참고문헌
- Cisco, Visual Networking Index: Global Mobile Data Traffic Forecast Update 2017-2022 [Internet], https://www.cisco.com/c/dam/global/ko_kr/solutions/service-provider/visual-networking-index-vni/.
- The institute of Foreign Affairs and National Security(ROK Gov), Cyberwarfare in the Russo-Ukraine War: Evaluation and Implications [Internet], https://www.ifans.go.kr/.
- National Intelligence service Republic of Korea, Operational Rules for Cybersecurity (Goverment Rule) [Internet], https://www.law.go.kr/.
- H. Hwang, D. Moon, and I. Kim, "Trend and issue dynamic analysis for malware," in Proceedings of the Korea Information Processing Society Conference, The KIPS, pp.418-420, 2015.
- J. W. Ji, "Problems of cyber security control system and the application of machine learning technology," Review of Korea Institue of Information Security and Cryptology, Vol.31, No.3, pp.13-19, 2021.
- K. H. Kim, K. D. Park, and M. N Sim, "A study on the organizational conflict and job withdrawal intention of the information security workers," Journal of the Korea Institute of Information Security & Cryptology, Vol.29, No.2, pp.451-463, 2019.
- Mitre, Mitre ATT&CK [Internet], https://attack.mitre.org.
- T. Chen and C. Guestrin. "Xgboost: A scalable tree boosting system," in Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM SIGKDD, 2016, pp.785-794.
- G. Ke et al., "Lightgbm: A highly efficient gradient boosting decision tree," in Advances in Neural Information Processing Systems, 30, NIPS, 2017.
- A. V. Dorogush, V. Ershov, and A. Gulin, "CatBoost: gradient boosting with categorical features support." arXiv preprint arXiv:1810.11363.
- M. Nour and J. Slay, "UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)," in 2015 Military Communications and Information Systems Conference (MilCIS), IEEE, 2015, pp.1-6.
- I. H. Seok, K. T. Lee, J. H. Yu, and S. J. Kim, "CNN based Real-Time DNS DDoS attack detection system," The KIPS Transactions on Computer and Communication Systems, Vol.6, No.3, pp.135-142, 2017. https://doi.org/10.3745/KTCCS.2017.6.3.135
- M. Hammad, W. El-medany, and Y. Ismail, "Intrusion detection system using feature selection with clustering and classification machine learning algorithms on the unswnb15 dataset," in 2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT), IEEE, pp.1-6, 2020.
- S. S. Kim, L. Chen, and J. Y. Kim, "Intrusion prediction using long short-term memory deep learning with UNSWNB15," in 2021 IEEE/ACIS 6th International Conference on Big Data, Cloud Computing, and Data Science (BCD), IEEE, 2021.
- P. Singh, J. Jaykumar, A. Pankaj, and R. Mitra "Edge-detect: Edge-centric network intrusion detection using deep neural network," in 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC), IEEE, 2021.
- Y. H. Lee, S. H. Baek, J. W. Seo, I. Y. Bang, and Y. H. Paek, "A study of cyber attacks and recent defense system: DDoS detection and applying deep learning," in Proceedings of the Korea Information Processing Society Conference, The KIPS, pp.302-305, 2017.
- P. D. Yoon and K. H. Hwang, "Malicious traffic detection using ensemble learning based on UNSW-NB15 dataset," in 2021 KICS Winter Conference, KICS, 2021.
- D. B. Lee and J. H. Seo, "Classification performance improvement of UNSW-NB15 dataset based on feature selection," Journal of the Korea Convergence Society, Vol. 10, No.5, pp.35-42, 2019. https://doi.org/10.15207/JKCS.2019.10.5.035
- R. Malhotra and S. Kamal, "An empirical study to investigate oversampling methods for improving software defect prediction using imbalanced data," Neurocomputing, Vol.343, pp.120-140, 2019. https://doi.org/10.1016/j.neucom.2018.04.090
- R. Mohammed, J. Rawashdeh, and M. Abdullah, "Machine learning with oversampling and undersampling techniques: Overview study and experimental results," in 2020 11th International Conference on Information and Communication Systems (ICICS), IEEE, 2020, pp.243-248.
- N. V. Chawla, K. W. Bowyer, L. O. Hall, and W. P. Kegelmeyer, "SMOTE: Synthetic minority over-sampling technique," Journal of Artificial Intelligence Research, Vol.16, pp.321-357, 2002. https://doi.org/10.1613/jair.953
- H. He, Y. Bai, E. A. Garcia, and S. Li, "ADASYN: Adaptive synthetic sampling approach for imbalanced learning," in 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence), IEEE, pp.1322-1328, 2008.
- H. Han, W. Y Wang, and B. H. Mao, "Borderline-SMOTE: A new over-sampling method in imbalanced data sets learning," in International Conference on Intelligent Computing. Springer, 2005.
- Lockheedmartine, Cyber Kill Chain [Internet], https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-ki-chain.html.
- Y. I. Yoon, J. H. Kim, J. Y. Lee, S. D. Yu, and S. J. Lee, "A research on cyber kill chain and TTP by APT attack case study," Jouranl of Information and Security, Vol.20, No.4, pp91-101, 2020. https://doi.org/10.33778/kcsa.2020.20.4.091
- J. Wang, B. Hu, X. Li, and Z. Yang, "GTC forest: An ensemble method for network structured data classification," in 2018 14th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN), IEEE, pp.81-85, 2018.
- T. Akiba, S. Sano, T. Yanase, T. Ohta, and M. Koyama, "Optuna: A next-generation hyperparameter optimization framework," in Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, ACM SIGKDD, pp2623-2631, 2019.
- E. Al Daoud, "Comparison between XGBoost, LightGBM and CatBoost using a home credit dataset," International Journal of Computer and Information Engineering, Vol.13, No.1, pp.6-10, 2019.
- J. H. Hong and B. Y. Lee, "Artificial intelligence-based security control construction and countermeasures," Journal of the Korea Contents Association, Vol.21, No.1, pp.531-540, 2021. https://doi.org/10.5392/JKCA.2021.21.01.531