Browse > Article
http://dx.doi.org/10.6109/jkiice.2015.19.6.1374

A Study on Feature Extraction and Response Technology of Zombie Smartphone  

Lee, Daesung (Department of Computer Engineering, Catholic University of Pusan)
Abstract
Malicious network attacks such as DDoS has no clear measures, the damage is also enormous. In particular, in addition to a network failure, such as leakage of personal information and damage of the communication charge in the case of zombie smartphone is infected, is expected damages of various users. In this study, we extract the zombie smartphone's phenomena and features that appear while the zombie service is running and introduce a corresponding technique to prevent zombie smartphone.
Keywords
Zombie Smartphone; Zombie PC; Distributed Denial of Service; Feature Extraction;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Arun Raj Kumar, P. and S. selvakumar, "Distributed Denial of Service(DDoS) Threat in Collaborative Environment A Survey on DDoS Attack Tools and Traceback Mechanisms", IEEE International Advance Computing conference(IACC 2009), Mar, 2009.
2 Ki-Hun Jang, Heung-Yul Hyum, "The Intrusion Path and Threat Analysis of Smartphone", Korea Institute of Information Security Autumn Conf., pp 238 - 244, Oct, 2010.
3 Yong-Hui Jun, Jong-Soo Jang, Jin-Tae Oh, “DDoS Attack and Response Method”, Korea Institute of Information Security, Vol. 19, No. 3, pp 46 ~ 57, June, 2009.
4 Jae-Nam Woo, Bok-Ki Lee, Android Programming, 1st ed. Hanbit Media, Inc. 2012.
5 http://www.gartner.com/technology/home.jsp
6 Sang-Myung Choi, “Zombie Smartphone and DDoS Attack,” Hauri, Technical Report, 2012.
7 Ki-Hun Jang, "A Study on Smartphone DDoS Attack Detection and Response System via Source-End Based Packet Monitoring", M.S Degree. dissertation, Soonchunhyang Univ., 2012.
8 Ho-Kyu Maeng, Tae-Won Oh, “Model for Personal Information Protection from Smartphone Synchronization ”, Korea Computer Domestic Conference Vol 38, No.1(D). pp 44~47, 2011.
9 Ki-Hun Jang, Sang-Myung Choi, Heung-Yul Hyum, “The Attack Trend of Smartphone DDoS”, Journal of Korea Institute of Information Security Vol. 21, No. 5, pp 65 ~ 70, 2011.
10 National Information Society Agency, “Security Issue and Response Strategy of Smartphone and Mobile Office,” CIO Report, 2010.