參考文獻 |
[1] H. Orman, "The Morris Worm:A Fifteen-Year Perspective," IEEE Security & Privacy, vol. 1, no. 5, pp. 35-43, 2003, doi: 10.1109/Msecp.2003.1236233.
[2] P. H. Meland, Y. F. F. Bayoumy, And G. Sindre, "The Ransomware-As-A-Service Economy Within The Darknet," Computers & Security, vol. 92, p. 101762, 2020, doi: https://doi.org/10.1016/j.cose.2020.101762.
[3] Check Point, "H1 2023 In Cybersecurity," https://research.checkpoint.com/2023/h1-2023-in-cybersecurity/, (accessed 2024/03/17).
[4] Cyberint, "2023 Ransomware Recap by Cyberint," https://l.cyberint.com/ransomware-recap-2023, (accessed 2024/04/10).
[5] E. Kovacs, "Ransomware Payments Surpassed $1 Billion In 2023:Analysis," https://www.securityweek.com/ransomware-payments-surpassed-1-billion-in-2023-analysis/, (accessed 2024/03/15).
[6] 王宏仁, "【臺灣史上最大資安事件】深度剖析台積產線中毒大當機始末," https://www.ithome.com.tw/news/125098, (accessed 2024/03/17).
[7] 公開資訊觀測站, "重大資安訊息," https://mops.twse.com.tw/mops/web/t05sr01_1, (accessed 2024/03/17).
[8] 金融監督管理委員會, "「公開發行公司建立內部控制制度處理準則」第九條之一、第四十七條修正草案已完成預告程序,將於近期發布施行," https://www.fsc.gov.tw/ch/home.jsp?id=2&parentpath=0&mcustomize=news_view.jsp&dataserno=202112230009&dtable=News, (accessed 2024/03/17).
[9] 行政院, "數位發展部於111年8月27日掛牌成立," https://www.ey.gov.tw/Page/5B2FC62D288F4DB7/3fe103aa-c3f8-4c46-af23-efd5aa133729, (accessed 2024/03/17).
[10] 總統府, "國家資通安全研究院揭牌," https://www.president.gov.tw/News/27301, (accessed 2024/03/17).
[11] 經濟部產業人才發展資訊網, "資安長的職能與人才發展," https://www.italent.org.tw/ePaperD/9/ePaper20230100006, (accessed 2024/03/12).
[12] ISC2, "Cybersecurity Workforce Study," https://www.isc2.org/research, (accessed 2024/03/12).
[13] E. S. Group, "SOC Modernization And The Role Of XDR," https://www.techtarget.com/esg-global/survey-results/esg-complete-survey-results-soc-modernization-and-the-role-of-xdr/, (accessed 2024/02/12).
[14] R. Brewer, "Ransomware Attacks: Detection, Prevention And Cure," Network Security, vol. 2016, no. 9, pp. 5-9, 2016.
[15] A. Young And Y. Moti, "Cryptovirology:Extortion-Based Security Threats And Countermeasures," In Proceedings 1996 IEEE Symposium On Security And Privacy, 6-8 May 1996, pp. 129-140, doi: 10.1109/SECPRI.1996.502676.
[16] Kaspersky, "Ransomware Attacks And Types – How Encryption Trojans Differ," https://www.kaspersky.com/resource-center/threats/ransomware-attacks-and-types, (accessed 2024/03/17).
[17] P. O′Kane, S. Sezer, And D. Carlin, "Evolution Of Ransomware," IET Networks, vol. 7, no. 5, pp. 321-327, 2018, doi:10.1049/iet-net.2017.0207.
[18] H. S. Lallie et al., "Cyber Security In The Age Of COVID-19: A Timeline And Analysis Of Cyber-Crime And Cyber-Attacks During The Pandemic," Computers & Security, vol. 105, p. 102248, 2021/06/01/, doi: https://doi.org/10.1016/j.cose.2021.102248.
[19] Metaage, "勒索病毒如何防範?認識傳播途徑、預防方法,保衛資訊安全!," https://www.metaage.com.tw/news/technology/211, (accessed 2024/03/17).
[20] M. Paquet-Clouston, B. Haslhofer, And B. Dupont, "Ransomware Payments In The Bitcoin Ecosystem," Journal Of Cybersecurity, vol. 2024/03/17, no. 1, p. tyz003, 2019, doi: 10.1093/cybsec/tyz003.
[21] V. Szücs, G. Arányi, And Á. Dávid, "Introduction Of The ARDS—Anti-Ransomware Defense System Model—Based On The Systematic Review of Worldwide Ransomware Attacks," Applied Sciences, vol. 11, no. 13, p. 6070, 2021, doi: 10.3390/app11136070.
[22] SonicWall, "Number Of Ransomware Attempts Per Year 2022," https://www.statista.com/statistics/494947/ransomware-attempts-per-year-worldwide/, (accessed 2024/03/17).
[23] C. Sausalito, "Ransomware Will Strike Every 2 Seconds By 2031," In Cybercrime Magazine, ed, 2022.
[24] A. T. Tunggal, "17 Ransomware Examples & How They Occurred," https://www.upguard.com/blog/ransomware-examples, (accessed 2024/03/17).
[25] N. J. Palatty, "2024 年 100 多個勒索軟體攻擊統計:趨勢與成本 --- 100+ Ransomware Attack Statistics 2024: Trends & Cost," https://www.getastra.com/blog/security-audit/ransomware-attack-statistics/#The_number_of_ransomware_attacks_per_year, (accessed 2024/03/17).
[26] A. Jackson, "Top 10 Ransomware Attacks," https://cybermagazine.com/articles/top-10-ransomware-attacks, (accessed 2024/03/17).
[27] 趨勢科技, "十大知名勒索病毒," https://blog.trendmicro.com.tw/?p=72601, (accessed 2024/03/17).
[28] IThome,"資安專區," https://www.ithome.com.tw/security, (accessed 2024/03/17).
[29] Y.-S. Lin And C.-F. Lee, "Ransomware Detection And Prevention Through Strategically Hidden Decoy File," International Journal of Network Security, vol. 25, no. 2, pp. 212-220, 2023, doi: 10.6633/ijns.202303_25(2).04.
[30] Q. Chen And R. A. Bridges, "Automated Behavioral Analysis Of Malware: A Case Study Of WannaCry Ransomware," 2017, doi: 10.1109/icmla.2017.0-119.
[31] S. Mehnaz, A. Mudgerikar, And E. Bertino, "RWGuard:A Real-Time Detection System Against Cryptographic Ransomware," Springer International Publishing, 2018, pp. 114-136.
[32] C. Moore, "Detecting Ransomware With Honeypot Techniques," in 2016 Cybersecurity And Cyberforensics Conference (CCC), 2-4 Aug. 2016, pp. 77-81, doi:10.1109/CCC.2016.14.
[33] A. Kharraz, W. Robertson, D. Balzarotti, L. Bilge, And E. Kirda, "Cutting The Gordian Knot:A Look Under The Hood Of Ransomware Attacks," Springer International Publishing, 2015, pp. 3-24.
[34] A. O. Almashhadani, M. Kaiiali, S. Sezer, And P. O′Kane, "A Multi-Classifier Network-Based Crypto Ransomware Detection System: A Case Study Of Locky Ransomware," IEEE Access, vol. 7, pp. 47053-47067, 2019, doi:10.1109/access.2019.2907485.
[35] O. M. K. Alhawi, J. Baldwin, And A. Dehghantanha, "Leveraging Machine Learning Techniques For Windows Ransomware Network Traffic Detection," Springer International Publishing, 2018, pp. 93-106.
[36] T. D. Wagner, K. Mahbub, E. Palomar, And A. E. Abdallah, "Cyber Threat Intelligence Sharing: Survey And Research Directions," Computers & Security, vol. 87, p. 101589, 2019/11/01/, doi: https://doi.org/10.1016/j.cose.2019.101589.
[37] Solutionary, "Threat Intelligence Defined,." White Paper, 2015, pp. 6–13.
[38] M. Bromiley, "Threat Intelligence:What It Is, And How To Use It Effectively," SANS Institute InfoSec Reading Room, vol. 15, p. 172, 2016.
[39] S. E. Jasper, "U.S. Cyber Threat Intelligence Sharing Frameworks," International Journal Of Intelligence And CounterIntelligence, vol. 30, no. 1, pp. 53-65, 2017/01/02, doi: 10.1080/08850607.2016.1230701.
[40] J. D. Moteff, S. Resources, And I. Division, "Critical Infrastructures:Background, Policy, And Implementation," 2007: Congressional Research Service, Library Of Congress.
[41] C. McCarthy, K. Harnett, A. Carter, And C. Hatipoglu, "Assessment Of The Information Sharing And Analysis Center Model," 2014.
[42] 國家資通安全研究院, "本院簡介," https://www.nics.nat.gov.tw/about/introduction/, (accessed 2024/03/17).
[43] 台灣電腦網路危機處理暨協調中心, "TWCERT/CC中心簡介," https://www.twcert.org.tw/tw/cp-24-72-b31f4-1.html, (accessed 2024/03/17).
[44] Gartner, "Innovation Insight For Security Orchestration, Automation And Response," https://www.gartner.com/en/documents/3834578, (accessed 2024/03/17).
[45] S. Shea, "What Is SOAR (Security Orchestration, Automation And Response)? | Definition From TechTarget," https://www.techtarget.com/searchsecurity/definition/SOAR, (accessed 2024/03/17).
[46] A. Sridharan And V. Kanchana, "SIEM Integration With SOAR," In 2022 International Conference On Futuristic Technologies (INCOFT), 25-27 Nov. 2022, pp. 1-6, doi: 10.1109/INCOFT55651.2022.10094537.
[47] iThome, "【關鍵資安議題】新世代資安指揮中心來了!提供更強大洞察力與執行力," https://www.ithome.com.tw/article/139571, (accessed 2024/03/17).
[48] 洪羿漣, "SOAR統整異質平台預建流程自動執行回應," https://www.netadmin.com.tw/netadmin/zh-tw/trend/F6E7E0CFB2F14E06ACCA8F67DE1330C9, (accessed 2024/03/17).
[49] B. Adetoye And R. C.-w. Fong, "Building A Resilient Cybersecurity Workforce: A Multidisciplinary Solution To The Problem Of High Turnover Of Cybersecurity Analysts," In Cybersecurity In The Age Of Smart Societies:Proceedings Of The 14th International Conference On Global Security, Safety And Sustainability, London, September 2022, 2023:VSpringer, pp. 61-87.
[50] K. L. McLaughlin, " Defense Is The Best Offense: The Evolving Role Of Cybersecurity Blue Tvvveams And The Impact Of Soar Technologies," Edpacs, vol. 67, no. 6, pp. 35-41, 2023/06/03, doi: 10.1080/07366981.2023.2212484.
[51] Y. Zhao And Y. Guo, "Playbook-Centric Scalable SOAR System Architecture," In ICETIS 2022; 7th International Conference On Electronic Technology And Information Science, 21-23 Jan. 2022, pp. 1-5.
[52] J. Kinyua And L. Awuah, "AI/ML In Security Orchestration, Automation And Response: Future Research Directions," Intelligent Automation & Soft Computing, vol. 28, no. 2, 2021.
[53] C. Leite, J. den Hartog, D. Ricardo Dos Santos, And E. Costante, "Actionable Cyber Threat Intelligence For Automated Incident Response," In Nordic Conference On Secure IT Systems, 2022:Springer, pp. 368-385.
[54] C. Islam, M. A. Babar, And S. Nepal, "Architecture-Centric Support For Integrating Security Tools In A Security Orchestration Platform," In Software Architecture: 14th European Conference, ECSA 2020, L′Aquila, Italy, September 14–18, 2020, Proceedings 14, 2020: Springer, pp. 165-181.
[55] R. Vast, S. Sawant, A. Thorbole, And V. Badgujar, "Artificial Intelligence Based Security Orchestration, Automation And Response System," In 2021 6th International Conference For Convergence In Technology (I2CT), 2021: IEEE, pp. 1-5.
[56] R. C. Leland And Michael, "Understanding The Difference Between EDR, SIEM, SOAR, And XDR," https://www.sentinelone.com/blog/understanding-the-difference-between-edr-siem-soar-and-xdr/, (accessed 2024/03/02).
[57] Heimdalsecurity, "XDR vs SIEM vs SOAR: A Comparison," https://heimdalsecurity.com/blog/xdr-vs-siem-vs-soar-a-comparison/, (accessed 2024/03/02).
[58] A. Mellen, "XDR Defined: Giving Meaning To Extended Detection And Response," https://www.forrester.com/blogs/xdr-defined-giving-meaning-to-extended-detection-and-response/, (accessed 2024/03/02).
[59] Airbus, "Cybersecurity Jargon Busting: MDR, SOC, EDR, XDR, SOAR And SIEM," https://www.protect.airbus.com/blog/cybersecurity-jargon-busting-mdr-soc-edr-xdr-soar-and-siem/, (accessed 2024/03/02).
[60] CrowdStrike, "XDR vs. SIEM vs. SOAR: What′s The Difference? - CrowdStrike," https://www.crowdstrike.com/cybersecurity-101/what-is-xdr/xdr-vs-siem-vs-soar/, (accessed 2024/03/02).
[61] Gartner, "Best Endpoint Detection And Response Solutions Reviews 2024 | Gartner Peer Insights," https://www.gartner.com/market/endpoint-detection-and-response-solutions, (accessed 2024/03/02).
[62] Microsoft, "什麼是 XDR? | Microsoft 安全性," https://www.microsoft.com/zh-tw/security/business/security-101/what-is-xdr, (accessed 2024/03/02).
[63] Nomios, "EDR, NDR, XDR, MDR - Different Concepts Of Detection & Response," https://www.nomios.com/news-blog/edr-ndr-xdr-mdr/, (accessed 2024/03/02).
[64] Trend Micro, "何謂 XDR?," https://www.trendmicro.com/zh_tw/what-is/xdr.html, (accessed 2024/03/02).
[65] NIST, "Cybersecurity Framework," https://www.nist.gov/cyberframework, (accessed 2024/03/17).
[66] A. Hochstein, R. Zarnekow, And W. Brenner, "ITIL As Common Practice Reference Model For IT Service Management: Formal Assessment And Implications For Practice," In 2005 IEEE International Conference On E-Technology, E-Commerce And e-Service, 2005: IEEE, pp. 704-710.
[67] B. Filkins, D. Wylie, And A. Dely, "Sans 2019 State Of OT/OCS Cybersecurity Survey," SANS™ Institute, 2019.
[68] R. Odarchenko, M. Iavich, G. Iashvili, S. Fedushko, And Y. Syerov, "Assessment Of Security KPIs For 5G Network Slices For Special Groups Of Subscribers," Big Data And Cognitive Computing, vol. 7, no. 4, p. 169, 2023. [Online]. Available: https://www.mdpi.com/2504-2289/7/4/169.
[69] S. Udipi, "The Event Data Management Problem: Getting The Most From Network Detection And response," Network Security, vol. 2021, no. 1, pp. 12-14, 2021.
[70] H. Wang And P. Liu, "Modeling And Evaluating The Survivability Of An Intrusion Tolerant Database System," In Computer Security–ESORICS 2006: 11th European Symposium On Research In Computer Security, Hamburg, Germany, September 18-20, 2006. Proceedings 11, 2006: Springer, pp. 207-224.
[71] R. K. Yin, "Discovering The Future Of The Case Study. Method In Evaluation Research," Evaluation Practice, vol. 15, no. 3, pp. 283-290, 1994.
[72] Quadrant Knowledge Solutions, "SPARK Matrix™: Security Orchestration, Automation, And Response (SOAR) Q2, 2023," https://quadrant-solutions.com/market-research/spark-matrix-security-orchestration-automation-and-response-soar-q2-2023-2883, (accessed 2024/03/17).
[73] G. Inc, "Best Security Orchestration, Automation And Response Solutions Reviews 2024 | Gartner Peer Insights," https://www.gartner.com/market/security-orchestration-automation-and-response-solutions, (accessed 2024/03/17).
[74] Paloalto, "Cortex XSOAR System Requirements • Cortex XSOAR Installation Guide • Reader • Palo Alto Networks documentation portal," https://docs-cortex.paloaltonetworks.com/r/Cortex-XSOAR/6.10/Cortex-XSOAR-Installation-Guide/Cortex-XSOAR-System-Requirements, (accessed 2024/03/17).
[75] Paloalto, "External Dynamic List," https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/policy/use-an-external-dynamic-list-in-policy/external-dynamic-list, (accessed 2024/05/02). |