Citation Export
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Taejin | - |
dc.contributor.author | Kwak, Jin | - |
dc.date.issued | 2018-06-29 | - |
dc.identifier.uri | https://dspace.ajou.ac.kr/dev/handle/2018.oak/31214 | - |
dc.description.abstract | Cyber attacks are increasing continuously. On average about one million malicious codes appear every day, and attacks are expanding gradually to IT convergence services (e.g. vehicles and television) and social infrastructure (nuclear energy, power, water, etc.), as well as cyberspace. Analysis of large-scale cyber incidents has revealed that most attacks are started by PCs infected with malicious code. This paper proposes a method of detecting an attack IP automatically by analyzing the characteristics of the e-mail transfer path, which cannot be manipulated by the attacker. In particular, we developed a system based on the proposed model, and operated it for more than four months, and then detected 1,750,000 attack IPs by analyzing 22,570,000 spam e-mails in a commercial environment. A detected attack IP can be used to remove spam e-mails by linking it with the cyber removal system, or to block spam e-mails by linking it with the RBL(Real-time Blocking List) system. In addition, the developed system is expected to play a positive role in preventing cyber attacks, as it can detect a large number of attack IPs when linked with the portal site. | - |
dc.description.sponsorship | This work was supported by Institute for Information & communications Technolo gy Promotion(IITP) grant funded by the Korea government(MSIT) (No. 2017-0-00683-001, Endpoint forensics and STIX analysis Machine learning based real time new malicious code detection/control system) and by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIT) (No. NRF-2017R1E1A1A01075110). | - |
dc.language.iso | eng | - |
dc.publisher | Korean Society for Internet Information | - |
dc.subject.mesh | Collection systems | - |
dc.subject.mesh | Convergence services | - |
dc.subject.mesh | Cyber-attacks | - |
dc.subject.mesh | Malicious codes | - |
dc.subject.mesh | Removal systems | - |
dc.subject.mesh | Social infrastructure | - |
dc.subject.mesh | Spam e-mails | - |
dc.subject.mesh | Transfer paths | - |
dc.title | EMICS: E-mail based malware infected IP collection system | - |
dc.type | Article | - |
dc.citation.endPage | 2894 | - |
dc.citation.startPage | 2881 | - |
dc.citation.title | KSII Transactions on Internet and Information Systems | - |
dc.citation.volume | 12 | - |
dc.identifier.bibliographicCitation | KSII Transactions on Internet and Information Systems, Vol.12, pp.2881-2894 | - |
dc.identifier.doi | 10.3837/tiis.2018.06.024 | - |
dc.identifier.scopusid | 2-s2.0-85081982698 | - |
dc.identifier.url | http://itiis.org/digital-library/manuscript/2049 | - |
dc.subject.keyword | Botnet | - |
dc.subject.keyword | - | |
dc.subject.keyword | Malware | - |
dc.subject.keyword | Spam | - |
dc.subject.keyword | Threat intelligence | - |
dc.description.isoa | true | - |
dc.subject.subarea | Information Systems | - |
dc.subject.subarea | Computer Networks and Communications | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.