Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Focusing on the Weakest Link: A Similarity Analysis on Phishing Campaigns Based on the ATT&CK Matrix

Full metadata record
DC Field Value Language
dc.contributor.authorShin, Youngsup-
dc.contributor.authorKim, Kyoungmin-
dc.contributor.authorLee, Jemin Justin-
dc.contributor.authorLee, Kyungho-
dc.date.accessioned2022-06-09T21:41:03Z-
dc.date.available2022-06-09T21:41:03Z-
dc.date.created2022-06-09-
dc.date.issued2022-04-26-
dc.identifier.issn1939-0114-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/141779-
dc.description.abstractIn the past, phishing techniques were a common means of attack carried out by individuals or small groups via spam mail on a randomly selected target. However, in recent years, phishing techniques have been adopted by advanced persistent threat (APT) groups to attack organizations such as the Sony Pictures Enterprise and Korea Hydro & Nuclear Power. As such, our study aims to analyze the past campaigns conducted by the APT groups. We aim to propose a countermeasure that corresponds to the phishing campaign by collecting datasets pertaining to the phishing techniques. Based on our past study, we collected private and public data from 16 different cases that utilize a phishing attack. Our research adopted MITRE's ATT&CK framework and tactic, techniques, and procedures (TTPs) to extract and examine the various campaigns. The framework proposed in this study makes considerable contributions to both the private and public sectors, as the framework aids the organizations in counteracting the malicious threats performed by the APT groups.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherWILEY-HINDAWI-
dc.subjectANALYTICS-
dc.subjectKNOWLEDGE-
dc.titleFocusing on the Weakest Link: A Similarity Analysis on Phishing Campaigns Based on the ATT&CK Matrix-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, Kyungho-
dc.identifier.doi10.1155/2022/1699657-
dc.identifier.scopusid2-s2.0-85129948208-
dc.identifier.wosid000795127800001-
dc.identifier.bibliographicCitationSECURITY AND COMMUNICATION NETWORKS, v.2022-
dc.relation.isPartOfSECURITY AND COMMUNICATION NETWORKS-
dc.citation.titleSECURITY AND COMMUNICATION NETWORKS-
dc.citation.volume2022-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.isOpenAccessY-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordPlusANALYTICS-
dc.subject.keywordPlusKNOWLEDGE-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE