References
- 이세열, "블록체인을 적용한 사설 클라우드 기반 침입시도탐지", 디지털산업정보학회 논문지, 제14권, 제2호, 2018, pp.11-17.
- 김창식.김남규.곽기영, "머신러닝 및 딥러닝 연구동향 분서: 토픽모델링을 중심으로", 디지털산업정보학회 논문지, 제15권, 제2호, 2019, pp.19-28.
- J. Navarro, A. Deruyver and P. Parrend, "A systematic survey on multi-step attack detection," Computers & Security, Vol.76, 2018, pp.214-249. https://doi.org/10.1016/j.cose.2018.03.001
- Z. Liu, C. Wang and S. Chen, "Correlating multi-step attack and constructing attack scenarios based on attack pattern modeling," in 2008 International Conference on Information Security and Assurance, 2008, pp.214-219.
- A. Ebrahimi, A. H. Z Navin, M. K. Mirnia, H. Bahrbegi and A. A. A. Ahrabi, "Automatic attack scenario discovering based on a new alert correlation method," in 2011 IEEE International Systems Conference, 2011, pp.52-58.
- M. Bateni and A. Baraani, "An architecture for alert correlation inspired by a comprehensive model of human immune system," International Journal of Computer Network & Information Security, 2014, pp.47-57.
- J. Wang, H. Wang and G. Zhao, "A GA-based solution to an NP-hard problem of clustering security events," in Proceedings of the 2006 International Conference on Communications, Circuits and Systems, 2006, pp.2093-2097.
- S. Mathew and S. Upadhyaya, "Attack scenario recognition through heterogeneous event stream analysis," IEEE Military Communications Conference, 2009, pp.1-7.
- S. Shin, S. Lee, H. Kim and S. Kim, "Advanced probabilistic approach for network intrusion forecasting and detection," Expert systems with applications, Vol. 40, No. 1, 2013, pp.315-322. https://doi.org/10.1016/j.eswa.2012.07.057
- N. K. Pandey, S. K. Gupta, S. Leekha and J. Zhou, "ACML: capability based attack modeling language," in Fourth International Conference on Information Assurance and Security, 2008, pp.147-154.
- Y. Lv, S. Xiang, J. Geng, Y. Li and C. Xia, "An alert correlation algorithm based on the sequence pattern mining," in IEEE Advanced Information Technology, Electronic and Automation Control Conference, 2015, pp.1146-1151.
- R. Katipally, W. Gasior, X. Cui and L. Yang, "Multistage attack detection system for network administrators using data mining," in Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, April 2010, pp.1-4.
- C. M. Chen, D. J. Guan, Y. Z. Huang and Y. H. Ou, "Anomaly network intrusion detection using Hidden Markov Model," International Journal of Innovative Computer Information and Control, Vol.12, No.2, 2016, pp.569-580.
- S. Fayyad and C. Meinel, "New attack scenario prediction methodology," in Tenth International Conference on Information Technology: New Generations, 2013, pp.53-59.
- Y. Luo, F. Szidarovszky, Y. Al-Nashif and S. ariri, "A fictitious play based response strategy for multistage intrusion defense systems," Security and Communication Networks, Vol.7, No.3, 2014, pp.473-491. https://doi.org/10.1002/sec.730
- A. Sadighian, J. M. Fernandez, A. Lemay and S.T. Zargar, "ONTIDS: a highly flexible context-aware and ontology based alert correlation framework," in 6th International Symposium on Foundations and Practice of Security, 2013, pp.161-177.
- 임창완.신영섭.이동재.조성영.한인성.오행록, "실시간 사이버 위협 지능형 분석 및 예측 기술," 정보과학회 컴퓨팅의 실제 논문지, 제25권, 제11호, 2019, pp.565-570.
- 김현진.손태식, "스마트시티의 보안을 위한 사이버보안위협정보 활용 연구," 한국디지털콘텐츠학회 논문지, 제20권, 제6호, 2019, pp.1173-1180.
- J.H Eom, "Modeling of Cyber-attack Intentions Analysis Reflecting Domestic / International Situations," International Journal of Grid and Distributed Computing, Vol.11, No.1, 2018, pp.13-26. https://doi.org/10.14257/ijgdc.2018.11.1.02
Cited by
- 제4차 산업혁명시대의 테러에 악용되는 첨단 정보통신기술 vol.17, pp.1, 2021, https://doi.org/10.17662/ksdim.2021.17.1.015