쿠쿠 샌드박스 기술을 이용한 악성코드 행위분석 기법
Malware Behavior Analysis using Cuckoo Sandbox Techniques
- 한국IT마케팅학회
- The Journal of Information Technology and Management
- Vol.1 No.1
-
2013.1216 - 22 (6 pages)
- 287
Intrusion Tolerant Systems is to ensure the continued normal service on the system operation, even if the system is attacked maliciously. Such a system is to be characterized by applying security techniques, but specific technical studies have limitation. Intrusion tolerant based system is proposed security techniques against such as the attack from the outside. The system is applied to a systematic methodology to develop a reliable system. In this paper, the Cuckoo Sandbox tool is referenced for the analysis of malicious codes. It can be constructed and operated dependent services by this system. And it is finely classified and built by the type of database and the security companies to share how to reduce the damage of malicious code. The system is virtualized and built by reliable intrusion tolerant systems for threat detection, control and recovery by the intrusion- tolerant configuration. Also this system is continuously maintained even if system is partially corrupted by malicious intrusion.
Abstract
1. 서론
2. 관련연구
3. 연구모델
4. 시스템 구현 및 시험
5. 결론
6. References
(0)
(0)