Ajou University repository

EMICS: E-mail based malware infected IP collection systemoa mark
Citations

SCOPUS

1

Citation Export

DC Field Value Language
dc.contributor.authorLee, Taejin-
dc.contributor.authorKwak, Jin-
dc.date.issued2018-06-29-
dc.identifier.urihttps://dspace.ajou.ac.kr/dev/handle/2018.oak/31214-
dc.description.abstractCyber attacks are increasing continuously. On average about one million malicious codes appear every day, and attacks are expanding gradually to IT convergence services (e.g. vehicles and television) and social infrastructure (nuclear energy, power, water, etc.), as well as cyberspace. Analysis of large-scale cyber incidents has revealed that most attacks are started by PCs infected with malicious code. This paper proposes a method of detecting an attack IP automatically by analyzing the characteristics of the e-mail transfer path, which cannot be manipulated by the attacker. In particular, we developed a system based on the proposed model, and operated it for more than four months, and then detected 1,750,000 attack IPs by analyzing 22,570,000 spam e-mails in a commercial environment. A detected attack IP can be used to remove spam e-mails by linking it with the cyber removal system, or to block spam e-mails by linking it with the RBL(Real-time Blocking List) system. In addition, the developed system is expected to play a positive role in preventing cyber attacks, as it can detect a large number of attack IPs when linked with the portal site.-
dc.description.sponsorshipThis work was supported by Institute for Information & communications Technolo gy Promotion(IITP) grant funded by the Korea government(MSIT) (No. 2017-0-00683-001, Endpoint forensics and STIX analysis Machine learning based real time new malicious code detection/control system) and by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIT) (No. NRF-2017R1E1A1A01075110).-
dc.language.isoeng-
dc.publisherKorean Society for Internet Information-
dc.subject.meshCollection systems-
dc.subject.meshConvergence services-
dc.subject.meshCyber-attacks-
dc.subject.meshMalicious codes-
dc.subject.meshRemoval systems-
dc.subject.meshSocial infrastructure-
dc.subject.meshSpam e-mails-
dc.subject.meshTransfer paths-
dc.titleEMICS: E-mail based malware infected IP collection system-
dc.typeArticle-
dc.citation.endPage2894-
dc.citation.startPage2881-
dc.citation.titleKSII Transactions on Internet and Information Systems-
dc.citation.volume12-
dc.identifier.bibliographicCitationKSII Transactions on Internet and Information Systems, Vol.12, pp.2881-2894-
dc.identifier.doi10.3837/tiis.2018.06.024-
dc.identifier.scopusid2-s2.0-85081982698-
dc.identifier.urlhttp://itiis.org/digital-library/manuscript/2049-
dc.subject.keywordBotnet-
dc.subject.keywordEmail-
dc.subject.keywordMalware-
dc.subject.keywordSpam-
dc.subject.keywordThreat intelligence-
dc.description.isoatrue-
dc.subject.subareaInformation Systems-
dc.subject.subareaComputer Networks and Communications-
Show simple item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

KWAK, JIN Image
KWAK, JIN곽진
Department of Cyber Security
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.