전자우편을 이용한 악성코드유포방법 분석 및 탐지에 관한 연구
DC Field | Value | Language |
---|---|---|
dc.contributor.author | 양경철 | - |
dc.contributor.author | 이수연 | - |
dc.contributor.author | 박원형 | - |
dc.contributor.author | 박광철 | - |
dc.contributor.author | 임종인 | - |
dc.date.accessioned | 2021-09-08T21:57:00Z | - |
dc.date.available | 2021-09-08T21:57:00Z | - |
dc.date.created | 2021-06-17 | - |
dc.date.issued | 2009 | - |
dc.identifier.issn | 1598-3986 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/121076 | - |
dc.description.abstract | This paper proposes the detection method of spreading mails which hacker injects malicious codes to steal the information. And I developed the ‘Analysis model' which is decoding traffics when hacker’s encoding them to steal the information. I researched ‘Methodology of intrusion detection techniques’ in the computer network monitoring. As a result of this simulation, I developed more efficient rules to detect the PCs which are infected malicious codes in the hacking mail. By proposing this security policy which can be applicable in the computer network environment including every government or company, I want to be helpful to minimize the damage by hacking mail with malicious codes. | - |
dc.language | Korean | - |
dc.language.iso | ko | - |
dc.publisher | 한국정보보호학회 | - |
dc.title | 전자우편을 이용한 악성코드유포방법 분석 및 탐지에 관한 연구 | - |
dc.title.alternative | A Study on the Analysis and Detection Methodfor Protecting Malware Spreading via E-mail | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | 임종인 | - |
dc.identifier.bibliographicCitation | 정보보호학회논문지, v.19, no.1, pp.93 - 101 | - |
dc.relation.isPartOf | 정보보호학회논문지 | - |
dc.citation.title | 정보보호학회논문지 | - |
dc.citation.volume | 19 | - |
dc.citation.number | 1 | - |
dc.citation.startPage | 93 | - |
dc.citation.endPage | 101 | - |
dc.type.rims | ART | - |
dc.identifier.kciid | ART001323827 | - |
dc.description.journalClass | 2 | - |
dc.description.journalRegisteredClass | kci | - |
dc.subject.keywordAuthor | Malicious Code | - |
dc.subject.keywordAuthor | Detection Method | - |
dc.subject.keywordAuthor | IDS | - |
dc.subject.keywordAuthor | SNORT | - |
dc.subject.keywordAuthor | Security Policy | - |
dc.subject.keywordAuthor | Encrypted traffic | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
145 Anam-ro, Seongbuk-gu, Seoul, 02841, Korea+82-2-3290-2963
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.