Ajou University repository

A Tool for Security Risk Assessment for APT Attacks: using Scenarios, Security Requirements, and Evidence
Citations

SCOPUS

0

Citation Export

DC Field Value Language
dc.contributor.authorPark, Sihn Hye-
dc.contributor.authorKim, Dongyoon-
dc.contributor.authorLee, Seok Won-
dc.date.issued2023-01-01-
dc.identifier.urihttps://aurora.ajou.ac.kr/handle/2018.oak/36980-
dc.identifier.urihttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85174387766&origin=inward-
dc.description.abstractAdvanced Persistent Threat (APT) attacks are complex, employing diverse attack elements and increasingly intelligent techniques. This paper introduces a tool for security risk assessment specifically designed for these attacks. This tool assists security teams in systematically analyzing APT attacks to derive adaptive security requirements for mission-critical target systems. Additionally, the tool facilitates the assessment of security risks, providing a comprehensive understanding of their impact on target systems. By leveraging this tool, security teams can enhance defense strategies, mitigating potential threats and ensuring the security of target systems.-
dc.description.sponsorshipThis work ' 'was supported \\ 3 by the CBK21 (+* ?FOUR 0& program \ of the /National Research ?Foundation of (Korea funded 3by the 8 Ministry of Education 1/(NRF5?=*FF1999FF*G*<910140GF*91) 2and the \u03b1Institute of \u03b1Information 9& .Communications Technology Planning 9& Evaluation 1\u03b1(IITP) \u03b1 2 under the Artificial \u03b1Intelligence .Convergence \u03b1Innovation Human Resources !Devel \opment 1(IITP\u03b1\u03b1 +-2023-RS-G+: +G2023-00255968) +: GG+==F>H2 grant funded 3by (Korea 18 (MSIT). \u03b1 2#-
dc.language.isoeng-
dc.publisherIEEE Computer Society-
dc.subject.meshAdaptive security-
dc.subject.meshAdaptive security requirement-
dc.subject.meshAdvanced persistent threat-
dc.subject.meshAttacks scenarios-
dc.subject.meshDomain ontologies-
dc.subject.meshEvidence-driven risk assessment-
dc.subject.meshProblem domain-
dc.subject.meshRisk aware-
dc.subject.meshRisk-aware problem domain ontology-
dc.subject.meshRisks assessments-
dc.subject.meshSecurity requirements-
dc.titleA Tool for Security Risk Assessment for APT Attacks: using Scenarios, Security Requirements, and Evidence-
dc.typeConference-
dc.citation.conferenceDate2023.9.4. ~ 2023.9.8.-
dc.citation.conferenceName31st IEEE International Requirements Engineering Conference, RE 2023-
dc.citation.editionProceedings - 31st IEEE International Requirements Engineering Conference, RE 2023-
dc.citation.endPage364-
dc.citation.startPage363-
dc.citation.titleProceedings of the IEEE International Conference on Requirements Engineering-
dc.citation.volume2023-September-
dc.identifier.bibliographicCitationProceedings of the IEEE International Conference on Requirements Engineering, Vol.2023-September, pp.363-364-
dc.identifier.doi10.1109/re57278.2023.00053-
dc.identifier.scopusid2-s2.0-85174387766-
dc.subject.keywordadaptive security requirements-
dc.subject.keywordadvanced persistent threat-
dc.subject.keywordattack scenario-
dc.subject.keywordevidence-driven risk assessment-
dc.subject.keywordrisk-aware problem domain ontology-
dc.type.otherConference Paper-
dc.description.isoafalse-
dc.subject.subareaComputer Science (all)-
dc.subject.subareaEngineering (all)-
dc.subject.subareaStrategy and Management-
Show simple item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Lee, Seok-Won Image
Lee, Seok-Won이석원
Department of Software and Computer Engineering
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.