Abstract
As many countries jump into cyber war preparation, the importance of malware detection and prevention keeps increasing. Especially, since large-scale malware attacks can cause serious damage to economy and society, it is critical to construct an effective nationwide system for early detection framework (EDF) for detecting large-scale malware attacks effectively. In this paper, we present a threat model, set main goals of EDF, and explain several consideration points to design EDF. We believe this research will lay groundwork upon which following design exploration research works.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Cooperative Cyber Defence Centre of Excellence, http://en.wikipedia.org/wiki/Cooperative_Cyber_Defence_Centre_of_Excellence
July 2009 cyber attacks, http://en.wikipedia.org/wiki/July_2009_cyber_attacks
Personal Information Protection Act, http://elaw.klri.re.kr
Process Hacker, http://processhacker.sourceforge.net/doc/struct___r_t_l___u_s_e_r___p_r_o_c_e_s_s___p_a_r_a_m_e_t_e_r_s.html
Snort, http://www.snort.org
VMProtect, http://vmprotect.com
VMProtect: Virus and Threat description, http://www.f-secure.com/v-descs/vmprotect.shtml
Bergeron, J., Debbabi, M., Erhioui, M.M., Ktari, B.: Static Analysis of Binary Code to Isolate Malicious Behaviors. In: Proceedings of the 8th Workshop on Enabling Technologies on Infrastructure for Collaborative Enterprises, WETICE 1999, pp. 184–189. IEEE Computer Society, Washington, DC (1999), http://dl.acm.org/citation.cfm?id=647067.757010
Chess, B., McGraw, G.: Static Analysis for Security. IEEE Security Privacy 2(6), 76–79 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, M. (2012). Design Considerations on Constructing an Early Detection Framework for Detecting Large-Scale Malware Attacks. In: Lee, G., Howard, D., Ślęzak, D., Hong, Y.S. (eds) Convergence and Hybrid Information Technology. ICHIT 2012. Communications in Computer and Information Science, vol 310. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32692-9_34
Download citation
DOI: https://doi.org/10.1007/978-3-642-32692-9_34
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32691-2
Online ISBN: 978-3-642-32692-9
eBook Packages: Computer ScienceComputer Science (R0)