Fig 1. Intrusion Situation Awareness Process Model
Table 1. Intrusion Situation Awareness Classification Model
Table 2. SW Service Network Classification according to proposed classification Model
Table 3. Cryptojacking Classification according to proposed classification model
References
- R. Von Solms & J. Van Niekerk. (2013). From information security to cyber security. computers & security, 38, 97-102. https://doi.org/10.1016/j.cose.2013.04.004
- K. Panetta. (2017). 5 Trends in Cybersecurity for 2017 and 2018. Smarter with Gartner.
- Symantec. (2017). 2017 Internet Security Threat Report. 22.https://www.symantec.com/content/dam/symantec/doc s/reports/istr-22-2017-en.pdf
- Y. X. Meng. (2011). The practice on using machine learning for network anomaly intrusion detection. In Machine Learning and Cybernetics (ICMLC), 2011 International Conference on, 2(1), 576-581.
- H. J. Seo, D. G. Lee, J. S. Choi & H. W. Kim.(2013). IoT Security Technology Trend. Journal of KIEES, 24(4), 27-35.
- M. Abomhara. (2015). Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks. Journal of Cyber Security, 4, 65-88. https://doi.org/10.13052/jcsm2245-1439.414
- H. H. Lee, Y. Y. Lee & J. S. An. (2016). Commercial and Public Software Intentional Security Weakness Trend. Journal of Information Security, 26(1), 9-19.
- W. S. Choi, H. S. Kim & D. H. Lee. (2018). Cryptojacking Research Trends. Journal of Information Security, 28(3), 33-37.
- H. J. Mun. (2018). Biometric Information and OTP based on Authentication Mechanism using Blockchain. Journal of Convergence for Information Technology, 8(3), 85-90. https://doi.org/10.22156/CS4SMB.2018.8.3.085
- H. J. Mun, Y. C. Hwang & H. Y. Kim. (2015). Countermeasure for Prevention and Detection against Attacks to SMB Information System - A Survey. Journal of Convergence for Information Technology, 5(2), 1-6. https://doi.org/10.22156/CS4SMB.2015.5.2.001
- K. S. Kim & M. S. Kang. (2014). Next Generation Cyber Security Issues, Threats and Countermeasures. Journal of Electrical Engineering, 41(4), 69-77.
- AhnLab. (2018). security threat trend.
- C. T. Lim, J. H. Oh & H. C. Jung. (2010). Trend of Malicious Code Technology and Analysis Method. Information Science Society, 28(11), 117-126.
- M. S Gu & Y. Z. Lee. (2015). A Study of Countermeasures for Advanced Persistent Threats attacks by malicious code. Journal of Convergence for Information Technology, 5(4), 37-42. https://doi.org/10.14801/jaitc.2015.5.2.37
- H. J. Mun, S. H. Choi & Y. C. Hwang. (2016). Effective Countermeasure to APT Attacks using Big Data. Journal of Convergence for Information Technology, 6(1), 17-23. https://doi.org/10.5121/ijitcs.2016.6402