Security Vulnerability Analysis and Forensic Data Research to Attacks on Mobile Stock Trading System in WiBro Network

被引:0
|
作者
Chun, Woo-Sung [1 ]
Park, Dea-Woo [1 ]
机构
[1] Hoseo Grad Sch Venture, Dept IT Applicat Technol, Seoul, South Korea
关键词
WiBro; Vulnerability; Forensic; Hacker Attack; DDoS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A financial transaction is becoming activation, and financial accident is frequently occurring at mobile terminals by a spread of the Ubiquitous Era on the latest date. We execute an attack regarding mobile stocks transactions system from WiBro networks at this paper, and we study a Security Vulnerability Analysis infringement attack accidents. We generate Forensic data use WireShark, and monitoring calls an actual stock trading process in WiBro networks in order to analyze mobile stocks transactions, and analyze, and detect Vulnerability, and analyzing a packet. We ensure a basis of study detect port, and detect Security Vulnerability through analyses aggressive analysis aggressive viral penetration, authentication packet analysis, analysis aggressive a DDoS network, analysis aggressive a terminal mobile WiBro, a HTS program that there was in order to open through the scanning that used NetScan Tools, and analyze, and generate Forensic data, and to be able to be used as to criminal investigation and legal data.
引用
收藏
页码:291 / 298
页数:8
相关论文
共 50 条
  • [11] Forensic Analysis of Network Attacks: Restructuring Security Events as Graphs and Identifying Strongly Connected Sub-graphs
    Leichtnam, Laetitia
    Totel, Eric
    Prigent, Nicolas
    Me, Ludovic
    2020 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2020), 2020, : 565 - 573
  • [12] Research on the Security Analysis and Management of the Network Information System Based on the Big Data Decision Making
    Liu, Weigang
    CYBER SECURITY INTELLIGENCE AND ANALYTICS, 2020, 928 : 224 - 229
  • [14] Research on Capability Building of Mobile Network Data Analysis and Visualization
    Guan, Jian
    Cheng, Xinzhou
    Chao, Kun
    He, Xin
    Jia, Yuwei
    Xu, Lexi
    Wang, Yunyun
    Xiao, Tian
    Li, Bei
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 1479 - 1484
  • [15] Research on Network Financial Data Analysis System
    GuoTanxin
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON EDUCATION TECHNOLOGY AND ECONOMIC MANAGEMENT (ICETEM 2017), 2017, 168 : 155 - 159
  • [16] Analysis and Research on Security Mechanism of Mobile Intelligent Terminal Operating System
    Zhao, Mingxin
    PROCEEDINGS OF THE 2017 7TH INTERNATIONAL CONFERENCE ON APPLIED SCIENCE, ENGINEERING AND TECHNOLOGY (ICASET 2017), 2017, 122 : 286 - 290
  • [17] TIFAflow: Enhancing Traffic Archiving System with Flow Granularity for Forensic Analysis in Network Security
    Chen, Zhen
    Ruan, Lingyun
    Cao, Junwei
    Yu, Yifan
    Jiang, Xin
    TSINGHUA SCIENCE AND TECHNOLOGY, 2013, 18 (04) : 406 - 417
  • [18] Cloud Computing-Based Forensic Analysis for Collaborative Network Security Management System
    Zhen Chen
    Fuye Han
    Junwei Cao
    Xin Jiang
    Shuo Chen
    Tsinghua Science and Technology, 2013, 18 (01) : 40 - 50
  • [19] Cloud Computing-Based Forensic Analysis for Collaborative Network Security Management System
    Chen, Zhen
    Han, Fuye
    Cao, Junwei
    Jiang, Xin
    Chen, Shuo
    TSINGHUA SCIENCE AND TECHNOLOGY, 2013, 18 (01) : 40 - 50
  • [20] TIFAflow: Enhancing Traffic Archiving System with Flow Granularity for Forensic Analysis in Network Security
    Zhen Chen
    Linyun Ruan
    Junwei Cao
    Yifan Yu
    Xin Jiang
    Tsinghua Science and Technology, 2013, 18 (04) : 406 - 417