Skip to main content
Top

2018 | OriginalPaper | Chapter

System Information Comparison and Analysis Technology for Cyber Attacks

Authors : Hyeonsu Youn, Duhoe Kim, Yong-Hyun Kim, Dongkyoo Shin, Dongil Shin

Published in: Advances in Computer Science and Ubiquitous Computing

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Although info-communication technologies are improving the quality of life, the damage due to insufficient security polices and various and powerful hacking techniques are increasing, affecting the national infrastructure. In this paper, we describe a technique to integrate digital forensic technology and an attack tree when a cyber attack is performed on any system, and to reveal the method and path of the attack through the storage, comparison, and analysis of a system’s volatile information based on the time difference. The proposed technology is expected to help assess the damage to the institutional systems networks, which will therefore allow solutions to be quickly determined.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Kim, K.W., Hong, D.W.: High-speed digital forensic technology. J. Korea Inst. Inf. Secur. Cryptology 19(5) (2009) Kim, K.W., Hong, D.W.: High-speed digital forensic technology. J. Korea Inst. Inf. Secur. Cryptology 19(5) (2009)
2.
go back to reference Han, J.S., Lee, S.J.: The windows physical memory dump explorer for live forensic. J. Korea Inst. Inf. Secur. Cryptology 21(2) (2011) Han, J.S., Lee, S.J.: The windows physical memory dump explorer for live forensic. J. Korea Inst. Inf. Secur. Cryptology 21(2) (2011)
3.
go back to reference Kim, S.G., Kim, S.G., Choi, J.H.: Prospective cyber-warfare and its preparations. Commun. Korean Inst. Inf. Sci. Eng. 26(1), 75–86 (2008) Kim, S.G., Kim, S.G., Choi, J.H.: Prospective cyber-warfare and its preparations. Commun. Korean Inst. Inf. Sci. Eng. 26(1), 75–86 (2008)
4.
go back to reference Brezinski, D., Killalea, T.: Guidelines for evidence collection and archiving. No. RFC 3227 (2002) Brezinski, D., Killalea, T.: Guidelines for evidence collection and archiving. No. RFC 3227 (2002)
5.
go back to reference Schneier, B.: Attack trees. Dr. Dobb’s J. 24(12), 21–29 (1999) Schneier, B.: Attack trees. Dr. Dobb’s J. 24(12), 21–29 (1999)
Metadata
Title
System Information Comparison and Analysis Technology for Cyber Attacks
Authors
Hyeonsu Youn
Duhoe Kim
Yong-Hyun Kim
Dongkyoo Shin
Dongil Shin
Copyright Year
2018
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7605-3_73