원문정보
보안공학연구지원센터(IJSIA)
International Journal of Security and Its Applications
Vol.7 No.3
2013.05
pp.215-222
피인용수 : 0건 (자료제공 : 네이버학술정보)
초록
영어
Recently, the illegal users with malicious intention utilize the file sharing site by making normal user's computer a zombie computer, which is a preliminary process for network intrusion attack. The propose scheme is divided into the method for real-time analysis for real-time tracking and the method of cooperative analysis method for non-real time analysis. By allowing the supervisors to choose the relevant analysis method selectively, we can conduct variable analysis depending on the network threat.
목차
Abstract
1. Introduction
2. Overview on Technology
3. Analyzing the Existing Schemes
4. File Multi-analysis for Real-time attack source and spread site trace
4.1. Assumptions
4.2. File Multi-analysis for real-time attack source and spread site trace
5. Analysis of the proposed scheme
5.1. Security Analysis
5.2. Implementation
6. Conclusions
Acknowledgements
References
1. Introduction
2. Overview on Technology
3. Analyzing the Existing Schemes
4. File Multi-analysis for Real-time attack source and spread site trace
4.1. Assumptions
4.2. File Multi-analysis for real-time attack source and spread site trace
5. Analysis of the proposed scheme
5.1. Security Analysis
5.2. Implementation
6. Conclusions
Acknowledgements
References
저자정보
참고문헌
자료제공 : 네이버학술정보