On-site investigation methodology for incident response in Windows environments
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Keungi | - |
dc.contributor.author | Lee, Changhoon | - |
dc.contributor.author | Lee, Sangjin | - |
dc.date.accessioned | 2021-09-06T02:01:22Z | - |
dc.date.available | 2021-09-06T02:01:22Z | - |
dc.date.created | 2021-06-18 | - |
dc.date.issued | 2013-05 | - |
dc.identifier.issn | 0898-1221 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/103354 | - |
dc.description.abstract | In recent years, various computers have been compromised through several paths. In particular, the attack patterns and paths are becoming more various than in the past. Furthermore, systems damaged by hackers are used as zombie systems to attack other web servers or personal computers, so there is a high probability to spread secondary damage such as DDoS. Also, previously, hacking and malicious code were carried out for self-display or simple curiosity, but recently they are related to monetary extortion. In order to respond to incidents correctly, it is important to measure the damage to a system rapidly and determine the attack paths. This paper will discuss an on-site investigation methodology for incident response and also describe the limitations of this methodology. (c) 2012 Elsevier Ltd. All rights reserved. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | PERGAMON-ELSEVIER SCIENCE LTD | - |
dc.title | On-site investigation methodology for incident response in Windows environments | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, Sangjin | - |
dc.identifier.doi | 10.1016/j.camwa.2012.01.029 | - |
dc.identifier.scopusid | 2-s2.0-84877751992 | - |
dc.identifier.wosid | 000320291500019 | - |
dc.identifier.bibliographicCitation | COMPUTERS & MATHEMATICS WITH APPLICATIONS, v.65, no.9, pp.1413 - 1420 | - |
dc.relation.isPartOf | COMPUTERS & MATHEMATICS WITH APPLICATIONS | - |
dc.citation.title | COMPUTERS & MATHEMATICS WITH APPLICATIONS | - |
dc.citation.volume | 65 | - |
dc.citation.number | 9 | - |
dc.citation.startPage | 1413 | - |
dc.citation.endPage | 1420 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Mathematics | - |
dc.relation.journalWebOfScienceCategory | Mathematics, Applied | - |
dc.subject.keywordAuthor | Digital forensics | - |
dc.subject.keywordAuthor | Rapid investigation | - |
dc.subject.keywordAuthor | On-site investigation | - |
dc.subject.keywordAuthor | Live forensics | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.