참고자료
Last updated
Last updated
[1] HAN, Xiao; KHEIR, Nizar; BALZAROTTI, Davide. Deception techniques in computer security: A research perspective. ACM Computing Surveys (CSUR), 2018, 51.4: 1-36.
[2] ZHANG, Li; THING, Vrizlynn LL. Three decades of deception techniques in active cyber defense-retrospect and outlook. Computers & Security, 2021, 106: 102288.
[3] TOUNSI, Wiem. Cyber deception, the ultimate piece of a defensive strategy-proof of concept. In: 2022 6th Cyber Security in Networking Conference (CSNet). IEEE, 2022, p. 1-5.
[4] BELTRÁN LÓPEZ, Pedro; GIL PÉREZ, Manuel; NESPOLI, Pantaleone. Cyber Deception: State of the art, Trends and Open challenges. arXiv e-prints, 2024, arXiv: 2409.07194.
[5] PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure (DC Sync)
[6]
[7]
[8]
[9]
[10] (2020.12.23) 보안뉴스, 솔라윈즈 사태로 다시 한 번 부각된 ‘골든 SAML’ 공격 기법
[11] (2017.11.21) CyberArk, Golden SAML: Newly Discovered Attack Technique Forges Authentication to Cloud Apps
[12] (2020.12.29) CyberArk, Golden SAML Revisited: The Solorigate Connection
[13] (2020.12) CISA, Detecting Abuse of Authentication Mechanisms
[14] (2021.07.21) Sygnia, Detection and Hunting of Golden SAML Attack
[16] (2021.01.08) Splunk, A Golden SAML Journey: SolarWinds Continued
[17] LogRhythm, Analysis and Detection of Golden SAML Attacks
[15] (2022.07.01) netwrix, Golden SAML Attack
[18] (2021.01.19) Mandiant, Remediation and Hardening strategies for Microsoft 365 to defend against unc2452
[19] Splunk, How the SolarWinds cyberattacks work
[20]
[21]