Browse > Article
http://dx.doi.org/10.13089/JKIISC.2019.29.5.1167

A Study of Effectiveness of the Improved Security Operation Model Based on Vulnerability Database  

Hyun, Suk-woo (Information Security Lab., Graduation School of Information, Yonsei University)
Kwon, Taekyoung (Information Security Lab., Graduation School of Information, Yonsei University)
Abstract
In this paper, the improved security operation model based on the vulnerability database is studied. The proposed model consists of information protection equipment, vulnerability database, and a dashboard that visualizes and provides the results of interworking with detected logs. The evaluation of the model is analyzed by setting up a simulated attack scenario in a virtual infrastructure. In contrast to the traditional method, it is possible to respond quickly to threats of attacks specific to the security vulnerabilities that the asset has, and to find redundancy between detection rules with a secure agent, thereby creating an optimal detection rule.
Keywords
Vulnerability Database; Security Vulnerability; Security Operation; Infringement Accident; Cyber Threat;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Dong-jin Kim, Sung-je Cho, "An Analysis of Domestic and Foreign Security Vulnerability Management Systems based on a National Vulnerability Database," Internet and Information Security, vol. 1, no. 2, pp. 130-147, Nov. 2010.
2 Han-eul Ryu, Tae-kyu Kim, Wan-soo Cho, "Method of Standard Dataset based Vulnerability Database Design for Constructive Modeling & Simulation," Proceedings of Symposium of the Korean Institute of Communications and Information Sciences, pp. 1346-1347, Jun. 2017.
3 Gu Yun-hua, Li Pei, "Design and Research on Vulnerability Database," 2010 Third International Conference on Information and Computing, vol. 2, pp. 209-212, Jun. 2010.
4 Yu-kyong Kim, Seung-cheol Shin, Joon-seon Ahn, Ouk-seh Lee, Eun-young Lee, Hwan-soo Han, "Analysis and Documentation of Korean Common Weakness Enumeration for Software Security," Communications of the Korean Institute of Information Scientists and Engineers, vol. 28, no. 2, pp. 20-31, Feb. 2010.
5 Yung-Yu Chang, Pavol Zavarsky, Ron Ruhl, Dale Lindskog, "Trend Analysis of the CVE for Software Vulnerability Management," 2011 IEEE Third International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing, pp. 1290-1293, Oct. 2011.
6 Su Zhang, Xlnmlng OU, Dolna Caragea, "Predicting Cyber Risks through National Vulnerability Database," Information Security Journal : A Global Perspective, pp. 194-206, Nov. 2015.
7 Jeong-hoon Hyun, Hyoung-joong Kim, "Security Operation Implementation through Big Data Analysis by Using Open Source ELK Stack," Journal of Digital Contents Society, vol. 19, no. 1, pp. 181-191, Jan. 2018.   DOI
8 Jin-guk Um, Hun-yeong Kwon, "Model Proposal for Detection Method of Cyber Attack using SIEM," The Journal of The Institute of Internet, Broadcasting and Communication, vol. 16, no. 6, pp. 43-54, Dec. 2016.   DOI
9 Sang-duck Cho, "A Study of Security Monitoring Enhancement by Using Security Vulnerability diagnosis," Konkuk University, Feb. 2014.
10 In-seok Jeon, Keun-hee Han, Dong-won Kim, Jin-yung Choi, "Using the SIEM Software vulnerability detection model proposed," Journal of the Korea Institute of Information Security & Cryptology, vol. 25, no. 4, pp. 961-974, Aug. 2015.   DOI
11 Jae-heon Lee, Sang-jin Lee, "A Study on Effective Security Control Model Based on Characteristic of Web Service," Journal of the Korea Institute of Information Security & Cryptology, vol. 29, no. 1, pp. 175-185, Feb. 2019.   DOI