Browse > Article
http://dx.doi.org/10.6109/jkiice.2021.25.9.1227

Cloud-based malware QR Code detection system  

Kim, Dae-Woon (Department of Information Security, Dong-Shin University)
Jo, Young-Tae (Department of Information Security, Dong-Shin University)
Kim, Jong-Min (Department of Information Security, Dong-Shin University)
Abstract
QR Code has been used in various forms such as simple business cards and URLs. Recently, the influence of Corona 19 Fundemik has led to the use of QR Codes to track travel routes through visits and entry / exit records, and QR Code usage has skyrocketed. In this way, most people have come to use it in the masses and are constantly under threat. In the case of QR Code, you do not know what you are doing until you execute it. Therefore, if you undoubtedly execute a QR Code with a malicious URL inserted, you will be directly exposed to security threats. Therefore, this paper provides a cloud-based malware QR Code detection system that can make a normal connection only when there is no abnormality after determining whether it is a malicious QR Code when scanning the QR Code.
Keywords
Cloud; QR code; Malware; Docker;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 QR Code standardization / standardization [Internet]. Available: https://www.qrcode.com/ko/about/standards.html.
2 E. C. Kim and S. I. Kim, "A Study on the the User Experience of Smartphone Camera Application," Journal of the Korea Convergence Society, vol. 8, no. 12, pp. 221-226, 2017.   DOI
3 E. Y. Oh. "A study on non-storage data recording system and non-storage data providing method by smart QR code," Journal of Convergence for Information Technology, vol. 9, no. 4, pp. 14-20, 2019.   DOI
4 QR Code information amount / version [Internet]. Available: https://www.qrcode.com/ko/about/version.html.
5 H. K. Yang, "A Study of Security Weaknesses of QR Codes and Its Countermeasures," The Journal of the Institute of Internet, Broadcasting and Communication, vol. 12, no. 1, pp. 83-89, 2012.   DOI
6 K. H. Bahn, J. W. Jung, and D. H. Won, "Counterplan of the XSS Attack to QR Code," Proceedings of the Korean Information Science Society Conference, vol. 38, no. 1, pp. 102-104, 2011.
7 T. S. Hur, "Database PasS web service system using Docker," Journal of the Korea Society of Computer and Information, vol. 25, no. 11, pp. 51-58, 2020.   DOI
8 H. S. Kim and S. J. Lee, "Method of Digital Forensic Investigation of Docker-Based Host," Korea Information Processing Society, vol. 6, no. 2, pp. 75-86, 2017.
9 M. S. Lee, M. S. Kang, I. H. Kim, and J. H. Kim, "Design and Performance Comparison of Docker Container Based Deep Learning Model Management System for Real-Time Analysis," Journal of Korean Institute of Communications and Information Sciences, vol. 46, no. 2, pp. 390-400, 2021.   DOI
10 Kubernetes Guide [Internet]. Available: https://subicura.com/2017/01/19/docker-guide-for-beginners-1.html.