Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

A Method of Detecting Abnormal Malicious Remote Control Codes using Network Domain Information

Full metadata record
DC Field Value Language
dc.contributor.authorOh, Hyung-Geun-
dc.contributor.authorSeo, Jung-Taek-
dc.contributor.authorLim, Jong In-
dc.contributor.authorMoon, Jong-sub-
dc.date.accessioned2021-09-06T20:14:06Z-
dc.date.available2021-09-06T20:14:06Z-
dc.date.created2021-06-18-
dc.date.issued2012-05-
dc.identifier.issn1343-4500-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/108493-
dc.description.abstractSince the malicious code used in the latest APT (Advanced Persistent Threat) attacks new, hitherto unknown security, vulnerabilities, it is almost impossible to detect with the conventional pattern-based information security system. Consequently, various targeted attacks such as internal data leakage and system demolition have inflicted great damage, thereby raising the need for a new concept of malicious code detection. This paper proposes a new method of detecting abnormal connections by observing the status of connection of an attack system connected to a target system over the network. This method can detect the connection of new malicious codes very efficiently using only the existing network data, and can intercept the leakage of internal data or the transfer of attack commands.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherINT INFORMATION INST-
dc.titleA Method of Detecting Abnormal Malicious Remote Control Codes using Network Domain Information-
dc.typeArticle-
dc.contributor.affiliatedAuthorLim, Jong In-
dc.contributor.affiliatedAuthorMoon, Jong-sub-
dc.identifier.scopusid2-s2.0-84863213413-
dc.identifier.wosid000305592200031-
dc.identifier.bibliographicCitationINFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, v.15, no.5, pp.2181 - 2192-
dc.relation.isPartOfINFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL-
dc.citation.titleINFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL-
dc.citation.volume15-
dc.citation.number5-
dc.citation.startPage2181-
dc.citation.endPage2192-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalWebOfScienceCategoryEngineering, Multidisciplinary-
dc.subject.keywordAuthorRemote Control Malware-
dc.subject.keywordAuthorAbnormal Malicious Code-
dc.subject.keywordAuthorDomain Name Information-
dc.subject.keywordAuthorAbnormal Network Connection-
dc.subject.keywordAuthorExtrusion Detection-
dc.subject.keywordAuthorIntrusion Detection-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles
College of Science and Technology > Department of Electronics and Information Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE