Browse > Article
http://dx.doi.org/10.22156/CS4SMB.2022.12.04.126

Design of Intelligent Intrusion Context-aware Inference System for Active Detection and Response  

Hwang, Yoon-Cheol (Department of Talmage Liberal Arts College, Hannam University)
Mun, Hyung-Jin (Department of Information & Communication Engineering, Sungkyul University)
Publication Information
Journal of Convergence for Information Technology / v.12, no.4, 2022 , pp. 126-132 More about this Journal
Abstract
At present, due to the rapid spread of smartphones and activation of IoT, malicious codes are disseminated using SNS, or intelligent intrusions such as intelligent APT and ransomware are in progress. The damage caused by the intelligent intrusion is also becoming more consequential, threatening, and emergent than the previous intrusion. Therefore, in this paper, we propose an intelligent intrusion situation-aware reasoning system to detect transgression behavior made by such intelligent malicious code. The proposed system was used to detect and respond to various intelligent intrusions at an early stage. The anticipated system is composed of an event monitor, event manager, situation manager, response manager, and database, and through close interaction between each component, it identifies the previously recognized intrusive behavior and learns about the new invasive activities. It was detected through the function to improve the performance of the inference device. In addition, it was found that the proposed system detects and responds to intelligent intrusions through the state of detecting ransomware, which is an intelligent intrusion type.
Keywords
Malware; Context-aware; Active Detection; Learning; Inference engine;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 D. H. Lakshminarayana, J. Philips & N. Tabrizi. (2019). A survey of intrusion detection techniques. In 2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA) (pp. 1122-1129). IEEE. DOI : 10.1109/ICMLA.2019.00187.   DOI
2 J. Y. Moon. & Y. H. Jang. (2016). Ransomware Analysis and Method for Minimize the Damage. The Journal of the Convergence on Culture Technology (JCCT), 2(1), 79-85. DOI : 10.17703/JCCT.2016.2.1.79   DOI
3 H. J. Mun, S. H. Choi & Y. C. Hwang. (2016). Effective Countermeasure to APT Attacks using Big Data. Journal of Convergence for Information Technology, 6(1), 7-23. DOI : 10.221 56/CS4SMB.2016.6.1.017   DOI
4 Y. C. Hwang. & H. J. Mun (2019). Intrusion Situation Classification Model for Intelligent Intrusion Awareness. Journal of Convergence for Information Technology, 9(3), 134-139. DOI : 10.22156/CS4SMB.2019.9.3.134   DOI
5 KISA. (2021). Ransomware Special Report. KISA(Online). https://www.boho.or.kr/data/reportView.do?bulletin_writing_sequence=36211
6 Y. Wang, W. Ji & J. Wang. (2012). Design and Implementation of Inference Engine for Conflict Resolution. In 2012 Second International Conference on Intelligent System Design and Engineering Application (pp. 220-223). IEEE. DOI : 10.1109/ISdea .2012.677.   DOI
7 S. Park. (2014). Current Status and Analysis of Domestic Security Monitoring Systems. Journal of the Korea Institute of Electronic Communication Sciences, 9(2), 261-266. DOI : 10.13067/JKIECS.2014.9.2.261   DOI
8 AhnLab. (2017). Latest Ransomware Trend Analysis Report. Seongnam : AhnLab.
9 CERT-EU. (2017). WannaCry Ransomware Analysis Propagated to Windows SMB Vulnerabilities. RedAlert.
10 Kenet. (2017). Petya Ransomware v0.3 National KE-CIRT-CC Report. ThaiCERT(Online). https://cert.kenet.or.ke/node/2.
11 KISA. (2017). Cyber Threat Trend Report for the first quarter of 2017. KISA(online). https://www.krcert.or.kr/data/reportView.do?bulletin_writing_sequence=25623&queryString=cGFnZT03JnNvcnRfY29kZT0mc29ydF9jb2RlX25hbWU9JnNlYXJjaF9zb3J0PXRpdGxlX25hbWUmc2VhcmNoX3dvcmQ9.
12 HAURI. (2017). SECURITY MAGAZINE ViRobot. HAURI(Online). http://www.hauri.co.kr/EBook/zoom.html?intSeq=99.
13 E. J. Khaleefa & D. A. Abdulah. (2022). Concept and difficulties of advanced persistent threats (APT): Survey. International Journal of Nonlinear Analysis and Applications, 13(1), 4037-4052. DOI : 10.22075/IJNAA.2022.6230   DOI
14 Charith Perera, et al. (2014). Context Aware Computing for the Internet of Things: A Survey. Communications Surveys & Tutorials, IEEE. 16(1). 414-454. DOI : 10.1109 /SURV.2013.042313.00197.   DOI
15 TACHYON & ISARC. (2017). Analysis of sage ransomware that appeared in version 2.0. (Online). https://isarc.tachyonlab.com/1085.
16 Korea Ransomware Infringement Response Center. (2017). CryptoShield. rancert(Online). https://www.rancert.com/bbs/bbs.php?bbs_id=case&mode=view&id=64.
17 M. C. Lim. (2017). Ransomware Infected Linux Servers, What Happens?. ZDNet Korea(Online). https://zdnet.co.kr/view/?no=20170613100723.