Malicious File Detection Method Using Machine Learning and Interworking with MITRE ATT&CK Framework
With advances in cyber threats and increased intelligence, incidents continue to occur related to new ways of using new technologies. In addition, as intelligent and advanced cyberattack technologies gradually increase, the limit of inefficient malicious code detection and analysis has been reached,...
Main Authors: | Gwanghyun Ahn, Kookjin Kim, Wonhyung Park, Dongkyoo Shin |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2022-10-01
|
Series: | Applied Sciences |
Subjects: | |
Online Access: | https://www.mdpi.com/2076-3417/12/21/10761 |
Similar Items
-
CVE2ATT&CK: BERT-Based Mapping of CVEs to MITRE ATT&CK Techniques
by: Octavian Grigorescu, et al.
Published: (2022-08-01) -
Cyberattack Models for Ship Equipment Based on the MITRE ATT&CK Framework
by: Yonghyun Jo, et al.
Published: (2022-02-01) -
Assessing Cyber Risks of an INS Using the MITRE ATT&CK Framework
by: Aybars Oruc, et al.
Published: (2022-11-01) -
Assessing MITRE ATT&CK Risk Using a Cyber-Security Culture Framework
by: Anna Georgiadou, et al.
Published: (2021-05-01) -
Analysis and Characterization of Cyber Threats Leveraging the MITRE ATT&CK Database
by: Bader Al-Sada, et al.
Published: (2024-01-01)