Browse > Article
http://dx.doi.org/10.12673/jkoni.2013.17.6.816

A Study on Cloud Computing for Detecting Cyber Attacks  

Lee, Jun-Won (Division of Computer Engineering, Sungkyunkwan University)
Cho, Jae-Ik (Samsung Electronics)
Lee, Seok-Jun (Division of Computer Engineering, Ajou University)
Won, Dong-Ho (Division of Computer Engineering, Sungkyunkwan University)
Abstract
In modern networks, data rate is getting faster and transferred data is extremely increased. At this point, the malicious codes are evolving to various types very fast, and the frequency of occurring new malicious code is very short. So, it is hard to collect/analyze data using general networks with the techniques like traditional intrusion detection or anormaly detection. In this paper, we collect and analyze the data more effectively with cloud environment than general simple networks. Also we analyze the malicious code which is similar to real network's malware, using botnet server/client includes DNS Spoofing attack.
Keywords
Packed technique; Malicious code; Zombie client; Automatic analysis; Anti-malware;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Wayne A. Jansen, "Cloud Hooks: Security and Privacy Issues in Cloud Computing", 44th Hawaii International Conference on System Sciences 2011.
2 W. Jansen, and T. Grance, "Guidelines on Security and Privacy in Public Cloud Computing", January, 2011
3 SungKyong Eun, "Cloud Computing Security Technology", No.20-2, Review of KIISC, 2010.
4 Taehyung Kim, Inhyun Kim, Changwoo Min, Yeongik Eom, "The Trends of Cloud Computing Security Technology", No.30-1, Communications of the Korea Information Science Society, 2012.
5 Korea Communicaions Commission, MOSPA, MOTIE, 2011 National Information Security White Paper, p.305, 2011.
6 Boan News, "Enhancing the security of SNS is what we need to do", http://www.boannews.com/media/view.asp?idx=22775, Sep 2010.
7 Trend Micro 2011 Security News, http://kr.trendmicro.com/kr/about/events/eventcalendar/event/20110803045254.html, Aug 2011.
8 ITL-SANS KOREA, "Summary of Intelligent Persistence Hacking APT attack", May 2011.
9 Ahnlab Web Document, "[Special Report] Revealed APT attack secrets", Oct 2011.
10 Wenke Lee, Salvatore J. Stolfo, "A framework for constructing features and models for intrusion detection systems", ACM Trans. Inf. Syst. Secur. 3, 2000