Browse > Article

Research on Mobile Malicious Code Prediction Modeling Techniques Using Markov Chain  

Kim, JongMin (경기대학교 산업보안학과)
Kim, MinSu (경기대학교 산업보안학과)
Kim, Kuinam J. (경기대학교 융합보안학과)
Publication Information
Abstract
Mobile malicious code is typically spread by the worm, and although modeling techniques to analyze the dispersion characteristics of the worms have been proposed, only macroscopic analysis was possible while there are limitations in predicting on certain viruses and malicious code. In this paper, prediction methods have been proposed which was based on Markov chain and is able to predict the occurrence of future malicious code by utilizing the past malicious code data. The average value of the malicious code to be applied to the prediction model of Markov chain model was applied by classifying into three categories of the total average, the last year average, and the recent average (6 months), and it was verified that malicious code prediction possibility could be increased by comparing the predicted values obtained through applying, and applying the recent average (6 months).
Keywords
Markov Chain; Mobile; Malicious Code; Prediction;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Qiang Yan, Robert H. Deng, Yingjiu Li, Tieyan Li, "On the Potential of Limitation-oriented Mal ware Detection and Prevention Techniques on Mobile Phones", International Journal of Security and Its Applications, Vol. 4, No. 1, 2010.
2 김호연, 장성수, 최영현, 정태명, "모바일 환경에서 악성코드 분석을 위한 효율적 동적 분석기법 연구", 한국정보처리학회 2011년도 제35회 춘계학술발표대회, 2011.
3 Seo, Seung-Hyun, Aditi Gupta, Asmaa Mohamed Sallam, Elisa Bertino, Kangbin Yim, "Detecting mobile malware threats to homeland security through static analysis", Journal of Network and Computer Applications, Volume 38, pp. 43-53, 2014.   DOI
4 유효선, "모바일오피스 구현- 보안대책마련'최우선'", Network Times, 2011. 3.
5 Cliff Changchun Zou, Weibo Gong, Don Towsley "Code Red Worm Propagation Modeling and Analysis", Conferrence on Computer and Comm unications Security, 2002.
6 D. J. Deley and J. Gani, "Epidemic Modeling: An Introduction", Cambridge university Press, 1999.
7 Charles M. Grinstead, "Introduction to Probability:Second Revised Edition", American Mathemati calSociety, pp405-406, 1997.
8 박원형, 김영진, 이동휘, 김귀남, "마코브 체인을 이용한 Mass SQL Injection 웜 확산 예측에 관한 연구", 정보보안논문지, 제8권 제4호, pp. 173-181, 2008.
9 한학용, "패턴 인식 개론", 한빛미디어, pp432-438, 2009.
10 http://www.ahnlab.com/kr/site/securitycenter/asec/asecReportList.do