Security Vulnerability Analysis and Forensic Data Research to Attacks on Mobile Stock Trading System in WiBro Network

被引:0
|
作者
Chun, Woo-Sung [1 ]
Park, Dea-Woo [1 ]
机构
[1] Hoseo Grad Sch Venture, Dept IT Applicat Technol, Seoul, South Korea
关键词
WiBro; Vulnerability; Forensic; Hacker Attack; DDoS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A financial transaction is becoming activation, and financial accident is frequently occurring at mobile terminals by a spread of the Ubiquitous Era on the latest date. We execute an attack regarding mobile stocks transactions system from WiBro networks at this paper, and we study a Security Vulnerability Analysis infringement attack accidents. We generate Forensic data use WireShark, and monitoring calls an actual stock trading process in WiBro networks in order to analyze mobile stocks transactions, and analyze, and detect Vulnerability, and analyzing a packet. We ensure a basis of study detect port, and detect Security Vulnerability through analyses aggressive analysis aggressive viral penetration, authentication packet analysis, analysis aggressive a DDoS network, analysis aggressive a terminal mobile WiBro, a HTS program that there was in order to open through the scanning that used NetScan Tools, and analyze, and generate Forensic data, and to be able to be used as to criminal investigation and legal data.
引用
收藏
页码:291 / 298
页数:8
相关论文
共 50 条
  • [31] Research on Risk Analysis and Security Testing Technology of Mobile Application in Power System
    Guo, Jing
    Jiang, Haitao
    Zhou, Chao
    2017 IEEE CONFERENCE ON ENERGY INTERNET AND ENERGY SYSTEM INTEGRATION (EI2), 2017,
  • [32] Research on architecture of security video surveillance network cascade system with big data
    Li, Zhihua
    Tang, Zianfei
    Yang, Yihua
    WORLD JOURNAL OF ENGINEERING, 2016, 13 (01) : 77 - 81
  • [33] Quantitative security analysis of a dynamic network system under lateral movement-based attacks
    Yu, Shi
    Chang Xiaolin
    Rodriguez, Ricardo J.
    Zhang Zhenjiang
    Trivedi, Kishor S.
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2019, 183 : 213 - 225
  • [34] A Visualization System for Multiple Heterogeneous Network Security Data and Fusion Analysis
    Zhang, Sheng
    Shi, Ronghua
    Zhao, Jue
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (06): : 2801 - 2816
  • [35] 4G Mobile Communication Network System Security Faced with Threat Question Research
    Wu Xinmin
    Wu Haoshu
    MEMS, NANO AND SMART SYSTEMS, PTS 1-6, 2012, 403-408 : 1564 - 1567
  • [36] The research on mobile video quality analysis and evaluation system for TD network
    Jiang, Dan
    Zhang, Xinchen
    Liang, Meiyan
    MEASUREMENT TECHNOLOGY AND ENGINEERING RESEARCHES IN INDUSTRY, PTS 1-3, 2013, 333-335 : 799 - 802
  • [37] Co-simulation for Cyber Security Analysis: Data Attacks against Energy Management System
    Pan, Kaikai
    Teixeira, Andre
    Lopez, Claudio David
    Palensky, Peter
    2017 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2017, : 253 - 258
  • [38] A Deep Neural-Network Based Stock Trading System Based on Evolutionary Optimized Technical Analysis Parameters
    Sezer, Omer Berat
    Ozbayoglu, Murat
    Dogdu, Erdogan
    COMPLEX ADAPTIVE SYSTEMS CONFERENCE WITH THEME: ENGINEERING CYBER PHYSICAL SYSTEMS, CAS, 2017, 114 : 473 - 480
  • [39] Cyber Security and Vulnerability Analysis of Networked Control System subject to False-Data injection
    Gerard, Benjamin
    Rebai, Souad Bezzaoucha
    Voos, Holger
    Darouach, Mohamed
    2018 ANNUAL AMERICAN CONTROL CONFERENCE (ACC), 2018, : 992 - 997
  • [40] Research of Mobile Inspection Substation Platform Data Analysis Method and System
    Li, Peng
    Gao, Ruibin
    Qu, Lu
    Wu, Wenjing
    Hu, Zhiqiang
    Guo, Guang
    INDUSTRIAL IOT TECHNOLOGIES AND APPLICATIONS, INDUSTRIAL IOT 2016, 2016, 173