Study on APT Penetration Analysis and Plan of Reaction for Secure XaaS 


Vol. 40,  No. 5, pp. 841-850, May  2015


PDF
  Abstract

XaaS (Everything as a Service) provides re-usable, fine-grained software components like software, platform, infra across a network. Then users usually pay a fee to get access to the software components. It is a subset of cloud computing. Since XaaS is provided by centralized service providers, it can be a target of various security attacks. Specially, if XaaS becomes the target of APT (Advanced Persistent Threat) attack, many users utilizing XaaS as well as XaaS system can be exposed to serious danger. So various solutions against APT attack are proposed. However, they do not consider all aspects of security control, synthetically. In this paper, we propose overall security checkup considering technical aspect and policy aspect to securely operate XaaS.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

S. H. Lee and D. Kim, "Study on APT Penetration Analysis and Plan of Reaction for Secure XaaS," The Journal of Korean Institute of Communications and Information Sciences, vol. 40, no. 5, pp. 841-850, 2015. DOI: .

[ACM Style]

Sun Ho Lee and DaeYoub Kim. 2015. Study on APT Penetration Analysis and Plan of Reaction for Secure XaaS. The Journal of Korean Institute of Communications and Information Sciences, 40, 5, (2015), 841-850. DOI: .

[KICS Style]

Sun Ho Lee and DaeYoub Kim, "Study on APT Penetration Analysis and Plan of Reaction for Secure XaaS," The Journal of Korean Institute of Communications and Information Sciences, vol. 40, no. 5, pp. 841-850, 5. 2015.