DOI QR코드

DOI QR Code

A Scheme on Anomaly Prevention for Systems in IoT Environment

사물인터넷 환경에서 시스템에 대한 비정상행위 방지 기법

  • Lee, Keun-Ho (Div. of Information Communication Technology, BaekSeok University)
  • Received : 2019.10.22
  • Accepted : 2019.12.17
  • Published : 2019.12.31

Abstract

Entering the era of the 4th Industrial Revolution and the Internet of Things, various services are growing rapidly, and various researches are actively underway. Among them, research on abnormal behaviors on various devices that are being used in the IoT is being conducted. In a hyper-connected society, the damage caused by one wrong device can have a serious impact on the various connected systems. In this paper, We propose a technique to cope with the problem that the threats caused by various abnormal behaviors such as anti-debugging scheme, anomalous process detection method and back door detection method on how to increase the safety of the device and how to use the device and service safely in such IoT environment.

Acknowledgement

Supported by : 백석대학교

References

  1. J.W.Park and Y.S,Park, "An automatic detection scheme of anti-debugging routines to the environment for analysis," Proc. Control Conference, p.2, 2014.
  2. H.M.Kwak, T.H.Lee, G.N.Kim, J.W.Cho and K.H.Lee, "A Scheme for Avoidance through Anti-debugging Program", The Korea Internet of Things Society Comprehensive Conference 2019, Vol.4, No.1, pp.55-57, 2019.
  3. p3ngdump's study blog. p3ngdump, June. 15. 2016, "https://p3ngdump.tistory.com/56".
  4. H.N.Kim, "Real-time hybrid analysis based on multiple profile for prevention of malware,"Hongik University Graduate School: Department of Information Security, 2014.
  5. JH.Choi, K.H.Lee and S.H.Yun, "Abnormal Process Detection Using Blockchain", The Korea Internet of Things Society Comprehensive Conference 2019, Vol.4, No.1, pp.67-68, 2019.
  6. E.G.Hong, S.J.Lee and S.H.Seo, "Blockchain Technology Trends for the Internet of Things", Journal of Information Security, Vol.9, No.1, pp.38-46, 2018.
  7. J.H.Choi, K.H.Lee and S.H.Yun, "Abnormal Process Detection Using Blockchain", The Korea Internet of Things Society Comprehensive Conference 2019, Vol.4, No.1, pp.67-68, 2019.
  8. H.Y.Kim, "Analysis of Security Threats and Countermeasures on Blockchain Platforms," Korean Institute of Information Technology, Vol.16, No.5, pp.103-112, 2018.
  9. H.J.Chu, I.H.Song and B.G.Choi, "A Decentralized Test Management Tool Based on Blockchain Technique," The Korean Institute of Information Scientists and Engineers, Vol.25, No.7, pp.321-328, 2019.
  10. J.H.Hong, K.H.Lee and S.H.Yun, "A Scheme for ECU Application Technique using Blockchain", The Korea Internet of Things Society Comprehensive Conference 2019, Vol.4, No.1, pp.34-35, 2019.
  11. T.Hardjono and N.Smith. "Cloud-based commissioning of constrained devices using permissioned blockchains." IoTPTS '16 Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security. ACM, 2016.
  12. J.H.Yang and K.H.Lee, "A Scheme for Application of Internet of Things and Blockchain Technology", The Korea Internet of Things Society Comprehensive Conference 2019, Vol.4, No.1, pp.75-76, 2019.
  13. J.T.Kim, J.H.Kho, M.S.Hong, C.W Son, B.Park, D.W.Lee and G.Lee "A Study on Intrusion Protection Techniques against Linux Kernel Backdoor", The Journal of The Institute of Webcasting, Internet Television and Telecommunication, Vol.9, No.3, pp.201-207, 2009.
  14. S.J.Park, G.S.Go, J.H.Cho and, K.H.Lee, "A Scheme for Anomaly Process Detection Using Blockchain", The Korea Internet of Things Society Comprehensive Conference 2019, Vol.4, No.1, pp.24-25, 2019.
  15. Wikipedia, "chkrootkit", https://ko.wikipedia.org/wIki/Chkrootkit
  16. J.H.Hong, J.W.Kim, C.J.Kim and, K.H.Lee, "Security Techniques for Various Hacking Using Kali-Linux", The Korea Internet of Things Society Comprehensive Conference 2019, Vol.4, No.1, pp.61-62, 2019.