Hyeisun Cho, Seulgi Lee, Nakhyun Kim, Byungik Kim, Junhyung Park
{"title":"Method of Quantification of Cyber Threat Based on Indicator of Compromise","authors":"Hyeisun Cho, Seulgi Lee, Nakhyun Kim, Byungik Kim, Junhyung Park","doi":"10.1109/platcon.2018.8472733","DOIUrl":null,"url":null,"abstract":"As a large quantity of new and varied attacks occur in Korea, it is difficult to analyze and respond to them with limited security experts and existing equipment. This paper proposes a method of analyzing the threat of Indicator of Compromise (IoC) used for cyber incidents and calculating it as a quantitative value in order to check the analysis priority of cyber incidents that occur in large quantities. Using this method, a large quantity of cyber incidents can be efficiently responded to by checking the quantification of cyber threat objectively to quickly determine the response level of the cyber incident and actively analyze cyber incidents with high threat levels.","PeriodicalId":231523,"journal":{"name":"2018 International Conference on Platform Technology and Service (PlatCon)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Platform Technology and Service (PlatCon)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/platcon.2018.8472733","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
As a large quantity of new and varied attacks occur in Korea, it is difficult to analyze and respond to them with limited security experts and existing equipment. This paper proposes a method of analyzing the threat of Indicator of Compromise (IoC) used for cyber incidents and calculating it as a quantitative value in order to check the analysis priority of cyber incidents that occur in large quantities. Using this method, a large quantity of cyber incidents can be efficiently responded to by checking the quantification of cyber threat objectively to quickly determine the response level of the cyber incident and actively analyze cyber incidents with high threat levels.