Ajou University repository

A study on analysis of malicious code behavior information for predicting security threats in new environmentsoa mark
Citations

SCOPUS

2

Citation Export

DC Field Value Language
dc.contributor.authorChoi, Seul Ki-
dc.contributor.authorLee, Taejin-
dc.contributor.authorKwak, Jin-
dc.date.issued2019-03-31-
dc.identifier.urihttps://dspace.ajou.ac.kr/dev/handle/2018.oak/30714-
dc.description.abstractThe emergence of new technologies and devices brings a new environment in the field of cyber security. It is not easy to predict possible security threats about new environment every time without special criteria. In other words, most malicious codes often reuse malicious code that has occurred in the past, such as bypassing detection from anti-virus or including additional functions. Therefore, we are predicting the security threats that can arise in a new environment based on the history of repeated malicious code. In this paper, we classify and define not only the internal information obtained from malicious code analysis but also the features that occur during infection and attack. We propose a method to predict and manage security threats in new environment by continuously managing and extending.-
dc.description.sponsorshipThis work was supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIT) (No. NRF-2017R1E1A1A01075110).-
dc.language.isoeng-
dc.publisherKorean Society for Internet Information-
dc.subject.meshAnti virus-
dc.subject.meshCyber security-
dc.subject.meshMalicious codes-
dc.subject.meshMalicious-code analysis-
dc.subject.meshSecurity threats-
dc.titleA study on analysis of malicious code behavior information for predicting security threats in new environments-
dc.typeArticle-
dc.citation.endPage1625-
dc.citation.startPage1611-
dc.citation.titleKSII Transactions on Internet and Information Systems-
dc.citation.volume13-
dc.identifier.bibliographicCitationKSII Transactions on Internet and Information Systems, Vol.13, pp.1611-1625-
dc.identifier.doi10.3837/tiis.2019.03.028-
dc.identifier.scopusid2-s2.0-85065564220-
dc.identifier.urlhttp://www.itiis.org/digital-library/manuscript/file/2302/TIIS+Vol+13,+No+3-28.pdf-
dc.subject.keywordCyber security-
dc.subject.keywordMalicious code-
dc.subject.keywordMalware-
dc.subject.keywordSecurity threat-
dc.description.isoatrue-
dc.subject.subareaInformation Systems-
dc.subject.subareaComputer Networks and Communications-
Show simple item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

KWAK, JIN Image
KWAK, JIN곽진
Department of Cyber Security
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.