박사

스마트폰 상태 정보를 이용한 효율적인 봇 탐지 기법 = An Efficient Bot Detection Scheme Using Smartphone Status Information

최우진 2015년
논문상세정보
' 스마트폰 상태 정보를 이용한 효율적인 봇 탐지 기법 = An Efficient Bot Detection Scheme Using Smartphone Status Information' 의 주제별 논문영향력
논문영향력 선정 방법
논문영향력 요약
주제
  • 보안
  • 봇넷
  • 스마트폰
  • 탐지기법
동일주제 총논문수 논문피인용 총횟수 주제별 논문영향력의 평균
1,243 0

0.0%

' 스마트폰 상태 정보를 이용한 효율적인 봇 탐지 기법 = An Efficient Bot Detection Scheme Using Smartphone Status Information' 의 참고문헌

  • “최근 봇넷의 악성 행위 동향 및 대응 기술 연구”
    강동완 임채태 정현철 한국정보보호학회 정보보호학회지, 19호 6권, pp. 22-31, Dec [2009]
  • “일반 P2P와 악성 P2P 봇넷 트래픽 비교 분석”
    김민수 노봉남 장대일 한국인터넷정보학회 년도 학술밣표대회, pp. 415-418, 2010 [2010]
  • “봇넷(Botnet) 동향 및 대응기술 현황”
    임채태 한국정보통신기술협회TTA저널, no. 118, pp. 58-65 [2008]
  • “봇넷 탐지 연구 조사”
    윤현수 이민수 허선동 한국정보과학회 한국컴퓨터종합학술대회, 37권 1호, pp. 72-76, June 2010 [2010]
  • “봇넷 분류법 및 진화된 봇넷 구조”
    오진태 전용희 정보보보학회지, 18권 4호, pp. 76-86 [2008]
  • “봇넷 기술 개요 및 분석”
    전용희 정보보호학회지, 18권 3호, pp. 101-108, June [2008]
  • http://appanalysis.org/
  • X. Kou and Q. Wen, “Intrusion detection model based on android”,Broadband Network and Multimedia Technology (IC-BNMT), pp. 624-628,2011.
  • W. Enck, P. Gilbert, B. Chun, L. Cox, J. Jung, P. McDaniel and A. Sheth, "TaintDroid: An information-flow tracking system for realtimeprivacy monitoring on smartphones", In Proceedings of the 9th USENIXSymposium on Operating Systems Design and Implementation., pp. 1-6,2010.
  • W. Ench, M. Ongtang and P. McDaniel, "On lightweight mobile phoneapplication certification", In Proceedings of the 16th ACM conference onComputer and communications security (CCS'09), pp. 235-245, 2009.
  • S. Kim, D. Choi and B. An, "Detection and Prevention Method byAnalyzing Malignant Code of Malignant Bot", The journal of the Instituteof Internet Broadcasting and Communication, vol. 13, no. 2, pp. 199-207,2013
  • P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall. “Thesearen’t the droids you’re looking for : Retrofitting Android to protect datafrom imperious applications,“ In Proceedings of the 18th ACM Conferenceon Computer and Communications Security (CCS 2011), pp. 639-652, Oct. 2011.
  • M. Becher, F.C. Freiling, J. Hoffmann, T. Holz, S. Uellenbeck and C. Wolf, "Mobile Security Catching Up? Revealing the Nuts and Bolts of theSecurity of Mobile Devices", In Proceedings of the 2011 IEEE Symposiumon Security and Privacy (SP'11), pp.96-111, 2011.
  • Liang Xie, Xinwen Zhang, Jean-Pierre Seifert, Sencun Zhu, “pBMDS ABehavior-based Malware Detection System for Cellphone Devices”, WiSec'10 Proceedings of the third ACM conference on Wireless network security,pp. 37-48, 2010
  • L. Liu, G. Yan, X. Zhang, and S. Chen, "VirusMeter: Preventing YourCellphone from Spies", In Proceedings of the 12th International Symposiumon Recent Advances in Intrusion Detection (RAID'09)., pp. 244-264, 2009.
  • K. Singh, S. Sangal, N. Jain, P. Traynor, and W. Lee, "Evaluatingbluetooth as a medium for botnet command and control", Detection ofIntrusions and Malware, and Vulnerability Assessment, vol. 6201, pp. 61-80,2010.
  • K. Shin, U. Park and M. Jun, "A Design of SMS DDoS Detection andDefense Method using Counting Bloom Filter", Proceedings of the KAISFall Conference, vol. 1, pp. 53-56, 2011.
  • K. J. Houle and G. M. Weaver, "Trends in Denial of Service AttackTechnology", CERT and CERT Coordination Center are registered in theU.S. Patent and Trademark Office, Oct 2001
  • J. Cheng, S.H.Y. Wong, H. Yang, and S. Lu, "SmartSiren: virusdetection and alert for smartphones", In Proceedings of the 5th internationalconference on Mobile systems, applications and services (MobiSys'07), pp. 258-271, 2007.
  • J. Baek and J. Park, "A study of analysis and improvement of securityvulnerability in Bluetooth for data transfer", Journal of the KoreaAcademia-Industrial cooperation Society. vol. 12, no. 6, pp. 2801-2806, 2011.
  • J. B. Grizzard, V. Sharma, C. Nunnery, Brent, B. Kang and D. Dagon,"Peer-to-Peer Botnets: Overview and Case Study", USENIX, 2007
  • I. Burguera, U. Zurutuza, S. Nadjm-Tehrani, “CrowdroidBehavior-Based Malware Detection System”, SPSM '11 Proceedings of the1st ACM workshop on Security and privacy in smartphones and mobiledevices, pp. 15-26, 2011
  • H. Yang, "A Study of Security Weaknesses of QR Codes and ItsCountermeasures", The journal of the Institute of Internet Broadcasting andCommunication, vol. 12, no. 1, pp. 83-89, 2012.
  • G. Weidman. "Transparent botnet command and control for smartphonesover SMS", Proceedings of Shmoocon., 2011.
  • G. Russello, B. Crispo, E. Fernandes and Y. Zhauniarovich, “YAASE:Yet Another Android Security Extension, Privacy, security, risk and trust(passat)”, 2011 ieee third international conference on and 2011 ieee thirdinternational conference on social computing (socialcom), pp. 1033-1040, Oct2011
  • G. Portokalidis, P. Homburg, K. Anagnostakis, and H. Bos, "ParanoidAndroid: versatile protection for smartphones", In Proceedings of the 26thAnnual Computer Security Applications Conference (ACSAC'10), pp. 347-356, 2010.
  • G. Geng, G. Xu, M. Zhang, Y. Guo, G. Yang, and C. Wei. "The designof SMS based heterogeneous mobile botnet", Journal of Computers., vol. 7,no. 1, pp. 235-243, 2012.
  • G. Dini, F. Martinelli, A. Saracino, and D. Sgandurra, "MADAM: AMulti-level Anomaly Detector for Android Malware", In Proceedings of the6th International Conference on Mathematical Methods, Models, andArchitectures for Computer Network Security (MMM-ACNS'12), pp. 240-253,2012.
  • E. Chain, A.P. Felt, K. Greenwood, and D. Wagner, "AnalyzingInter-Application Communication in Android", In Proceedings of the 9thInternational Conference on Mobile Systems, Applications, and Services(MobiSys'11), pp. 239-252, 2011
  • D. Venugopal and G. Hu, “Efficient signature based malware detectionon mobile devices”, Mobile Information Systems, vol 4, no. 1, pp. 33-49,2008
  • C. Mulliner and J. Seifert, "Rise of the ibots: Owning a telco network",In Proceedings of the 5th IEEE International Conference on Malicious andUnwanted Software (Malware), pp. 19-20, 2010.
  • B. Saha and A. Gairola, “Botnet: An Overview”, CERT-In White Paper,CIWP-2005-05, pp. 3-12, May 2005.
  • Asaf Shabtai, Uri Kanonov, Yuval Elovici, Chanan Glezer and YaelWeiss, “Andromaly : a behavioral malware detection framework for androiddevices”, JOURNAL OF INTELLIGENT INFORMATION SYSTEMS Volume38, Number 1, pp.161-190, 2012
  • Adam P. Fuchs, Avik Chaudhuri, and Jeffrey S. Foster, “ScanDroidAutomated Security Certification of Android Applications”, 2011
  • A. Karasaridis, B. Rexroad and D. Hoeflin, “Wide-Scale botnetdetection and characterization”, HotBots'07 Proceedings of the firstconference on First Workshop on Hot Topics in Understanding Botnets, pp. 1-8, 2007
  • A. Bose, Xin Hu, K. G. Shin and T. Park, “Behavioral Detection ofMalware on Mobile Handsets”, MobiSys 08 Proceedings of the 6thinternational conference on Mobile systems, applications, and services, pp. 225-238, 2008