQqVEFYhszLyy8veTOb38tkMoRcF37a9lMZuS0VKxdGvMDVNU-4gfbbLZEkSZDi1MCdu8H8fb6wJJYmJn9WVi1trEc34sfHvlfyL14FGfgV35L9C88egoIA0uBfOIKH4XgiH9OGoYrTkNPGHFUhNYo26lSDsG4lHg3rsygykoZFnqBmDhNQzHizCGACPClE2ubBUXFbTlspQEE5jVCQ0niCeQ0aCgTQrMgDXR8qLBEMt-B-AQW21agRNgFKerZisaFhMConAa1Q57gGo1KzzTTM5gla7hhZsmpgyePqfW2N4vgDYShLIGzxSA1xLKCyTQmZbZOxRh62V9tECJ1p-wlUTd1aWy-BCmi4RgMwoDpjPQLnFXCAUlBurGLQiqIr0YfsGJVKYcDXRe1gkKjO1eAyA12dq_nfvVEZxySMYxCZFlwmtTJfejVcjaMq41WxXWzJfIQck4LRQojfuMKRXck78XLz4Uqzs9qE2OtWE7gm53qSTMIQgmtonzQO_9gVP_I41g-klN44zgASJaufQeBc1nCbI_syc9kQCB4xoloGDthdbVc44OIZcroM3pywuBPPkonOyjnyYJC9Hb74nr9-OXzWc_JvH_KtH3n22Rl8zfJsN9_NnHwnG27tOMNXW_mbd4PNHSd_3st39wd7mdP_ctDf--hA-cH7Xr696fT3n6Juvv2pf9A7TxZvNhbr8275xRK3A0zfTZiKWy0Re5FIIbBpa5WwRIpWBEFYmrZVoHz7ZJyxWOuERzHwdaDvQZRokXIW1S6Qqe5KN71IHBaxRCjc7bemucBJA82SNu6tBQGEJ9NpMmO7o9lN1h41F8Lb9_B6Y8AWpATK7clpcg36yfroj766dAKdy-TU-Eq-QqbWVzfSq8DD16MZ6-Nfo6yrGA |
linkProvider | ISSN International Centre |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=%EB%84%A4%ED%8A%B8%EC%9B%8C%ED%81%AC+%EC%B7%A8%EC%95%BD%EC%84%B1+%EB%B6%84%EC%84%9D%EC%9D%84+%EC%9C%84%ED%95%9C+%ED%99%95%EC%9E%A5%EB%90%9C+%EC%82%AC%EC%9D%B4%EB%B2%84+%EA%B3%B5%EA%B2%A9+%ED%8A%B8%EB%A6%AC%EC%97%90+%EA%B4%80%ED%95%9C+%EC%97%B0%EA%B5%AC&rft.jtitle=%28%EC%82%AC%29%EB%94%94%EC%A7%80%ED%84%B8%EC%82%B0%EC%97%85%EC%A0%95%EB%B3%B4%ED%95%99%ED%9A%8C+%EB%85%BC%EB%AC%B8%EC%A7%80%2C+6%283%29&rft.au=%EC%97%84%EC%A0%95%ED%98%B8&rft.au=%EB%B0%95%EC%84%A0%ED%98%B8&rft.au=%EC%A0%95%ED%83%9C%EB%AA%85&rft.date=2010-09-01&rft.pub=%28%EC%82%AC%29%EB%94%94%EC%A7%80%ED%84%B8%EC%82%B0%EC%97%85%EC%A0%95%EB%B3%B4%ED%95%99%ED%9A%8C&rft.issn=1738-6667&rft.eissn=2713-9018&rft.spage=49&rft.epage=57&rft.externalDBID=n%2Fa&rft.externalDocID=oai_kci_go_kr_ARTI_782449 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1738-6667&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1738-6667&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1738-6667&client=summon |