• Title/Summary/Keyword: 위협 산출식

Search Result 5, Processing Time 0.025 seconds

3-Step Security Vulnerability Risk Scoring considering CVE Trends (CVE 동향을 반영한 3-Step 보안 취약점 위험도 스코어링)

  • Jihye, Lim;Jaewoo, Lee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.27 no.1
    • /
    • pp.87-96
    • /
    • 2023
  • As the number of security vulnerabilities increases yearly, security threats continue to occur, and the vulnerability risk is also important. We devise a security threat score calculation reflecting trends to determine the risk of security vulnerabilities. The three stages considered key elements such as attack type, supplier, vulnerability trend, and current attack methods and techniques. First, it reflects the results of checking the relevance of the attack type, supplier, and CVE. Secondly, it considers the characteristics of the topic group and CVE identified through the LDA algorithm by the Jaccard similarity technique. Third, the latest version of the MITER ATT&CK framework attack method, technology trend, and relevance between CVE are considered. We used the data within overseas sites provide reliable security information to review the usability of the proposed final formula CTRS. The scoring formula makes it possible to fast patch and respond to related information by identifying vulnerabilities with high relevance and risk only with some particular phrase.

IDS Model using Improved Bayesian Network to improve the Intrusion Detection Rate (베이지안 네트워크 개선을 통한 탐지율 향상의 IDS 모델)

  • Choi, Bomin;Lee, Jungsik;Han, Myung-Mook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.24 no.5
    • /
    • pp.495-503
    • /
    • 2014
  • In recent days, a study of the intrusion detection system collecting and analyzing network data, packet or logs, has been actively performed to response the network threats in computer security fields. In particular, Bayesian network has advantage of the inference functionality which can infer with only some of provided data, so studies of the intrusion system based on Bayesian network have been conducted in the prior. However, there were some limitations to calculate high detection performance because it didn't consider the problems as like complexity of the relation among network packets or continuos input data processing. Therefore, in this paper we proposed two methodologies based on K-menas clustering to improve detection rate by reforming the problems of prior models. At first, it can be improved by sophisticatedly setting interval range of nodes based on K-means clustering. And for the second, it can be improved by calculating robust CPT through applying weighted-leaning based on K-means clustering, too. We conducted the experiments to prove performance of our proposed methodologies by comparing K_WTAN_EM applied to proposed two methodologies with prior models. As the results of experiment, the detection rate of proposed model is higher about 7.78% than existing NBN(Naive Bayesian Network) IDS model, and is higher about 5.24% than TAN(Tree Augmented Bayesian Network) IDS mode and then we could prove excellence our proposing ideas.

An APT Attack Scoring Method Using MITRE ATT&CK (MITRE ATT&CK을 이용한 APT 공격 스코어링 방법 연구)

  • Cho, Sungyoung;Park, Yongwoo;Lee, Kunho;Choi, Changhee;Shin, Chanho;Lee, Kyeongsik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.4
    • /
    • pp.673-689
    • /
    • 2022
  • We propose an APT attack scoring method as a part of the process for detecting and responding to APT attacks. First, unlike previous work that considered inconsistent and subjective factors determined by cyber security experts in the process of scoring cyber attacks, we identify quantifiable factors from components of MITRE ATT&CK techniques and propose a method of quantifying each identified factor. Then, we propose a method of calculating the score of the unit attack technique from the quantified factors, and the score of the entire APT attack composed of one or more multiple attack techniques. We present the possibility of quantification to determine the threat level and urgency of cyber attacks by applying the proposed scoring method to the APT attack reports, which contains the hundreds of APT attack cases occurred worldwide. Using our work, it will be possible to determine whether actual cyber attacks have occurred in the process of detecting APT attacks, and respond to more urgent and important cyber attacks by estimating the priority of APT attacks.

Development of a Simplified Model for Estimating CO2 Emissions: Focused on Asphalt Pavement (CO2 배출량 추정을 위한 간략 모델 개발: 아스팔트 포장을 중심으로)

  • Kim, Kyu-Yeon;Kim, Sung-Keun
    • Land and Housing Review
    • /
    • v.12 no.2
    • /
    • pp.109-120
    • /
    • 2021
  • Global warming due to increased carbon dioxide is perceived as one of the factors threatening the future. Efforts are being made to reduce carbon dioxide emissions in each industry around the world. In particular, environmental loads and impacts during the life cycle of SOC structures and buildings have been quantitatively assessed through a quantitative method called Life Cycle Assessment (LCA). However, the construction sector has gone through difficulty in quantitative assessment for several reasons: 1) LCI DB is not fully established; 2) the life cycle is very long; 3) the building structures are unique. Therefore, it takes enormous effort and time to carry out LCA. Rather than estimating carbon emissions with accuracy, this study aims to present a simplified estimation model that allows owners or designers to easily estimate carbon dioxide emissions with little effort, given that rapid and rough decisions regarding environmental load reduction are to be made. This study performs the LCA using data from 25 road construction projects across the country, followed by multiple regression analyses to derive a simplified carbon estimation model (SLCA). The study also carries out a comparative analysis with values estimated by performing a typical LCA. The comparison analysis shows an error rate of less than 5% for 16 road projects.

Tunnel Stability Assessment Considering Rock Damage from Blasting Near to Excavation Line (굴착선 주변공 발파의 암반손상을 고려한 터널 안정성 검토)

  • 이인모;윤현진;이형주;이상돈;박봉기
    • Journal of the Korean Geotechnical Society
    • /
    • v.19 no.4
    • /
    • pp.167-178
    • /
    • 2003
  • Damage and overbreak of the remaining rock induced by blasting can not be avoided during tunnel construction which may result in either short-term or long-term tunnel instability. Therefore, in this paper, a methodology to take into account the effect of blast-induced damage in tunnel stability assessment is proposed. Dynamic numerical analysis was executed to evaluate damage and overbreak of the remaining rock for the most common blasting pattern in road tunnel. Rock damage was quantified by utilizing the damage variable factor which is adopted proposed in continuum damage mechanics. The damaged rock stiffness and the damaged failure criteria are used to consider the effect of rock damage in tunnel stability analysis. The damaged geological strength index of the damaged rock was newly proposed from the relationship between deformation modulus and geological strength index. Also the Hoek-Brown failure criteria of the damaged rock was obtained using the damaged geological strength index. Analysing the tunnel stability with the consideration of the blast-induced damage of remaining rock, it was found that the extend of plastic zone and deformation increased compared to the undamaged rock. Therefore the short-term or long-term tunnel stability will be threatened when the rock damage from blasting is ignored in the tunnel stability analysis.