ABSTRACT
요약
1. Introduction
2. Related research
2.1 Hacking E-Mail Distribution Status
2.2 Digital Forensics and Indicators Of Comp romis(IOC)
3. Proposed Model
3.1 EML Extraction System
3.2 Construction of Hacking E-Mail IOC
4. Verification and Conclusions
4.1 Verification and Utilization of Hacking E-Mail detection indicator
4.2. Conclusion and Suggestions
References