DOI QR코드

DOI QR Code

Study on Real-time Cooperation Protect System Against Hacking Attacks of WiBro Service

  • Park, Dea-Woo (Department of IT Application Technology, Hoseo Graduate School of Venture)
  • Received : 2011.07.21
  • Accepted : 2011.08.10
  • Published : 2011.08.31

Abstract

U.S. Obama government is submit a motion to consider cyber attacks on State as a war. 7.7DDoS attack in Korea in 2009 and 3.4 DDoS attacks 2011, the country can be considered about cyber attacks. China hackers access a third country, bypassing South Korea IP by hacking the e-commerce sites with fake account, that incident was damaging finance. In this paper, for WiBro service, DDoS attacks, hackers, security incidents and vulnerabilities to the analysis. From hacker's attack, WiBro service's prognostic relevance by analyzing symptoms and attacks, in real time, Divide Red, Orange, Yellow, Green belonging to the risk rating. For hackers to create a blacklist, to defend against attacks in real-time air-conditioning system is the study of security. WiBro networks for incident tracking and detection after the packets through the national incident response should contribute to the development of technology.

Keywords

References

  1. Ashley Chonka, Jaipal Singh, Wanlei Zhou, "Chaos Theory Based Detection against Network Mimicking DDoS Attacks", IEEE Communications Letters, Vol. 13 No. 9, pp. 717-719, September 2009. https://doi.org/10.1109/LCOMM.2009.090615
  2. K. K. Mookhey, "Nilesh Burghate, Detection of SQL Injection and Cross-site Scripting Attacks", http://www.securityfocus.com/infocus/1768
  3. Dea-Woo Park, "A Study on Hacking Attacks and Real-time Security Cooperation System of WiBro Service", Korea Institute of Maritime Information and Communication Sciences, Vol. 4 No. 1, pp. 6-9, June 2011.
  4. Dea-Woo Park, Jung-Man Seo, "TCP/IP attacks, security measures for the study," Korea Institute of Computer and Information, Volume 10 No. 5, pp.217-226, November 2005.
  5. Sung-Ho Ahn, Chang-Gu Kang, Young-Rak Choi, "Agent DDoS attack response mechanisms and through cooperation,"
  6. "Reducing the Energy Consumption of Ether net with Adaptive Link Rate(ALR)", Cham ara Gunaratne, IEEE Transaction on computers, Vol. 57, No. 4, 2008.
  7. In-Hee Lee, Dea-Woo Park, "spam and Vulnerability attack to VoIP and security for the Study", Korea Computer and Information Science, Volume 14 No. 2, pp.215-224, December 2006.
  8. Jung-Ho Choi, "cyber-terrorism, and South Korea support the direction of the transition", Defence and Security Conference, pp.155-172, April 2008.
  9. T Yamakami, T ACCESS, "MobileWeb 2.0: Lessons from Web 2.0 and Past Mobile Internet Development," Multimedia and Ubiquitous Engineering, 2007.
  10. A Raniwala, T Chiueh, "Architecture and algorithms for an IEEE 802.11-based multi-channel wireless mesh network," IEEE Computer and Communications Societies, Proceedings IEEE, 24th Annual Join, INFOCOM 2005.
  11. Dea-Woo Park, Seung-Lin Im, "the hacker's attack, intrusion prevention system for the study of intelligent connection", Korea Institute of Computer and Information, Volume 11, No. 2, pp.351-360, May 2006.
  12. Yeon-Seo Jung, Gul-Woo Ryu, Jong-Su Jang, "ESM technology trends for network security", ETRI, 2001.