메뉴 건너뛰기




Volumn 17, Issue 5, 2016, Pages 947-955

Security challenges in recent internet threats and enhanced security service model for future IT environments

Author keywords

Advanced persistent threats; Internet threats; Ransomware; Security service model; Zero day attack

Indexed keywords

MALWARE; SECURITY SYSTEMS;

EID: 84989849873     PISSN: 16079264     EISSN: 20794029     Source Type: Journal    
DOI: 10.6138/JIT.2016.17.5.20160821     Document Type: Article
Times cited : (9)

References (40)
  • 1
    • 84942256240 scopus 로고    scopus 로고
    • Design of IP camera access control protocol by utilizing hierarchical group key
    • August
    • J. Kang, J.-K. Han and J. H. Park, Design of IP Camera Access Control Protocol by Utilizing Hierarchical Group Key, Symmetry, Vol. 7, No. 3, pp. 1567-1586, August, 2015.
    • (2015) Symmetry , vol.7 , Issue.3 , pp. 1567-1586
    • Kang, J.1    Han, J.-K.2    Park, J.H.3
  • 2
    • 84989291236 scopus 로고    scopus 로고
    • Secure HDFS design using group key management system
    • July
    • J. Kang and J. Kim, Secure HDFS Design Using Group Key Management System, Journal of Internet Technology, Vol. 17, No. 4, pp. 729-737, July, 2015.
    • (2015) Journal of Internet Technology , vol.17 , Issue.4 , pp. 729-737
    • Kang, J.1    Kim, J.2
  • 3
    • 84883040938 scopus 로고    scopus 로고
    • A secure network for mobile wireless service
    • K. Peng, A Secure Network for Mobile Wireless Service, Journal of Information Processing Systems, Vol. 9, No. 2, pp. 247-258, 2013.
    • (2013) Journal of Information Processing Systems , vol.9 , Issue.2 , pp. 247-258
    • Peng, K.1
  • 7
    • 84899421373 scopus 로고    scopus 로고
    • Advanced persistent threats: Minimising the damage
    • April
    • R. Brewer, Advanced Persistent Threats: Minimising the Damage, Network Security, Vol. 2014, No. 4, pp. 5-9, April, 2014.
    • (2014) Network Security , vol.2014 , Issue.4 , pp. 5-9
    • Brewer, R.1
  • 10
    • 84973117870 scopus 로고    scopus 로고
    • Design of quantification model for ransom ware prevent
    • September
    • D. Kim and S. Kim, Design of Quantification Model for Ransom Ware Prevent, World Journal of Engineering and Technology, Vol. 3, No. 3, pp. 203- 207, September, 2015.
    • (2015) World Journal of Engineering and Technology , vol.3 , Issue.3 , pp. 203-207
    • Kim, D.1    Kim, S.2
  • 11
    • 84973154521 scopus 로고    scopus 로고
    • The effective ransomware prevention technique using process monitoring on android platform
    • March
    • S. Song, B. King and S. Lee, The Effective Ransomware Prevention Technique Using Process Monitoring on Android Platform, Mobile Information Systems, Vol. 2016, March, 2016, doi: 10.1155/2016/2946735.
    • (2016) Mobile Information Systems , vol.2016
    • Song, S.1    King, B.2    Lee, S.3
  • 14
    • 84869403808 scopus 로고    scopus 로고
    • Before we knew it: An empirical study of zero-day attacks in the real world
    • Raleigh, NC
    • L. Bilge and D. Tudor, Before We Knew It: An Empirical Study of Zero-Day Attacks in the Real World, 2012 ACM Conference on Computer and Communications Security, Raleigh, NC, 2012, pp. 833-844.
    • (2012) 2012 ACM Conference on Computer and Communications Security , pp. 833-844
    • Bilge, L.1    Tudor, D.2
  • 15
    • 84894556085 scopus 로고    scopus 로고
    • K-zero day safety: A network security metric for measuring the risk of unknown vulnerabilities
    • January
    • L. Wang, S. Jajodia, A. Singhal, P. Cheng and S. Noel, K-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities, IEEE Transactions on Dependable and Secure Computing, Vol. 11, No. 1, pp. 30-44, January, 2014.
    • (2014) IEEE Transactions on Dependable and Secure Computing , vol.11 , Issue.1 , pp. 30-44
    • Wang, L.1    Jajodia, S.2    Singhal, A.3    Cheng, P.4    Noel, S.5
  • 17
    • 84989937188 scopus 로고    scopus 로고
    • FireEye, SPEAR-PHISHING ATTACKS, 2016, https://www2.fireeye.com/rs/fireye/images/fireeye-howstop- spearphishing.pdf
    • (2016) Spear-Phishing Attacks
    • FireEye1
  • 22
    • 84947445554 scopus 로고    scopus 로고
    • Identifying phishing threats in government web services
    • February
    • Y. Oh and T. Obi, Identifying Phishing Threats in Government Web Services, International Journal of Information and Network Security, Vol. 2, No. 1, pp. 32-43, February, 2013.
    • (2013) International Journal of Information and Network Security , vol.2 , Issue.1 , pp. 32-43
    • Oh, Y.1    Obi, T.2
  • 25
    • 84944443432 scopus 로고    scopus 로고
    • Cooperation-aware vanet clouds: Providing secure cloud services to vehicular ad hoc networks
    • March
    • R. Hussain and H. Oh, Cooperation-Aware VANET Clouds: Providing Secure Cloud Services to Vehicular Ad Hoc Networks, Journal of Information Processing Systems, Vol. 10, No. 1, pp. 103-118, March, 2014.
    • (2014) Journal of Information Processing Systems , vol.10 , Issue.1 , pp. 103-118
    • Hussain, R.1    Oh, H.2
  • 26
    • 84875654471 scopus 로고    scopus 로고
    • McAfee, Mobile Threat Report, http://www. mcafee.com/us/resources/reports/rp-mobile-threatreport- 2016.pdf
    • Mobile Threat Report
    • McAfee1
  • 27
    • 84989900408 scopus 로고    scopus 로고
    • Security considerations for a connected car
    • June
    • J. W. Joo, J. K. Lee and J. H. Park, Security Considerations for a Connected Car, Journal of Convergence, Vol. 6, No. 2, pp. 1-9, June, 2015.
    • (2015) Journal of Convergence , vol.6 , Issue.2 , pp. 1-9
    • Joo, J.W.1    Lee, J.K.2    Park, J.H.3
  • 28
    • 84935510273 scopus 로고    scopus 로고
    • A virtual laboratory to practice mobile wireless sensor networks: A case study on energy efficient and safe weighted clustering algorithm
    • June
    • A. Dahane, N.-E. Berrached and A. Loukil, A Virtual Laboratory to Practice Mobile Wireless Sensor Networks: A Case Study on Energy Efficient and Safe Weighted Clustering Algorithm, Journal of Information Processing Systems, Vol. 11, No. 2, pp. 205-228, June, 2015.
    • (2015) Journal of Information Processing Systems , vol.11 , Issue.2 , pp. 205-228
    • Dahane, A.1    Berrached, N.-E.2    Loukil, A.3
  • 29
    • 84989840791 scopus 로고    scopus 로고
    • Certificateless based public key infrastructure using a dnssec
    • September
    • H. Im, J. Kang and J. H. Park, Certificateless Based Public Key Infrastructure Using a DNSSEC, Journal of Convergence, Vol. 6, No. 3, pp. 26-33, September, 2015.
    • (2015) Journal of Convergence , vol.6 , Issue.3 , pp. 26-33
    • Im, H.1    Kang, J.2    Park, J.H.3
  • 30
    • 84989864369 scopus 로고    scopus 로고
    • Efficiency of lea compared with aes
    • September
    • T. Kwon, J. Lee, H. Choi, O. Yi and S. Ju, Efficiency of LEA compared with AES, Journal of Convergence, Vol. 6, No. 3, pp. 16-25, September, 2015.
    • (2015) Journal of Convergence , vol.6 , Issue.3 , pp. 16-25
    • Kwon, T.1    Lee, J.2    Choi, H.3    Yi, O.4    Ju, S.5
  • 32
    • 84924940631 scopus 로고    scopus 로고
    • A survey on communication technologies and requirements for internet of electric vehicles
    • December
    • I. S. Bayram and I. Papapanagiotou, A Survey on Communication Technologies and Requirements for Internet of Electric Vehicles, EURASIP Journal on Wireless Communications and Networking, Vol. 2014, No. 1, December, 2014, doi: 10.1186/1687-1499- 2014-223.
    • (2014) EURASIP Journal on Wireless Communications and Networking , vol.2014 , Issue.1
    • Bayram, I.S.1    Papapanagiotou, I.2
  • 36
    • 84894652457 scopus 로고    scopus 로고
    • A survey of intrusion detection systems in wireless sensor networks
    • May
    • I. Butun, S. D. Morgera and R. Sankar, A Survey of Intrusion Detection Systems in Wireless Sensor Networks, IEEE Communications Surveys & Tutorials, Vol. 16, No. 1, pp. 266-282, May, 2014.
    • (2014) IEEE Communications Surveys & Tutorials , vol.16 , Issue.1 , pp. 266-282
    • Butun, I.1    Morgera, S.D.2    Sankar, R.3
  • 38
    • 84875222968 scopus 로고    scopus 로고
    • Repids: A multi tier real-time payload-based intrusion detection system
    • February
    • A. Jamdagni, Z. Tan, X. He, P. Nanda and R. P. Liu, RePIDS: A Multi Tier Real-Time Payload-Based Intrusion Detection System, Computer Networks, Vol. 57, No. 3, pp. 811-824, February, 2013.
    • (2013) Computer Networks , vol.57 , Issue.3 , pp. 811-824
    • Jamdagni, A.1    Tan, Z.2    He, X.3    Nanda, P.4    Liu, R.P.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.