151. A Study on Responding to DDoS Architecture in Smart Phone Environment
- Author
-
Mi-Ran Han, Jong-Bae Kim, and Young-Chul Oh
- Subjects
021110 strategic, defence & security studies ,Service (systems architecture) ,General Computer Science ,Computer science ,As is ,Zombie ,0211 other engineering and technologies ,Denial-of-service attack ,02 engineering and technology ,Computer security ,computer.software_genre ,Classified information ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Code (cryptography) ,Personally identifiable information ,computer ,Hacker - Abstract
A smart phone is closely related to our lives throughout the world. It processes and stores various information from personal information to classified information of companies. As it is called as “a PC in my hand,” it is similar to a PC so that it is likely to be misused, being exposed to many security threats such as hacking, malicious code, and loss, just like the DDoS attack on PC. A hacker can control a smart phone through a number of zombie smart phone instructions, even shutting down the service on the server. However, it is difficult to adapt the PC defense system to the smart phone environment as is because the attack methods on a PC and a smart phone are different. Therefore, this study aims to compare and analyze DDoS attacks on the smart phone environment and PC environment to predict DDoS attack scenario on the smart phone and establish a defense system to reduce the damage.
- Published
- 2016
- Full Text
- View/download PDF