최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기융합보안논문지 = Convergence security journal, v.20 no.4, 2020년, pp.91 - 101
윤영인 (고려대학교) , 김종화 (한화시스템(주)) , 이재연 (한화시스템(주)) , 유석대 (한화시스템(주)) , 이상진 (고려대학교)
We analyzed APT attack cases that occurred overseas in the past using a cyber kill chain model and a TTP model. As a result of the analysis, we found that the cyber kill chain model is effective in figuring out the overall outline, but is not suitable for establishing a specific defense strategy, ho...
Jae-won Yoo, and Dea-woo Park."Cyber kill chain strategy for hitting attacker origin,"한국정보통신학회논문지 Vol. 21, No. 11 pp. 2199-2205, 2017.
Lockheed Martin Corporation, "Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains," 2011 Available: "https://www.lockheedmartin.com/content/dam/lockheed-martin/rms/documents/cyber/LM-White-Paper-Intel-Driven-Defense.pdf".
Stech F.J., Heckman K.E., and Strom B.E. "Integrating Cyber-D&D into Adversary Modeling for Active Cyber Defense," Cyber Deception: Building the Scientific Foundation, pp.1-22, 2016.
MITRE, "Finding Cyber Threats with ATT&CK-Based Analytics," 2017 Available: "https://www.mitre.org/sites/default/files/publications/16-3713-finding-cyber-threats%20with%20att%26ck-based-analytics.pdf"
Clearsky Cyber Security, "Iranian cyber espionage against human rights activists, academic researchers and media outlets and the HBO hacker connection," 2017 Available: "https://www.clearskysec.com/charmingkitten"
Trend Micro, "Update on Pawn Storm: New Targets and Politically Motivated Campaigns," 2018 Available: "https://www.trendmicro.com/en_us/research/18/a/update-pawn-storm-new-targets-politically-motivated-campaigns.html".
Palo Alto Networks, "Threat Actors Target Government of Belarus Using CMSTAR Trojan," 2017 Avaliable: "https://unit42.paloaltonetworks.com/unit42-threat-actors-target-government-belarus-using-cmstar-trojan".
Kaspersky, "BlackOasis APT and new targeted attacks leveraging zero-day exploit," 2017 Available: "https://securelist.com/blackoasis-apt-and-new-targeted-attacks-leveraging-zero-day-exploit/82732".
NSA/CSS(National Security Agency/Central Security Service) "Defense In Depth", 2010 Available: "https://apps.nsa.gov/iaarchive/library/ia-guidance/archive/defense-in-depth.cfm".
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.