earticle

논문검색

A Study on Responding to DDoS Architecture in Smart Phone Environment

초록

영어

A smart phone is closely related to our lives throughout the world. It processes and stores various information from personal information to classified information of companies. As it is called as “a PC in my hand,” it is similar to a PC so that it is likely to be misused, being exposed to many security threats such as hacking, malicious code, and loss, just like the DDoS attack on PC. A hacker can control a smart phone through a number of zombie smart phone instructions, even shutting down the service on the server. However, it is difficult to adapt the PC defense system to the smart phone environment as is because the attack methods on a PC and a smart phone are different. Therefore, this study aims to compare and analyze DDoS attacks on the smart phone environment and PC environment to predict DDoS attack scenario on the smart phone and establish a defense system to reduce the damage.

목차

Abstract
 1. Introduction 
 2. DDoS Attack and Smart Phone Attack Tendency 
  2.1. Existing DDoS Attack Tendency
  2.2. Tendency Threats to Smart Phones
  2.3. Tendency of DDoS Attacks on PC and Smart Phone
 3. Approaches to Detect Malicious Codes Aimed at the Smart Phone
 4. SCIT Self-Cleansing Intrusion Tolerance 
 5. Conclusion
 References

저자정보

  • Mi-Ran Han Graduate School of Software, Soongsil University, Seoul 156-743, Korea
  • Young-Chul Oh Department of IT Policy and Management, Soongsil University, Seoul 156-743, Korea
  • Jong-Bae Kim Graduate School of Software, Soongsil University, Seoul 156-743, Korea

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.