Browse > Article
http://dx.doi.org/10.6109/jkiice.2013.17.8.1835

Response Guide of Smart-Phone Malware Using PC  

Yoon, Poong-Sik (Department of Information and Communication Engineering, Chosun University)
Han, Seung-Jo (Department of Information and Communication Engineering, Chosun University)
Abstract
With the increase in smartphone users, attacks targeting smartphone malware, zombie smartphone, such as smart phones is increasing. Security of smart phones is more vulnerable than PC security, for a zombie smartphone and generates a serious problem than the zombie PC attack on the smartphone every day is diversification. In this paper, the comparative analysis of malicious code and smartphone DDoS attacks and DDoS attacks from the PC, When using a service by connecting to the data network, proposes a method for users to confirm the packet smartphone direct a method for detecting by using the PC malware Smart PC Phone. Propose the measures of malicious code and smartphone DDoS attacks.
Keywords
SmartPhone Security; SmartPhone DDoS; Zombie SmartPhone; SmartPhone MalignantCode;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Arun Raj Kumar, P. and S. Selvakumar, "Distributed Denial-of-Service Threat in Collaborative Environment A Survey on DDoS Attack Tools and Traceback Mechanisms", IEEE International Advance Computing Conference 2009
2 C-J Ryu, K-H Han, "A Study on the Security Research about Botnet Attack Detection Interception" KICS, 2010.
3 K-H Jang, S-M Choi, H-Y Yeom "Smartphone DDoS Attack Trends", KIISC, 2011
4 S-W Lee, "DDoS Attack Change and Forward", Financial Security Agency Issue Report Vol.2011-004, 2011.
5 G-Y Kim, S-J Cho, "Security Vulnerability Trends in Smartphones", KIISE Fall Conference, Vol.37, No.2 pp.90-91, 2010.
6 W-S Choi, S-J Han "A Study of DDOS Attack and Malicious code Countermeasures for Smart Phone", KIPS C2012J 0153, Fall Conference 2012.
7 Bud Smith, "How to do Everthing Nexus One", 2010.
8 Ken Dunham, "Mobile Malware attacks and Defense", SYNGRESS, 2009.
9 G Carl, G Kesidis, RR Brooks, S Rai, "Denial of serviceattack detection techniques", IEEE Internet Computing, pp.82-89, 2006.
10 Felix Lau, stuart H. Rubin, Michael H. Smith, Ljiljana Trajkovic, "Distributed Denial of Service Attacks", 2000 IEEE International Conference on Systems, Man and Cybernetics, Volume, pp.2275-2280, 2000.