• Title/Summary/Keyword: Download

Search Result 446, Processing Time 0.028 seconds

ELPA: Emulation-Based Linked Page Map Analysis for the Detection of Drive-by Download Attacks

  • Choi, Sang-Yong;Kim, Daehyeok;Kim, Yong-Min
    • Journal of Information Processing Systems
    • /
    • v.12 no.3
    • /
    • pp.422-435
    • /
    • 2016
  • Despite the convenience brought by the advances in web and Internet technology, users are increasingly being exposed to the danger of various types of cyber attacks. In particular, recent studies have shown that today's cyber attacks usually occur on the web via malware distribution and the stealing of personal information. A drive-by download is a kind of web-based attack for malware distribution. Researchers have proposed various methods for detecting a drive-by download attack effectively. However, existing methods have limitations against recent evasion techniques, including JavaScript obfuscation, hiding, and dynamic code evaluation. In this paper, we propose an emulation-based malicious webpage detection method. Based on our study on the limitations of the existing methods and the state-of-the-art evasion techniques, we will introduce four features that can detect malware distribution networks and we applied them to the proposed method. Our performance evaluation using a URL scan engine provided by VirusTotal shows that the proposed method detects malicious webpages more precisely than existing solutions.

Multi-Level Emulation for Malware Distribution Networks Analysis (악성코드 유포 네트워크 분석을 위한 멀티레벨 에뮬레이션)

  • Choi, Sang-Yong;Kang, Ik-Seon;Kim, Dae-Hyeok;Noh, Bong-Nam;Kim, Yong-Min
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1121-1129
    • /
    • 2013
  • Recent malware distribution causes severe and nation-wide problems such as 3 20 cyber attack in Korea. In particular, Drive-by download attack, which is one of attack types to distribute malware through the web, becomes the most prevalent and serious threat. To prevent Drive-by download attacks, it is necessary to analyze MDN(Malware Distribution Networks) of Drive-by download attacks. Effective analysis of MDN requires a detection of obfuscated and/or encapsulated JavaScript in a web page. In this paper, we propose the scheme called Multi-level emulation to analyze the process of malware distribution. The proposed scheme analyzes web links used for malware distribution to support the efficient analysis of MDN.

Design and Development of Multi-Media Data Download System for GSM Mobile Phones (GSM 휴대단말기를 위한 멀티미디어 데이터의 다운로드 시스템 설계 및 구현)

  • OK Kyoung-Dal;Lee Sang-Bum
    • Journal of Internet Computing and Services
    • /
    • v.5 no.3
    • /
    • pp.63-72
    • /
    • 2004
  • Recently the range of mobile phone's usage has become more widely since phone has the function of data communication and voice communication. In addition, the request of users who wish to represent their identity on their mobile phones by storing some kinds of multimedia data such as images and melody has increased. There are two different methods for downloading the multimedia data; one method accesses a wireless internet server to download the data and another method downloads the data from PC directly. While the first one requires extra fee for downloading the data, the second method has weakness to modify the original data and it cannot be used in GSM phone yet since it is developed for CDMA phone. In this paper, we introduce a PC-based download application system that enables the users to download multimedia data from PC to GSM phone very easily.

  • PDF

SDR Software Download Framework using Jini (Jini를 이용한 SDR 소프트웨어 다운로드 Framework)

  • Jang Kee-Hyun;Kwon Yong-Ho;Kim Mun-Gi;Rhee Byung-Ho
    • Proceedings of the IEEK Conference
    • /
    • 2004.06a
    • /
    • pp.257-260
    • /
    • 2004
  • This paper describes the software download framework for SDR(Software Defined Radio). SDR is expected to solve the compatibility problem among various mobile communication standards so that people can use the same device for different wireless network. We integrated the SDR software download process into Jini architecture, and modified Jini's several functions. We implemented this proposed framework on a Linux and windows operating systems with Java programming language. With Java platform, we can easily transfer this framework into hand-held devices.

  • PDF

A Scheme for Return Channel Utilization for Efficient Download of Data Broadcasting Applications (데이터 방송 애플리케이션의 효율적 다운로드를 지원하는 리턴 채널 활용 기법)

  • Kang Seung-Mi;Sun Seungsang;Eom Young Ik
    • The KIPS Transactions:PartC
    • /
    • v.12C no.7 s.103
    • /
    • pp.1047-1056
    • /
    • 2005
  • The existing data broadcasting system has the mechanism that the receiving device should download repetitively the entire broadcasting application data until it acquires the whole of the application data. This mechanism takes long time for the download. To solve this problem this paper proposes a scheme that the device effectively downloads the missing parts of broadcasting application data through the return channel and shows the performance evaluations of the proposed scheme with respect to the experiment.

Generalized Proxy-Assisted Periodic Broadcasting (G-ProB) for Heterogeneous Clients in Video-on-Demand Service

  • Febiansyah, Hidayat;Kwon, Jin-Baek
    • Journal of Information Processing Systems
    • /
    • v.6 no.4
    • /
    • pp.575-596
    • /
    • 2010
  • Video-on-Demand services are increasing rapidly nowadays. The load on servers can be very high, even exceeding their capacity. For popular contents, we can use a Periodic Broadcast (PB) strategy using multicast to serve all clients. Recent development of PB uses multiple channels broadcasting for segments of movies in certain patterns, so that users only need to wait for a small segment to start the service. However, users need higher download capacity to download multiple segments at a time. In order to compensate for this, a proxy server can help to reduce download bandwidth requirements by holding some segments for a certain time. This research will focus on more recent PB schemes that couldn't be covered by previous Proxy-Assisted Periodic Broadcast strategies.

A Chinese Restaurant Game for Distributed Cooperative Caching in Small Cell Networks

  • Chen, Junliang;Wang, Gang;Wang, Fuxiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.1
    • /
    • pp.222-236
    • /
    • 2019
  • Wireless content caching in small cell networks has recently been considered as a promising way to alleviate the congestion of the backhaul in emerging heterogenous cellular network. However, how to select files which are cached in SBSs and how to make SBSs work together is an important issue for cooperative cache research for the propose of reducing file download time. In this paper, a Cooperative-Greedy strategy (CGS) among cache-enabled small base stations (SBSs) in small cell network is proposed, in order to minimize the download time of files. This problem is formulated as a Chinese restaurant game.Using this game model, we can configure file caching schemes based on file popularity and the spectrum resources allocated to several adjacent SBSs. Both the existence and uniquencess of a Nash equilibrium are proved. In the theoretical analysis section, SBSs cooperate with each other in order to cache popular files as many as possible near UEs. Simulation results show that the CGS scheme outperforms other schemes in terms of the file-download time.

The Relationship between Social Norm and Intention to Use Illegal Download : Focused on Moderating Effects of Attitude to Copyright Law and Perceived Price Importance (규범인식과 불법다운로드 이용의향 간 관계 : 저작권법 태도와 콘텐츠 구매시 가격 중요성의 조절효과를 중심으로)

  • Kim, Dong-Tae
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.8
    • /
    • pp.97-106
    • /
    • 2016
  • The results of advanced studies which handled the relationship between social norm and intention to use illegal download don't match exactly. This study determined that the reason why the results of advanced studies are confused is, that moderator variables play important roles. For this reason, this study planned to test for significance of moderators consisting of attitude to copyright law(A) and perceived price importance at time of purchase(B). To achieve this, the present study divide social norm into two norms(subjective norm and group norm) and set up hypotheses on the moderating effects of two variables(A, B) between these two norms and intention to use the illegal download. The results show that all but one hypotheses are accepted. The other moderating effect hypothesis which is consist of subjective norm and attitude toward copyright law is rejected. This means that the effect of group norm on intention to use illegal download is moderated by attitude to copyright law. Also, this result means the effects of group/subjective norm on intention to use illegal download is moderated by the perceived price importance at time of purchase.

Supporting Effective Open Workspaces Based on WebDAV (WebDAV 기반의 효과적인 공개 작업장 지원)

  • Park Hee-Jong;Kim Dong-Ho;Ahn Geon-Tae;Lee Myung-Joon
    • The KIPS Transactions:PartC
    • /
    • v.13C no.2 s.105
    • /
    • pp.249-258
    • /
    • 2006
  • WebDAV is an IETF standard protocol, which is an extended version of HTTP 1.1, supporting asynchronous collaborative authoring of various contents on the web. Recently, to precisely control access to the resources on a WebDAY server, the WebDAV Access Control Protocol was published. This protocol helps developers to implement advanced server functionalities in a convenient way by providing various control methods to the resources on the WebDAV server. Based on the WebDAV access control protocol, we developed Open Workspaces, which systematically support exchanging and sharing data for general visitors. An Open Workspace can be supplied as a Download-Only Open Workspace, an Upload-Only Open Workspace, or an Upload-Download Open Workspace. Any registered user can create these workspaces without bothering the system administrator. To support the Open Workspaces, we extended the Slide WebDAV server and the DAVExplorer WebDAV client, which are being used popularly.

Performance analysis of session admission control based on area for software download in cellular CDMA systems (셀룰러 CDMA 시스템에서 소프트웨어 다운로드를 위한 영역 기반 세션수락제어방식 성능분석)

  • 김광식;조무호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.5A
    • /
    • pp.294-304
    • /
    • 2003
  • For an efficient software download in cellular CDMA systems, session admission control based on area (SACA) is presented. In the SACA scheme, the base station only allows mobile terminal to start session when the mobile locates near the base station of a cell. A mobile that is located near cell center can request software download session, but the mobile that is far away from the center can request session only after arriving near the cell center. Session duration time follows exponential and Pareto distribution. Performance is analyzed in terms of handoff rate, mean channel holding time, session blocking probability and handoff forced termination probability. As analysis results, handoff rate between cells in the proposed scheme is reduced to 30 ~ 250 % compared to conventional scheme, according to traffic characteristics such as terminal speed, session duration time and the size of the allowable zone area in a cell for the start of the session. And new session blocking probability slightly decreases to 5 ~ 20 %, but handoff session forced termination probability drastically decreases to 35 ~ 220 %.