Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

A study on the live forensic techniques for anomaly detection in user terminals

Authors
Kim, A.C.Park, W.H.Lee, D.H.
Issue Date
2013
Keywords
Anomaly detection; Live forensics; Malware; User terminals
Citation
International Journal of Security and its Applications, v.7, no.1, pp.181 - 188
Indexed
SCOPUS
Journal Title
International Journal of Security and its Applications
Volume
7
Number
1
Start Page
181
End Page
188
URI
https://scholar.korea.ac.kr/handle/2021.sw.korea/106010
ISSN
1738-9976
Abstract
Digital forensics techniques that have been used to analyze system intrusion incidents traditionally are used to detect anomaly behavior that may occur in the user terminal environment. Particularly, for the method to analyze user terminals, automated live forensics techniques that are used as supporting tool for malicious code (malware) detection. We suggest a way to take advantage of the live forensic techniques for the anomaly detection of malware.
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Dong Hoon photo

Lee, Dong Hoon
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE