본문 바로가기
  • Home

Indicators of Compromise Data Generation Method for Malware on Cyber Incident Occurrence in IoT Environments

  • Journal of Internet of Things and Convergence
  • Abbr : JKIOTS
  • 2023, 9(4), pp.1-8
  • DOI : 10.20465/KIOTS.2023.9.4.001
  • Publisher : The Korea Internet of Things Society
  • Research Area : Engineering > Computer Science > Internet Information Processing
  • Received : June 2, 2023
  • Accepted : July 28, 2023
  • Published : August 31, 2023

Lee, Hyung Woo 1

1한신대학교

Accredited

ABSTRACT

As cyber attacks become more intelligent and advanced, cyber attacks targeting heterogeneous systems such as Internet of Things (IoT) devices are increasing. There is a need for a technique to share detailed threat information about the incident attack. In the event of an infringement incident, a technique that can express digital forensic artifacts collected from heterogeneous IoT devices as indicators of compromise (IoC) and share them must be established. In particular, when malicious code is executed targeting various IoT devices, an efficient IoC generation method to express cyber threat information and share it among CTI systems must be presented. Therefore, in this study, the existing IoC creation method and expression method were analyzed. A classification system for generating IoC for malware and an efficient and standardized expression method were presented. Based on the proposed IoC expression and standardization method, it is expected that it will be able to actively respond to intelligent attacks when establishing an accident management framework

Citation status

* References for papers published after 2023 are currently being built.