Ajou University repository

EMICS: E-mail based malware infected IP collection systemoa mark
Citations

SCOPUS

1

Citation Export

Publication Year
2018-06-29
Publisher
Korean Society for Internet Information
Citation
KSII Transactions on Internet and Information Systems, Vol.12, pp.2881-2894
Keyword
BotnetEmailMalwareSpamThreat intelligence
Mesh Keyword
Collection systemsConvergence servicesCyber-attacksMalicious codesRemoval systemsSocial infrastructureSpam e-mailsTransfer paths
All Science Classification Codes (ASJC)
Information SystemsComputer Networks and Communications
Abstract
Cyber attacks are increasing continuously. On average about one million malicious codes appear every day, and attacks are expanding gradually to IT convergence services (e.g. vehicles and television) and social infrastructure (nuclear energy, power, water, etc.), as well as cyberspace. Analysis of large-scale cyber incidents has revealed that most attacks are started by PCs infected with malicious code. This paper proposes a method of detecting an attack IP automatically by analyzing the characteristics of the e-mail transfer path, which cannot be manipulated by the attacker. In particular, we developed a system based on the proposed model, and operated it for more than four months, and then detected 1,750,000 attack IPs by analyzing 22,570,000 spam e-mails in a commercial environment. A detected attack IP can be used to remove spam e-mails by linking it with the cyber removal system, or to block spam e-mails by linking it with the RBL(Real-time Blocking List) system. In addition, the developed system is expected to play a positive role in preventing cyber attacks, as it can detect a large number of attack IPs when linked with the portal site.
Language
eng
URI
https://dspace.ajou.ac.kr/dev/handle/2018.oak/31214
DOI
https://doi.org/10.3837/tiis.2018.06.024
Fulltext

Type
Article
Funding
This work was supported by Institute for Information & communications Technolo gy Promotion(IITP) grant funded by the Korea government(MSIT) (No. 2017-0-00683-001, Endpoint forensics and STIX analysis Machine learning based real time new malicious code detection/control system) and by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIT) (No. NRF-2017R1E1A1A01075110).
Show full item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

KWAK, JIN Image
KWAK, JIN곽진
Department of Cyber Security
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.