A Study on Defense and Attack Model for Cyber Command Control System based Cyber Kill Chain |
Lee, Jung-Sik
(2nd R&D Institute - 3rd Directorate, Agency for Defense Development)
Cho, Sung-Young (2nd R&D Institute - 3rd Directorate, Agency for Defense Development) Oh, Heang-Rok (2nd R&D Institute - 3rd Directorate, Agency for Defense Development) Han, Myung-Mook (School of AI Software, GaChon University) |
1 | Sung-young Cho, Insung Han, YoungSyup Shin, DongJea Lee, ChangWan Lim, Haengrok Oh, "Automation Method ofcyber threat scenario analysis and prediction", CISC-S, pp.564-569, 2018. |
2 | Sung-young Cho, Insung Han, Hyunsook Jeong, Sungmo Koo, Moosung Park, "Killchain model and cyber threat classification for cyber situational awareness", CISC-S, pp.149-153, 2017. |
3 | Bryan Harris, Eli Konikoff, and Phillip Petersen, "Breaking the DDoS attack chain", Institute for Software Research, 2013. |
4 | Bin Zhu and Ali A. Ghorbani, "Alert correlation for extracting attack strategies", IJ Network Security, vol.3, no.3, pp.244-258, 2006. http://ijns.jalaxy.com.tw/contents/ijns-v3-n3/ijns-2006-v3-n3-p244-258.pdf |
5 | Sungyoung Cho, Insung Han, Hyunsook Jeong, Jinsoo Kim, Sungmo Koo, Haengrok Oh and Moosung Park, "Cyber Kill Chain based Threat Taxonomy and its Application on Cyber Common Operational Picture", Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA 2018), 2018 International Conference on. IEEE, pp 1-8. 2018. https://doi.org/10.1109/CyberSA.2018.8551383 DOI |
6 | Dongho Kang and Jungchan Na, "A rule based event correlation approach for physical and logical security convergence", IJCSNS, 12(1), pp.28, 2012. http://paper.ijcsns.org/07_book/201201/20120104.pdf |
7 | Tarun Yadav and Arvind Mallari Rao, "Technical aspects of cyber kill chain", International Symposium on Security in Computing and Communication, pp.438-452, Springer, 2015. https://arxiv.org/pdf/1606.03184.pdf |
8 | MITRE ATT&CK (Adversarial Tactics, Techniques & Common Knowledge), https://attack.mitre.org/wiki/Main_Page |
9 | Ali Ahmadian Ramaki and Abbas Rasoolzadegan, "Causal knowledge analysis for detecting and modeling multi-step attacks", Security and Communication Networks, 9(18), pp.6042-6065, Wiley Online Library, 2016. https://doi.org/10.1002/sec.1756| DOI |
10 | Chih-Hung Wang and Ye-Chen Chiou, "Alert correlation system with automatic extraction of attack strategies by using dynamic feature weights", International Journal of Computer and Communication Engineering, 5(1), pp.1, IACSIT Press, 2016. https://doi.org/10.17706/IJCCE.2016.5.1.1-10 DOI |