최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기韓國컴퓨터情報學會論文誌 = Journal of the Korea Society of Computer and Information, v.25 no.8, 2020년, pp.31 - 37
Ahn, Myung Kil (School of Electrical and Electronics Engineering, Chung-Ang University) , Lee, Jung-Ryun (School of Electrical and Electronics Engineering, Chung-Ang University)
In this paper, we propose a system architecture and methodology based on cyber kill chain and MITRE ATT&CK for experiment analysis on cyber warfare simulation. Threat analysis is possible by applying various attacks that have actually occurred with continuous updates to reflect newly emerging attack...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
Ryu Young ki, "Systematic Analysis technique for Determining ROCs", Kongju University Doctoral Thesis, 2011.
Symantec, "2019 Internet Security Threat Report", Volume 24, February 2019.
AhnLab, "ASEC REPORT", Vol.98, 2020.
Gartner Research, "Gartner's Top 10 Strategic Technology Trends for 2017", October 2016.
S. Hassell, P. Beraud, A. Cruz, G. Ganga, S. Martin, J. Toennies, P. Vazquez, G. Wright, D. Gomez, F. Pietryka, N. Srivastava, T. Hester, D. Hyde, and B. Mastropietro, "Evaluating network cyber resiliency methods using cyber threat, vulnerability and defense modeling and simulation,", 2012 IEEE Military Communications Conference, pp.1-6, Orlando, FL, USA, Oct. 2012, DOI: 10.1109/MILCOM.2012.6415565.
United States. Joint Chiefs of Staff, "Joint Tactics, Techniques, and Procedures for Joint Intelligence Preparation of the Battlespace", JP 2-01.3, 2000.
E. M. Hutchins, M. J. Cloppert, and R. M. Amin, "Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains", Leading Issues in Information Warfare & Security Research, vol. 1, p. 80, 2011.
MITRE, ATT&CK, Available at https://attack.mitre.org.
Jungyun Kwon, Soomin Han, Sangyun Choe, Hanil Jeong, "A Study on Developing Performance Evaluation System Using Delphi Technique and Analytic Hierarchy Process", Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology, Vol.6, No.9, pp. 99-110, September 2016, DOI:10.14257/AJMAHS.2016.09.40
MITRE, CVE, Available at http://cve.mitre.org/
ECSIRT, IODEF/IDMEF Solutions, Available at http://www.ecsirt.net/service/products.html
I. Kotenko, A. Chechulin, "A Cyber Attack Modeling and Impact Assessment Framework", Proceedings of the 5th International Conference on Cyber Conflict 2013 (CyCon 2013), pp.119-142, Tallinn, Estonia, July 2013.
Jajodia, S., Noel, S., Kalapa, P., Albanese, M., Williams, J., "Cauldron: Mission-Centric Cyber Situational Awareness with Defense in Depth", MILCOM 2011 Military Communications Conference, Baltimore, USA, Nov. 2011, DOI:10.1109/MILCOM.2011.6127490.
H. Al-Mohannadi, Q. Mirza, A. Namanya, I. Awan, A. Cullen, J. Disso, "Cyber-attack modeling analysis techniques: An overview", 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), pp.69-76, Vienna, Austria, Aug. 2016, DOI:10.1109/W-FiCloud.2016.29
AttackIQ, Available at https://attackiq.com/
SafeBreach, Available at https://safebreach.com/
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.