• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Cyber threat Detection and Response Time Modeling


Han Choong-Hee, Han ChangHee, Journal of Internet Computing and Services, Vol. 22, No. 3, pp. 53-58, Jun. 2021
10.7472/jksii.2021.22.3.53, Full Text:
Keywords:

Abstract

There is little research on actual business activities in the field of security control. Therefore, in this paper, we intend to present a practical research methodology that can contribute to the calculation of the size of the appropriate input personnel through the modeling of the threat information detection response time of the security control and to analyze the effectiveness of the latest security solutions. The total threat information detection response time performed by the security control center is defined as TIDRT (Total Intelligence Detection & Response Time). The total threat information detection response time (TIDRT) is composed of the sum of the internal intelligence detection & response time (IIDRT) and the external intelligence detection & response time (EIDRT). The internal threat information detection response time (IIDRT) can be calculated as the sum of the five steps required. The ultimate goal of this study is to model the major business activities of the security control center with an equation to calculate the cyber threat information detection response time calculation formula of the security control center. In Chapter 2, previous studies are examined, and in Chapter 3, the calculation formula of the total threat information detection response time is modeled. Chapter 4 concludes with a conclusion.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[APA Style]
Choong-Hee, H. & ChangHee, H. (2021). Cyber threat Detection and Response Time Modeling. Journal of Internet Computing and Services, 22(3), 53-58. DOI: 10.7472/jksii.2021.22.3.53.

[IEEE Style]
H. Choong-Hee and H. ChangHee, "Cyber threat Detection and Response Time Modeling," Journal of Internet Computing and Services, vol. 22, no. 3, pp. 53-58, 2021. DOI: 10.7472/jksii.2021.22.3.53.

[ACM Style]
Han Choong-Hee and Han ChangHee. 2021. Cyber threat Detection and Response Time Modeling. Journal of Internet Computing and Services, 22, 3, (2021), 53-58. DOI: 10.7472/jksii.2021.22.3.53.