Advertisement

Analysis of Cyber Attacks and Security Intelligence

  • Youngsoo KimEmail author
  • Ikkyun Kim
  • Namje Park
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 274)

Abstract

A cyber attack is deliberate exploitation of computer systems, technology-dependent enterprises and networks. Cyber attacks use malicious code to alter computer code, logic or data, resulting in disruptive consequences that can compromise data and lead to cybercrimes, such as information and identity theft. Cyber attack is also known as a computer network attack (CNA). Cyber attacks occurred targeting banks and broadcasting companies in South Korea on March 20. The malware involved in these attacks brought down multiple websites and interrupted bank transactions by overwriting the Master Boot Record (MBR) and all the logical drives on the infected servers rendering them unusable. It was reported that 32,000 computers had been damaged and the exact amount of the financial damage has not yet been calculated. More serious is that we are likely to have greater damages in case of occurring additional attacks, since exact analysis of cause is not done yet. APT(Advanced Persistent Threat), which is becoming a big issue due to this attack, is not a brand new way of attacking, but a kind of keyword standing for a trend of recent cyber attacks. In this paper, we show some examples and features of recent cyber attacks and describe phases of them. Finally, we conclude that only the concept of security intelligence can defend these cyber threats.

Keywords

Cyber Attacks Security Intelligence MBR APT Threat 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
  2. 2.
    Pangalos, G., et al.: The Importance of Corporate Forensic Readiness in the information security framework. In: 2010 Workshops on Enabling Technologies (2010)Google Scholar
  3. 3.
  4. 4.
  5. 5.
    Rivner, U.: Anatomy of an Attack, http://blogs.rsa.com/rivner/anatomy-of-an-attack/
  6. 6.
    MacDonald, N.: The future of information Security is Context Aware and Adaptive. GartnerGoogle Scholar
  7. 7.
    Park, N., Kwak, J., Kim, S., Won, D., Kim, H.: WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 741–748. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  8. 8.
    Park, N.: Security scheme for managing a large quantity of individual information in RFID environment. In: Zhu, R., Zhang, Y., Liu, B., Liu, C. (eds.) ICICA 2010. CCIS, vol. 106, pp. 72–79. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  9. 9.
    Park, N.: Secure UHF/HF Dual-Band RFID: Strategic Framework Approaches and Application Solutions. In: Jędrzejowicz, P., Nguyen, N.T., Hoang, K. (eds.) ICCCI 2011, Part I. LNCS, vol. 6922, pp. 488–496. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  10. 10.
    Park, N.: Implementation of Terminal Middleware Platform for Mobile RFID computing. International Journal of Ad Hoc and Ubiquitous Computing 8(4), 205–219 (2011)CrossRefGoogle Scholar
  11. 11.
    Park, N., Kim, Y.: Harmful Adult Multimedia Contents Filtering Method in Mobile RFID Service Environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010, Part II. LNCS (LNAI), vol. 6422, pp. 193–202. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  12. 12.
    Park, N., Song, Y.: AONT Encryption Based Application Data Management in Mobile RFID Environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010, Part II. LNCS (LNAI), vol. 6422, pp. 142–152. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  13. 13.
    Park, N.: Customized Healthcare Infrastructure Using Privacy Weight Level Based on Smart Device. In: Lee, G., Howard, D., Ślęzak, D. (eds.) ICHIT 2011. CCIS, vol. 206, pp. 467–474. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  14. 14.
    Park, N.: Secure Data Access Control Scheme Using Type-Based Re-encryption in Cloud Environment. In: Katarzyniak, R., Chiu, T.-F., Hong, C.-F., Nguyen, N.T. (eds.) Semantic Methods. SCI, vol. 381, pp. 319–327. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  15. 15.
    Kim, Y., Park, N., Hong, D.: Enterprise Data Loss Prevention System Having a Function of Coping with Civil Suits. In: Lee, R. (ed.) Computers,Networks, Systems, and Industrial Engineering 2011. SCI, vol. 365, pp. 201–208. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  16. 16.
    Kim, Y., Park, N., Won, D.: Privacy-Enhanced Adult Certification Method for MultimediaContents on Mobile RFID Environments. In: Proc. of IEEE International Symposium onConsumer Electronics, pp. 1–4. IEEE, Los Alamitos (2007)Google Scholar
  17. 17.
    Kim, Y., Park, N., Hong, D., Won, D.: Adult Certification System on Mobile RFID ServiceEnvironments. Journal of Korea Contents Association 9(1), 131–138 (2009)CrossRefGoogle Scholar
  18. 18.
    Park, N., Song, Y.: Secure RFID Application Data Management Using All-Or-Nothing Transform Encryption. In: Pandurangan, G., Anil Kumar, V.S., Ming, G., Liu, Y., Li, Y. (eds.) WASA 2010. LNCS, vol. 6221, pp. 245–252. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  19. 19.
    Park, N.: The Implementation of Open Embedded S/W Platform for Secure Mobile RFID Reader. The Journal of Korea Information and Communications Society 35(5), 785–793 (2010)Google Scholar
  20. 20.
    Park, N.: Mobile RFID/NFC Linkage Based on UHF/HF Dual Band’s Integration in U-Sensor Network Era. In: Park, J.J. (J.H.), Kim, J., Zou, D., Lee, Y.S. (eds.) ITCS & STA 2012. LNEE, vol. 180, pp. 265–271. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  21. 21.
    Park, N.: Secure Data Access Control Scheme Using Type-Based Re-encryption in Cloud Environment. In: Katarzyniak, R., Chiu, T.-F., Hong, C.-F., Nguyen, N.T. (eds.) Semantic Methods. SCI, vol. 381, pp. 319–327. Springer, Heidelberg (2011)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  1. 1.Cyber Security Research LaboratoryElectronics and Telecommunications Research Institute (ETRI)DaejeonKorea
  2. 2.Department of Computer Education, Teachers CollegeJeju National UniversityJejuKorea

Personalised recommendations