Browse > Article
http://dx.doi.org/10.3745/KTCCS.2013.2.8.357

Strategies Building Knowledge_Base to Respond Effectively to Advanced Cyber Threats  

Lee, Tae-Young (순천향대학교 정보통신공학과)
Park, Dong-Gue (순천향대학교 정보통신공학과)
Publication Information
KIPS Transactions on Computer and Communication Systems / v.2, no.8, 2013 , pp. 357-368 More about this Journal
Abstract
Our society has evolved into a fully connected society in a mixed reality environment enabling various knowledge sharing / management / control / creation due to the expansion of broadband ICT infrastructure, smart devices, cloud services and social media services. Therefore cyber threats have increased with the convenience. The society of the future can cause more complex and subtle problems, if you do not have an effective response to cyber threats, due to fusion of logical space and physical space, organic connection of the smart object and the universalization of fully connected society. In this paper, we propose the strategy to build knowledge-base as the basis to actively respond to new cyber threats caused by future various environmental changes and the universalization of fully connected society.
Keywords
Target Attacks; Advanced Persistent Threats; Cyber Threats; National Security Knowledge_Base;
Citations & Related Records
연도 인용수 순위
  • Reference
1 http://docs.media.bitpipe.com/io_10x/io_105022/item_550605/Lifecycle_of_the_Advanced_Persistent_Threat%5B1%5D.pdf
2 Kim Hyung-Wook, "0-Day Attack Protection for IBM's multi-tier pre-emptive countermeasures", IBM Security Summit, 2011.
3 "Corresponds to the current state of the 2010 virus hacking", KISA Final Research Report, KISA-RP-2010-0051
4 http://www.ahnlab.com/kr/site/securityinfo/secunews/secuNewsView.do?curPage=1&menu_dist=2&seq=18487&dir_group_dist=0
5 http://www.Websense.com/assets/white-papers/whitepa per-Websense-advanced-persistent-threats-and-other-advanced-attacks-en.pdf
6 http://www.trendmicro.com/us/enterprise/challenges/ad vance-targeted-attacks/index.html#understand-an-attack
7 http://www.trendmicro.com/cloud-content/us/pdfs/busi ness/datasheets/ds_deep-discovery.pdf
8 http://www.it-win.co.kr/EMC_RSA_NetWitness.pdf
9 http://www.zdnet.co.kr/news/news_view.asp?artice_id=20120918220326&type=det
10 http://image.itstv.net/upload_files/infocenter/file32599-137302.pdf
11 http://blog.hitoos.com/radiohankook/44961
12 http://www.eurosouthkorea-ict.org/documents/forum2_ppt/mijoo_kim.pdf
13 http://epc.neograph.co.kr/kor/info/kor_info_dic_list.httml?sval=&mode=h8&page=3#
14 http://blog.daum.net/damulkan/7563870
15 http://www.isssource.com/wp-content/uploads/2012/04/040412C5_APT_ADecadeInReview.pdf
16 Lee Chang-bum, Kang Lee-Seock, "Internet Law Trends No. 22", KISA, Trends in Internet legislation 2009-07.
17 http://netsquare.kisa.or.kr/report/securityTrend/[June 3 weeks] "United States, for cyber security 'Plan X' strategy promotion" 2012-06-21.
18 Kim Il-Soo, Kang Seock-Gu, Yoon Hee-Sang And five others, "Study on the Construction of cyber security system", Korea Criminal Policy Research Institute, 2010.
19 http://yjlee.delighit.net/i/entry/75
20 http://www.ahnlab.com/kr/site/securityinfo/secunews/secuNewsView.do?menu_dist=2&seq=16854
21 http://blog.daum.net/saschajin/12603
22 Nam Ki-Hyo, Kim Youn-Hong, Kwon Hwan-Woo, "Trends in information protection latest technology: APT and its corresponding", Information and communication industry Agency, 2011. 9.