Ajou University repository

Threat-driven Risk Assessment for APT Attacks using Risk-Aware Problem Domain Ontology
Citations

SCOPUS

0

Citation Export

DC Field Value Language
dc.contributor.authorPark, Sihn Hye-
dc.contributor.authorLee, Seok Won-
dc.date.issued2022-01-01-
dc.identifier.urihttps://aurora.ajou.ac.kr/handle/2018.oak/36833-
dc.identifier.urihttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85142265119&origin=inward-
dc.description.abstractCybersecurity attacks, which have many business impacts, continuously become more intelligent and complex. These attacks take the form of a combination of various attack elements. APT attacks reflect this characteristic well. To defend against APT attacks, organizations should sufficiently understand these attacks based on the attack elements and their relations and actively defend against these attacks in multiple dimensions. Most organizations perform risk management to manage their information security. Generally, they use the information system risk assessment (ISRA). However, the method has difficulties supporting sufficiently analyzing security risks and actively responding to these attacks due to the limitations of asset-driven qualitative evaluation activities. In this paper, we propose a threat-driven risk assessment method. This method can evaluate how dangerous APT attacks are for an organization, analyze security risks from multiple perspectives, and support establishing an adaptive security strategy.-
dc.description.sponsorshipThis research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NKF), funded by the Ministry of Science and ICT (NRF-2020R1F1A1075605), and the BK21 FOUR program of the National Research Foundation of Korea, funded by the Ministry of Education (NRF5199991014091).-
dc.language.isoeng-
dc.publisherIEEE Computer Society-
dc.subject.meshAdvanced persistent threat-
dc.subject.meshAsset identification-
dc.subject.meshBusiness Process-
dc.subject.meshBusiness process-based asset identification-
dc.subject.meshDomain ontologies-
dc.subject.meshEvidence-based-
dc.subject.meshEvidence-based risk evaluation-
dc.subject.meshProblem domain-
dc.subject.meshProcess-based-
dc.subject.meshRisk aware-
dc.subject.meshRisk evaluation-
dc.subject.meshRisk-aware problem domain ontology-
dc.subject.meshRisks assessments-
dc.subject.meshThreat-driven risk assessment-
dc.titleThreat-driven Risk Assessment for APT Attacks using Risk-Aware Problem Domain Ontology-
dc.typeConference-
dc.citation.conferenceDate2022.8.15. ~ 2022.8.19.-
dc.citation.conferenceName30th IEEE International Requirements Engineering Conference Workshops, REW 2022-
dc.citation.editionProceedings - 30th IEEE International Requirements Engineering Conference Workshops, REW 2022-
dc.citation.endPage231-
dc.citation.startPage226-
dc.citation.titleProceedings of the IEEE International Conference on Requirements Engineering-
dc.identifier.bibliographicCitationProceedings of the IEEE International Conference on Requirements Engineering, pp.226-231-
dc.identifier.doi10.1109/rew56159.2022.00050-
dc.identifier.scopusid2-s2.0-85142265119-
dc.subject.keywordadvanced persistent threat-
dc.subject.keywordbusiness process-based asset identification-
dc.subject.keywordevidence-based risk evaluation-
dc.subject.keywordrisk-aware problem domain ontology-
dc.subject.keywordthreat-driven risk assessment-
dc.type.otherConference Paper-
dc.description.isoafalse-
dc.subject.subareaComputer Science (all)-
dc.subject.subareaEngineering (all)-
dc.subject.subareaStrategy and Management-
Show simple item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Lee, Seok-Won Image
Lee, Seok-Won이석원
Department of Software and Computer Engineering
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.