ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Conference Paper Involvers’ Behavior-based Modeling in Cyber Targeted Attack
Cited - time in scopus Share share facebook twitter linkedin kakaostory
Authors
Youngsoo Kim, Ikkyun Kim
Issue Date
2014-11
Citation
International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) 2014, pp.132-137
Language
English
Type
Conference Paper
Abstract
Cyber targeted attack has sophisticated techniques using malwares to exploit vulnerabilities in systems and an external command and control is continuously monitoring and extracting data off a specific target. Since this attacking process is working continuously and uses diverse malicious codes and attacking routes, it is considered to be difficult to detect in advance. In this paper, we categorized cyber targeted attacks into four steps and defined potential behaviors of involvers like attackers or victims, in order to make a model. Each behavior of our model can include a couple of methods. Furthermore, we applied our behavior-based model to the real targeted attacks, “3.20 South Korean Malware Attack” and “The Targeted Attack for SK Communications”.
KSP Keywords
Attacking process, Behavior based, Command and control, Continuously monitoring, Malicious code, targeted attack