Secure File Transfer Method and Forensic Readiness by converting file format in Network Segmentation Environment |
Han, Jaehyeok
(Institute of Cyber Security & Privacy (ICSP), Korea University)
Yoon, Youngin (Institute of Cyber Security & Privacy (ICSP), Korea University) Hur, Gimin (Institute of Cyber Security & Privacy (ICSP), Korea University) Lee, Jaeyeon (Hanwha Systems Co., Ltd.) Choi, Jeongin (Hanwha Systems Co., Ltd.) Hong, SeokJun (Hanwha Systems Co., Ltd.) Lee, Sangjin (Institute of Cyber Security & Privacy (ICSP), Korea University) |
1 | Eun-hye Han and In-seok Kim, "Efficient Operation Model for Effective APT Defense." Journal of The Korea Institute of information Security & Cryptology, 27(3), pp. 501-519, June. 2017. DOI |
2 | AhnLab, "Beware of APT Attacks Using E-mail", https://asec.ahnlab.com/814, June. 2012. |
3 | KISA, "Ransomware Guidelines.", 2018. |
4 | C. Tankard. "Advanced Persistent threats and how to monitor and deter them." Network security, Vol. 2011. Issue 8, pp. 16-19. Aug. 2011. DOI |
5 | Byeong-joo Cho, Jang-ho Yun, Kyeong-ho Lee, "Study of effectiveness for the network separation policy of financial companies." Journal of The Korea Institute of information Security & Cryptology, 25(1), pp. 181-195, Feb. 2015 DOI |
6 | McAfee, "McAfee Advanced Threat Defense: Detect advanced malware", Nov. 2018. |
7 | Gartner, "Spamina recognized in the Market Guide for Secure Email Gateways", 2017. |
8 | Je-Seong Jeong, Kwangjo Kim, "A Study on Detection of Evasive Malware in Cuckoo Sandbox", CISC-S'15, June. 2015. |
9 | Eunkwang Kim, Sangjun Jeon, Jaehyeok Han, Minwook Lee, Sangjin Lee, "An effective detection method for hiding data in compound- document files." Journal of The Korea Institute of information Security & Cryptology, 25(6), pp. 1485-1494, Dec. 2015. DOI |
10 | Kiwon Hong, Jongsung Kim, "Improved Data Concealing and Detecting Methods for OOXML Document." Journal of The Korea Institute of information Security & Cryptology, 27(3), pp. 489-499, June. 2017. DOI |
11 | Jungeun Jee and Yongtae Shin, "A Logical Network Partition Scheme for Cyber Hacking and Terror Attacks." Journal of KIISE, 39(1), pp. 95-101, Feb. 2012. |
12 | Choon Sik Park, "An Email Vaccine Cloud System for Detecting Malcode-Bearing Documents", Journal of Korea Multimedia Society 13(5), pp. 754-762, May. 2010. |
13 | NIST, "National Software Reference Library (NSRL).", https://www.nist.gov/software-quality-group/national-software-reference-library-nsrl |