메뉴 건너뛰기




Volumn , Issue , 2011, Pages 113-125

Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains

Author keywords

APT; Computer network defense; Incident response; Intelligence; Intrusion detection; Threat

Indexed keywords

CHAINS; COMPUTER NETWORKS; COMPUTER VIRUSES; ITERATIVE METHODS; KNOWLEDGE MANAGEMENT; NATIONAL SECURITY; NETWORK SECURITY; RISK ASSESSMENT;

EID: 84863432533     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (214)

References (23)
  • 1
    • 85163465076 scopus 로고    scopus 로고
    • Adobe. APSA09-01: Security Updates available for Adobe Reader and Acrobat versions 9 and earlier, February, URL
    • Adobe. APSA09-01: Security Updates available for Adobe Reader and Acrobat versions 9 and earlier, February 2009. URL http://www.adobe.com/support/security/advisories/apsa09-01.html.
    • (2009)
  • 3
    • 84882204548 scopus 로고    scopus 로고
    • Network Security Breaches Plague NASA
    • November 2008. URL
    • Epstein, Keith, and Elgin, Ben. Network Security Breaches Plague NASA, November 2008. URL http://www.businessweek.com/print/magazine/content/0_48/b4110072404167.htm.
    • Epstein, K.1    Elgin, B.2
  • 4
    • 84893150145 scopus 로고    scopus 로고
    • Defending Against the Unknown: Antiterrorism and the Terrorist Planning Cycle
    • LTC Ashton Hayes
    • LTC Ashton Hayes. Defending Against the Unknown: Antiterrorism and the Terrorist Planning Cycle. The Guardian, 10(1):32-36, 2008. URL http://www.jcs.mil/content/files/2009-04/04130915524_ spring2008.pdf.
    • The Guardian , vol.10 , Issue.1
  • 5
    • 78650900359 scopus 로고    scopus 로고
    • Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation
    • October, URL
    • Krekel, Bryan. Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation, October 2009. URL http://www.uscc.gov/researchpapers/2009/NorthropGrumma_ PR_Cybe_Pape_FINA_Approved%20Repor_16Oct2009.pdf.
    • (2009)
    • Krekel, B.1
  • 6
    • 85163516419 scopus 로고    scopus 로고
    • Andrew Holistic Approaches to Cybersecurity to Enable Network Centric Operations
    • April, URL
    • Lewis, James Andrew Holistic Approaches to Cybersecurity to Enable Network Centric Operations, April 2008. URL http://armedservices.house.gov/pdfs/TUTC040108/Lewi_Testimony040108.pdf.
    • (2008)
    • Lewis, J.1
  • 7
    • 84855831640 scopus 로고    scopus 로고
    • M-Trends: The Advanced Persistent Threat
    • Mandiant, January, URL
    • Mandiant. M-Trends: The Advanced Persistent Threat, January 2010. URL http://www.mandiant.com/products/services/m-trends.
    • (2010)
  • 8
    • 85163480096 scopus 로고    scopus 로고
    • Microsoft. Microsoft Security Bulletin MS09-017: Vulnerabilities in Microsoft Office PowerPoint Could Allow Remote Code Execution (967340), May, URL
    • Microsoft. Microsoft Security Bulletin MS09-017: Vulnerabilities in Microsoft Office PowerPoint Could Allow Remote Code Execution (967340), May 2009a. URL http://www.microsoft.com/technet/security/bulletin/ms09-017.mspx.
    • (2009)
  • 9
    • 85163463227 scopus 로고    scopus 로고
    • Microsoft. Microsoft Security Advisory (969136): Vulnerability in Microsoft Office PowerPoint Could Allow Remote Code Execution, April, URL
    • Microsoft. Microsoft Security Advisory (969136): Vulnerability in Microsoft Office PowerPoint Could Allow Remote Code Execution, April 2009b. URL http://www.microsoft.com/technet/security/advisory/969136.mspx.
    • (2009)
  • 10
    • 33746748784 scopus 로고    scopus 로고
    • Dimitrios Patsosa, and Christos Douligeris
    • Sarandis Mitropoulos, July, URL
    • Sarandis Mitropoulos, Dimitrios Patsosa, and Christos Douligeris. On Incident Handling and Response: A stateof- the-art approach. Computers & Security, 5:351-370, July 2006. URL http://dx.doi.org/10.1016/j.cose.2005.09.006.
    • (2006) On Incident Handling and Response: A stateof- the-art approach. Computers & Security , vol.5 , pp. 351-370
  • 11
    • 85163492928 scopus 로고    scopus 로고
    • Special Publication
    • National Institute of Standards and Technology, Computer Security Incident Handling Guide, March
    • National Institute of Standards and Technology. Special Publication 800-61: Computer Security Incident Handling Guide, March 2008. URL http://csrc.nist.gov/publications/PubsSPs.html.
    • (2008) , pp. 800-861
  • 12
    • 70350525184 scopus 로고    scopus 로고
    • Countering the Threat of Improvised Explosive Devices: Basic Research Opportunities
    • National Research Council., (Abbreviated Version
    • National Research Council. Countering the Threat of Improvised Explosive Devices: Basic Research Opportunities (Abbreviated Version), 2007. URL http://books.nap.edu/catalog.php?recor_id=11953.
    • (2007)
  • 13
    • 51349142613 scopus 로고    scopus 로고
    • Exploring Security Countermeasures along the Attack Sequence
    • In Proc. Int. Conf. Information Security and Assurance ISA 2008, doi:10.1109/ISA.2008.112
    • Sakuraba, T. Domyo, S, Chou Bin-Hui and Sakurai, K. Exploring Security Countermeasures along the Attack Sequence. In Proc. Int. Conf. Information Security and Assurance ISA 2008, pages 427-432, 2008. doi:10.1109/ISA.2008.112.
    • (2008) , pp. 427-432
    • Sakuraba, T.1    Domyo, S.2    Chou Bin-Hui3    Sakurai, K.4
  • 14
    • 85163511696 scopus 로고    scopus 로고
    • Aurora
    • Response Recommendations, February 2010. URL
    • Stamos, Alex. "Aurora" Response Recommendations, February 2010. URL https://www.isecpartners./com/files/iSE_Auror_Respons_Recommendations.pdf.
    • Stamos, A.1
  • 15
    • 0034425955 scopus 로고    scopus 로고
    • Find, Fix, Track, Target, Engage, Assess
    • URL
    • Tirpak, John A. Find, Fix, Track, Target, Engage, Assess. Air Force Magazine, 83:24-29, 2000. URL http://www.airforce-magazine.com/MagazineArchive/Pages/2000/July%202000/0700find.aspx.
    • (2000) Air Force Magazine , vol.83 , pp. 24-29
    • Tirpak, J.A.1
  • 16
    • 85163424674 scopus 로고    scopus 로고
    • National Infrastructure Security Co-ordination Centre: Targeted Trojan Email Attacks
    • UK-NISCC., June, URL
    • UK-NISCC. National Infrastructure Security Co-ordination Centre: Targeted Trojan Email Attacks, June 2005. URL https://www.cpni.gov.uk/docs/ttea.pdf.
    • (2005)
  • 17
    • 84863536999 scopus 로고    scopus 로고
    • A Military Guide to Terrorism in the Twenty-First Century
    • United States Army Training and Doctrine Command., August, URL
    • United States Army Training and Doctrine Command. A Military Guide to Terrorism in the Twenty-First Century, August 2007. URL http://www.dtic.mil/srch/doc?collection=t3&id=ADA472623.
    • (2007)
  • 18
    • 85163555515 scopus 로고    scopus 로고
    • US-CERT., Technical Cyber Security Alert TA05-189A: Targeted Trojan Email Attacks, July
    • US-CERT. Technical Cyber Security Alert TA05-189A: Targeted Trojan Email Attacks, July 2005. URL http://www.us-cert.gov/cas/techalerts/TA05-189A.html.
    • (2005)
  • 19
    • 85163420446 scopus 로고    scopus 로고
    • U.S.-China Economic and Security Review Commission. 2008 Report to Congress of the U.S. China Economic and Security Review Commission, November, URL
    • U.S.-China Economic and Security Review Commission. 2008 Report to Congress of the U.S. China Economic and Security Review Commission, November 2008. URL http://www.uscc.gov/annua_report/2008/annua_repor_ful_08.pdf.
    • (2008)
  • 20
    • 85163474375 scopus 로고    scopus 로고
    • U.S.-China Economic and Security Review Commission. 2009 Report to Congress of the U.S.-China Economic and Security Review Commission, November, URL
    • U.S.-China Economic and Security Review Commission. 2009 Report to Congress of the U.S.-China Economic and Security Review Commission, November 2009. URL http://www.uscc.gov/annua_report/2009/annua_repor_ful_09.pdf.
    • (2009)
  • 21
    • 85163489582 scopus 로고    scopus 로고
    • U.S. Department of Defense. Joint Publication 3-13 Information Operations, February
    • U.S. Department of Defense. Joint Publication 3-13 Information Operations, February 2006. URL http://www.dtic.mil/doctrine/ne_pubs/jp_13.pdf.
    • (2006)
  • 22
    • 85163494888 scopus 로고    scopus 로고
    • U.S. Department of Defense. Joint Publication 3-60 Joint Targeting, April
    • U.S. Department of Defense. Joint Publication 3-60 Joint Targeting, April 2007. URL http://www.dtic.mil/doctrine/ne_pubs/jp_60.pdf.
    • (2007)
  • 23
    • 70149119150 scopus 로고    scopus 로고
    • Mikko Overcoming the insider: reducing employee computer crime through Situational Crime Prevention
    • Willison, Robert and Siponen. Mikko Overcoming the insider: reducing employee computer crime through Situational Crime Prevention. Communications of the ACM, 52(9):133-137, 2009. doi: http://doi.acm. org/10.1145/1562164.1562198.
    • (2009) Communications of the ACM , vol.52 , Issue.9 , pp. 133-137
    • Willison, R.1    Siponen2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.