Acknowledgement
이 논문은 한신대학교 학술연구비 지원에 의하여 연구되었음
References
- Johnson, C., Badger, L., Waltermire, D., Snyder, J. and Skorupka, C., "Guide to Cyber Threat Information Sharing", NIST Special Publication 800-150, 2016.
- Vasil Rizov, "Information Sharing for Cyber Threats", International Journal of Information Security, Vol.39, No.1, pp.43-50, 2018. https://doi.org/10.11610/isij.3904
- A. Pala, J. Zhuang, "Information sharing in cybersecurity: A review," Decis. Anal., Vol.16, No.3, pp.172-196, 2019. https://doi.org/10.1287/deca.2018.0387
- S. Ghernaouti, L. Cellier, and B. Wanner, "Information sharing in cybersecurity : Enhancing security, trust and privacy by capacity building," 2019 3rd Cyber Security in Networking Conference (CSNet), pp.58-62, 2019.
- Wagner, T.D., Mahbub, K., Palomar, E. and Abdallah, A.E., "Cyber threat intelligence sharing: Survey and research directions", Computers & Security Vol.87, pp.1-13, 2019. https://doi.org/10.1016/j.cose.2019.101589
- D. Preuveneers, W. Joosen, J. B. Bernabe and A. Sharmeta, "Distributed Security Framework for Reliable Threat Intelligence Sharing", Security and Communication Networks, Vol.2022, Article ID 8833765, Hindawi, 2022.
- R. Brown, R. M. Lee, "SANS Cyber Treat Intelligence (CTI) Survey," SANS Institute, Scandinavia, UK, 2021, https://www.sans.org/white-papers/40080/Tech.Rep.
- S. Abu, S.R. Selamat, R. Yusof and A. Ariffin, "An Enhancement of Cyber Threat Intelligence Framework", J. Adv. Res. Dyn. Control. Syst, 10, pp.96-104, 2018.
- Mavroeidis, V., Bromander, S., "Cyber threat intelligence model: An evaluation of taxonomies, sharing standards, and ontologies within cyber threat intelligence", Intelligence and Security Informatics Conference (EISIC), pp.91-98, 2017.
- T. D. Wagner, E. Palomar, K. Mahbub and A. E. Abdallah, "A Novel Trust Taxonomy for Shared Cyber Threat Intelligence", Security and Communication Networks, Vol.2018, Article ID 9634507, Hindawi, 2018.
- MISP Threat Sharing, https://www.misp-project.org
- OpenCTI, https://filigran.io/solutions/products/opencti-threat-intelligence/
- Burger, E. W., Goodman, M. D., Kampanakis, P. and Zhu, K. A., "Taxonomy model for cyber threat intelligence information exchange technologies", ACM Workshop on Information Sharing & Collaborative Security, pp.51-60. 2017.
- Maria Stoyanova, Yannis Nikoloudakis, Spyridon Panagiotakis, Evangelos Pallis, and Evangelos K. Markakis, "A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues", IEEE Communications Surveys & Tutorials, Vol.22, No.2, pp.1191-1221, 2020. https://doi.org/10.1109/COMST.2019.2962586
- STIX(TM) Version 2.0. https://www.oasis-open.org/standard/stix2-0/
- H. W. Lee, "Analysis of Cyber Incident Artifact Data Enrichment Mechanism for SIEM Model", Journal of Internet of Things and Convergence, Vol.8, No.5, pp.1-10, 2022. https://doi.org/10.20465/KIOTS.2022.8.5.001
- H. W. Lee, "Indicators of Compromise Data Generation Method for Malware on Cyber Incident Occurrence in IoT Environments", Journal of Internet of Things and Convergence, Vol.9, No.4, pp.1-8, 2023. https://doi.org/10.20465/KIOTS.2023.9.4.001
- MITRE ATT&CK, https://attack.mitre.org