Cyber Security Threat Analysis Model for Countermeasure to New and Variant Threats
Cyber Security Threat Analysis Model for Countermeasure to New and Variant Threats
- 주제(키워드) Cyber security threat
- 발행기관 아주대학교
- 지도교수 곽진
- 발행년도 2020
- 학위수여년월 2020. 2
- 학위명 박사
- 학과 및 전공 일반대학원 컴퓨터공학과
- 실제URI http://www.dcollection.net/handler/ajou/000000029465
- 본문언어 영어
- 저작권 아주대학교 논문은 저작권에 의해 보호받습니다.
초록/요약
Various researches are underway to respond to cybersecurity threats. Research on security threat modeling focuses on the definition and classification of security threats. Through security threat modeling, security threats can be accurately identified and classified, and security threat analysis can be performed more efficiently. Most of the security threat modeling currently developed identifies threats from a high-level perspective (eg, Denial of Service, Repudiation, Information disclosure etc). However, there are various techniques for generating each threat. Various techniques can be applied even if only the technology for intruding and infecting malware for generating a threat of Denial of Service is seen. As described above, from a high-level perspective, even if a security threat is identified, if a countermeasure is not actually prepared, more detailed information can be requested as a developer or an analyst. Therefore, this paper proposes a model for analyzing security threats in detail. The proposed model categorized the threat techniques that could be included into 7 categories. As a result, the procedure for continuously operating the analysis model of security threats and its effect are shown. The analysis modeling of this paper can be used to understand the trends and current status of security threats that are occurring, which can be useful for preparing countermeasures. I also presented a method that can be used to generate and verify test cases for Penetration Test.
more목차
Ⅰ. Introduction
Ⅱ. Related Work
A. Trends of Cyber Security Threats
B. Cyber Security Threat Model
Ⅲ. Proposed Cyber Security Threat Analysis Model
A. Operation Method of Proposed Model
B. Category of Threat Techniques
Ⅳ. Simulation Result
Ⅴ. Conclusion
Reference
초록