DOI QR코드

DOI QR Code

PC를 이용한 스마트폰 악성코드 대응

Response Guide of Smart-Phone Malware Using PC

  • Yoon, Poong-Sik (Department of Information and Communication Engineering, Chosun University) ;
  • Han, Seung-Jo (Department of Information and Communication Engineering, Chosun University)
  • 투고 : 2013.05.07
  • 심사 : 2013.06.07
  • 발행 : 2013.08.31

초록

스마트폰 사용자가 증가함에 따라 스마트폰 악성코드, 좀비 스마트폰등의 스마트폰을 겨냥한 공격이 증가하고 있다. 스마트폰에 대한 보안은 PC보안 보다 더 취약하며, 스마트폰에 대한 공격은 날이 갈수록 다양해지고 있으며 좀비 스마트폰의 경우 좀비 PC보다 심각한 문제를 야기시킨다. 본 논문에서는 PC에서 DDoS 공격과 스마트폰 DDoS공격 및 악성코드를 비교 분석하고 데이터망에 접속하여 서비스를 이용할 때 이용자가 직접 스마트폰의 패킷을 확인하는 방법과 스마트PC폰에 대한 악성코드들을 PC를 이용하여 탐지 하는 방법에 대해 제안하며 스마트폰 DDoS 공격과 악성코드에 관한 대응책을 제시한다.

With the increase in smartphone users, attacks targeting smartphone malware, zombie smartphone, such as smart phones is increasing. Security of smart phones is more vulnerable than PC security, for a zombie smartphone and generates a serious problem than the zombie PC attack on the smartphone every day is diversification. In this paper, the comparative analysis of malicious code and smartphone DDoS attacks and DDoS attacks from the PC, When using a service by connecting to the data network, proposes a method for users to confirm the packet smartphone direct a method for detecting by using the PC malware Smart PC Phone. Propose the measures of malicious code and smartphone DDoS attacks.

키워드

참고문헌

  1. C-J Ryu, K-H Han, "A Study on the Security Research about Botnet Attack Detection Interception" KICS, 2010.
  2. K-H Jang, S-M Choi, H-Y Yeom "Smartphone DDoS Attack Trends", KIISC, 2011
  3. S-W Lee, "DDoS Attack Change and Forward", Financial Security Agency Issue Report Vol.2011-004, 2011.
  4. Arun Raj Kumar, P. and S. Selvakumar, "Distributed Denial-of-Service Threat in Collaborative Environment A Survey on DDoS Attack Tools and Traceback Mechanisms", IEEE International Advance Computing Conference 2009
  5. G-Y Kim, S-J Cho, "Security Vulnerability Trends in Smartphones", KIISE Fall Conference, Vol.37, No.2 pp.90-91, 2010.
  6. W-S Choi, S-J Han "A Study of DDOS Attack and Malicious code Countermeasures for Smart Phone", KIPS C2012J 0153, Fall Conference 2012.
  7. Bud Smith, "How to do Everthing Nexus One", 2010.
  8. Ken Dunham, "Mobile Malware attacks and Defense", SYNGRESS, 2009.
  9. G Carl, G Kesidis, RR Brooks, S Rai, "Denial of serviceattack detection techniques", IEEE Internet Computing, pp.82-89, 2006.
  10. Felix Lau, stuart H. Rubin, Michael H. Smith, Ljiljana Trajkovic, "Distributed Denial of Service Attacks", 2000 IEEE International Conference on Systems, Man and Cybernetics, Volume, pp.2275-2280, 2000.