Security Vulnerability Analysis and Forensic Data Research to Attacks on Mobile Stock Trading System in WiBro Network

被引:0
|
作者
Chun, Woo-Sung [1 ]
Park, Dea-Woo [1 ]
机构
[1] Hoseo Grad Sch Venture, Dept IT Applicat Technol, Seoul, South Korea
关键词
WiBro; Vulnerability; Forensic; Hacker Attack; DDoS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A financial transaction is becoming activation, and financial accident is frequently occurring at mobile terminals by a spread of the Ubiquitous Era on the latest date. We execute an attack regarding mobile stocks transactions system from WiBro networks at this paper, and we study a Security Vulnerability Analysis infringement attack accidents. We generate Forensic data use WireShark, and monitoring calls an actual stock trading process in WiBro networks in order to analyze mobile stocks transactions, and analyze, and detect Vulnerability, and analyzing a packet. We ensure a basis of study detect port, and detect Security Vulnerability through analyses aggressive analysis aggressive viral penetration, authentication packet analysis, analysis aggressive a DDoS network, analysis aggressive a terminal mobile WiBro, a HTS program that there was in order to open through the scanning that used NetScan Tools, and analyze, and generate Forensic data, and to be able to be used as to criminal investigation and legal data.
引用
收藏
页码:291 / 298
页数:8
相关论文
共 50 条
  • [21] Research and Implementation of Network Users' Behavior Forensic Analysis System Based on System Log
    Liu, Yingchun
    Zhao, Aitao
    AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 900 - 903
  • [22] Data Acquisition System Research Based on Mobile Agent in Network Management
    Li, Yan
    Zhu, Li
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ELECTRONIC TECHNOLOGY, 2015, 6 : 485 - 489
  • [23] Research on Quantitative Analysis of Security of Network Risk Based on Big Data
    Qian, Zhang
    2019 INTERNATIONAL CONFERENCE ON ROBOTS & INTELLIGENT SYSTEM (ICRIS 2019), 2019, : 159 - 162
  • [24] Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis
    Hu, Hao
    Liu, Yuling
    Zhang, Hongqi
    Zhang, Yuchen
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [25] Impact analysis of false data injection attacks on power system static security assessment
    Chen, Jiongcong
    Liang, Gaoqi
    Cai, Zexiang
    Hu, Chunchao
    Xu, Yan
    Luo, Fengji
    Zhao, Junhua
    JOURNAL OF MODERN POWER SYSTEMS AND CLEAN ENERGY, 2016, 4 (03) : 496 - 505
  • [26] Impact analysis of false data injection attacks on power system static security assessment
    Jiongcong CHEN
    Gaoqi LIANG
    Zexiang CAI
    Chunchao HU
    Yan XU
    Fengji LUO
    Junhua ZHAO
    JournalofModernPowerSystemsandCleanEnergy, 2016, 4 (03) : 496 - 505
  • [27] State estimation under false data injection attacks: Security analysis and system protection
    Hu, Liang
    Wang, Zidong
    Han, Qing-Long
    Liu, Xiaohui
    AUTOMATICA, 2018, 87 : 176 - 183
  • [28] Security Analysis of Cyber-Physical System under False Data Injection Attacks
    Liu, Ruirui
    Yu, Hao
    Hao, Fei
    2021 PROCEEDINGS OF THE 40TH CHINESE CONTROL CONFERENCE (CCC), 2021, : 8586 - 8591
  • [29] Data Collection and Analysis Framework for Mobile Ad Hoc Network Research
    Arbiv, Scott
    Amin, Rahul
    Goff, Tom
    Street, Dow
    Pedan, Igor
    Bressler, Larry
    Gibbons, Terry
    Cheng, Bow-Nan
    Timmerman, Chayil
    MILCOM 2019 - 2019 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2019,
  • [30] NLP-Based Digital Forensic Analysis for Online Social Network Based on System Security
    Shahbazi, Zeinab
    Byun, Yung-Cheol
    INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH, 2022, 19 (12)