Detailed Information

Cited 0 time in webofscience Cited 20 time in scopus
Metadata Downloads

Modified cyber kill chain model for multimedia service environments

Authors
Kim, HyeobKwon, HyukJunKim, Kyung Kyu
Issue Date
Feb-2019
Publisher
Springer Nature
Keywords
Multimedia service environment; Cyber kill chain; Endpoint detection and response; Internet of things environment; Multimedia security
Citation
Multimedia Tools and Applications, v.78, no.3, pp 3153 - 3170
Pages
18
Journal Title
Multimedia Tools and Applications
Volume
78
Number
3
Start Page
3153
End Page
3170
URI
https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/4763
DOI
10.1007/s11042-018-5897-5
ISSN
1380-7501
1573-7721
Abstract
The sudden rise in the frequency and sophistication of cyber threats has become a hindrance to the steady development of internet of things (IoT)-based multimedia service environments. The framework currently in use for understanding and analyzing cyber threats in the information security (IS) field is the cyber kill chain model. Of these threats, a particular threat that involves advanced and persistent attacks on a designated target (company that provides multimedia services) and causes large-scale damage is referred to as an advanced persistent threat (APT). As there can be numerous threat points in an IoT-based multimedia service environment with networks of various heterogeneous devices connected through multiple routes, an understanding of the potential routes of the threats is crucial. APTs are generally divided into the infiltration stage from the outside into the inside of an organization, and a threat stage that occurs within an organization. The existing kill chain model in the IS field is problematic in that it cannot fully express the actions that occur inside an organization. However, many attacks that occur in today's IoT-based multimedia service environments are performed after infiltration of an insider or the organization. Thus, it is important for actions that occur on the inside to be clearly schematized to secure visibility in the multimedia service environment. This study analyzes the limitations of the existing model, and proposes a revised cyber kill chain model for multimedia security that can explain threats within an organization in addition to external threats.
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Global Business > Department of Economics and Finance > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Kwon, Hyuk Jun photo

Kwon, Hyuk Jun
College of Global Business (Department of Economics and Finance)
Read more

Altmetrics

Total Views & Downloads

BROWSE