Acknowledgement
이 논문은 한신대학교 학술연구비 지원에 의하여 연구되었음
References
- Abu, S.; Selamat, S.R.; Yusof, R.; Ariffin, A., "An Enhancement of Cyber Threat Intelligence Framework", J. Adv. Res. Dyn. Control. Syst, 10, pp.96-104, 2018.
- Harrington, C., "Sharing indicators of compromise: An overview of standards and formats", Emc Crit. Incid. Response Cent. 2013.
- Brown, R.; Lee, R.M. The Evolution of Cyber Threat Intelligence (CTI): 2019 SANS CTI Survey; SANS Institute: Bethesda, MA, USA, 2019.
- A. Pala and J. Zhuang, "Information sharing in cybersecurity: A review," Decis. Anal., Vol.16, No.3, pp. 172-196, 2019. https://doi.org/10.1287/deca.2018.0387
- S. Ghernaouti, L. Cellier, and B. Wanner, "Information sharing in cybersecurity : Enhancing security, trust and privacy by capacity building," 2019 3rd Cyber Secur. Netw. Conf. CSNet, pp.58-62, 2019.
- Johnson, C., Badger, L., Waltermire, D., Snyder, J., Skorupka, C., "Guide to Cyber Threat Information Sharing", NIST Special Publication 800-150, 2016
- Mavroeidis, V., Bromander, S., "Cyber threat intelligence model: An evaluation of taxonomies, sharing standards, and ontologies within cyber threat intelligence", Intelligence and Security Informatics Conference (EISIC), pp.91-98, 2017
- Burger, E. W., Goodman, M. D., Kampanakis, P., Zhu, K. A., "Taxonomy model for cyber threat intelligence information exchange technologies", ACM Workshop on Information Sharing & Collaborative Security, pp.51-60. 2017.
- Wagner, T.D., Mahbub, K., Palomar, E., Abdallah, A.E., "Cyber threat intelligence sharing: Survey and research directions", Computers & Security Vol.87, pp.1-13, 2019. https://doi.org/10.1016/j.cose.2019.101589
- Maria Stoyanova, Yannis Nikoloudakis, Spyridon Panagiotakis, Evangelos Pallis, and Evangelos K. Markakis, "A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues", IEEE Communications Surveys & Tutorials, Vol.22, No.2, pp.1191-1221, 2020. https://doi.org/10.1109/COMST.2019.2962586
- C. Beaman, A. Barkworth, T. D. Akande, S. Hakak, M. H. Khan, "Ransomware: Recent advances, analysis, challenges and future research directions", Computer & Security, Vol.111, 2021.
- H. W. Lee, "Cryptography Module Detection and Identification Mechanism on Malicious Ransomware Software", Journal of Internet of Things and Convergence, Vol.9, No.1, pp.1-7, 2023. https://doi.org/10.20465/KIOTS.2023.9.1.001
- T. Y. Kim, K. Han, S. O. Hwang, "A New Association Rule Mining based on Coverage and Exclusion for Network Intrusion Detection", Journal of Internet of Things and Convergence, Vol.9, No.1, pp.77-87, 2023. https://doi.org/10.20465/KIOTS.2023.9.1.077
- H. W. Lee, "Analysis of Cyber Incident Artifact Data Enrichment Mechanism for SIEM Model Analysis of AI-Based Water Pipeline Improved Decision", Journal of Internet of Things and Convergence, Vol.8, No.5, pp.1-10, 2022. https://doi.org/10.20465/KIOTS.2022.8.5.001
- J. K. Park, J. Kim, "Comparison of encryption algorithm performance between low-spec IoT devices", Journal of Internet of Things and Convergence, Vol.8, No.1, pp.79-85, 2022. https://doi.org/10.20465/KIOTS.2022.8.1.079
- Open IOC: Back to the Basics, Mandiant, https://www.mandiant.com/resources/blog/openioc-basics
- C-TAS, Cyber Threat Analysis and Sharing System, https://cshare.krcert.or.kr:8443/index
- FSEC, Financial Security Institute API, https://www.fsec.or.kr