1 |
Jungchan Na, Hyunsook Cho, "Classification of ICS abnormal behavior in terms of security", Journal of the Korea Institute of Information Security & Cryptology 23(2), pp. 329-33, Apr. 2013.
DOI
|
2 |
Hyunguk Yoo, Jeong-Han Yun, Taeshik Shon, "Whitelist-Based Anomaly Detection for Industrial Control System Security", The Journal of The Korean Institute of Communication Sciences 38(8), pp. 642-643, April. 2013.
|
3 |
Younghun Lee, Junghyun Ryu, Jonghyuk Park, "Research Trends and Considerations of Security Technology of Industrial Control System", SeoulNational University of Science and Technology, pp.3, May. 2018.
|
4 |
Procon, "SCADA OS Windows Unix", http://www.procon.co.kr/page/sub.htm l?main=2&sub=1, DEC. 2018.
|
5 |
Univ. Hoseo, "Analysis of Overseas System based Evaluation Cases and Technology", KISA-WP-2009-0011. pp. 8, Jun. 2009.
|
6 |
Josh Brower, "Using Sysmon to Enrich Security Onion's Host-Level Capabilities", GIAC (GCFA) Gold Certification, pp.6-15, Mar. 2015.
|
7 |
Vasileios Mavroeidis . Audcun Josang, "Data-Driven Threat Hunting Using Sysmon", ICCSP 2018, pp.5-6, Mar. 2018.
|
8 |
Financial Security Institute, "Cyber Threat Intelligence", https://www.fsec.or.kr/user /bbs/fsec/163/344/bbsDataView/1139.do?page=1&column=&search=&searchSDate=&searchEDate=&bbsDataCategory=, Sep. 2018.
|
9 |
Mitre Corp, "Mitre ATT&CK", https://mitre-attack.github.io/caret, Sep. 2018.
|
10 |
Kaspersky Lab, "ShadowPad", https://securelist.com/shadowpad-in-corporate-networks/81432/, Oct. 2018.
|
11 |
JPCERT Coordination Center, "Sysmon Malware Detection", https://blogs.jpcert.or.jp /en/2018/09/visualise-sysmon-logs-and-detect-suspicious-device-behaviour-sysmonsearch.html, Sep. 2018.
|
12 |
SecurityFocus, "SCADA vulnerabilities", https://www.securityfocus.com/news/11402, Sep. 2018.
|
13 |
Gyeongyeong Song, "Security technology trend for SCADA system", The Magazine of the IEEK, pp.1-2, Aug. 2015.
|
14 |
GAO, "Critical Infrastructure Threats", GAO 04-354, pp.2, Mar. 2004.
|
15 |
MSS, "Technology Roadmap for SME 2018-2020 Information Security", MSS, pp. 257, Jan. 2018.
|
16 |
Microsoft, "Sysmon Setup", https://docs. microsoft.com/ko-kr/sysinternals/downloads/sysmon, Aug. 2018.
|
17 |
CISA, "ICS Sysmon", https://ics-cert.us-cert.gov/Industrial-Control-Systems-Joint-Working-Group-ICSJWG, Sep. 2018.
|
18 |
Plura Blog, "Windows Sysmon", http:// blog.plura.io/?p=9481, Sep. 2018
|
19 |
Elastic, "Elasticsearch Logstash Kibana", https://www.elastic.co/kr/products/, Sep. 2018
|
20 |
"4th Industrial Revolution and 'Cyber Threat Intelligence'", DT, 2. May. 2018. http://www.dt.co.kr/contents.html?article_no=2018050302102351607001
|
21 |
Darktrace Blog, "ICS SCADA EDR", https://blog.naver.com/darktrace-ray/221045454630, Sep. 2018.
|
22 |
MSS, "Technology Roadmap for SME 2018-2020Information Security", MSS, pp. 252-254, Jan. 2018.
|
23 |
DRAGOS, "CRASHOVERRIDE; Analysisof the Threat to Electric Grid Operations", DRAGOS, pp.6-11, Jun. 2017.
|
24 |
NIST, "Guide to Industrial control systems security", NIST Special Publication 800-82 Revision 2, pp. 29-31, May. 2015.
|
25 |
Seonghun Eom, Jaepyo Bag, "A Study on the Security Threats Detection through Analysis of Endpoint Integration Security Log", Soongsil Univ., pp.9-24, Dec. 2016.
|
26 |
Ahnlab, "Critical Infrastructure Threats", Analysis Report, pp. 36-37, May. 2016.
|
27 |
Boannews, "Seungyeon Han, The impo rtance of ICS /SCADA security and co unter measures, ISEC 2018", https://www.youtube. com/watch?v=k2oJO-_nkRw, Nov. 2018.
|