TY - JOUR T1 - The Classification Model of Fileless Cyber Attacks AU - Lee, GyungMin AU - Shim, ShinWoo AU - Cho, ByoungMo AU - Kim, TaeKyu AU - Kim, KyoungGon JO - Journal of KIISE, JOK PY - 2020 DA - 2020/1/14 DO - 10.5626/JOK.2020.47.5.454 KW - cyber security KW - cyber-attack KW - fileless malware KW - cyber kill chain AB - Since late 2000, state-sponsored and sophisticated cyber-attacks have continued unabated. Also, preparing countermeasures against cyber-attack techniques based on traces are also in development. Cyber attackers use a variety of techniques to veil their attacks from these analyses and countermeasures. In particular, fileless cyber-attacks that do not create a file used for an attack are increasing. Fileless cyber-attacks are difficult to analyze because there are no executable files to analyze from the defender"s perspective. In this paper, we investigate and analyze fileless cyber-attacks and present a model based on the cyber kill chain to classify fileless cyber-attacks. Through this, it is expected to identify and respond to attack types more quickly than when new fileless cyber-attacks occur.