Ajou University repository

Multi-perspective APT Attack Risk Assessment Framework using Risk-Aware Problem Domain Ontology
Citations

SCOPUS

0

Citation Export

DC Field Value Language
dc.contributor.authorPark, Sihn Hye-
dc.contributor.authorJung, Ji Wook-
dc.contributor.authorLee, Seok Won-
dc.date.issued2021-09-01-
dc.identifier.urihttps://aurora.ajou.ac.kr/handle/2018.oak/36718-
dc.identifier.urihttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85118462555&origin=inward-
dc.description.abstractCyber-attacks, which affect a wide range of areas such as political, economic, and social organizations, continue to evolve along with rapid changes in the IT environment, becoming more intelligent and complex. Especially, APT attacks have specific targets with obvious goals and use complex strategies from multiple perspectives. To proactively defend against these potential attacks, it is important to assess security risks based on a comprehensive and systematic understanding of APT attacks. In this paper, we propose the APT Attack Risk Assessment Framework to evaluate the security risks for specific APT attacks, using Risk-Aware Problem Domain Ontology. The proposed framework can assess the risks in which a specific APT attack affects an organization within a domain.-
dc.description.sponsorshipThis research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science and ICT (NRF-2020RIF1A1075605).-
dc.language.isoeng-
dc.publisherIEEE Computer Society-
dc.subject.meshAdvanced persistent threat-
dc.subject.meshDomain ontologies-
dc.subject.meshMulti-perspective-
dc.subject.meshProblem domain-
dc.subject.meshProblem domain ontology-
dc.subject.meshRisk assessment framework-
dc.subject.meshRisk aware-
dc.subject.meshSecurity requirements-
dc.subject.meshSecurity risk assessments-
dc.subject.meshSecurity risks-
dc.titleMulti-perspective APT Attack Risk Assessment Framework using Risk-Aware Problem Domain Ontology-
dc.typeConference-
dc.citation.conferenceDate2021.9.20. ~ 2021.9.24.-
dc.citation.conferenceName29th IEEE International Requirements Engineering Conference Workshops, REW 2021-
dc.citation.editionProceedings - 29th IEEE International Requirements Engineering Conference Workshops, REW 2021-
dc.citation.endPage405-
dc.citation.startPage400-
dc.citation.titleProceedings of the IEEE International Conference on Requirements Engineering-
dc.citation.volume2021-September-
dc.identifier.bibliographicCitationProceedings of the IEEE International Conference on Requirements Engineering, Vol.2021-September, pp.400-405-
dc.identifier.doi10.1109/rew53955.2021.00071-
dc.identifier.scopusid2-s2.0-85118462555-
dc.subject.keywordAdvanced Persistent Threat-
dc.subject.keywordProblem Domain Ontology-
dc.subject.keywordSecurity Requirements-
dc.subject.keywordSecurity Risk Assessment-
dc.type.otherConference Paper-
dc.description.isoafalse-
dc.subject.subareaComputer Science (all)-
dc.subject.subareaEngineering (all)-
dc.subject.subareaStrategy and Management-
Show simple item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Lee, Seok-Won Image
Lee, Seok-Won이석원
Department of Software and Computer Engineering
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.