Browse > Article
http://dx.doi.org/10.15207/JKCS.2015.6.1.085

A Scheme of Social Engineering Attacks and Countermeasures Using Big Data based Conversion Voice Phishing  

Kim, Jung-Hoon (Division of Information & Communication, Baekseok University)
Go, Jun-Young (Division of Information & Communication, Baekseok University)
Lee, Keun-Ho (Division of Information & Communication, Baekseok University)
Publication Information
Journal of the Korea Convergence Society / v.6, no.1, 2015 , pp. 85-91 More about this Journal
Abstract
Recently government has distributed precautionary measure and response procedures for smishing(SMS phishing), pharming, phishing, memory hacking and intensified Electronic Financial Transaction Act because of the sharp increase of electronic bank frauds. However, the methods of electronic bank frauds also developed and changed accordingly so much it becomes hard to cope with them. In contrast to earlier voice phishing targeted randomizing object, these new methods find out the personal information of targets and analyze them in detail making a big data base. And they are progressed into new kind of electronic bank frauds using those analyzed informations for voice phishing. This study analyze the attack method of voice phishing blended with the Big Data of personal informations and suggests response procedures for electronic bank frauds increasingly developed. Using the method to save meaningless data in a memory, attackers cannot deduct accurate information and try voice phishing properly even though they obtain personal information based on the Big Data. This study analyze newly developed social technologic attacks and suggests response procedures for them.
Keywords
Smishing; Pharming; Phishing; Big Data; Convergence; Electronic banking Fraud;
Citations & Related Records
Times Cited By KSCI : 13  (Citation Analysis)
연도 인용수 순위
1 Young-Arm Kwak, "A Study on Smartphone's Phishing Cases and Security", KECRA, Vol. 14, No. 1, pp. 3-22, 2013.
2 Hong-Ryeol Ryu, Mo-Ses Hong, Taek-Young Kwon, "A Study of Multiple Password Leakage Factors Caused by Phishing and Pharming Attacks", KIISC, Vol. 23, No. 6, pp. 1225-1229, 2013.   과학기술학회마을   DOI   ScienceOn
3 Ji-Sun Shin, "Study on Anti-Phishing Solutions, Related Researches and Future Directions", KIISC, Vol. 23, no. 6, pp. 1037-1047, 2013.   과학기술학회마을   DOI
4 Byung-Seok Yu, Sung-Hyun Yun, "The Design and Implementation of Messenger Authentication Protocol to Prevent Smartphone Phishing", KCS, Vol. 2, No. 4, pp. 99-14, 2011.   과학기술학회마을
5 Jae-Saeng Kim, "Big data analysis Technologies and practical examples", KOCON, Vol. 12, No. 1, pp. 14-20, 2014.   과학기술학회마을
6 Ho-Dae Cho, "Voice Phishing Occurrence and Counterplan", KOCON, Vol. 12, No. 7, pp. 176-182, 2012.   과학기술학회마을   DOI
7 Si-Young Lee, Hee-Soo Kang, Jong-Sub Moon, "A Study on Smishing Block of Android Platform Environment", KIISC, Vol. 24, No. 5, pp. 975-985, 2014.   과학기술학회마을   DOI
8 Dea-Woo Park, "Analysis on Mobile Forensic of Smishing Hacking Attack", JKIICE, Vol. 18, No. 12. pp. 2878-2884, 2014.   과학기술학회마을   DOI
9 Seung-hyun Kim, "A financial institution that is targeted phishing / pharming attacks Technology Trends", IEEK, Vol. 6, No. 3. pp. 40-48, 2013.
10 Dae-Yong Jeong, Kyung-bok Lee, Tae-Hyoung Park, "A Study on Improving the Electronic Financial Fraud Prevention Service: Focusing on an Analysis of Electronic Financial Fraud Cases in 2013", JKIICE, Vol. 24, No. 6. pp. 1243-1261, 2014.   과학기술학회마을   DOI
11 In-woo Park, Dea-woo Park, "A Study of Intrusion Security Research and Smishing Hacking Attack on a Smartphone", JKIICE, Vol. 17, No. 11. pp. 2584-2594, 2013.   과학기술학회마을   DOI
12 Choon-Kyon Joo, Ji-Won Yoon, "Discrimination of SPAM and prevention of smishing by sending personally identified SMS(For financial sector)", JKIICE, Vol. 24, No. 4. pp. 645-653, 2014.   과학기술학회마을   DOI
13 Seung-Min Rho, "Big Data Analysis Platform Technology R&D Trend through Patent Analysis", Journal of Digital Convergence, Vol. 12, No. 9, pp. 169-175, 2014.   과학기술학회마을   DOI
14 Byung-Chul Kim, "A study on Utilization of Big Data Based on the Personal Information Protection Act", Journal of Digital Convergence, Vol. 12, No. 12. pp. 87-92, 2014.   과학기술학회마을   DOI
15 Jung-Young Ki, Seok-Myoung Gun, Gim-Chang Jae "A study on the success factors of Big Data through an analysis of introduction effect of Big Data", Journal of Digital Convergence, Vol. 12, No. 11. pp. 241-248, 2014.   과학기술학회마을   DOI