1 유형욱, "제어시스템 보안을 위한 whitelist 기반 이상징후 탐지 기법" 한국통신학회 38 (38): 641-653, 2013
2 나중찬, "보안측면에서의 산업제어시스템 비정상 행위 분류" 한국정보보호학회 23 (23): 329-337, 2013
3 Plura Blog, "Windows Sysmon"
4 Josh Brower, "Using Sysmon to Enrich Security Onion’s Host-Level Capabilities"
5 MSS, "Technology Roadmap for SME 2018-2020Information Security"
6 MSS, "Technology Roadmap for SME 2018-2020 Information Security"
7 Microsoft, "Sysmon Setup"
8 JPCERT Coordination Center, "Sysmon Malware Detection"
9 Kaspersky Lab, "ShadowPad"
10 Boannews, "Seungyeon Han, The impo rtance of ICS /SCADA security and co unter measures, ISEC 2018"
1 유형욱, "제어시스템 보안을 위한 whitelist 기반 이상징후 탐지 기법" 한국통신학회 38 (38): 641-653, 2013
2 나중찬, "보안측면에서의 산업제어시스템 비정상 행위 분류" 한국정보보호학회 23 (23): 329-337, 2013
3 Plura Blog, "Windows Sysmon"
4 Josh Brower, "Using Sysmon to Enrich Security Onion’s Host-Level Capabilities"
5 MSS, "Technology Roadmap for SME 2018-2020Information Security"
6 MSS, "Technology Roadmap for SME 2018-2020 Information Security"
7 Microsoft, "Sysmon Setup"
8 JPCERT Coordination Center, "Sysmon Malware Detection"
9 Kaspersky Lab, "ShadowPad"
10 Boannews, "Seungyeon Han, The impo rtance of ICS /SCADA security and co unter measures, ISEC 2018"
11 Gyeongyeong Song, "Security technology trend for SCADA system" 1-2, 2015
12 SecurityFocus, "SCADA vulnerabilities"
13 Procon, "SCADA OS Windows Unix" DEC
14 Younghun Lee, "Research Trends and Considerations of Security Technology of Industrial Control System" SeoulNational University of Science and Technology 3-, 2018
15 Mitre Corp, "Mitre ATT&CK"
16 CISA, "ICS Sysmon"
17 Darktrace Blog, "ICS SCADA EDR"
18 NIST, "Guide to Industrial control systems security"
19 Elastic, "Elasticsearch Logstash Kibana"
20 Vasileios Mavroeidis, "Data-Driven Threat Hunting Using Sysmon"
21 Financial Security Institute, "Cyber Threat Intelligence"
22 GAO, "Critical Infrastructure Threats"
23 Ahnlab, "Critical Infrastructure Threats" 36-37, 2016
24 DRAGOS, "CRASHOVERRIDE; Analysisof the Threat to Electric Grid Operations"
25 Univ. Hoseo, "Analysis of Overseas System based Evaluation Cases and Technology"
26 Seonghun Eom, "A Study on the Security Threats Detection through Analysis of Endpoint Integration Security Log" Soongsil Univ 9-24, 2016
27 "4th Industrial Revolution and ‘Cyber Threat Intelligence’"