The Classification Model of Fileless Cyber Attacks 


Vol. 47,  No. 5, pp. 454-465, May  2020
10.5626/JOK.2020.47.5.454


PDF

  Abstract

Since late 2000, state-sponsored and sophisticated cyber-attacks have continued unabated. Also, preparing countermeasures against cyber-attack techniques based on traces are also in development. Cyber attackers use a variety of techniques to veil their attacks from these analyses and countermeasures. In particular, fileless cyber-attacks that do not create a file used for an attack are increasing. Fileless cyber-attacks are difficult to analyze because there are no executable files to analyze from the defender"s perspective. In this paper, we investigate and analyze fileless cyber-attacks and present a model based on the cyber kill chain to classify fileless cyber-attacks. Through this, it is expected to identify and respond to attack types more quickly than when new fileless cyber-attacks occur.


  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

G. Lee, S. Shim, B. Cho, T. Kim, K. Kim, "The Classification Model of Fileless Cyber Attacks," Journal of KIISE, JOK, vol. 47, no. 5, pp. 454-465, 2020. DOI: 10.5626/JOK.2020.47.5.454.


[ACM Style]

GyungMin Lee, ShinWoo Shim, ByoungMo Cho, TaeKyu Kim, and KyoungGon Kim. 2020. The Classification Model of Fileless Cyber Attacks. Journal of KIISE, JOK, 47, 5, (2020), 454-465. DOI: 10.5626/JOK.2020.47.5.454.


[KCI Style]

이경민, 심신우, 조병모, 김태규, 김경곤, "파일리스(Fileless) 사이버공격의 분류 모델," 한국정보과학회 논문지, 제47권, 제5호, 454~465쪽, 2020. DOI: 10.5626/JOK.2020.47.5.454.


[Endnote/Zotero/Mendeley (RIS)]  Download


[BibTeX]  Download



Search




Journal of KIISE

  • ISSN : 2383-630X(Print)
  • ISSN : 2383-6296(Electronic)
  • KCI Accredited Journal

Editorial Office

  • Tel. +82-2-588-9240
  • Fax. +82-2-521-1352
  • E-mail. chwoo@kiise.or.kr