|
參考資料 [1]羅正漢, "Palo Alto提2019網路安全5大預測," in "iThome," 2019-01-10. [Online]. Available: https://www.ithome.com.tw/news/128178 [2]N. Lewis, "防範內部威脅攻擊您的網路," 2018. [Online]. Available: https://blog.ipswitch.com/tw/how-to-safeguard-your-network-from-insider-threats [3]行政院國家資通安全會報技術服務中心, "政府機關資安弱點通報機制推動規劃," ed, 2019-7. [4]陳曉莉, "微軟3月更新遺漏一個未被修補的SMB蠕蟲漏洞,引發爭議," in "iThome," 2020. [Online]. Available: https://www.ithome.com.tw/news/136307 [5]T. Labs, "即使漏洞修補了兩年, WannaCry 仍是使用EternalBlue 漏洞攻擊手法中最多的," 2019. [Online]. Available: https://blog.trendmicro.com.tw/?p=62316 [6] R. A. Lika, D. Murugiah, S. N. Brohi, and D. Ramasamy, "NotPetya: Cyber Attack Prevention through Awareness via Gamification," in 2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE), 2018: IEEE, pp. 1-6. [7]陳曉莉, "Coveware:RDP為勒索軟體入侵的主要管道," in "iThome," 2019. [Online]. Available: https://www.ithome.com.tw/news/131843 [8]C. Cimpanu, "Microsoft: RDP brute-force attacks last 2-3 days on average," in "ZDnet," 2020. [Online]. Available: https://www.zdnet.com/article/microsoft-rdp-brute-force-attacks-last-2-3-days-on-average [9]Z. Wang, C. Liu, J. Qiu, Z. Tian, X. Cui, and S. Su, "Automatically traceback RDP-based targeted ransomware attacks," Wireless Communications and Mobile Computing, vol. 2018, 2018. [10]陳炳宏, "威脅台企業惡意軟體 挖礦軟體仍居首," in "自由時報," 2109-04-29. [Online]. Available: https://ec.ltn.com.tw/article/breakingnews/2773768 [11]t. Labs, "挖礦惡意程式攻擊 Linux 系統,並利用 Rootkit 自我隱藏," 2018. [Online]. Available: https://blog.trendmicro.com.tw/?p=57986 [12]S. Chou, "資安威脅─挖礦殭屍網路構成新型態暗黑經濟," in "科技新報," 2018. [Online]. Available: https://technews.tw/2018/09/17/mining-dark-economy/ [13]A. Botta, W. De Donato, V. Persico, and A. Pescapé, "Integration of cloud computing and internet of things: a survey," Future generation computer systems, vol. 56, pp. 684-700, 2016. [14] M. Sato, A. Sugimoto, N. Hayashi, Y. Isobe, and R. Sasaki, "Proposal of a Method for Identifying the Infection Route for Targeted Attacks Based on Malware Behavior in a Network," in 2015 Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec), 2015: IEEE, pp. 40-45. [15] S. M. Milajerdi, R. Gjomemo, B. Eshete, R. Sekar, and V. Venkatakrishnan, "Holmes: real-time apt detection through correlation of suspicious information flows," in 2019 IEEE Symposium on Security and Privacy (SP), 2019: IEEE, pp. 1137-1152. [16] D. Liu, H. Zhang, H. Yu, X. Liu, Y. Zhao, and G. Lv, "Research and Application of APT Attack Defense and Detection Technology Based on Big Data Technology," in 2019 IEEE 9th International Conference on Electronics Information and Emergency Communication (ICEIEC), 2019: IEEE, pp. 1-4. [17]S. Team, "What are software supply chain attacks?," 2019. [Online]. Available: https://secureteam.co.uk/articles/web-application-security-articles/what-are-software-supply-chain-attacks/,. [18]李宗翰. (2020-01-09) 2020十大資安趨勢6:供應鏈安全. iThome. Available: https://www.ithome.com.tw/news/135178, [19]A. T. T. Tiwari , A. Oprea, K. Olcoz and A. K. Coskun,, "User-profile-based analytics for detecting cloud security breaches," IEEE International Conference on Big Data, 2017. [20]B. D. Newton, "Anomaly Detection in Network Traffic Traces Using Latent Dirichlet Allocation," dated Dec, vol. 31, 2012. [21]A. N. M. M. Ahmed, and J. Hu,, "A survey of network anomaly detection techniques,," Journal of Network and Computer Applications, vol. 60, pp. 19-31,, 2016. [22]L. Sun, S. Versteeg, S. Boztas, and A. Rao, "Detecting anomalous user behavior using an extended isolation forest algorithm: an enterprise case study," arXiv preprint arXiv:1609.06676, 2016. [23]K. Singh, K. S. Dhindsa, and B. Bhushan, "Threshold-based distributed DDoS attack detection in ISP networks," Turkish Journal of Electrical Engineering & Computer Sciences, vol. 26, no. 4, pp. 1796-1811, 2018. [24]Z. Ma, Q. Li, and X. Meng, "Discovering suspicious APT families through a large-scale domain graph in information-centric IoT," IEEE Access, vol. 7, pp. 13917-13926, 2019. [25]D. M. D. B. Percival, "Discrete Wavelet Transform”, Handbook of Statistics," 2012. [26]Ł. Saganowski, M. Goncerzewicz, and T. Andrysiak, "Anomaly detection preprocessor for snort ids system," in Image Processing and Communications Challenges 4: Springer, 2013, pp. 225-232. [27]F. S. Al-Kamal et al., "An efficient transceiver scheme for sc-fdma systems based on discrete wavelet transform and discrete cosine transform," Wireless Personal Communications, vol. 83, no. 4, pp. 3133-3155, 2015. [28] R. F. Fouladi, C. E. Kayatas, and E. Anarim, "Frequency based DDoS attack detection approach using naive Bayes classification," in 2016 39th International Conference on Telecommunications and Signal Processing (TSP), 2016: IEEE, pp. 104-107. [29]M. N. M. A. M. Hasan, B. Pal, and S. Ahmad, "Support vector machine and random forest modeling for intrusion detection system (IDS)," Journal of Intelligent Learning Systems and Applications, vol. 6, no. 01, p. 45, 2014. [30]B. D. Y. Dong, and L. Zhang, "Target detection based on random forest metric learning," IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, vol. 8, no. 4, pp. 1830-1838, 2015. [31]N. F. a. M. Jabbar, "Random forest modeling for network intrusion detection system," Procedia Computer Science, vol. 89, pp. 213-217, 2016. [32]Y. L. H. Yao, and C. Fang, "An abnormal network traffic detection algorithm based on big data analysis," International Journal of Computers, Communications & Control, vol. 11, no. 4, 2016. [33]G. L. a. A. L. Baldoni, "Malware Triage Based on Static Features and Public APT Reports," Lecture Notes in Computer Science, vol. LNCS, volume 10332, 02 June 2017. [34]M. K. J. Nowak, R. Nowicki, R. Scherer, and A. Siwocha,, "Random forests for profiling computer network users," in International Conference on Artificial Intelligence and Soft Computing, pp. 734-739, 2018: Springer, . [35]黃馨瑩, "事件解析】臺灣 22 間醫療院所遭到勒索軟體攻擊,10招防禦措施要做好!," 2019-09-11. [Online]. Available: https://secbuzzer.co/post/121
|