Fig. 1. General structure of direct command and control botnets
Fig. 2. General structure of P2P-based botnets
Fig. 3. Differences between DoS and DDoS
Fig. 4. Blockchain technique schematization
Fig. 5. schematization by attack stage
Fig. 6. GPS data in picture files
Fig. 7. Example of a simple EXIF metadata removal python program
References
- W. Largent. (2018). New VPNFilter malware targets at least 500K networking devices worldwide. California : Cisco.
- H. J. Bak, S. B. Yang, J. K. Jang & Y. H. Jeon. (2016). A Study on the Cyber Attack against Social Infrastructure and the Security Countermeasure. Journal of Korean Society for Internet Information, 17(1), 285-286.
- http://www.igloosec.co.kr/BLOG_VPNFilter%20%EC%95%85%EC%84%B1%EC%BD%94%EB%93%9C%20%EB%B6%84%EC%84%9D%20%EB%B3%B4%EA%B3%A0%EC%84%9C?searchItem=&searchWord=&bbsCateId=47&gotoPage=1
- S. Saad, L. Traore, A. Ghorbani, B. Sayed, D. Zhao, W. Lu, J. Felix & P. Hakimian. (2011). Detecting P2P botnets through network behavior analysis and machine learning. In Privacy, Security and Trust (PST), 2011 Ninth Annual International Conference. (pp. 174-180). IEEE.
- Y. Fan & N. Xu. (2014). A P2P Botnet Detection Method Used On-line Monitoring and Off-line Detection. International Journal of Security and Its Applications, 8(3), 87-96. https://doi.org/10.14257/ijsia.2014.8.3.10
- J. S. Lee, D. W. Kim, W. H. Park & K. H. Kuk. (2009). A Study on Analysis and Response of DDoS Cyber Terror Based on Network. Jouranl of Information and Security, 9(3), 43-51.
- I. S. Lee & S. Y. Lee. (2018). A Study on Implementation of DDOS Attack Simulator in Cloud Computing. The Journal of Korean Institute of Communications and Information Sciences, 2018.6, 1384-1385.
- Y. G. Park. (2013). Analysis of DDoS Attack Trends through Cyber ??Shelters. KISA, Internet & Security Focus, 2, 28-38.
- J. H. Joo, H. C. Youn, J. S. Oh & T. H. Kim. (2018). A Study on Cognitive Dissonance in the Understanding of Blockchain and Crpytocurrency. The Journal of the Korea Contents Association, 2018(5), 73-74.
- bitcoin.org
- www.ethereum.org
- ripple.com
- H. Y. Kim. (2018). Analysis of Security Threats and Countermeasures on Blockchain Platforms. Korean Institute of Information Technology, 16(5), 103-112.
- Microsoft. (2018). Behavior monitoring combined with machine learning spoils a massive Dofoil coin mining campaign. Washington : Microsoft
- H. S. Seo, J. S. Choi & P. H. Chu. (2009). Design of Classification Methodology of Malicious Code in Windows Environment. Journal of The Korea Institute of Information Security and Cryptology, 19(2), 83-92.
- S. H. Hong & J. A. Yu. Ransomware attack analysis and countermeasures of defensive aspects. Journal of Convergence for Information Technology, 8(1), 139-145. https://doi.org/10.22156/CS4SMB.2018.8.1.139