Browse > Article
http://dx.doi.org/10.13089/JKIISC.2022.32.1.99

Deep Learning-Based Automation Cyber Attack Convergence Trend Analysis Mechanism for Deep Learning-Based Security Vulnerability Analysis  

Kim, Jinsu (Jeju National University)
Park, Namje (Jeju National University)
Abstract
In the current technological society, where various technologies are converged into one and being transformed into new technologies, new cyber attacks are being made just as they keep pace with the changes in society. In particular, due to the convergence of various attacks into one, it is difficult to protect the system with only the existing security system. A lot of information is being generated to respond to such cyber attacks. However, recklessly generated vulnerability information can induce confusion by providing unnecessary information to administrators. Therefore, this paper proposes a mechanism to assist in the analysis of emerging cyberattack convergence technologies by providing differentiated vulnerability information to managers by learning documents using deep learning-based language learning models, extracting vulnerability information and classifying them according to the MITRE ATT&CK framework.
Keywords
MITRE ATT&CK; Cyber Attack; Attack Convergence; Vulnerability; MachineLearning;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 D. Lee and N. Park, "Geocasting-based synchronization of Almanac on the maritime cloud for distributed smart surveillance," The Journal of Supercomputing, vol. 73, pp. 1103-1118, Aug. 2016.
2 J. Kim, N. Park, G. Kim and S. Jin, "CCTV Video Processing Metadata Security Scheme Using Character Order Preserving-Transformation in the Emerging Multimedia," Electronics, vol. 8, no. 4, 412, Apr. 2019.   DOI
3 Sung-Hee Jin, "A Case Study and Industry Demand Investigation on Technological Convergence Education Related to the 4th Industrial Revolution - Focused on Electronics, Software, and Automobile -," Journal Of The Korea Contents Association, 19(2), pp. 36-48, Feb. 2019.   DOI
4 Otis Alexander, Misha Belisle and Jacob Steele, "MITRE ATT&CK® for Industrial Control Systems: Design and Philosophy," MITRE, Mar. 2020.
5 N. Park, Y. Sung, Y. Jeong, S. Shin and C. Kim, "The Analysis of the Appropriateness of Information Education Curriculum Standard Model for Elementary School in Korea," International Conference on Computer and Information Science, pp. 1-15, Jun. 2019.
6 Anna Georgiadou, Spiros Mouzakitis and Dimitris Askounis, "Assessing MITRE ATT&CK Risk Using a Cyber-Security Culture Framework," Sensors, vol. 21, no. 9, 3267, May. 2021.   DOI
7 Jinsu Kim and Namje Park, "A Face Image Virtualization Mechanism for Privacy Intrusion Prevention in Healthcare Video Surveillance Systems," Symmetry, vol. 12, no. 6, pp.1-15, Jun. 2020.
8 Jacob Devlin, Ming-Wei Chang, Kenton Lee and Kristina Toutanova, "BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding," Computation and Language, pp. 1-16, May. 2019.
9 Rich Caruana and Alexandru Niculescu-Mizil, "An empirical comparison of supervised learning algorithms," Proceedings of the 23rd international conference on Machine learning, pp. 161-168, Jun. 2006.
10 J. Kim and N. Park, "Role-based Access Control Video Surveillance Mechanism Modeling in Smart Contract Environment," Transactions on Emerging Telecommunications Technologies, John Wiley & Sons, Inc. New York, NY, USA, Fub. 2021.
11 Jeremy Straub, "Modeling Attack, Defense and Threat Trees and the Cyber Kill Chain, ATT&CK and STRIDE Frameworks as Blackboard Architecture Networks," 2020 IEEE International Conference on Smart Cloud (SmartCloud), Washington, DC, USA, Nov. 2020.
12 Bing Liu, "Supervised Learning," Web data mining, pp. 63-132, Apr. 2011.
13 Jong-Seok Choe, Jong-Gyu Park and Ho-Won Kim, "Research on artificial intelligence and internet of things convergence security technology," Information and Communications Magazine, vol. 34, no. 3, pp. 65-73, Feb. 2017.
14 J. Kim and N. Park, "Lightweight knowledge-based authentication model for intelligent closed circuit television in mobile personal computing," Personal and Ubiquitous Computing, pp. 1-9, Aug. 2019.
15 Gihyo Nam, "Convergence security technology trends and issues," Weekly technology trend, Institute for Information & communications Technology Promotion, pp. 1-9, Nov. 2014.
16 Yinhan Liu, Myle Ott, NamanGoyal, Jingfei Du, Mandar Joshi, Danqi Chen, Omer Levy, Mike Lewis, Luke Zettlemoyer and Veselin Stoyanov, "RoBERTa: A Robustly Optimized BERT Pretraining Approach," Computation and Language, pp. 1-13, Jul. 2019.
17 Jinsu Kim and Namje Park, "Blockchain-based data-preserving AI learning environment model for AI cybersecurity systems in IoT service environments." Applied Sciences, vol. 10, no. 14, pp. 1-12, Jul. 2020.
18 Gyeong-Hui Gwon, "Seoul Digital Forum 2004- Digital Convergence Revolution: In Search of New Opportunities," Digital Contents, vol. 6, no. 133, pp. 72-80, Jun. 2004.
19 Dou Kim, "Convergence security technology and patent trends," Weekly technology trend, Institute for Information & communications Technology Promotion, pp. 15-24, Jun. 2017.
20 D. Lee and N. Park, "Blockchain based privacy preserving multimedia intelligent video surveillance using secure Merkle tree," Multimedia Tools and Applications, vol. 80, pp. 34517-34534, Mar. 2020.
21 Jinsu Kim, Sungwook Ryu and Namje Park, "Privacy-Enhanced Data Deduplication Computational Intelligence Technique for Secure Healthcare Applications," Computers Materials Continua, vol. 70, no. 2, pp. 4169-4184, Sep. 2021.
22 Seong-Hoon Lee and Dong-Won Han, "Smart technology application status and future," Korea Institute of Information Technology Magazine, 9(2), pp. 45-52, Aug. 2011.
23 Eunjin Kim, Sun-Tae Kim and Jong-Suk Lee, "Exploratory research on future innovation convergence technology in the digital transformation era," Proceedings of the Korean Institute of Information and Commucation Sciences Conference, pp. 627-629, Jan. 2021.
24 D. Lee, N. Park, G. Kim and S. Jin, "De-identification of metering data for smart grid personal security in intelligent CCTV-based P2P cloud computing environment," Peer-to-Peer Networking and Applications, vol. 11, pp. 1299-1308, Mar. 2018.   DOI
25 Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N. Gomez and Lukasz Kaiser and Illia Polosukhin, "Attention Is All You Need," Computation and Language, pp.1-15, Jun. 2017.
26 Sungwook Ryu, Jinsu Kim, Namje Park and Yongseok Seo, "Preemptive Prediction-Based Automated Cyberattack Framework Modeling," Symmetry, vol.13, no. 5, 793, pp. 1-20, May. 2021.   DOI
27 Jinsu Kim, Donghyeok Lee and Namje Park, "CCTV-RFID enabled multifactor authentication model for secure differential level video access control," Multimedia Tools and Applications, vol. 79, pp. 23461-23481, Jun. 2020.   DOI
28 Youngsup Shin, Kyoungmin Kim Jemin Justin Lee and Kyungho Lee, "ART: Automated Reclassification for Threat Actors based on ATT&CK Matrix Similarity," 2021 World Automation Congress (WAC), Taipei, Taiwan, Oct. 2021.
29 Roger Kwon, Travis Ashley, Jerry Castleberry, Penny Mckenzie and Sri Nikhil Gupta Gourisetti, "Cyber Threat Dictionary Using MITRE ATT&CK Matrix and NIST Cybersecurity Framework Mapping," 2020 Resilience Week, Salt Lake City, UT, USA, Oct. 2020.