Cyber Threat Intelligence를 위한 악성코드 프로파일링 및 이메일 기반 Botnet Group 분석기술 연구

DC Field Value Language
dc.contributor.advisor곽진-
dc.contributor.author이태진-
dc.date.accessioned2018-11-08T08:17:00Z-
dc.date.available2018-11-08T08:17:00Z-
dc.date.issued2017-02-
dc.identifier.other24359-
dc.identifier.urihttps://dspace.ajou.ac.kr/handle/2018.oak/12302-
dc.description학위논문(박사)--아주대학교 일반대학원 :컴퓨터공학과,2017. 2-
dc.description.tableofcontentsⅠ. Introduction Ⅱ. Research Background A. Importance of Malware Profiling B. Importance of Botnet Group Analysis C. Importance of Cyber ​​Threat Intelligence Analysis Ⅲ. Related Research A. Trends of Malware Profiling Research B. Trends of Botnet Group Analysis Research C. Trends of Cyber Threat Intelligence Research Ⅳ. Malware Profiling Technology A. Overview B. Model Proposal C. Experimental Results D. System Implementation Ⅴ. Email-based Botnet Group Analysis Technology A. Overview B. Model Proposal C. Experimental Results D. System Implementation Ⅵ. Future Research Direction A. Overview B. Profiling by Cyber-attack Element Ⅶ. Conclusion A. Malware Profiling Technology B. Email-based Botnet Group Detection Technology C. Cyber Threat Intelligence Analysis Technology REFERENCES-
dc.language.isoeng-
dc.publisherThe Graduate School, Ajou University-
dc.rights아주대학교 논문은 저작권에 의해 보호받습니다.-
dc.titleCyber Threat Intelligence를 위한 악성코드 프로파일링 및 이메일 기반 Botnet Group 분석기술 연구-
dc.title.alternativeTaejin Lee-
dc.typeThesis-
dc.contributor.affiliation아주대학교 일반대학원-
dc.contributor.alternativeNameTaejin Lee-
dc.contributor.department일반대학원 컴퓨터공학과-
dc.date.awarded2017. 2-
dc.description.degreeDoctoral-
dc.identifier.localId770666-
dc.identifier.urlhttp://dcoll.ajou.ac.kr:9080/dcollection/jsp/common/DcLoOrgPer.jsp?sItemId=000000024359-
dc.subject.keywordmalware-
dc.subject.keywordspam-
dc.subject.keywordzombie-
dc.subject.keywordcti-
dc.subject.keywordprofiling-
dc.description.alternativeAbstractCyber-attacks are steadily increasing as they are becoming more confidential and intelligent. An average of 1,000,000 malware appear every day, and these attacks are gradually expanding into IT convergence services, such as automobile and TV, and even to social infrastructures such as nuclear power, electricity and water supply. There have been large cyber-attacks in Korea including 7.7 DDoS attack, personal information leakage in SK Communications and Nexon in 2009, and 6.25 and 3.20 Cyber-attacks in 2013. Such cyber-attacks have grown beyond financial crime and have been appearing in forms of political disputes and cyber warfare. However, an element that does not change in cyber-attacks is that one, malware is used as an attack technique and, two, a malware infected PC (Botnet Group) is used to access the attack target. In this study, we analyzed malware, variant detection, profiling technique and email based Botnet Group analysis technology which are the key elements of intelligent cyber-attack. Based on this, we have studied Cyber Threat Intelligence technology that can support correlation analysis and decision-making between overall cyber attacks. As a result, a system is developed and its effectiveness is verified as real data in a commercial environment. Moreover, not only does the research contents proposed in this paper validated but also are applied to the practical application of the real environment. It is positively expected that more can be derived from the system management at its actual use.-
Appears in Collections:
Graduate School of Ajou University > Department of Computer Engineering > 4. Theses(Ph.D)
Files in This Item:
There are no files associated with this item.

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Browse