• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ ³í¹®Áö

Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ ³í¹®Áö

Current Result Document : 2 / 4

ÇѱÛÁ¦¸ñ(Korean Title) ÇÇ½Ì ¸ÞÀÏ °ø°ÝÁ¶Á÷¿¡ ´ëÇÑ ÇÁ·ÎÆÄÀϸµ »ç·Ê ¿¬±¸
¿µ¹®Á¦¸ñ(English Title) A Profiling Case Study to Phishing Mail Attack Group
ÀúÀÚ(Author) ±è¼¼¿ë   ±ÇÇõÁø   Ãֹο젠 Seyong Kim   Hyukjin Kwon   Minwoo Choi   ÀÌÀçÀÏ   ÀÌ¿ëÁØ   ±ÇÇõÁø   Jae-il Lee   Yong-joon Lee   Hyuk-jin Kwon  
¿ø¹®¼ö·Ïó(Citation) VOL 21 NO. 02 PP. 0091 ~ 0097 (2020. 04)
Çѱ۳»¿ë
(Korean Abstract)
ÃÖ±Ù ±¹¹æ, ¾Èº¸, ¿Ü±³ ºÐ¾ß °ü·ÃÀÚ¸¦ ´ë»óÀ¸·Î ÇÏ´Â ÇÇ½Ì °ø°ÝÀÌ ±ÞÁõÇÏ°í ÀÖ´Ù. ƯÈ÷ ÇØÅ· °ø°ÝÁ¶Á÷ Kimsuky´Â 2013³â ÀÌÈÄ ÇÇ½Ì °ø°ÝÀ» ÅëÇØ °ø°ø±â°üÀÇ ÁÖ¿ä Á¤º¸ ¼öÁýÀ» À§ÇÑ È°µ¿À» ÇÏ°í ÀÖ´Ù. º» ³í¹®¿¡¼­´Â ÇÇ½Ì ¸ÞÀÏ °ø°ÝÁ¶Á÷¿¡ ´ëÇÑ ÇÁ·ÎÆÄÀϸµ ºÐ¼®À» ¼öÇàÇÏ¿´´Ù. À̸¦ À§ÇØ ÇÇ½Ì ¸ÞÀÏ °ø°ÝÀÇ À¯ÇüÀ» ºÐ·ùÇÏ°í ÇØÅ· °ø°ÝÁ¶Á÷ÀÇ °ø°Ý¹æ½Ä¿¡ ´ëÇÑ ºÐ¼®À» ÇÏ¿´´Ù. »ó¼¼ÇÑ ÇÁ·ÎÆÄÀϸµ ºÐ¼®À» ÅëÇØ °ø°ÝÁ¶Á÷ÀÇ ¸ñÀûÀ» ÃßÁ¤ÇÏ°í ´ëÀÀ¹æ¾ÈÀ» Á¦½ÃÇÏ¿´´Ù.
¿µ¹®³»¿ë
(English Abstract)
Recently, phishing attacks targeting those involved in defense, security and unification have been on the rise. In particular, hacking attack organization Kimsuky has been engaged in activities to collect important information from public organizations through phishing attacks since 2013. In this paper, profiling analysis of phishing mail attack organization was performed. Through this process, we estimated the purpose of the attack group and suggested countermeasures.
Å°¿öµå(Keyword) ÀΰøÁö´É   ºí·ÏüÀΠ  Çؽ¬ÇÔ¼ö   ºòµ¥ÀÌÅÍ   AI   Block-Chain   Hash function   Big-Data   ÇÇ½Ì ¸ÞÀÏ   ÇØÅ·   »çÀ̹ö °ø°Ý ±×·ì   Phishing mail   Hacking   Cyber Attack Group   Profiling   ÇÁ·ÎÆÄÀϸµ  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå