Abstract
A variety of operating systems and application programs on the internet have weak points in terms of security. Intelligent attacks on such weak points have been spreading rapidly, causing a lot of damage. In particular, the files downloaded use Application Programming Interface, an intermediate interface between operating systems and application programs, for their running. At that time, attacks on weak points of the application programs are made. In such a principle, users are infected with the malicious codes disguised in the process of updating security patches. Therefore, this work tries to propose a system for integrity security patch updating using PM-FTS (Patch Management–File Transfer System).
Similar content being viewed by others
References
http://www.kcc.go.kr/tsi/etc/search/search/ASC_integrationsearch.jsp?page=A1001000.
Tankard, C. (2011). Persistent threats and how to monitor and deter them. Network security, 2011(8), 16–19.
Symantec, Symantec internet security threat report. Symantec, Vol. 17, 2011.
Coviello, A. W. (2011). Open letter to RSA customers. www.rsa.com/node.aspx?id=3872.
Han, S. B., & Hong, S. K. (2013). A study on responses against in the financial sector for APT attack. Korea Institute of Information Security & Cryptology, 23(1), 44–53.
http://www.hauri.co.kr/customer/security/colum_view.html?intSeq=93&page=1.
Sung, A., Zu, J., Chavez, P., Mukkamala, S. (2004). Static analyzer for vicious executavles (SAVE). In 20th annual computer security applications conference, pp. 326–334.
Bergeron, J., Debbabi, M., Desharnais, J., Erhioui, M. M., Lavoie, Y., Tawbi, N. (2001). Static detection of malicious code in executable programs, SREIS ‘01.
Masood, S. G. (2004). Malware analysis for administrators, http://www.securityfocus.com/infocus/1780.
Chaang, C.-W., Tsai, D.-R., Tsai, J.-M. (2005). A cross-site patch management model and architecture design for large scale heterogeneous environment. Security Technology 2005, CCST ‘05. 39th, IEEE, pp. 41–46.
Shon, T., Moon, J., Lee, C., Im, E. G., & Seo, J. T. (2003). Safe patch distribution architecture in intranet environments. Securtiy and Management, 2003, 455–460.
Tak, B. C., Chung, Y. D., & Kim, M. H. (2005). Improving fault tolerance for high-capacity shared distributed file systems using the rotational lease under network Partitioning. Korea Institute of Information Scientists and Engineers, 32(6), 616–628.
Curtis, P. W. (2002). Using SANs and NAS. Cambridge: O’Reilly.
Gibson, G. A., & Meter, R. V. (2000). Network attached storage architecture. Communications of the ACM, 43(11), 37–45.
Lee, W. B., & Park, J. W. (2007). Application of Group Master Cachefor the Integrated Environment of SAN and NAS. Korea Society for Simulation, 16(2), 9–15.
Acknowledgments
This work was supported by Kyonggi University Research Grant 2013.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kim, K.J., Kim, M. A Study of Integrity on the Security Patches System Using PM-FTS. Wireless Pers Commun 94, 165–173 (2017). https://doi.org/10.1007/s11277-015-3162-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-015-3162-z