최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Journal of Internet Computing and Services = 인터넷정보학회논문지, v.23 no.6, 2022년, pp.15 - 26
신찬호 (Defense Cyber Technology Center, Agency for Defense Development) , 최창희 (Defense Cyber Technology Center, Agency for Defense Development)
Various subjects are carrying out cyberattacks using a variety of tactics and techniques. Additionally, cyberattacks for political and economic purposes are also being carried out by groups which is sponsored by its nation. To deal with cyberattacks, researchers used to classify the malware family a...
Cybersecurity and Infrastructure Security Agency(CIS A), "North Korean State-Sponsored Cyber Actors Use Maui Ransomware to Target the Healthcare and Public Health Sector", 2022. https://cisa.gov/uscert/ncas/alerts/aa22-187a
D. Kushner, "The real story of stuxnet", IEEE Spectrum, Vol.50, No.3, pp.48-53, 2013. https://doi.org/10.1109/MSPEC.2013.6471059
N. Falliere, L. Murchu, and E. Chien, "W32.Stuxnet Dossier", 2011. https://docs.broadcom.com/doc/security-response-w32-stuxnet-dossier-11-en
Mandiant, "APT41(Double dragon): A Dual Espionage and Cyber crime Operation", 2022. https://www.mandiant.com/sites/default/files/2022-02/rt-apt41-dual-operation.pdf
Faou, M., Tartare, M., Dupuy, T., "OPERATION GHOST. The Dukes aren't back - they never left", 2019. https://welivesecurity.com/wp-content/uploads/2019/10/ESET_Operation_Ghost_Dukes.pdf
Federal Bureau of Investigation(FBI), "Update on Sony Investigation)", https://www.fbi.gov/news/press-releases/update-on-sony-investigation
Choi, C. H., Lee, H. S., Jung, I. H., Yoo, C. G., and Yoon, H. S., "Statistical Analysis of EML Header for Cyber Attacker Tracing", Proceedings of Korea Institute of Military Science and Technology annual conference, pp.1141-1142, 2017.
Choi, C. H., Lee, H. S., Jung, I. H., Park, J. H., and Yoon, H. S.,"E-mail Clustering for Cyber Attack Attribution", Proceedings of Korea Institute of Military Science and Technology annual conference, pp.1289-1290, 2018.
N. Villeneuve, J. Bennett, "Detecting APT Activity with Network Traffic Analysis", 2012. https://documents.trendmicro.com/assets/wp/wp-detecting-apt-activity-with-network-traffic-analysis.pdf
G. Zhao, K. Xu, L. Xu and B. Wu, "Detecting APT Malware Infections Based on Malicious DNS and Traffic Analysis", IEEE Access, Vol.3, pp.1132-1142, 2015. https://doi.org/10.1109/ACCESS.2015.2458581
MITRE ATT&CK®, https://attack.mitre.org
International Organization for Standardization(ISO), "Information technology - Security techniques - Information security management systems - Overview and vocabulary(ISO Standard No.27000:2009)", 2009. https://www.iso.org/standard/41933.html
Kaspersky, "LAZARUS UNDER THE HOOD", 2018. https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/07180244/Lazarus_Under_The_Hood_PDF_final.pdf
Securelist by Kaspersky, "OlympicDestroyer is here to trick the industry", 2018. https://securelist.com/olympicdestroyer-is-here-to-trick-the-industry/84295/
Shin C. H., Shin S. U., Seo, S. Y., Lee, I. S., Choi, C. H., "Embedding and Training RNN for estimating the goal of cyberattack", Proceedings of Korea Institute of Military Science and Technology annual conference, pp.1055-1056, 2021.
Bitdefender, StrongPity APT - Revealing Trojanized Tools, Working hours and Infrastructure, https://bitdefender.com/files/News/CaseStudies/study/353/Bitdefender-Whitepaper-StrongPity-APT.pdf
Ahnlab Security Emergency response Center(ASEC), "Analysis Report of Kimsuky Group's APT Attacks (AppleSeed, PebbleDash)", http://download.ahnlab.com/global/brochure/Analysis%20Report%20of%20Kimsuky%20Group.pdf
C. Beek, "Operation 'Harvest': A Deep Dive into a Long-term Campaign", https://www.trellix.com/en-us/about/newsroom/stories/threa-labs/operation-harvest-a-deep-dive-into-a-long-term-campaign.html
APT&CyberCriminal Campaign Collections, https://github.com/CyberMonitor/APT_CyberCriminal_Campaign_Collections
Legoy, V., Caselli, M., Seifert, C., and Peter, A, "Automated retrieval of ATT&CK tactics and techniques for cyber threat reports.", arXiv preprint arXiv:2004.14322, 2020.
rcATT, https://github.com/vlegoy/rcATT
Pedregosa et al., "Scikit-learn: Machine Learning in Python", Journal of Machine Learning Research, Vol.12, pp. 2825-2830, 2011. https://dl.acm.org/doi/10.5555/1953048.2078195
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.