RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Enhancing Security in Mobile IPv6

        Hero Modares,Amirhossein Moravejosharieh,Rosli Bin Salleh,Jaime Lloret 한국전자통신연구원 2014 ETRI Journal Vol.36 No.1

        In the Mobile IPv6 (MIPv6) protocol, a mobile node(MN) is a mobile device with a permanent home address(HoA) on its home link. The MN will acquire a care-ofaddress (CoA) when it roams into a foreign link. It thensends a binding update (BU) message to the home agent(HA) and the correspondent node (CN) to inform them ofits current CoA so that future data packets destined for itsHoA will be forwarded to the CoA. The BU message,however, is vulnerable to different types of security attacks,such as the man-in-the-middle attack, the sessionhijacking attack, and the denial-of-service attack. Thecurrent security protocols in MIPv6 are not able toeffectively protect the BU message against these attacks. The private-key-based BU (PKBU) protocol is proposed inthis research to overcome the shortcomings of someexisting MIPv6 protocols. PKBU incorporates a method toassert the address ownership of the MN, thus allowing theCN to validate that the MN is not a malicious node. Theresults obtained show that it addresses the securityrequirements while being able to check the addressownership of the MN. PKBU also incorporates a methodto verify the reachability of the MN.

      • KCI등재

        Mobile Botnet Attacks - an Emerging Threat: Classification, Review and Open Issues

        ( Ahmad Karim ),( Syed Adeel Ali Shah ),( Rosli Bin Salleh ),( Muhammad Arif ),( Rafidah Md Noor ),( Shahaboddin Shamshirband ) 한국인터넷정보학회 2015 KSII Transactions on Internet and Information Syst Vol.9 No.4

        The rapid development of smartphone technologies have resulted in the evolution of mobile botnets. The implications of botnets have inspired attention from the academia and the industry alike, which includes vendors, investors, hackers, and researcher community. Above all, the capability of botnets is uncovered through a wide range of malicious activities, such as distributed denial of service (DDoS), theft of business information, remote access, online or click fraud, phishing, malware distribution, spam emails, and building mobile devices for the illegitimate exchange of information and materials. In this study, we investigate mobile botnet attacks by exploring attack vectors and subsequently present a well-defined thematic taxonomy. By identifying the significant parameters from the taxonomy, we compared the effects of existing mobile botnets on commercial platforms as well as open source mobile operating system platforms. The parameters for review include mobile botnet architecture, platform, target audience, vulnerabilities or loopholes, operational impact, and detection approaches. In relation to our findings, research challenges are then presented in this domain.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼