Detailed Information

Cited 3 time in webofscience Cited 3 time in scopus
Metadata Downloads

Network Security Node-Edge Scoring System Using Attack Graph Based on Vulnerability Correlation

Full metadata record
DC Field Value Language
dc.contributor.authorShin, Gun-Yoon-
dc.contributor.authorHong, Sung-Sam-
dc.contributor.authorLee, Jung-Sik-
dc.contributor.authorHan, In-Sung-
dc.contributor.authorKim, Hwa-Kyung-
dc.contributor.authorOh, Haeng-Rok-
dc.date.accessioned2022-09-27T10:40:16Z-
dc.date.available2022-09-27T10:40:16Z-
dc.date.created2022-09-22-
dc.date.issued2022-07-
dc.identifier.issn2076-3417-
dc.identifier.urihttps://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/85578-
dc.description.abstractAs network technology has advanced, and as larger and larger quantities of data are being collected, networks are becoming increasingly complex. Various vulnerabilities are being identified in such networks, and related attacks are continuously occurring. To solve these problems and improve the overall quality of network security, a network risk scoring technique using attack graphs and vulnerability information must be used. This technology calculates the degree of risk by collecting information and related vulnerabilities in the nodes and the edges existing in the network-based attack graph, and then determining the degree of risk in a specific network location or the degree of risk occurring when a specific route is passed within the network. However, in most previous research, the risk of the entire route has been calculated and evaluated based on node information, rather than edge information. Since these methods do not include correlations between nodes, it is relatively difficult to evaluate the risk. Therefore, in this paper, we propose a vulnerability Correlation and Attack Graph-based node-edge Scoring System (VCAG-SS) that can accurately measure the risk of a specific route. The proposed method uses the Common Vulnerability Scoring System (CVSS) along with node and edge information. Performing the previously proposed arithmetic evaluation of confidentiality, integrity, and availability (CIA) and analyzing the correlation of vulnerabilities between each node make it possible to calculate the attack priority. In the experiment, the risk scores of nodes and edges and the risk of each attack route were calculated. Moreover, the most threatening attack route was found by comparing the attack route risk. This confirmed that the proposed method calculated the risk of the network attack route and was able to effectively select the network route by providing the network route priority according to the risk score.-
dc.language영어-
dc.language.isoen-
dc.publisherMDPI-
dc.relation.isPartOfAPPLIED SCIENCES-BASEL-
dc.titleNetwork Security Node-Edge Scoring System Using Attack Graph Based on Vulnerability Correlation-
dc.typeArticle-
dc.type.rimsART-
dc.description.journalClass1-
dc.identifier.wosid000833294900001-
dc.identifier.doi10.3390/app12146852-
dc.identifier.bibliographicCitationAPPLIED SCIENCES-BASEL, v.12, no.14-
dc.description.isOpenAccessY-
dc.identifier.scopusid2-s2.0-85134077928-
dc.citation.titleAPPLIED SCIENCES-BASEL-
dc.citation.volume12-
dc.citation.number14-
dc.contributor.affiliatedAuthorShin, Gun-Yoon-
dc.type.docTypeArticle-
dc.subject.keywordAuthornetwork security-
dc.subject.keywordAuthorcommon vulnerability scoring system-
dc.subject.keywordAuthorscoring system-
dc.subject.keywordAuthorvulnerability correlation analysis-
dc.subject.keywordAuthorattack graph-
dc.relation.journalResearchAreaChemistry-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaMaterials Science-
dc.relation.journalResearchAreaPhysics-
dc.relation.journalWebOfScienceCategoryChemistry, Multidisciplinary-
dc.relation.journalWebOfScienceCategoryEngineering, Multidisciplinary-
dc.relation.journalWebOfScienceCategoryMaterials Science, Multidisciplinary-
dc.relation.journalWebOfScienceCategoryPhysics, Applied-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
ETC > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE