본문 바로가기
  • Home

Survey on the use of security metrics on attack graph

  • Journal of The Korea Society of Computer and Information
  • Abbr : JKSCI
  • 2018, 23(12), pp.95-105
  • DOI : 10.9708/jksci.2018.23.12.095
  • Publisher : The Korean Society Of Computer And Information
  • Research Area : Engineering > Computer Science
  • Received : August 27, 2018
  • Accepted : November 26, 2018
  • Published : December 31, 2018

Lee Gyung Min 1 Huy-Kang Kim 1

1고려대학교

Accredited

ABSTRACT

As the IT industry developed, the information held by the company soon became a corporate asset. As this information has value as an asset, the number and scale of various cyber attacks which targeting enterprises and institutions is increasing day by day. Therefore, research are being carried out to protect the assets from cyber attacks by using the attack graph to identify the possibility and risk of various attacks in advance and prepare countermeasures against the attacks. In the attack graph, security metric is used as a measure for determining the importance of each asset or the risk of an attack. This is a key element of the attack graph used as a criterion for determining which assets should be protected first or which attack path should be removed first. In this survey, we research trends of various security metrics used in attack graphs and classify the research according to application viewpoints, use of CVSS(Common Vulnerability Scoring System), and detail metrics. Furthermore, we discussed how to graft the latest security technologies, such as MTD(Moving Target Defense) or SDN(Software Defined Network), onto the attack graphs.

Citation status

* References for papers published after 2023 are currently being built.