Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

전자우편을 이용한 악성코드유포방법 분석 및 탐지에 관한 연구

Full metadata record
DC Field Value Language
dc.contributor.author양경철-
dc.contributor.author이수연-
dc.contributor.author박원형-
dc.contributor.author박광철-
dc.contributor.author임종인-
dc.date.accessioned2021-09-08T21:57:00Z-
dc.date.available2021-09-08T21:57:00Z-
dc.date.created2021-06-17-
dc.date.issued2009-
dc.identifier.issn1598-3986-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/121076-
dc.description.abstractThis paper proposes the detection method of spreading mails which hacker injects malicious codes to steal the information. And I developed the ‘Analysis model' which is decoding traffics when hacker’s encoding them to steal the information. I researched ‘Methodology of intrusion detection techniques’ in the computer network monitoring. As a result of this simulation, I developed more efficient rules to detect the PCs which are infected malicious codes in the hacking mail. By proposing this security policy which can be applicable in the computer network environment including every government or company, I want to be helpful to minimize the damage by hacking mail with malicious codes.-
dc.languageKorean-
dc.language.isoko-
dc.publisher한국정보보호학회-
dc.title전자우편을 이용한 악성코드유포방법 분석 및 탐지에 관한 연구-
dc.title.alternativeA Study on the Analysis and Detection Methodfor Protecting Malware Spreading via E-mail-
dc.typeArticle-
dc.contributor.affiliatedAuthor임종인-
dc.identifier.bibliographicCitation정보보호학회논문지, v.19, no.1, pp.93 - 101-
dc.relation.isPartOf정보보호학회논문지-
dc.citation.title정보보호학회논문지-
dc.citation.volume19-
dc.citation.number1-
dc.citation.startPage93-
dc.citation.endPage101-
dc.type.rimsART-
dc.identifier.kciidART001323827-
dc.description.journalClass2-
dc.description.journalRegisteredClasskci-
dc.subject.keywordAuthorMalicious Code-
dc.subject.keywordAuthorDetection Method-
dc.subject.keywordAuthorIDS-
dc.subject.keywordAuthorSNORT-
dc.subject.keywordAuthorSecurity Policy-
dc.subject.keywordAuthorEncrypted traffic-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE