• Title/Summary/Keyword: 스마트폰 좀비

Search Result 9, Processing Time 0.026 seconds

Response Guide of Smart-Phone Malware Using PC (PC를 이용한 스마트폰 악성코드 대응)

  • Yoon, Poong-Sik;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.8
    • /
    • pp.1835-1841
    • /
    • 2013
  • With the increase in smartphone users, attacks targeting smartphone malware, zombie smartphone, such as smart phones is increasing. Security of smart phones is more vulnerable than PC security, for a zombie smartphone and generates a serious problem than the zombie PC attack on the smartphone every day is diversification. In this paper, the comparative analysis of malicious code and smartphone DDoS attacks and DDoS attacks from the PC, When using a service by connecting to the data network, proposes a method for users to confirm the packet smartphone direct a method for detecting by using the PC malware Smart PC Phone. Propose the measures of malicious code and smartphone DDoS attacks.

A Study on Feature Extraction and Response Technology of Zombie Smartphone (좀비 스마트폰 특징 추출 및 대응기술 연구)

  • Lee, Daesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.6
    • /
    • pp.1374-1379
    • /
    • 2015
  • Malicious network attacks such as DDoS has no clear measures, the damage is also enormous. In particular, in addition to a network failure, such as leakage of personal information and damage of the communication charge in the case of zombie smartphone is infected, is expected damages of various users. In this study, we extract the zombie smartphone's phenomena and features that appear while the zombie service is running and introduce a corresponding technique to prevent zombie smartphone.

A Study on Feature Extraction of Zombie Smartphone (좀비 스마트폰 특징 추출에 관한 연구)

  • Lee, Daesung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.222-223
    • /
    • 2015
  • Malicious network attacks such as DDoS is no clear preparedness, the damage is also a bar. In particular, when a smartphone is infected to the zombies, the damage such as communication fee billing and leakage of personal information with numerous network failures are expected. In this study, with reference of the features that appear in a zombie PC we extract the zombie smartphone's phenomena and features that appear while the zombie service is running.

  • PDF

스마트폰 DDoS 공격 동향

  • Jang, Ki-Hun;Choi, Sang-Myung;Youm, Heung-Youl
    • Review of KIISC
    • /
    • v.21 no.5
    • /
    • pp.65-70
    • /
    • 2011
  • 스마트폰 시장이 전체 모바일 시장에서 큰 비중을 차지하고 있으며, 사용자 수는 급격하게 증가하고 있다. 스마트폰은 다양한 인터페이스 및 기능 등 기존 휴대폰과는 차별화된 장점을 가지고 있으며, 사용자의 취향에 따라 어플리케이션 설치 및 제거가 가능하다. 또한 신용정보, 인증서, 전화번호부 등 다양한 개인정보를 저장하고 있으며, 업무용으로도 사용되고 있다. 이러한 정보를 저장하고 있는 스마트폰에는 다양한 보안 위협이 존재하고 있으며, 개인 및 기업에게 치명적인 피해를 발생 시킬 수 도 있다. 특히 스마트폰을 이용한 DDoS 공격은 기존 DDoS(Distributed Denial of Service) 공격과 비슷하지만 스마트폰만이 가지고 있는 환경 때문에 여러 가지 다른 특정을 보인다. 본 논문에서는 기존 DDoS 공격 기법 및 동향을 알아보고, 좀비 스마트폰과 좀비 PC의 환경을 비교 분석함으로써 스마트폰 DDoS 공격 동향을 살펴본다.

A Study of DDoS Attack and Malicious Code Countermeasures for Smartphone (스마트폰 DDoS 공격과 악성코드에 관한 대응책 연구)

  • Choi, Woo-Seok;Han, Seung-jo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.896-899
    • /
    • 2012
  • 현재 스마트폰 사용자가 급증하면서 통계적으로 국민 1인당 1대의 스마트폰 혹은 태블릿PC를 사용하고 있는 것으로 집계되고 있다. 스마트폰 이용자가 증가함에 따라 보안에 대한 위협도 증가하고 있다. 실제 좀비 스마트폰에 대한 좀비 악성코드에 감염된 사례도 있으며 본 논문에서는 PC를 이용한 기존의 DDoS(Distributed Denial of Service)공격과 스마트폰을 이용한 DDoS공격 기법의 공격을 살펴보고, 스마트폰의 패킷을 캡쳐하여 Wi-fi 데이터망에서 앱 실행이나 웹에 접속 할 때 어떤 패킷이 나가고 들어오는지 확인하는 방법을 소개하며, 스마트폰 DDoS 공격 등의 악성코드에 대한 대응책을 제시한다.

Implementation of the Smombie (smartphone zombie) VR experience game using Google Cardboard and Bluetooth controller (구글 카드보드와 블루투스 컨트롤러를 이용한 스몸비(스마트폰 좀비) VR 체험 게임)

  • Kim, Ji-hyun;Seo, Mi-hye;Yang, Seon-young;Lee, Bo-hyun;Jin, I-seul;Park, Su e;Park, Jung-kyu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.212-215
    • /
    • 2017
  • In this paper, VR game was produced to inform the danger of using smartphone while walking and to raise awareness. In this VR games, you can experience Smombie (smart phone and zombie compound word) like a real situation by using Google card board and Bluetooth controller. Designed as a directions game of everyday material, the user indirectly experiences the dangerous situations that may actually occur in everyday life. In the virtual space, you can see the map on the smartphone, navigate the route, and send text messages using the controller during the game. We will explain how to implement smartphone map and send text message using controller which are the main functions of VR game.

  • PDF

Model for personal information protection from smart phone synchronization (스마트폰 동기화의 개인정보 유출방지 모델)

  • Maeng, Ho-Kyu;Oh, Tae-Won
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06d
    • /
    • pp.44-47
    • /
    • 2011
  • 본 연구는 스마트폰 사용자들의 개인정보유출 경로와 스마트폰과 PC에서 동기화가 이뤄질 때 개인정보 유출 방지에 관하여 기술한다. 스마트폰에서 노트북이나 데스크탑 PC로 동기화시킨 후 로컬 컴퓨터 내에 남아있는 스마트폰 사용자의 모든 정보는 침입자들의 정보라고 하여도 과언이 아니다. 특히 스마트폰 사용자의 PC가 DDos에 감염된 좀비 PC라면 스마트폰 사용자의 취약성은 더욱 더 높아질 것이다. 최근 OTP카드의 프로그램을 만드는 최고 보안등급을 가진 RSA사 조차도 해킹을 당했다고 한다. 스마트폰 사용자들의 개인정보는 더욱 취약하다는 것을 반증하는 것이다. 본 연구에서는 개인정보 유출을 막기위해 동기화 후 PC에 남아있는 데이터를 처리하는 방법을 제안한다.

A Study of Client Side Defence Method of UDP/ICMP Attack (UDP/ICMP 플러딩 공격에 대한 클라이언트 측 방어 기법 연구)

  • Kim, Dong-Hoon;Lee, Ki-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.667-669
    • /
    • 2012
  • Traditional DDoS defence methods are performed at server side which was attacked. If servers detect DDoS attack, they use some methods for defending the attack such as increasing the bandwidth, bypassing the traffic, blocking the IP addresses or blocking the ports by the firewall. But as lots of people use smart-phones, it is possible a smart-phone to be a zombie and DDoS attack could be much more a huge and powerful forms than now. Victims are not only a server but also a host which becomes a zombie. While it performs DDoS attack, zombie smart-phone users have to pay the extra charge. After finish the attack, DDoS try to destroy hard drives of zombie hosts. Therefore the situation is changed rather than to defend DDoS server side only, we should protect a client side who needs to prevent DDoS attacks. In this paper, we study a defence method that we terminates a process which perform the attack, send the information to different hosts when a zombie PC or smart-phone perform DDoS attacks.

  • PDF

The Techno-mediated Rebirth of Young Precariat's Working Conditions Today (동시대 청년 알바노동의 테크노미디어적 재구성)

  • Lee, Kwang-Suk
    • Korean journal of communication and information
    • /
    • v.83
    • /
    • pp.157-185
    • /
    • 2017
  • The present study examines the dialectic tensions arising within the ICT-mediated labor culture between the dominant power of conglomerates and the precarious labor subjects in the labor practices, as smartphones and tablet PCs have grown in popularity. The present study explores how much young precarious workers named 'Cheongyeon Alba' (young precariat in S Korea) suffers from continually precarious job positions as temporary staff or contract workers, being trapped at the bottom of the pay scale, and also being electronically connected to the workplace in a seamless way. Concretely, this study investigates how the mobile phone becomes deeply entangled with the 'precarious' labor culture in the metropolitan city of Seoul. The mobile precariat has been in a disadvantaged position, in terms not only of the moral issue of exploitation in business but also of social injustice. Labor exploitation of young workers has been reinforced by the mobile labor culture, in which they are remotely monitored by live surveillance mobile apps, and mobile instant messaging from a boss can intrude incessantly into their private life. This study depicts the extension of the business's surveillant power by mobilizing the mobile phone in the working practices.

  • PDF