Automatically Attributing Mobile Threat Actors by Vectorized ATT&CK Matrix and Paired Indicator
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Kyoungmin | - |
dc.contributor.author | Shin, Youngsup | - |
dc.contributor.author | Lee, Justin | - |
dc.contributor.author | Lee, Kyungho | - |
dc.date.accessioned | 2022-02-18T05:41:22Z | - |
dc.date.available | 2022-02-18T05:41:22Z | - |
dc.date.created | 2022-02-08 | - |
dc.date.issued | 2021-10 | - |
dc.identifier.issn | 1424-8220 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/136189 | - |
dc.description.abstract | During the past decade, mobile attacks have been established as an indispensable attack vector adopted by Advanced Persistent Threat (APT) groups. The ubiquitous nature of the smartphone has allowed users to use mobile payments and store private or sensitive data (i.e., login credentials). Consequently, various APT groups have focused on exploiting these vulnerabilities. Past studies have proposed automated classification and detection methods, while few studies have covered the cyber attribution. Our study introduces an automated system that focuses on cyber attribution. Adopting MITRE's ATT & CK for mobile, we performed our study using the tactic, technique, and procedures (TTPs). By comparing the indicator of compromise (IoC), we were able to help reduce the false flags during our experiment. Moreover, we examined 12 threat actors and 120 malware using the automated method for detecting cyber attribution.</p> | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | MDPI | - |
dc.title | Automatically Attributing Mobile Threat Actors by Vectorized ATT&CK Matrix and Paired Indicator | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, Kyungho | - |
dc.identifier.doi | 10.3390/s21196522 | - |
dc.identifier.scopusid | 2-s2.0-85116066467 | - |
dc.identifier.wosid | 000709530000001 | - |
dc.identifier.bibliographicCitation | SENSORS, v.21, no.19 | - |
dc.relation.isPartOf | SENSORS | - |
dc.citation.title | SENSORS | - |
dc.citation.volume | 21 | - |
dc.citation.number | 19 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Chemistry | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Instruments & Instrumentation | - |
dc.relation.journalWebOfScienceCategory | Chemistry, Analytical | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Instruments & Instrumentation | - |
dc.subject.keywordAuthor | cyber security | - |
dc.subject.keywordAuthor | mobile security | - |
dc.subject.keywordAuthor | threat intelligence | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.