Browse > Article
http://dx.doi.org/10.5762/KAIS.2015.16.12.8908

A Implement of Integrated Management Systems for User Fraud Protection and Malware Infection Prevention  

Min, So-Yeon (Department of Information and Communication, Seoil University)
Cho, Eun-Sook (Department of Computer Software, Seoil University)
Jin, Byung-Wook (Department of Computer Science, Soongsil University)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.16, no.12, 2015 , pp. 8908-8914 More about this Journal
Abstract
The Internet continues to grow and develop, but there are going to generate a variety of Internet attacks that exploit it. In the initial Internet environment, the attackers maliciously exploited Internet environments for ostentations and hobbies. but these days many malicious attempts purpose the financial gain so systematic and sophisticated attacks that are associated with various crimes are occurred. The structures, such as viruses and worms were present in the form of one source multi-target before. but recently, APT(Advanced Persistent Threat, intelligent continuous attacks) in the form of multi-source single target is dealing massive damage. The performance evaluation analyzed whether to generate audit data and detect integrity infringement, and false positives for normal traffic, process detecting and blocking functions, and Agent policy capabilities with respect to the application availability.
Keywords
Integrated Management; Malware Infection Prevention; User Fraud Protection;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Saint Security, Malware analysis report, malwares.com, 2015. 7. 13
2 Jae-Kyung Park, A Realtime Malware Detection Technique Using Multiple Filter, KSCI, Vol.19, No. 7. 2014. 7.
3 Jaeho Lee, Sangjin Lee, A Study on Unknown Malware Detection using Digital Forensic Techniques, , JKIISC, Vol24, No. 1, 2014. 2.
4 JesseBurns,"DevelopingSecureMobileApplications forAndroid:AnintroductiontomakingsecureAndroidapplications",Dec2009.
5 A.Shabtai,Y.FledelandU.Kanonov,Y.EloviiandS.Dolev. "GoogleAndroid:AState - of - the -ArtReview of Security Mechanisms . " IEEE SecurityandPrivacy,vol.8,issue2,pp.35-442010.
6 James M. Aquilina, Eoghan Casey, Cameron H. Malin, MalwareForensics-InvestigatingandAnalyzingMaliciousCode", 2008.
7 Brett Stone-Gross, Ryan Abman, Richard A. Kemmerer, ChristopherKruegel,DouglasG.Steigerwald,andGiovanniV igna, "TheUndergroundEconomyofFakeAntivirusSoftware", 2012.
8 Sang Min Lee, Hwa Sun Kim, Hune Cho, "Study on OWL-based database built for the efficient operation of human resources bank," Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology, Vol.5, No.3, pp.55-64, June 2015. DOI: http://dx.doi.org/10.14257/AJMAHS.2015.06.27
9 Sattarova Feruza, "Secure Multi-Party Computation in Networks Over A Cross Domain Privacy Preserving Firewall Optimization," Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology, Vol.1, No.1, pp.91-98, Dec. 2011. DOI: http://dx.doi.org/10.14257/AJMAHS.2011.12.06
10 Zita Maria Almeida do Vale, Carlos Ramos, Rosslin John Robles, "Effective Use of Multiple Random Walks in P2P Networks," Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology, Vol.4, No.1, pp.1-8, June 2014. DOI: http://dx.doi.org/10.14257/AJMAHS.2014.06.04   DOI
11 Farkhod Alisherov, "The Security in the Vehicular Ad Hoc Network (VANET) Using Expedite Message Authentication Protocol (EMAP)," Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology, Vol.1, No.1, pp.99-106, Dec. 2011. DOI: http://dx.doi.org/10.14257/AJMAHS.2011.12.03
12 Chul-Woo Park, Ji-Woong Son, Hyun-Ki Hwang, Ki-Chang Kim, "Detection of systems infected with C&C Zeus through technique of Windows API hooking," Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology, Vol.5 No.2, pp.297-304, April 2015. DOI: http://dx.doi.org/10.14257/AJMAHS.2015.04.11