Browse > Article
http://dx.doi.org/10.14400/JDC.2015.13.4.235

Real-time hacking, detection and tracking ICT Convergence Security Solutions Test and Evaluation  

Kim, Seung-Bum (Dept. of Information Management, Graduate School of Venture, Hoseo University)
Yang, Hae-Sool (Dept. of Information Management, Graduate School of Venture, Hoseo University)
Publication Information
Journal of Digital Convergence / v.13, no.4, 2015 , pp. 235-246 More about this Journal
Abstract
Understanding the various unspecified hacking and repeated cyber DDoS attacks, finally was able to find a solution in the methods of attacks. Freely researching approach that combines the attacker and defender, offensive and defensive techniques can be called a challenge to discover the potential in whimsy. In this paper we test and evaluate "KWON-GA", global white hackers team has made by many years of experiences in infiltration and diagnosis under guise of offence is the best defence. And it is knowledge information ICT Convergence security solution which is developed for the purpose of defence, it provide customization policy that can be fit to customer's system environment with needed techniques and it is processed with unique proprietary technology so that it's not possible to scan. And even if it has leaked internally it's impossible to analyze so hackers can't analyze vulnerability, also it can't be abused as hacking tools.
Keywords
ICT Convergence; Knowledge and Information Protection; KWON-GA; penetration and diagnostics; unique technology;
Citations & Related Records
연도 인용수 순위
  • Reference
1 The 12th Conference of Defense Privacy and password Defense Security Command, pp. 34-61, pp. 113-124, 2014. 11. 07.
2 Four nemon Against Cybercrime scale embodied in expense reports. 2014.
3 Sung Jin Ahn, Kyung Ho Lee, Won Hyung Park. Study of Security Control pp183-245. 2013. 05.
4 NSHC 3.20 cyberterrorism incident reports, 2013.
5 NSHC 6.25 Cyber Terrorism Analysis Report, 2013.
6 CERT Insider Threat Center(2011). Insider Threat Control : Using a SIEM signature to detect potential precursors to IT Sabotage. 2011.
7 Jung Ho Eom, Sung Soo Choi, Tae Myung Jung, Introduction of Cyber Warfare, pp31-106, 2012.
8 Sang Yong Choi, Reconstruction of hacking incidents, pp. 287-324, 2013, 07.
9 Dae Woo Park, Theory of Network security, 2009.
10 Dae Woo Park, Jung Man Seo. "Research of Security method for TCP/IP attack", Journal of the Korea Computer Information Association, Vol. 10, No. 5 pp. 217-226. 2005, 11. 30.
11 Hoon Bae Gil, "A Study on Security Policy about PC communication", Master's thesis Graduate School of Polytechnic, Yonsei University, 1996.
12 CERT/Coordination Center, "CSIRT Frequently Asked Questions," Pittsburgh, Pa.:CMU/SEI, 2007.
13 Tae Myung Jung, CERT's functions and roles, education in course of operating CERT, 2002.
14 Internet Security / Web Hacking domestic hacking case http://www.ahnlab.com 2014. 05. 09.
15 Cuvepia Profile New Leader of Integrated Security Solution www.cuvepia.com(2013.04).