A study on the live forensic techniques for anomaly detection in user terminals
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, A.C. | - |
dc.contributor.author | Park, W.H. | - |
dc.contributor.author | Lee, D.H. | - |
dc.date.accessioned | 2021-09-06T10:05:02Z | - |
dc.date.available | 2021-09-06T10:05:02Z | - |
dc.date.created | 2021-06-17 | - |
dc.date.issued | 2013 | - |
dc.identifier.issn | 1738-9976 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/106010 | - |
dc.description.abstract | Digital forensics techniques that have been used to analyze system intrusion incidents traditionally are used to detect anomaly behavior that may occur in the user terminal environment. Particularly, for the method to analyze user terminals, automated live forensics techniques that are used as supporting tool for malicious code (malware) detection. We suggest a way to take advantage of the live forensic techniques for the anomaly detection of malware. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.subject | Anomaly detection | - |
dc.subject | Digital forensic | - |
dc.subject | Live Forensics | - |
dc.subject | Malicious codes | - |
dc.subject | Malwares | - |
dc.subject | Supporting tool | - |
dc.subject | User terminals | - |
dc.subject | Computer crime | - |
dc.title | A study on the live forensic techniques for anomaly detection in user terminals | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, D.H. | - |
dc.identifier.scopusid | 2-s2.0-84877115294 | - |
dc.identifier.bibliographicCitation | International Journal of Security and its Applications, v.7, no.1, pp.181 - 188 | - |
dc.relation.isPartOf | International Journal of Security and its Applications | - |
dc.citation.title | International Journal of Security and its Applications | - |
dc.citation.volume | 7 | - |
dc.citation.number | 1 | - |
dc.citation.startPage | 181 | - |
dc.citation.endPage | 188 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordPlus | Anomaly detection | - |
dc.subject.keywordPlus | Digital forensic | - |
dc.subject.keywordPlus | Live Forensics | - |
dc.subject.keywordPlus | Malicious codes | - |
dc.subject.keywordPlus | Malwares | - |
dc.subject.keywordPlus | Supporting tool | - |
dc.subject.keywordPlus | User terminals | - |
dc.subject.keywordPlus | Computer crime | - |
dc.subject.keywordAuthor | Anomaly detection | - |
dc.subject.keywordAuthor | Live forensics | - |
dc.subject.keywordAuthor | Malware | - |
dc.subject.keywordAuthor | User terminals | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.