Cyber-attack group analysis method based on association of cyber-attack information

3Citations
Citations of this article
27Readers
Mendeley users who have this article in their library.

Abstract

Cyber-attacks emerge in a more intelligent way, and various security technologies are applied to respond to such attacks. Still, more and more people agree that individual response to each intelligent infringement attack has a fundamental limit. Accordingly, the cyber threat intelligence analysis technology is drawing attention in analyzing the attacker group, interpreting the attack trend, and obtaining decision making information by collecting a large quantity of cyber-attack information and performing relation analysis. In this study, we proposed relation analysis factors and developed a system for establishing cyber threat intelligence, based on malicious code as a key means of cyber-attacks. As a result of collecting more than 36 million kinds of infringement information and conducting relation analysis, various implications that cannot be obtained by simple searches were derived. We expect actionable intelligence to be established in the true sense of the word if relation analysis logic is developed later.

Cite

CITATION STYLE

APA

Son, K. H., Kim, B. I., & Lee, T. J. (2020). Cyber-attack group analysis method based on association of cyber-attack information. KSII Transactions on Internet and Information Systems, 14(1), 260–280. https://doi.org/10.3837/tiis.2020.01.015

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free