A Simulation Approach for Information Assurance : Focus on Vulnerability Analysis

정보보증을 위한 시뮬레이션 접근: 취약성 분석을 중심으로

  • 이장세 (해양대학교 컴퓨터제어전자통신공학부) ;
  • 유용준 (항공대학교 컴퓨터공학과) ;
  • 지승도 (항공대학교 컴퓨터공학과)
  • Published : 2007.11.07

Abstract

Keywords

References

  1. 김여라, 김홍근, '사이버보안을 위한 국가 프레임워크 개발', 정보보호 글로벌 동향, 정책개발 06-06, 한국정보보호진흥원, 2006
  2. 송관호, '인터넷대란과 대응방안', 한국통신학회지(정보통신), 제21권, 1호, pp.60-69, 2004
  3. 윤재석, 원순재, '미국 사이버보안 R&D 계획 및 시사점', IITA 주간기술동향, 통권 1253호, 2006
  4. A. Jones, 'The challenge of building survivable information-intensive systems', IEEE Computer, Vol. 33, No. 8, pp. 39-43, 2000
  5. Aslam, T., A taxonomy of security faults in the UNIX operating system, M.S. thesis, Purdue University, 1995
  6. C.E. Landwehr, et. al., 'A Taxonomy of Computer Program Security Flaws', ACM Computing Surveys, Vol. 26(3), pp. 211-254, 1994 https://doi.org/10.1145/185403.185412
  7. Char Sample, Ian Poynter, 'Quantifying vulnerabilities in the networked environment: Methods and Uses', The Internet Security Conference 2000, 2000
  8. F. Cohen. 'Simulating Cyber Attacks, Defenses, and Consequences', Computer & Security, Vol. 18, pp 479-518, 1999 https://doi.org/10.1016/S0167-4048(99)80115-1
  9. N. Ye, and J. Giordano, 'CACS - A Process Control Approach to Cyber Attack Detection', Communications of the ACM, Vol.44(8), pp.76-82, 2001
  10. J.S. Lee, et. al., 'Design of Intelligent Security Management System using Simulation-based Analysis', AI2005:Advances in Artificial Intelligence, LNAI 3809, pp.766-775, 2005
  11. J.S. Lee, J.R. Jung and S.D. Chi, 'Vulnerability Measures for Network Vulnerability Analysis System', Proc. of 2002 IRC International Conference on Internet Information Retrieval, 2002
  12. R.A. Martin, 'Managing Vulnerabilities in Networked Systems', IEEE Computer, Vol. 34(11), pp. 32-38, 2001
  13. S.D. Chi, J.S. Park, and J.S. Lee, 'A Role of DEVS Simulation for Information Assurance', Information Security Applications, LNCS 2908, pp.27-41, 2004
  14. S. Hariri, et. al., 'A Framework for Network Vulnerability Analysis', Communications, Internet and Information Technology 2002, 2002
  15. Y.J. You, J.S. Lee, and S.D. Chi, 'SIMVA : A tool for the Network Vulnerability Analysis', PROCEEDING of International Conference on Internet Information Retrieval 2003, 2003
  16. B.P. Zeigler, H. Praehofer, and T.G. Kim. Theory of Modeling and Simulation 2ed., Academic Press, 1999