Citation Export
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Choi, Heeyoung | - |
dc.contributor.author | Kang, Juyoung | - |
dc.contributor.author | Park, Sangun | - |
dc.date.issued | 2020-01-01 | - |
dc.identifier.issn | 2185-2766 | - |
dc.identifier.uri | https://dspace.ajou.ac.kr/dev/handle/2018.oak/31285 | - |
dc.description.abstract | According to the Jan. 18, 2018, security news article, “Political and diplomatic situations have begun to flood cyberspace”, cyber-threat acts by Russia and North Korea have soared significantly since 2017, indicating that hackers have taken advantage of geopolitical tensions. In other words, the number of attacks by hackers involving political and diplomatic situations has increased; to prove this phenomenon, we extracted keywords that have appeared in a number of political articles published in the central newspapers of the nation. In addition, by analyzing the relationship between political issues and security attacks through text mining analysis of political news, including the log data of typical security equipment – DDoS and IPS equipment – we were able to analyze and even predict cyberattacks based on these results. Consequently, we have found a link between certain keywords and some attacks, and based on these analyses, we want to derive a proactive response through forecasting a growing number of cyberattacks in the event of similar social issues. In particular, as security threats have characterized an increasing trend of intelligent cyberattacks against specific targets, an effective preemptive defense system can be constructed by seeking ways to enhance the security capabilities of these targets. | - |
dc.description.sponsorship | This work was supported by the Ajou University research fund. | - |
dc.language.iso | eng | - |
dc.publisher | ICIC International | - |
dc.title | Forecasting cyber threats through the text mining analysis of political news and security logs | - |
dc.type | Article | - |
dc.citation.endPage | 586 | - |
dc.citation.startPage | 577 | - |
dc.citation.title | ICIC Express Letters, Part B: Applications | - |
dc.citation.volume | 11 | - |
dc.identifier.bibliographicCitation | ICIC Express Letters, Part B: Applications, Vol.11, pp.577-586 | - |
dc.identifier.doi | 10.24507/icicelb.11.06.577 | - |
dc.identifier.scopusid | 2-s2.0-85084371344 | - |
dc.identifier.url | http://www.icicelb.org/ellb/contents/2020/6/elb-11-06-08.pdf | - |
dc.subject.keyword | Analysis | - |
dc.subject.keyword | Cyberattack | - |
dc.subject.keyword | Machine learning | - |
dc.subject.keyword | Security logs | - |
dc.subject.keyword | Text mining | - |
dc.subject.subarea | Computer Science (all) | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.