과제정보
The authors wish to thank the Universitas Amikom Yogyakarta for providing the financial support and Universiti Teknikal Malaysia Melaka (UTeM) for providing the facilities.
참고문헌
- Heartfield, R. and Loukas, G.: Detecting Semantic Social Engineering Attacks with The Weakest Link: Implementation and Empirical Evaluation of a Human-As-A-Security-Sensor Framework. Computers & Security. Elsevier Ltd. (2018)
- Magar, A.: State-of-the-Art in Cyber Threat Models and Methodologies, Sphyma Security (2016)
- Hansman, S. and Hunt, R.: A Taxonomy of Network and Computer Attacks. Computers and Security, 24(1), pp. 31-43 (2005) https://doi.org/10.1016/j.cose.2004.06.011
- Klaper, D. and Hovy, E.: A Taxonomy and A Knowledge Portal for Cybersecurity. In: Proceedings of the 15th Annual International Conference on Digital Government Research, pp. 79-85 (2014)
- Louis Marinos and ENISA: ENISA Threat Taxonomy-A Tool for Structuring Threat Information. Athens (2016)
- ENISA.: ENISA Threat Landscape Report 2017. ENISA (2018)
- Simmons, C. B. et al.: AVOIDIT: A Cyber Attack Taxonomy. In: 9th Annual Symposium on Information Assurance, (June 3-4), pp. 12-22 (2014)
- Treadstone71: Treadstone 71 Cyber Attack Taxonomy. In: Website the Cyber Shafarat - Treadstone 71. Available at: https://treadstone71llc.files.wordpress.com/2014/11/cyberattack-taxonomy-treadstone-71.jpg (Accessed: 4 June 2021).
- Myers, C., Powers, S. and Faissol, D.: Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches. Lawrence Livermore National Laboratory, (August 2007), pp. 1-22 (2009)
- Sanjeev Relia, C.: Cyber Warfare: Its Implication on National Security, Cyber Warfare. New Delhi: Vij Books India Pvt Ltd. (2015)
- Agrafiotis, I. et al.: A Taxonomy of Cyber-Harms: Defining the Impacts of Cyber-Attacks and Understanding How They Propagate. Journal of Cybersecurity, 4(1), pp. 1-15 (2018)
- Howard, J. D.: An Analysis of Security Incidents on The Internet 1989 - 1995. Carnegie Mellon University. (1997)
- John D. Howard and Thomas A Longstaff: A Common Language for Computer Security Incidents. Albuquerque, New Mexico; Livermore, California (1998)
- Lough, D. L.: A Taxonomy of Computer Attacks with Applications to Wireless Networks. In: PhD Thesis. Virginia Polytechnic Institute and State University (2001)
- Mirkovic, J. and Reiher, P.: A Taxonomy of DDoS Attack and DDoS Defense Mechanisms. ACM SIGCOMM Computer Communication Review, 34(2), p. 39-54 (2004) https://doi.org/10.1145/997150.997156
- Kiltz, S., Lang, A. and Dittmann, J.: Taxonomy for Computer Security Incidents. In: Cyber Warfare and Cyber Terrorism, pp. 412-417 (2008)
- Zhu, B., Joseph, A. and Sastry, S.: A Taxonomy of Cyber Attacks on SCADA Systems. In: Proceedings - 2011 IEEE International Conferences on Internet of Things and Cyber, Physical and Social Computing, iThings/CPSCom 2011, pp. 380-388 (2011)
- Simmons, C. B. et al.: ADAPT: A Game Inspired AttackDefense and Performance Metric Taxonomy. In: IFIP International Information Security Conference, 405, pp. 344-365 (2013)
- Gao, J. B. et al.: Ontology-Based Model of Network and Computer Attacks for Security Assessment. Journal of Shanghai Jiaotong University (Science), 18(5), pp. 554-562 (2013) https://doi.org/10.1007/s12204-013-1439-5
- Loukas, G., Gan, D. and Vuong, T.: A Taxonomy of Cyber Attack and Defence Mechanisms for Emergency Management Networks. In: Proc. of 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, March, pp. 534-539 (2013)
- Cebula, J. J., Popeck, M. E. and Young, L. R.: A Taxonomy of Operational Cyber Security Risks Version 2. In: Technical Report of Carnegie Mellon University Software Engineering Institute, CMU/SEI-2014-TN-006 (2014)
- Joshi, C. and Singh, U. K.: ADMIT- A Five Dimensional Approach Towards Standardization of Network and Computer Attack Taxonomies. International Journal of Computer Applications, 100(5), pp. 30-36 (2014) https://doi.org/10.5120/17524-8091
- Drias, Z., Serhrouchni, A. and Vogel, O.: Taxonomy of Attacks on Industrial Control Protocols. In: Proc. Of International Conference on Protocol Engineering, ICPE 2015 and International Conference on New Technologies of Distributed Systems, NTDS 2015 (2015)
- Douad, M. A. and Dahmani, Y.: ARTT Taxonomy and Cyber-attack Framework. In: Proc. Of First International Conference on New Technologies of Information and Communication (NTIC), pp. 1-6 (2015)
- Juliadotter, N. V. and Choo, K. K. R.: Cloud Attack and Risk Assessment Taxonomy. IEEE Cloud Computing, 2(1), pp. 14-20 (2015) https://doi.org/10.1109/MCC.2015.2
- Iqbal, S. et al.: On Cloud Security Attacks: A Taxonomy and Intrusion Detection and Prevention as a Service. Journal of Network and Computer Applications. Elsevier, 74, pp. 98-120 (2016) https://doi.org/10.1016/j.jnca.2016.08.016
- Wu, M. and Moon, Y. B.: Taxonomy of Cross-Domain Attacks on CyberManufacturing System. Procedia Computer Science. Elsevier B.V., 114, pp. 367-374 (2017) https://doi.org/10.1016/j.procs.2017.09.050
- Banga, A., Gupta, D. and Bathla, R.: Towards a Taxonomy of Cyber Attacks on SCADA System. In: Proc. of 2019 International Conference on Intelligent Computing and Control Systems, ICCS 2019. IEEE, (ICICCS), pp. 343-347 (2019)
- Kim, S. et al.: Cyber Attack Taxonomy for Digital Environment in Nuclear Power Plants. Nuclear Engineering and Technology. Elsevier Ltd, 52(5), pp. 995-1001 (2020) https://doi.org/10.1016/j.net.2019.11.001
- Xenofontos, C. et al.: Consumer, Commercial and Industrial IoT (In) Security: Attack Taxonomy and Case Studies. IEEE Internet of Things Journal, 4662(c), pp. 1-1 (2021) https://doi.org/10.1109/JIOT.2021.3079916
- Derbyshire, R. et al.: An Analysis of Cyber Security Attack Taxonomies. In: Proc. of 3rd IEEE European Symposium on Security and Privacy Workshops, EURO S and PW 2018. IEEE, pp. 153-161 (2018)