Focusing on the Weakest Link: A Similarity Analysis on Phishing Campaigns Based on the ATT&CK Matrix
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Shin, Youngsup | - |
dc.contributor.author | Kim, Kyoungmin | - |
dc.contributor.author | Lee, Jemin Justin | - |
dc.contributor.author | Lee, Kyungho | - |
dc.date.accessioned | 2022-06-09T21:41:03Z | - |
dc.date.available | 2022-06-09T21:41:03Z | - |
dc.date.created | 2022-06-09 | - |
dc.date.issued | 2022-04-26 | - |
dc.identifier.issn | 1939-0114 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/141779 | - |
dc.description.abstract | In the past, phishing techniques were a common means of attack carried out by individuals or small groups via spam mail on a randomly selected target. However, in recent years, phishing techniques have been adopted by advanced persistent threat (APT) groups to attack organizations such as the Sony Pictures Enterprise and Korea Hydro & Nuclear Power. As such, our study aims to analyze the past campaigns conducted by the APT groups. We aim to propose a countermeasure that corresponds to the phishing campaign by collecting datasets pertaining to the phishing techniques. Based on our past study, we collected private and public data from 16 different cases that utilize a phishing attack. Our research adopted MITRE's ATT&CK framework and tactic, techniques, and procedures (TTPs) to extract and examine the various campaigns. The framework proposed in this study makes considerable contributions to both the private and public sectors, as the framework aids the organizations in counteracting the malicious threats performed by the APT groups. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | WILEY-HINDAWI | - |
dc.subject | ANALYTICS | - |
dc.subject | KNOWLEDGE | - |
dc.title | Focusing on the Weakest Link: A Similarity Analysis on Phishing Campaigns Based on the ATT&CK Matrix | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, Kyungho | - |
dc.identifier.doi | 10.1155/2022/1699657 | - |
dc.identifier.scopusid | 2-s2.0-85129948208 | - |
dc.identifier.wosid | 000795127800001 | - |
dc.identifier.bibliographicCitation | SECURITY AND COMMUNICATION NETWORKS, v.2022 | - |
dc.relation.isPartOf | SECURITY AND COMMUNICATION NETWORKS | - |
dc.citation.title | SECURITY AND COMMUNICATION NETWORKS | - |
dc.citation.volume | 2022 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | Y | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | ANALYTICS | - |
dc.subject.keywordPlus | KNOWLEDGE | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.