• Title/Summary/Keyword: 모바일 웜

Search Result 10, Processing Time 0.031 seconds

Epidemics of Wireless Mobile Worms on Smartphones (스마트폰 환경에서 무선 모바일 웜 확산 방식 연구)

  • Shin, Weon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.5
    • /
    • pp.1154-1159
    • /
    • 2013
  • Now we are facing various threats as side effects against the growth of smartphone markets. Malicious codes such as mobile worms may bring about disclosures of personal information and confusions to upset a national wireless backbone. In this paper, we examine the existed spreading models and try to describe the correct spread of mobile worms on smartphones. We also analyze the spreading effects, and simulate bluetooth, MMS and Wi-Fi worms by various experiments.

휴대폰 노리는 바이러스- 휴대폰 바이러스 안전지대 아니다

  • Gwon, Gyeong-Hui
    • Digital Contents
    • /
    • no.9 s.136
    • /
    • pp.26-29
    • /
    • 2004
  • 세계적인 바이러스 백신업체 트렌드마이크로의 스티브창 CEO는 올해 초“앞으로 어떤 형태의 웜이 대형 사고를 칠 것 같으냐”라는질문에“모바일 분야에서 대형 사고가 있을 것이다”고 말한 바 있다. 그는“휴대폰이 PC처럼 바뀌고 있고 또 네트워크로 연결돼 있기 때문에 이곳을 겨냥한 웜이 등장할 가능성은 매우 높다”고 경고했다. 스티브창의 경고는 최근 현실로 나타났다. 심비안OS를 탑재한 휴대폰을 노린‘카비르’웜이 모습을 드러낸 것이다. 다행히 이번 웜은‘애교성’에 그쳤지만‘휴대폰 대국’인 우리나라에는‘적색경보’로 다가온다. 앞으로 좀더‘강한 놈’의 등장은 이제 시간문제로 부상했기 때문이다. 이에 앞으로 결코 바이러스로부터 안전하지 못한 휴대폰을 방어하기 위해 각계가 안전대책 현황을 점검한다.

  • PDF

A Worm Containing Strategy Using Social Network and PageRank (소셜 네트워크와 페이지랭크를 이용한 웜 전파 방지 기법)

  • Kang, Dong-Hwa;Park, Ji-Yeon;Cho, Yoo-Kun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06a
    • /
    • pp.98-100
    • /
    • 2012
  • 모바일 웜의 전파 속도는 시간이 지날수록 급격히 빨라진다. 급속도로 전파하는 웜을 억제하기 위한 연구가 계속 진행되어 왔다. 기존 연구 중 하나로 소셜 네트워크를 그래프(Graph)로 표현하고 분할한 뒤 각 파티션의 대표노드(Key Node)를 선택해 웜 패치를 전파하는 기법이 있다. 이 기법은 패치 전파 속도를 웜 전파 속도보다 빠르게 해서 웜을 억제 시킨다. 하지만 이 기법에서는 대표노드에 가중치(Weight)가 낮은 간선(Edge)이 연결 될 수 있거나 대표노드가 없는 파티션이 생길 수 있다. 잘못된 대표노드 선정은 패치 전파속도를 저하시키고 웜 억제를 지연시킬 수 있다. 본 논문에서는 페이지랭크를 이용해서 대표노드를 선정하는 개선된 소셜 네트워크 기반의 웜 패칭 기법을 제안한다. 제안 기법은 웜 패칭 전략에 사용할 수 있도록 수정한 페이지랭크를 각 파티션에 적용해서 대표노드를 선정한다. 파티션마다 전파 능력이 가장 높은 노드가 대표노드로 선정되기 때문에 웜 패치 전파 속도를 향상시킬 수 있다.

A Scalable Distributed Worm Detection and Prevention Model using Lightweight Agent (경량화 에이전트를 이용한 확장성 있는 분산 웜 탐지 및 방지 모델)

  • Park, Yeon-Hee;Kim, Jong-Uk;Lee, Seong-Uck;Kim, Chol-Min;Tariq, Usman;Hong, Man-Pyo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.5
    • /
    • pp.517-521
    • /
    • 2008
  • A worm is a malware that propagates quickly from host to host without any human intervention. Need of early worm detection has changed research paradigm from signature based worm detection to the behavioral based detection. To increase effectiveness of proposed solution, in this paper we present mechanism of detection and prevention of worm in distributed fashion. Furthermore, to minimize the worm destruction; upon worm detection we propagate the possible attack aleγt to neighboring nodes in secure and organized manner. Considering worm behavior, our proposed mechanism detects worm cycles and infection chains to detect the sudden change in network performance. And our model neither needs to maintain a huge database of signatures nor needs to have too much computing power, that is why it is very light and simple. So, our proposed scheme is suitable for the ubiquitous environment. Simulation results illustrate better detection and prevention which leads to the reduction of infection rate.

Research on Mobile Malicious Code Prediction Modeling Techniques Using Markov Chain (마코프 체인을 이용한 모바일 악성코드 예측 모델링 기법 연구)

  • Kim, JongMin;Kim, MinSu;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.19-26
    • /
    • 2014
  • Mobile malicious code is typically spread by the worm, and although modeling techniques to analyze the dispersion characteristics of the worms have been proposed, only macroscopic analysis was possible while there are limitations in predicting on certain viruses and malicious code. In this paper, prediction methods have been proposed which was based on Markov chain and is able to predict the occurrence of future malicious code by utilizing the past malicious code data. The average value of the malicious code to be applied to the prediction model of Markov chain model was applied by classifying into three categories of the total average, the last year average, and the recent average (6 months), and it was verified that malicious code prediction possibility could be increased by comparing the predicted values obtained through applying, and applying the recent average (6 months).

Threat Analysis of Mobile Environment (모바일 환경에서의 보안위협 분석)

  • Jeong Youn-Seo;Kim Ki-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.749-753
    • /
    • 2006
  • Since the appearance of the first computer virus in 1986, a significant number of new viruses has appeared every year. Recently, there has been a marked increase in the number of mobile malicious code(virus, worm, trojan) in Mobile devices(smart phone, PDA). As a growing number of people use mobile device, we have to prepare for coming mobile attacks. In this paper, we study trends and characteristics of mobile malicious code. And, we describe considerations of on-device and network security in mobile environment.

  • PDF

Design and Implementation of Network Access Control for Security of Company Network (사내 네트워크 보안을 위한 네트워크 접근제어시스템 설계 및 구현)

  • Paik, Seung-Hyun;Kim, Sung-Kwang;Park, Hong-Bae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.12
    • /
    • pp.90-96
    • /
    • 2010
  • IT environment is rapidly changed, thus security threats such as worms and viruses have increased. Especially company's internal network requires to be inherently protected against these threats. In this respect, NAC(Network Access Control) has attracted attention as new network security techniques. The NAC implements the endpoint access decision based on the collected endpoint security status information and platform measurement information. In this paper, we describe the design and implementation of unauthorized NAC which protect against such as a worm, virus, malware-infected PC, and mobile device to connect to company's internal networks.

A Study on the Awareness of Mobile Manifesto Infestions and Security Vulnerabilities (모바일 악성코드 감염과 보안취약성에 대한 학부생의 인식조사 연구)

  • Kim, MyeongOh;Kang, KyeongHyeok;Kim, TaeYang;Park, GunWoo;Kim, SeokMin;Jang, YoungSu
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.05a
    • /
    • pp.133-134
    • /
    • 2018
  • 모바일 기기를 이용하는 인터넷 서비스가 증가하고 있다. 반면 응용소프트웨어의 보안 허점을 노린 바이러스, 웜, 악성코드는 나날이 증가하여 개인은 물론 기업, 국가차원의 대책이 요구되고 있다. 악성코드는 악의적인 목적을 위해 작성된 코드를 통칭하며 시스템 성능저하, 개인정보 유출, 파일 감염 및 손상을 입힌다. 본 논문에서는 모바일 기기의 악성코드 종류, 증상, 감염경로를 알아보고, 보안 취약성에 대한 학부생의 인식도를 조사하여 예방하는데 그 목적을 둔다. 이러한 인식도 조사를 통해 모바일 악성코드에 대한 학부생의 인식을 향상시키고, 기초 예방만으로도 쉽게 감염률을 낮출 수 있도록 백신을 설치하고 수시로 업데이트하여 이용자들에게 악성코드 감염 증상과 사례의 심각함을 알려줌으로써 예방 인식도를 함양 시킬 수 있다.

A intelligent network weather map framework using mobile agent (이동 에이전트 기반 지능형 네트워크 weather map 프레임워크)

  • Kang, Hyun-Joong;Nam, Heung-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.3
    • /
    • pp.203-211
    • /
    • 2006
  • Today, Internet covers a world wide range and most appliances of our life are linked to network from enterprise server to household electric appliance. Therefore, the importances of administrable framework that can grasp network state by real-time is increasing day by day. Our objective in this paper is to describe a network weather report framework that monitors network traffic and performance state to report a network situation including traffic status in real-time. We also describe a mobile agent architecture that collects state information in each network segment. The framework could inform a network manager of the network situation. Through the framework. network manager accumulates network data and increases network operating efficiency.

  • PDF

Performance Analysis of TCAM-based Jumping Window Algorithm for Snort 2.9.0 (Snort 2.9.0 환경을 위한 TCAM 기반 점핑 윈도우 알고리즘의 성능 분석)

  • Lee, Sung-Yun;Ryu, Ki-Yeol
    • Journal of Internet Computing and Services
    • /
    • v.13 no.2
    • /
    • pp.41-49
    • /
    • 2012
  • Wireless network support and extended mobile network environment with exponential growth of smart phone users allow us to utilize the network anytime or anywhere. Malicious attacks such as distributed DOS, internet worm, e-mail virus and so on through high-speed networks increase and the number of patterns is dramatically increasing accordingly by increasing network traffic due to this internet technology development. To detect the patterns in intrusion detection systems, an existing research proposed an efficient algorithm called the jumping window algorithm and analyzed approximately 2,000 patterns in Snort 2.1.0, the most famous intrusion detection system. using the algorithm. However, it is inappropriate from the number of TCAM lookups and TCAM memory efficiency to use the result proposed in the research in current environment (Snort 2.9.0) that has longer patterns and a lot of patterns because the jumping window algorithm is affected by the number of patterns and pattern length. In this paper, we simulate the number of TCAM lookups and the required TCAM size in the jumping window with approximately 8,100 patterns from Snort-2.9.0 rules, and then analyse the simulation result. While Snort 2.1.0 requires 16-byte window and 9Mb TCAM size to show the most effective performance as proposed in the previous research, in this paper we suggest 16-byte window and 4 18Mb-TCAMs which are cascaded in Snort 2.9.0 environment.