Fig. 1. Vulnerability Patch Process by DHS
Fig. 2. Structure of Digital I&C System
Fig. 3. Classification of Quantitative Security Metric
Fig. 4. Transition Matrix
Fig. 5. Proposed Probabilistic Vulnerability Assessment Framework
Fig. 6. Proposed Probabilistic Vulnerability Assessment Process
Fig. 7. Proposed Predictive modeling Process
Fig. 8. Proposed modeling's pseudo algorithm
Fig. 9. Predictive modeling process
Fig. 10. Case-Initial Attack Graph
Fig. 11. Case1-Attack Graph combined with VDM
Fig. 12. Case2-Attack Graph combined with VDM
참고문헌
- S. Y. Oh. & J. K. Hong. (2018). Vulnerability Case Analysis of Wireless Moving Vehicle. Journal of the Korea convergence society, 9(8), 41-46. DOI : 10.15207/JKCS.2018.9.8.041
- J. K. Cho. (2019). Study on Improvement of Vulnerability Diagnosis Items for PC Security Enhancement. Journal of Convergence for information Technology, 9(3), 1-7. DOI : 10.22156/CS4SMB.2019.9.3.001
- Recommended Practice for Patch Management of Control Systems. (2008). Department of Homeland Security. (pp. 23-24).
- L. S. IS. (2018). Digital I&C System Diagram. LS IS Product. http://www.lsis.com/ko/product/view/P01211
- Pubudu et al. (2018). Non-Homogeneous Stochastic Model for Cyber Security Predictions. The Journal of Information Security. (pp. 12-24). DOI : 10.15207/JKCS.2018.9.8.041
- Karen Scarfone. (2009). An analysis of CVSS version 2 vulnerability scoring. ESEM '09 Proceedings of the 2009 3rd International Symposium on Empirical Software Engineering and Measurement. (pp. 516-525). DOI : 10.1109/ESEM.2009.5314220
- S. M. Rajasooriya & C. P. Tsokos. (2017). Cybersecurity: Nonlinear Stochastic models for Predicting the Exploitability. The Journal of information Security. (pp. 125-140). DOI : 10.4236/jis.2017.82009
- P. Ammann. (2002). Scalable, graph-based network vulnerability analysis. Proceedings of the 9th ACM conference on Computer and communications security. (pp. 217-224). DOI : 10.1145/586110.586140
- S. Jah. (2002). Two formal analyses of attack graphs. The Proceedings 15th IEEE Computer Security Foundations Workshop. DOI : 10.1109/CSFW.2002.1021806
- S. Abraham. & S. Nair. (2014). Cyber Security Analytics: A Stochastic Model for Security Quantification Using Absorbing Markov Chains. Journal of Communications, 9(12), 899-907. DOI : 10.12720/jcm.9.12.899-907
- A. Reibman & K. Trivedi. (1998). Numerical transient analysis of markov models. Computer & Operations Research, 15(1), 19-36. DOI : 10.1016/0305-0548(88)90026-3
- B. A. Craig. (2002). Estimation of the transition matrix of a discrete time Markov chain. Health Economics, 11(1), 33-42. DOI : 10.1002/hec.654
- S. Swapna. (2004). Analysis of Software Fault Removal Policies Using a Non-Homogeneous Continuous Time Markov Chain. Software Quality Journal, 12(3). (pp. 211-230). DOI : 10.1023/B:SQJO.0000034709.63615.8b
- A. Andan & S. Munmad. (2005). Verifying continuous time Markov chains. International Conference on Computer Aided Verification. (pp. 269-276). DOI : 10.1007/3-540-61474-5_75
- G. Laurent. (2011). Vulnerability Discrimination Using CVSS Framework. 2011 4th IFIP International Conference on New Technologies, Mobility and Security. DOI : 10.1109/NTMS.2011.5720656
- S. Roger. (1989). Markov and Markov reward model transient analysis: An overview of numerical approaches. European journal of Operation Research, 40(2). 257-267. DOI : 10.1016/0377-2217(89)90335-4
- N. Skku. (2015). Exploitability analysis using predictive cyber security framework. 2015 IEEE 2nd International Conference on Cybernetics. DOI : 10.1109/CYBConf.2015.7175953
- J. Y. Kim. (2007). Vulnerability Discovery in Multi version software systems. 10th IEEE High Assurance Systems Engineering Symposium.. DOI : 10.1109/HASE.2007.55