earticle

논문검색

File Multi-analyses for Real-time Attack Source and Spread Site Trace

초록

영어

Recently, the illegal users with malicious intention utilize the file sharing site by making normal user's computer a zombie computer, which is a preliminary process for network intrusion attack. The propose scheme is divided into the method for real-time analysis for real-time tracking and the method of cooperative analysis method for non-real time analysis. By allowing the supervisors to choose the relevant analysis method selectively, we can conduct variable analysis depending on the network threat.

목차

Abstract
 1. Introduction
 2. Overview on Technology
 3. Analyzing the Existing Schemes
 4. File Multi-analysis for Real-time attack source and spread site trace
  4.1. Assumptions
  4.2. File Multi-analysis for real-time attack source and spread site trace
 5. Analysis of the proposed scheme
  5.1. Security Analysis
  5.2. Implementation
 6. Conclusions
 Acknowledgements
 References

저자정보

  • DaeHee Seo Electronics and Telecommunications Research Institute
  • SangWoo Lee Electronics and Telecommunications Research Institute
  • ByungDoo Kim Electronics and Telecommunications Research Institute
  • ByungGil Lee Electronics and Telecommunications Research Institute
  • JangMi Baek SoonChunHyang University

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.