JOURNAL BROWSE
Search
Advanced SearchSearch Tips
A Implement of Integrated Management Systems for User Fraud Protection and Malware Infection Prevention
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
A Implement of Integrated Management Systems for User Fraud Protection and Malware Infection Prevention
Min, So-Yeon; Cho, Eun-Sook; Jin, Byung-Wook;
  PDF(new window)
 Abstract
The Internet continues to grow and develop, but there are going to generate a variety of Internet attacks that exploit it. In the initial Internet environment, the attackers maliciously exploited Internet environments for ostentations and hobbies. but these days many malicious attempts purpose the financial gain so systematic and sophisticated attacks that are associated with various crimes are occurred. The structures, such as viruses and worms were present in the form of one source multi-target before. but recently, APT(Advanced Persistent Threat, intelligent continuous attacks) in the form of multi-source single target is dealing massive damage. The performance evaluation analyzed whether to generate audit data and detect integrity infringement, and false positives for normal traffic, process detecting and blocking functions, and Agent policy capabilities with respect to the application availability.
 Keywords
Integrated Management;Malware Infection Prevention;User Fraud Protection;
 Language
Korean
 Cited by
 References
1.
Saint Security, Malware analysis report, malwares.com, 2015. 7. 13

2.
Jae-Kyung Park, A Realtime Malware Detection Technique Using Multiple Filter, KSCI, Vol.19, No. 7. 2014. 7.

3.
Jaeho Lee, Sangjin Lee, A Study on Unknown Malware Detection using Digital Forensic Techniques, , JKIISC, Vol24, No. 1, 2014. 2.

4.
JesseBurns,"DevelopingSecureMobileApplications forAndroid:AnintroductiontomakingsecureAndroidapplications",Dec2009.

5.
A.Shabtai,Y.FledelandU.Kanonov,Y.EloviiandS.Dolev. "GoogleAndroid:AState - of - the -ArtReview of Security Mechanisms . " IEEE SecurityandPrivacy,vol.8,issue2,pp.35-442010.

6.
James M. Aquilina, Eoghan Casey, Cameron H. Malin, MalwareForensics-InvestigatingandAnalyzingMaliciousCode", 2008.

7.
Brett Stone-Gross, Ryan Abman, Richard A. Kemmerer, ChristopherKruegel,DouglasG.Steigerwald,andGiovanniV igna, "TheUndergroundEconomyofFakeAntivirusSoftware", 2012.

8.
Sang Min Lee, Hwa Sun Kim, Hune Cho, "Study on OWL-based database built for the efficient operation of human resources bank," Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology, Vol.5, No.3, pp.55-64, June 2015. DOI: http://dx.doi.org/10.14257/AJMAHS.2015.06.27

9.
Sattarova Feruza, "Secure Multi-Party Computation in Networks Over A Cross Domain Privacy Preserving Firewall Optimization," Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology, Vol.1, No.1, pp.91-98, Dec. 2011. DOI: http://dx.doi.org/10.14257/AJMAHS.2011.12.06

10.
Zita Maria Almeida do Vale, Carlos Ramos, Rosslin John Robles, "Effective Use of Multiple Random Walks in P2P Networks," Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology, Vol.4, No.1, pp.1-8, June 2014. DOI: http://dx.doi.org/10.14257/AJMAHS.2014.06.04

11.
Farkhod Alisherov, "The Security in the Vehicular Ad Hoc Network (VANET) Using Expedite Message Authentication Protocol (EMAP)," Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology, Vol.1, No.1, pp.99-106, Dec. 2011. DOI: http://dx.doi.org/10.14257/AJMAHS.2011.12.03

12.
Chul-Woo Park, Ji-Woong Son, Hyun-Ki Hwang, Ki-Chang Kim, "Detection of systems infected with C&C Zeus through technique of Windows API hooking," Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology, Vol.5 No.2, pp.297-304, April 2015. DOI: http://dx.doi.org/10.14257/AJMAHS.2015.04.11