Skip to main content

Network-Threatening Element Extraction and Quantification Framework

  • Conference paper
Advances in Computer Science and its Applications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 279))

  • 188 Accesses

Abstract

APT attacks’ forecasts and warning technologies are the most effective strategy to detect and analyze pre-attack indicators. Here, a study on a quantification framework for threatening conditions is necessary to being able to extract various network threatening elements. In this study, we collected data on security threatening elements to analyze network threatening elements. We analyzed the limitations of pre-technologies to analyze the quantification technologies of pre-threatening conditions. We also categorized their degrees of risks by grading threatening elements to deduce a method of graded degrees of risks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Korea National Intelligence Service. White book (2012)

    Google Scholar 

  2. Robert Lemos, Counting the Cost of Slammer, CNet News.Com (2003)

    Google Scholar 

  3. Bodmer, Kilger, Carpenter, Jones: Reverse Deception: Organized Cyber Threat Counter-Exploitation. McGraw-Hill Osborne Media, New York (2012)

    Google Scholar 

  4. Tankard, C.: Advanced Persistent threats and how to monitor and deter them 2011(8), 16–19 (2011)

    Google Scholar 

  5. Trendmicro, Recent APT Attacks’ Style and Solution, Cloudsec (2012)

    Google Scholar 

  6. National Cyber-Alert System, Vulnerability Summary for CVE-2010-2743, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2743

  7. Wikipedia, http://en.wikipedia.org/wiki/Stuxnet

  8. A Complete Guide to the Common Vulnerability Scoring System Version 2.0, http://www.first.org/cvss/cvss-guide.html

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sungmo Jung .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jung, S., Kim, D., Kim, S. (2014). Network-Threatening Element Extraction and Quantification Framework. In: Jeong, H., S. Obaidat, M., Yen, N., Park, J. (eds) Advances in Computer Science and its Applications. Lecture Notes in Electrical Engineering, vol 279. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41674-3_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-41674-3_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-41673-6

  • Online ISBN: 978-3-642-41674-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics