A study of agent system model for response to spear-phishing
DC Field | Value | Language |
---|---|---|
dc.contributor.author | 김종배 | - |
dc.contributor.author | Kim, S. | - |
dc.contributor.author | Kim, C.-H. | - |
dc.date.available | 2018-05-07T11:12:48Z | - |
dc.date.created | 2018-04-18 | - |
dc.date.issued | 2016-01 | - |
dc.identifier.issn | 1343-4500 | - |
dc.identifier.uri | http://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/5622 | - |
dc.description.abstract | Cyberattacks such as APT (Advanced Persistent Threat) have been increasing with the development of information technology. Spear-phishing, which accounts for more than 90% of APT attacks, has transformed the previous attacks aimed at the masses to attacks that target specific individuals. Instant defense from spear-phishing attacks is impossible because such attacks use diverse techniques. Such attacks are especially difficult to detect and cure with current virus vaccines if they use unknown techniques. Thus, the scale of damage from such attacks may increase. It is more difficult for individuals, who are relatively weak in security management, to avoid social technological attacks than for companies and institutions, which can develop countermeasures. Therefore, in this study, we suggest the hierarchical security system model for end-users by using end-point agent application. The suggested model synthetically uses data encoding, blocking control application, and blocking network access to protect systems; and based on the white list, works on application control, checking of the validity of a digital signature, registry protection, and detection and control of reverse-access functions. © 2016 International Information Institute. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | International Information Institute Ltd. | - |
dc.relation.isPartOf | Information (Japan) | - |
dc.title | A study of agent system model for response to spear-phishing | - |
dc.type | Article | - |
dc.type.rims | ART | - |
dc.identifier.bibliographicCitation | Information (Japan), v.19, no.1, pp.263 - 268 | - |
dc.description.journalClass | 1 | - |
dc.identifier.scopusid | 2-s2.0-84960410183 | - |
dc.citation.endPage | 268 | - |
dc.citation.number | 1 | - |
dc.citation.startPage | 263 | - |
dc.citation.title | Information (Japan) | - |
dc.citation.volume | 19 | - |
dc.contributor.affiliatedAuthor | 김종배 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | N | - |
dc.subject.keywordAuthor | APT | - |
dc.subject.keywordAuthor | End-point Agent | - |
dc.subject.keywordAuthor | Etc. | - |
dc.subject.keywordAuthor | Security System Model | - |
dc.subject.keywordAuthor | Spear-phishing | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Soongsil University Library 369 Sangdo-Ro, Dongjak-Gu, Seoul, Korea (06978)02-820-0733
COPYRIGHT ⓒ SOONGSIL UNIVERSITY, ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.