TAKSONOMI PERTAHANAN CYBER SECURITY MENGGUNAKAN MODEL CYBER KILL CHAIN
Abstract
Keywords
Full Text:
PDF hlm 232 - 245References
P. Yadav, R.S., Likhar, Firewall: A Vital Constituent of Network Security. Springer Singapore, 2024.
S. Deshpande and H. Wang, “Design of Quantum Computer Antivirus.â€
J. Zhang and D. Tenney, “The Evolution of Integrated Advance Persistent Threat and Its Defense Solutions: A Literature Review,†Open Journal of Business and Management, vol. 12, no. 01, pp. 293–338, 2024, doi: 10.4236/ojbm.2024.121021.
K. O. Chee and C. Science, “Security Modelling and Analysis of Internet of Things against Evolving Attacks,†2024.
O. Gulyas and G. Kiss, “Impact of cyber-Attacks on the financial institutions,†Procedia Computer Science, vol. 219, pp. 84–90, 2023, doi: 10.1016/j.procs.2023.01.267.
A. Wijoyo, A. Saputra, M. R. A. Pratama, and R. Rahman, “Analisis Serangan Phising dan Strategi Deteksinya,†JRIIN: Jurnal Riset Informatika dan Inovasi, vol. 1, no. 4, pp. 1–6, 2023.
J. Beerman, D. Berent, Z. Falter, and S. Bhunia, “A Review of Colonial Pipeline Ransomware Attack,†Proceedings - 23rd IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing Workshops, CCGridW 2023, pp. 8–15, 2023, doi: 10.1109/CCGridW59191.2023.00017.
A. Shehu, M. Umar, and A. Aliyu, “Cyber Kill Chain Analysis Using Artificial Intelligence,†Asian Journal of Research in Computer Science, vol. 16, no. 3, pp. 210–219, 2023, doi: 10.9734/ajrcos/2023/v16i3357.
G. Matto, “The Cyber Kill Chain Model and Its Applicability on The Protection of Students Academic Information Systems ( SAIS ) in Tanzanian HEIs,†vol. 6, no. 1, pp. 548–560, 2024, doi: 10.51519/journalisi.v6i1.676.
S. R. B. Mohd Kassim, S. Li, and B. Arief, “Understanding How National CSIRTs Evaluate Cyber Incident Response Tools and Data: Findings from Focus Group Discussions,†Digital Threats: Research and Practice, vol. 4, no. 3, 2023, doi: 10.1145/3609230.
Y. Ahmed, A. T. Asyhari, and M. A. Rahman, “A Cyber Kill Chain Approach for Detecting Advanced Persistent Threats,†Computers, Materials and Continua, vol. 67, no. 2, pp. 2497–2513, 2021, doi: 10.32604/cmc.2021.014223.
M. Aamir, S. S. H. Rizvi, M. A. Hashmani, M. Zubair, and J. A. . Usman, “Machine Learning Classification of Port Scanning and DDoS Attacks: A Comparative Analysis,†Mehran University Research Journal of Engineering and Technology, vol. 40, no. 1, pp. 215–229, 2021, doi: 10.22581/muet1982.2101.19.
Y. Li, J. Hua, H. Wang, C. Chen, and Y. Liu, “DeepPayload: Black-box backdoor attack on deep learning models through neural payload injection,†Proceedings - International Conference on Software Engineering, pp. 263–274, 2021, doi: 10.1109/ICSE43902.2021.00035.
C. Guo, Z. Song, Y. Ping, G. Shen, Y. Cui, and C. Jiang, “Pratd: A phased remote access trojan detection method with double-sided features,†Electronics (Switzerland), vol. 9, no. 11, pp. 1–19, 2020, doi: 10.3390/electronics9111894.
V. Valeros and S. Garcia, “Growth and Commoditization of Remote Access Trojans,†Proceedings - 5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020, pp. 454–462, 2020, doi: 10.1109/EuroSPW51379.2020.00067.
M. Nasereddin, A. ALKhamaiseh, M. Qasaimeh, and R. Al-Qassas, “A systematic review of detection and prevention techniques of SQL injection attacks,†Information Security Journal, vol. 32, no. 4, pp. 252–265, 2023, doi: 10.1080/19393555.2021.1995537.
R. Alabdan, “Phishing attacks survey: Types, vectors, and technical approaches,†Future Internet, vol. 12, no. 10, pp. 1–39, 2020, doi: 10.3390/fi12100168.
R. Casolare, C. De Dominicis, G. Iadarola, F. Martinelli, F. Mercaldo, and A. Santone, “Dynamic mobile malware detection through system call-based image representation,†Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol. 12, no. 1, pp. 44–63, 2021, doi: 10.22667/JOWUA.2021.03.31.044.
M. A. Hakim and N. A. Abdullah, “A Dropper Remover Tool,†vol. 4, no. 1, pp. 79–91, 2023.
T. Neubert and C. Vielhauer, “Kill chain attack modelling for hidden channel attack scenarios in industrial control systems,†IFAC-PapersOnLine, vol. 53, no. 2, pp. 11074–11080, 2020, doi: 10.1016/j.ifacol.2020.12.246.
L. F. Eliyan and R. Di Pietro, “DoS and DDoS attacks in Software Defined Networks: A survey of existing solutions and research challenges,†Future Generation Computer Systems, vol. 122, pp. 149–171, 2021, doi: 10.1016/j.future.2021.03.011.
S. Slamet, “Pertahanan Pencegahan Serangan Social Engineering Menggunakan Two Factor Authentication (2Fa) Berbasis Sms (Short Message System),†Spirit, vol. 14, no. 2, pp. 23–29, 2023, doi: 10.53567/spirit.v14i2.260.
S. Slamet, “Desain Arsitektur Aplikasi Qr Code Sebagai Anti Phishing Serangan Qr Code,†Spirit, vol. 15, no. 1, pp. 42–48, 2023, doi: 10.53567/spirit.v15i1.280.
M. A. Al-shareeda, M. Anbar, S. Manickam, and I. H. Hasbullah, “Review of Prevention Schemes for Man-In-The-Middle (MITM) Attack in Vehicular Ad hoc Networks,†International Journal of Engineering and Management Research, vol. 10, no. 3, pp. 153–158, 2020, doi: 10.31033/ijemr.10.3.23.
S. G. Selvaganapathy, S. Sadasivam, and V. Ravi, “A Review on Android Malware: Attacks, Countermeasures and Challenges Ahead,†Journal of Cyber Security and Mobility, vol. 10, no. 1, pp. 177–230, 2021, doi: 10.13052/jcsm2245-1439.1017.
A. Mosteiro-Sanchez, M. Barcelo, J. Astorga, and A. Urbieta, “Securing IIoT using Defence-in-Depth: Towards an End-to-End secure Industry 4.0,†Journal of Manufacturing Systems, vol. 57, pp. 367–378, 2020, doi: 10.1016/j.jmsy.2020.10.011.
DOI: http://dx.doi.org/10.53567/spirit.v16i1.332
Refbacks
- There are currently no refbacks.
Copyright (c) 2024 Slamet Slamet
This work is licensed under a Creative Commons Attribution 4.0 International License.
Diindeks Oleh:
SPIRIT : Sarana Penunjang Informasi Terkini
Diterbitkan oleh Teknologi Informasi Institut Teknologi dan Bisnis Yadika Pasuruan
Alamat Redaksi: Jl. Bader No.9, Kwangsan, Kalirejo, Kec. Bangil, Pasuruan, Jawa Timur 67153
Telp/Fax: (0343) 742070 , Email : lppm@stmik-yadika.ac.id
Google Maps : Klik Disini
Karya ini dilisensikan di bawah Lisensi Internasional Creative Commons Atribusi 4.0 .