• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ ³í¹®Áö

Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ ³í¹®Áö

Current Result Document : 3 / 128 ÀÌÀü°Ç ÀÌÀü°Ç   ´ÙÀ½°Ç ´ÙÀ½°Ç

ÇѱÛÁ¦¸ñ(Korean Title) °ø°ÝÀÚ ±×·ì Ư¡ ÃßÃâ ÇÁ·¹ÀÓ¿öÅ© : ¾Ç¼ºÄÚµå ÀúÀÚ ±×·ì ½Äº°À» À§ÇÑ À¯Àü ¾Ë°í¸®Áò ±â¹Ý ÀúÀÚ Å¬·¯½ºÅ͸µ
¿µ¹®Á¦¸ñ(English Title) The attacker group feature extraction framework : Authorship Clustering based on Genetic Algorithm for Malware Authorship Group Identification
ÀúÀÚ(Author) ½Å°ÇÀ±   ±èµ¿¿í   ÇÑ¸í¹¬   Gun-Yoon Shin   Dong-Wook Kim   Myung-Mook Han  
¿ø¹®¼ö·Ïó(Citation) VOL 21 NO. 02 PP. 0001 ~ 0008 (2020. 04)
Çѱ۳»¿ë
(Korean Abstract)
ÃÖ±Ù ¾Ç¼ºÄڵ带 È°¿ëÇÑ APT(Advanced Persistent Threat) °ø°ÝÀÇ ¼ö°¡ Á¡Â÷ Áõ°¡Çϸ鼭 À̸¦ ¿¹¹æÇÏ°í ŽÁöÇϱâ À§ÇÑ ¿¬±¸°¡ È°¹ßÈ÷ ÁøÇàµÇ°í ÀÖ´Ù. ÀÌ·¯ÇÑ °ø°ÝµéÀº °ø°ÝÀÌ ¹ß»ýÇϱâ Àü¿¡ ŽÁöÇÏ°í Â÷´ÜÇÏ´Â °Íµµ Áß¿äÇÏÁö¸¸, ¹ß»ý °ø°Ý »ç·Ê ¶Ç´Â °ø°Ý À¯Çü¿¡ ´ëÇÑ Á¤È®ÇÑ ºÐ¼®°ú °ø°Ý ºÐ·ù¸¦ ÅëÇØ È¿°úÀûÀÎ ´ëÀÀÀ» ÇÏ´Â °Í ¶ÇÇÑ Áß¿äÇϸç, ÀÌ·¯ÇÑ ´ëÀÀÀº ÇØ´ç °ø°ÝÀÇ °ø°Ý ±×·ìÀ» ºÐ¼®ÇÔÀ¸·Î½á Á¤ÇÒ ¼ö ÀÖ´Ù. µû¶ó¼­ º» ³í¹®¿¡¼­´Â °ø°ÝÀÚ ±×·ìÀÇ Æ¯Â¡À» ÆľÇÇÏ°í ºÐ¼®Çϱâ À§ÇÑ ¾Ç¼ºÄڵ带 È°¿ëÇÑ À¯Àü ¾Ë°í¸®Áò ±â¹Ý °ø°ÝÀÚ ±×·ì Ư¡ ÃßÃâ ÇÁ·¹ÀÓ¿öÅ©¸¦ Á¦¾ÈÇÑ´Ù. ÇØ´ç ÇÁ·¹ÀÓ¿öÅ©¿¡¼­´Â ¼öÁýµÈ ¾Ç¼ºÄڵ带 µðÄÄÆÄÀÏ·¯¿Í µð¼Àºí·¯¸¦ ÅëÇØ °ü·Ã Äڵ带 ÃßÃâÇÏ°í ÄÚµå ºÐ¼®À» ÅëÇØ ÀúÀÚ¿Í °ü·ÃµÈ Á¤º¸µéÀ» ºÐ¼®ÇÑ´Ù. ¾Ç¼ºÄڵ忡´Â ÇØ´ç Äڵ常ÀÌ °¡Áö°í ÀÖ´Â °íÀ¯ÇÑ Æ¯Â¡µéÀÌ Á¸ÀçÇϸç, ÀÌ·¯ÇÑ Æ¯Â¡µéÀº °ð ÇØ´ç ¾Ç¼ºÄÚµåÀÇ ÀÛ¼ºÀÚ ¶Ç´Â °ø°ÝÀÚ ±×·ìÀ» ½Äº°ÇÒ ¼ö Àִ Ư¡À̶ó°í ÇÒ ¼ö ÀÖ´Ù. µû¶ó¼­ ¿ì¸®´Â ÀúÀÚ Å¬·¯½ºÅ͸µ ¹æ¹ýÀ» ÅëÇØ ¹ÙÀ̳ʸ® ¹× ¼Ò½º Äڵ忡¼­ ÃßÃâÇÑ ´Ù¾çÇÑ Æ¯Â¡µé Áß¿¡ ƯÁ¤ ¾Ç¼ºÄÚµå ÀÛ¼ºÀÚ ±×·ì¸¸ÀÌ °¡Áö°í Àִ Ư¡µéÀ» ¼±º°ÇÏ°í, Á¤È®ÇÑ Å¬·¯½ºÅ͸µ ¼öÇàÀ» À§ÇØ À¯Àü ¾Ë°í¸®ÁòÀ» Àû¿ëÇÏ¿© ÁÖ¿ä Ư¡µéÀ» À¯ÃßÇÑ´Ù. ¶ÇÇÑ °¢ ¾Ç¼ºÄÚµå ÀúÀÚ ±×·ìµéÀÌ °¡Áö°í Àִ Ư¼ºµéÀ» ±â¹ÝÀ¸·Î °¢ ±×·ìµé¸¸À» Ç¥ÇöÇÒ ¼ö Àִ Ư¡µéÀ» ã°í À̸¦ ÅëÇØ ÇÁ·ÎÇÊÀ» ÀÛ¼ºÇÏ¿© ÀÛ¼ºÀÚ ±×·ìÀÌ Á¤È®ÇÏ°Ô ±ºÁýÈ­ µÇ¾ú´ÂÁö È®ÀÎÇÑ´Ù. º» ³í¹®¿¡¼­´Â ½ÇÇèÀ» ÅëÇØ À¯Àü ¾Ë°í¸®ÁòÀ» È°¿ëÇÏ¿© ÀúÀÚ°¡ Á¤È®È÷ ½Äº°µÇ´Â Áö¿Í À¯Àü ¾Ë°í¸®ÁòÀ» È°¿ëÇÏ¿© ÁÖ¿ä Ư¡ ½Äº°ÀÌ °¡´ÉÇÑÁö¸¦ È®ÀÎ ÇÒ °ÍÀÌ´Ù. ½ÇÇè °á°ú, 86%ÀÇ ÀúÀÚ ºÐ·ù Á¤È®µµ¸¦ º¸ÀÌ´Â °ÍÀ» È®ÀÎÇÏ¿´°í À¯Àü ¾Ë°í¸®ÁòÀ» ÅëÇØ ÃßÃâµÈ Á¤º¸µé Áß¿¡ ÀúÀÚ ºÐ¼®¿¡ »ç¿ëµÉ Ư¡µéÀ» ¼±º°ÇÏ¿´´Ù.
¿µ¹®³»¿ë
(English Abstract)
Recently, the number of APT(Advanced Persistent Threats) attack using malware has been increasing, and research is underway to prevent and detect them. While it is important to detect and block attacks before they occur, it is also important to make an effective response through an accurate analysis for attack case and attack type, these respond which can be determined by analyzing the attack group of such attacks. Therefore, this paper propose a framework based on genetic algorithm for analyzing malware and understanding attacker group's features. The framework uses decompiler and disassembler to extract related code in collected malware, and analyzes information related to author through code analysis. Malware has unique characteristics that only it has, which can be said to be features that can identify the author or attacker groups of that malware. So, we select specific features only having attack group among the various features extracted from binary and source code through the authorship clustering method, and apply genetic algorithm to accurate clustering to infer specific features. Also, we find features which based on characteristics each group of malware authors has that can express each group, and create profiles to verify that the group of authors is correctly clustered. In this paper, we do experiment about author classification using genetic algorithm and finding specific features to express author characteristic. In experiment result, we identified an author classification accuracy of 86% and selected features to be used for authorship analysis among the information extracted through genetic algorithm.
Å°¿öµå(Keyword) ÀúÀÚ Æ¯¼º   °ø°ÝÀÚ ±×·ì   À¯Àü ¾Ë°í¸®Áò   ÀúÀÚ Å¬·¯½ºÅ͸µ   Authorship Attribution   Attacker Group   Genetic Algorithm   Malware   Authorship Clustering   ¾Ç¼ºÄڵ堠
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå