참고문헌
- Daesung Moon, Hansung Lee, Ikkyun Kim, "Host based Feature Description Method for Detecting APT Attack", Journal of The Korea Institute of Information Security & Cryptology VOL.24, NO.5, Oct. 2014 DOI: https://doi.org/10.13089/jkiisc.2014.24.5.839
- MoonGoo, Lee, Chunsock Bae, "A Study for the Principle Cases of Advanced Persistent Threat Attacks", THE INSTITUTE OF ELECTRONICS ENGINEERS OF KOREA pp.939-942, Nov. 2013
- Sul-Hwa Im, Jong-Soo Kim, Jun-Keun Yang, Chae-ho Lim, "Present situation of APT and Response Strategies of new malware", Korea Institute Of Information Security And Cryptology VOL.24, NO.2, April. 2014
- Sung-Baek HAN, Sung-Kwon Hong, "Countermeasures in APT attack for the financial sector", Korea Institute Of Information Security And Cryptology VOL.23, NO.1, Feb. 2013
- Si-Jang Park, Jong-Hoon Park, "Current Status and Analysis of Domestic Security Monitoring Systems", The Korea Institute of Electronic Communication Sciences VOL.9, NO.2, pp.261-266, Feb. 2014 DOI: https://doi.org/10.13067/jkiecs.2014.9.2.261
- Jaeho Lee, Sangjin Lee, "A Study on Unknown Malware Detection using Digital Forensic Techniques", Journal of The Korea Institute of Information Security & Cryptology VOL.24, NO.1, Feb. 2014 DOI: https://doi.org/10.13089/jkiisc.2014.24.1.107
- Hojin Park, Sangjin Lee, "Build a Digital Evidence Map considered Log-Chain", Journal of The Korea Institute of Information Security & Cryptology VOL.24, NO.3, Jun. 2014 DOI: https://doi.org/10.13089/jkiisc.2014.24.3.523
- Jae-Hwa Sim, Sung-Hwan Kim, Tai-Myoung Chung, "A Survey of Solutions using Security Information Event Management", Proceedings of Symposium of the Korean Institute of communications and Information Sciences, pp.390-391, Jan. 2014
- Hyu Keun Shin, Kichul Kim, "Security Monitering Technology trends survey and A Study on the next generation of security monitering framework", Journal of The Korea Institute of Information Security & Cryptology VOL.23, NO.6, Dec. 2014
- Kyu-il Kim, Hark-soo Park, Ji-yeon Choi, Sang-jun Ko, Jung-suk Song, "An Auto-Verification Method of Security Events Based on Empirical Analysis for Advanced Security Monitoring and Response", Journal of The Korea Institute of Information Security & Cryptology VOL.24, NO.3, Jun. 2014 DOI: https://doi.org/10.13089/jkiisc.2014.24.3.507
- Dae-Soo Choi, Yong-Min Kim, "BigData and Integrated security 2.0", COMMUNICATIONS OF THE KOREA INFORMATION SCIENCE SOCIETY VOL.30, NO.6, pp.65-72, Jun. 2012
- DeokJo Jeon, Dong-Gue Park, "Analysis Model for Prediction of Cyber Threats by Utilizing Big Data Technology", Journal of Korean Institute Of Information Technology. Vol. 12, No. 5, pp. 81-100, May. 2014 DOI: https://doi.org/10.14801/kiitr.2014.12.5.81
- Mee Lan Han, Deok Jin Kim, Huy Kang Kim, "Applying CBR algorithm for cyber infringement profiling system", Journal of The Korea Institute of Information Security & Cryptology VOL.23, NO.6, Dec. 2013 DOI: https://doi.org/10.13089/jkiisc.2013.23.6.1069
- Hyong-su Park, Huy-kang Kim, Eun-jin Kim, "Hacking Mail Profiling by Applying Case Based Reasoning", Journal of The Korea Institute of Information Security & Cryptology VOL.25, NO.1, Feb. 2015 DOI: https://doi.org/10.13089/jkiisc.2015.25.1.107
- Ho-sub Lee, Eung-ki Park, Jung-taek Seo, "A New Method to Detect Anomalous State of Network using Information of Clusters", Journal of the Korea Institute of Information Security and Cryptology VOL.22, NO.3, pp.545-552, Jun. 2012
- Ki-Soon Yu, Sul-Hwa Im, Hak-Beom KIM, "Technology Trends of SIEM and direction of improvement", Journal of The Korea Institute of Information Security & Cryptology VOL.23, NO.6, Dec. 2014
- Kyung-Shin Kim, "Security Analysis and Improvement of Integrated Security Management System", Journal of Institute of Internet, Broadcasting and Communication VOL.15, No.1, pp.15-23, Feb. 2015 DOI: https://doi.org/10.7236/jiibc.2015.15.1.15