A Study on Building a Cyber Attack Database using Open Source Intelligence (OSINT) |
Shin, Kyuyong
(육군사관학교 컴퓨터과학과)
Yoo, Jincheol (육군사관학교 컴퓨터과학과) Han, Changhee (육군사관학교 컴퓨터과학과) Kim, Kyoung Min (육군사관학교 컴퓨터과학과) Kang, Sungrok (육군사관학교 심리경영학과) Moon, Minam (육군사관학교 수학과) Lee, Jongkwan (육군사관학교 컴퓨터과학과) |
1 | Jin Gui Min, "National Intelligence Studies, 9th edition", Baeum, Jan. 2019. |
2 | Wanhee Lee, Minwoo Yun, and Jung Seok Park, "Intelligence in the Internet Era: Understanding OSINT and Case Analysis", Korean Security Science Review, No. 34, pp. 259-278, 2013. |
3 | Byungchul Cho, "A System for National Intelligence Activity Based on All Kinds of OSINT(Open Source INTelligence) on the Internet", Journal of Information and Security, Vol. 3, No. 2, pp. 41-55, June 2003. |
4 | Woong Chun, "Open Source Intelligence in the Information Age", Journal of National Intelligence Studies, Vol. 1, No. 1, pp. 151-172, July 2008. |
5 | Minwoo Yun, "Construction of Database for Terrorism and Crime through OSINT", The Korean Association of Criminal Psychology, Vol. 13, No. 2, June 2017. |
6 | Mabrey Daniel, "Analyzing Terrorist Activities through Operational & Associational Coding of Events: Introducing the Institute for the Study of Violent Groups' Relational Database", ISVG center, 2010. |
7 | START, "Global Terrorism Database Codebook : Inclusion Criteria and Variables", START Center. University of Maryland, 2017. |
8 | FBI Office of the Program Management Executive, "Security Concept of Operations (S-CONOPS), Investigative Data Warehouse (IDW) Program", Electronic Frontier Foundation, Nov. 2004. |
9 | Wanju Kim, Changwook Park, Soojin Lee, and Jaesung Lim, "Methods for Classification and Attack Prediction of Attack Groups based on Framework of Cyber Defense Operations", Journal of KIISE, Vol. 20, No. 6, pp. 317-328, June 2014. |
10 | Kyuyong Shin, Jincheol Yoo, Changhee Han, Sungrok Kang, Jongkwan Lee, Minam Moon, Kyoung Min Kim, "A Study on Cyber Threat Analysis based on Open Source Intelligence", Technical Report, ROK Cyber Command, Dec. 2018. |
11 | ISVG(Institute for the Study of Violent Groups), ISVG Relational Database Codebook, Sam Houston University, Huntswille, TX. 2005. |
12 | Yeongdo Jung and Jeonggi Seog, "A Study on Countermeasures against North Korea's Cyber Attack", Journal of Information and Security, Vol. 16, No. 6, pp 43-50, Oct. 2016. |