원문정보
초록
영어
A smart phone is closely related to our lives throughout the world. It processes and stores various information from personal information to classified information of companies. As it is called as “a PC in my hand,” it is similar to a PC so that it is likely to be misused, being exposed to many security threats such as hacking, malicious code, and loss, just like the DDoS attack on PC. A hacker can control a smart phone through a number of zombie smart phone instructions, even shutting down the service on the server. However, it is difficult to adapt the PC defense system to the smart phone environment as is because the attack methods on a PC and a smart phone are different. Therefore, this study aims to compare and analyze DDoS attacks on the smart phone environment and PC environment to predict DDoS attack scenario on the smart phone and establish a defense system to reduce the damage.
목차
1. Introduction
2. DDoS Attack and Smart Phone Attack Tendency
2.1. Existing DDoS Attack Tendency
2.2. Tendency Threats to Smart Phones
2.3. Tendency of DDoS Attacks on PC and Smart Phone
3. Approaches to Detect Malicious Codes Aimed at the Smart Phone
4. SCIT Self-Cleansing Intrusion Tolerance
5. Conclusion
References