Acknowledgement
이 성과의 일부는 2022년도 정부(과학기술정보통신부)의 재원으로 한국연구재단의 지원을 받아 수행된 연구임 (No 2021R1F1A1046954).
References
- 'Ransomware Latest Trend Analysis and Implications', Digital & Security Policy, KISA Insight, Vol.02, 2021, Korea Internet & Security Agency, https://www.kisa.or.kr/20301/form?postSeq=4&page=1
- C. Beaman, A. Barkworth, T. D. Akande, S. Hakak, M. H. Khan, "Ransomware: Recent advances, analysis, challenges and future research directions," Computer & Security, Vol.111, 2021, 102490
- H. Alshaikh NR, Nagy, H. Hefny, "Ransomware prevention and mitigation techniques." International Journal of Computer Applications, Vol.117, No.40, pp.31-39, 2020. https://doi.org/10.5120/ijca2020919899
- P. Bajpai, R. Enbody, "An empirical study of API calls in ransomware," IEEE International Conference on Electro Information Technology (EIT); 2020, pp. 443-448.
- B. Qin, Y. Wang, C. Ma, "API call based ransomware dynamic detection approach using textCNN," 2020 International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering (ICBAIE); 2020. pp.162-166.
- J. Y. Moon and Y. H. Chang, "Ransomware analysis method for minimize the damage," The Journal of the Convergence on Culture Technology, Vol.2, No.1, pp.79-85, 2016. https://doi.org/10.17703/JCCT.2016.2.1.79
- J. Y. Kim, "A study on the recovery of ransomware infected file through real-time file behavior analysis," Master's Thesis, Korea University, May. 2017.
- S. W. Yoon, M. S. Jun, "A Study on a Method of Identifying a Block Cipher Algorithm to increase Ransomware Detection Rate," Journal of The Korea Institute of Information Security & Cryptology, Vol.28, No.2, Apr. 2018.
- "Wannacry report," https://www.pandasecurity.com/ mediacenter/src/uploads/2017/05/WannaCry_Report-en.pdf
- "SimpleLocker Ransomware Encryption Function Analysis Report," July. 2019, Korea Internet & Security Agency,
- "immuni Ransomware Encryption Function Analysis Report," Dec. 2020, Korea Internet & Security Agency,
- Hassannataj Joloudari, J., Haderbadi, M., Mashmool, A., GhasemiGol, M., Shahab, S., and Mosavi, A., "Early detection of the advanced persistent threat attack using performance analysis of deep learning", arXiv e-prints, 2020.
- Md Sahrom Abu, Siti Rahayu Selamat, Aswami Ariffin, Robiah Yusof, "Cyber Threat Intelligence - Issue and Challenges," Indonesian Journal of Electrical Emgineering and Computer Science, Vol.10, No.1, pp.371-379, 2018. https://doi.org/10.11591/ijeecs.v10.i1.pp371-379
- H.Lee, "Intrusion Artifact Acquisition Method based on IoT Botnet Malware," Journal of The Korea Internet of Things Society, Vol.7, No.3, pp.1-8, 2021.
- Maria Stoyanova, Yannis Nikoloudakis, Spyridon Panagiotakis, Evangelos Pallis, and Evangelos K. Markakis, "A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues," IEEE COMMUNICATIONS SURVEYS & TUTORIALS, Vol.22, No.2, pp.1191-1221, 2020. https://doi.org/10.1109/COMST.2019.2962586