최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기융합보안논문지 = Convergence security journal, v.24 no.2, 2024년, pp.19 - 29
유지원 (성신여자대학교) , 강서연 (성신여자대학교) , 이수미 (성신여자대학교) , 김성민 (성신여자대학교)
A crypto-jacking attack is an attack that infringes on the availability of users by stealing computing resources required for cryptocurrency mining. The target of the attack is gradually diversifying from general desktop or server environments to cloud environments. Therefore, it is essential to app...
Microsoft. (2023). Microsoft Threat Intelligence.?https://www.microsoft.com/en-us/security/business/siem-and-xdr/microsoft-defender-threat-intelligence.
Son, J (2018, February 25) . (2018, Fe 12). "'Malicious Cryptojacking'... Trials of Hacking with the Rise in Digital Currency Values." Maeil Business Newspaper, Retrieved from: https://www.mk.co.kr/news/it/8206706.
Kim, K. (2022, November 15). "Astron Security:?'Cryptojacking Tops the List of Cyber Attacks?Targeting Clouds... Cryptocurrency Mining'." Boan News. Retrieved from https://www.boannews.com/media/view.asp?idx111330.
Karn, Rupesh Raj, Kudva, Prabhakar, Huang, Hai, Suneja, Sahil, & Elfadel, Ibrahim (Abe) M.?(2021, March). "Cryptomining Detection in Container Clouds Using System Calls and Explainable Machine Learning." IEEE Transactions on Parallel and Distributed Systems, 32(3).
IGLOO. (2020, May 6). The Ever-Present Threat: Cryptojacking. Retrieved from: https://www.igloo.co.kr/security-information/%EC%82%AC%EB%9D%BC%EC%A7%80%EC%A7%80-%EC%95%8A%EC%9D%80-%EC%9C%84%ED%98%91-%ED%81%AC%EB%A6%BD%ED%86%A0%EC%9E%AC%ED%82%B9/.
Goh, D., Jung, I., Choi, S. H., & Choi, Y. H. (2018). Dynamic Analysis Framework for Cryptojacking Site Detection. Journal of the Korea Institute of Information Security and Cryptology, 28(4), 963-974.
Choi, W.-S., Kim, H.-S., & Lee, D.-H. (2018).?Trends in Cryptojacking Research. Journal of Information Security, 28(3). 33-36.
Kim, I., Yoo, S., & Nam, J. (2023). Workload Analysis of CryptoJacking Containers. In Proceedings of the 2023 Korean Computer Conference,?pp.1,911-1,913.
Lim, E. J., Lee, E. Y., & Lee, I. G. (2021). Behavior and Script Similarity-Based Cryptojacking?Detection Framework Using Machine Learning.?Journal of the Korea Institute of Information Security and Cryptology, 31(6), 1105-1114.
Song, J. H., Park, K. M., Park, C. H., Kim, J.?H., & Kim, I. K. (2023). Performance Analysis?of Cryptojacking Container Detection with Machine Learning. Proceedings of the Korea Information Science Society Conference, 1294-1296.
Tahir, R., Huzaifa, M., Das, A., Ahmad, M., Gunter, C., Zaffar, F., Caesar, M., & Borisov, N. (2017). "Mining on Someone Else's Dime: Mitigating?Covert Mining Operations in Clouds and Enterprises." In Proceedings of the International Symposium on Research in Attacks, Intrusions, and Defenses?(RAID), Lecture Notes in Computer Science.
S. Sultan, I. Ahmad and T. Dimitriou, "Container Security: Issues, Challenges, and the Road Ahead," inIEEE Access, vol. 7, pp. 52976-52996, 2019, doi: 10.1109/ACCESS.2019.2911732
해당 논문의 주제분야에서 활용도가 높은 상위 5개 콘텐츠를 보여줍니다.
더보기 버튼을 클릭하시면 더 많은 관련자료를 살펴볼 수 있습니다.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.