Cyber Threat Intelligence를 위한 악성코드 프로파일링 및 이메일 기반 Botnet Group 분석기술 연구
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | 곽진 | - |
dc.contributor.author | 이태진 | - |
dc.date.accessioned | 2018-11-08T08:17:00Z | - |
dc.date.available | 2018-11-08T08:17:00Z | - |
dc.date.issued | 2017-02 | - |
dc.identifier.other | 24359 | - |
dc.identifier.uri | https://dspace.ajou.ac.kr/handle/2018.oak/12302 | - |
dc.description | 학위논문(박사)--아주대학교 일반대학원 :컴퓨터공학과,2017. 2 | - |
dc.description.tableofcontents | Ⅰ. Introduction Ⅱ. Research Background A. Importance of Malware Profiling B. Importance of Botnet Group Analysis C. Importance of Cyber Threat Intelligence Analysis Ⅲ. Related Research A. Trends of Malware Profiling Research B. Trends of Botnet Group Analysis Research C. Trends of Cyber Threat Intelligence Research Ⅳ. Malware Profiling Technology A. Overview B. Model Proposal C. Experimental Results D. System Implementation Ⅴ. Email-based Botnet Group Analysis Technology A. Overview B. Model Proposal C. Experimental Results D. System Implementation Ⅵ. Future Research Direction A. Overview B. Profiling by Cyber-attack Element Ⅶ. Conclusion A. Malware Profiling Technology B. Email-based Botnet Group Detection Technology C. Cyber Threat Intelligence Analysis Technology REFERENCES | - |
dc.language.iso | eng | - |
dc.publisher | The Graduate School, Ajou University | - |
dc.rights | 아주대학교 논문은 저작권에 의해 보호받습니다. | - |
dc.title | Cyber Threat Intelligence를 위한 악성코드 프로파일링 및 이메일 기반 Botnet Group 분석기술 연구 | - |
dc.title.alternative | Taejin Lee | - |
dc.type | Thesis | - |
dc.contributor.affiliation | 아주대학교 일반대학원 | - |
dc.contributor.alternativeName | Taejin Lee | - |
dc.contributor.department | 일반대학원 컴퓨터공학과 | - |
dc.date.awarded | 2017. 2 | - |
dc.description.degree | Doctoral | - |
dc.identifier.localId | 770666 | - |
dc.identifier.url | http://dcoll.ajou.ac.kr:9080/dcollection/jsp/common/DcLoOrgPer.jsp?sItemId=000000024359 | - |
dc.subject.keyword | malware | - |
dc.subject.keyword | spam | - |
dc.subject.keyword | zombie | - |
dc.subject.keyword | cti | - |
dc.subject.keyword | profiling | - |
dc.description.alternativeAbstract | Cyber-attacks are steadily increasing as they are becoming more confidential and intelligent. An average of 1,000,000 malware appear every day, and these attacks are gradually expanding into IT convergence services, such as automobile and TV, and even to social infrastructures such as nuclear power, electricity and water supply. There have been large cyber-attacks in Korea including 7.7 DDoS attack, personal information leakage in SK Communications and Nexon in 2009, and 6.25 and 3.20 Cyber-attacks in 2013. Such cyber-attacks have grown beyond financial crime and have been appearing in forms of political disputes and cyber warfare. However, an element that does not change in cyber-attacks is that one, malware is used as an attack technique and, two, a malware infected PC (Botnet Group) is used to access the attack target. In this study, we analyzed malware, variant detection, profiling technique and email based Botnet Group analysis technology which are the key elements of intelligent cyber-attack. Based on this, we have studied Cyber Threat Intelligence technology that can support correlation analysis and decision-making between overall cyber attacks. As a result, a system is developed and its effectiveness is verified as real data in a commercial environment. Moreover, not only does the research contents proposed in this paper validated but also are applied to the practical application of the real environment. It is positively expected that more can be derived from the system management at its actual use. | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.