Home // SECURWARE 2014, The Eighth International Conference on Emerging Security Information, Systems and Technologies // View article


Involvers’ Behavior-based Modeling in Cyber Targeted Attack

Authors:
Youngsoo Kim
Ikkyun Kim

Keywords: APT; Targeted Attacks; Behavior-based Modeling; Malicious Codes; 3.20 DarkSeoul

Abstract:
Cyber targeted attack has sophisticated techniques using malwares to exploit vulnerabilities in systems and an external command and control is continuously monitoring and extracting data off a specific target. Since this attacking process is working continuously and uses diverse malicious codes and attacking routes, it is considered to be difficult to detect in advance. In this paper, we categorized cyber targeted attacks into four steps and defined potential behaviors of involvers like attackers or victims, in order to make a model. Each behavior of our model can include a couple of methods. Furthermore, we applied our behavior-based model to the real targeted attacks, “3.20 South Korean Malware Attack” and “The Targeted Attack for SK Communications”.

Pages: 132 to 137

Copyright: Copyright (c) IARIA, 2014

Publication date: November 16, 2014

Published in: conference

ISSN: 2162-2116

ISBN: 978-1-61208-376-6

Location: Lisbon, Portugal

Dates: from November 16, 2014 to November 20, 2014