• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö > Á¤º¸°úÇÐȸ ÄÄÇ»ÆÃÀÇ ½ÇÁ¦ ³í¹®Áö (KIISE Transactions on Computing Practices)

Á¤º¸°úÇÐȸ ÄÄÇ»ÆÃÀÇ ½ÇÁ¦ ³í¹®Áö (KIISE Transactions on Computing Practices)

Current Result Document : 1 / 2

ÇѱÛÁ¦¸ñ(Korean Title) ½Ç½Ã°£ »çÀ̹ö À§Çù Áö´ÉÇü ºÐ¼® ¹× ¿¹Ãø ±â¼ú
¿µ¹®Á¦¸ñ(English Title) Real-time Cyber Threat Intelligent Analysis and Prediction Technique
ÀúÀÚ(Author) ÀÓâ¿Ï   ½Å¿µ¼·   À̵¿Àç   Á¶¼º¿µ   ÇÑÀμº   ¿ÀÇà·Ï   Changwan Lim   Youngsup Shin   Dongjae Lee   Sungyoung Cho   Insung Han   Haengrok Oh  
¿ø¹®¼ö·Ïó(Citation) VOL 25 NO. 11 PP. 0565 ~ 0570 (2019. 11)
Çѱ۳»¿ë
(Korean Abstract)
ÀÎÅÍ³Ý ¹× ³»ºÎ¸Á¿¡ ¼³Ä¡ ¿î¿ë ÁßÀÎ °¢Á¾ Á¤º¸º¸È£Ã¼°è ¹× ÅëÇÕº¸¾È°üÁ¦Ã¼°è¿¡¼­ ¹ß»ýµÈ ¹æ´ëÇÑ ¾çÀÇ À§Çù À̺¥Æ®¸¦ ¼öÁý, À¶ÇÕÇÏ¿© Àüó¸®Çϸç, À§Çù °æº¸¿¡ ´ëÇÑ Åë°è ±â¹ÝÀÇ »ó°ü°ü°è ºÐ¼®°ú À§Çù°æº¸ °£ »óÈ£ Àΰú°ü°è¸¦ ÇнÀÇÏ´Â ¸ðµ¨À» ±¸ÃàÇÏ¿© Áö´ÉÇü ºÐ¼® ¸ðµ¨À» ±¸ÃàÇÑ´Ù. ±â°èÇнÀ ±â¹ÝÀÇ À§Çù°æº¸ »ó°üºÐ¼®À» ÅëÇØ ÀÚµ¿À¸·Î °ø°Ý °æ·Î À籸¼º ¹× ¿¹»óµÇ´Â À§ÇùÀ» ¿¹ÃøÇϸç, OSINT¸¦ ÅëÇØ ±¸ÃàÇÑ »çÀ̹ö À§Çù ÀÎÅÚ¸®Àü½º¿ÍÀÇ ÀÚµ¿È­µÈ ¿¬°üºÐ¼®À» ÅëÇØ Ä§ÅõÇÑ Àû°ú °ø°Ý¿¡ ´ëÇÑ Á¤º¸¸¦ ¼öÁýÇÏ°í ¿¹»óµÇ´Â À§ÇèÀ» ¿¹ÃøÇÏ¿© °áÁ¤±ÇÀÚÀÇ °á½ÉÀ» Áö¿øÇÏ´Â ±â¼úÀ» Á¦¾ÈÇÑ´Ù.
¿µ¹®³»¿ë
(English Abstract)
There is a wide variety of information security systems and integrated security control systems that are installed and operated in the internet and internal networks, and these systems collect substantial amounts of threat events. These collected events are fused and preprocessed to build an intelligent analysis model that learns the mutual causal relationship between the threat alarm and the statistical based correlation analysis. The machine learning-based threat correlation analysis enables the automatic prediction of path reconstruction and anticipated threats. The automated association analysis with cyber threat intelligence built through OSINT collects information on infiltrators and attacks, and also predicts expected risks. This paper suggests a technique to support the decision maker¡¯s determination for the final purpose.
Å°¿öµå(Keyword) »ó°ü°ü°è ºÐ¼®   À§Çù ¿¹Ãø   »çÀ̹ö À§Çù ÀÎÅÚ¸®Àü½º   Bayesian Networks   ±â°èÇнÀ   correlation analysis   threat prediction   cyber threat intelligence   bayesian network   machine learning  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå