Citation Export
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Choi, Seul Ki | - |
dc.contributor.author | Lee, Taejin | - |
dc.contributor.author | Kwak, Jin | - |
dc.date.issued | 2019-03-31 | - |
dc.identifier.uri | https://dspace.ajou.ac.kr/dev/handle/2018.oak/30714 | - |
dc.description.abstract | The emergence of new technologies and devices brings a new environment in the field of cyber security. It is not easy to predict possible security threats about new environment every time without special criteria. In other words, most malicious codes often reuse malicious code that has occurred in the past, such as bypassing detection from anti-virus or including additional functions. Therefore, we are predicting the security threats that can arise in a new environment based on the history of repeated malicious code. In this paper, we classify and define not only the internal information obtained from malicious code analysis but also the features that occur during infection and attack. We propose a method to predict and manage security threats in new environment by continuously managing and extending. | - |
dc.description.sponsorship | This work was supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIT) (No. NRF-2017R1E1A1A01075110). | - |
dc.language.iso | eng | - |
dc.publisher | Korean Society for Internet Information | - |
dc.subject.mesh | Anti virus | - |
dc.subject.mesh | Cyber security | - |
dc.subject.mesh | Malicious codes | - |
dc.subject.mesh | Malicious-code analysis | - |
dc.subject.mesh | Security threats | - |
dc.title | A study on analysis of malicious code behavior information for predicting security threats in new environments | - |
dc.type | Article | - |
dc.citation.endPage | 1625 | - |
dc.citation.startPage | 1611 | - |
dc.citation.title | KSII Transactions on Internet and Information Systems | - |
dc.citation.volume | 13 | - |
dc.identifier.bibliographicCitation | KSII Transactions on Internet and Information Systems, Vol.13, pp.1611-1625 | - |
dc.identifier.doi | 10.3837/tiis.2019.03.028 | - |
dc.identifier.scopusid | 2-s2.0-85065564220 | - |
dc.identifier.url | http://www.itiis.org/digital-library/manuscript/file/2302/TIIS+Vol+13,+No+3-28.pdf | - |
dc.subject.keyword | Cyber security | - |
dc.subject.keyword | Malicious code | - |
dc.subject.keyword | Malware | - |
dc.subject.keyword | Security threat | - |
dc.description.isoa | true | - |
dc.subject.subarea | Information Systems | - |
dc.subject.subarea | Computer Networks and Communications | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.