A study on monitoring and protecting computer system against interception threat

  • Authors:
  • Seongje Cho;Chulyean Chang;Joonmo Kim;Jongmoo Choi

  • Affiliations:
  • Division of Information and Computer Science, Dankook University, Seoul, Korea;Division of Information and Computer Science, Dankook University, Seoul, Korea;Information Security Technology Division, Korea Information Security Agency, Seoul, Korea;Division of Information and Computer Science, Dankook University, Seoul, Korea

  • Venue:
  • HSI'03 Proceedings of the 2nd international conference on Human.society@internet
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

Perfect protection against all system threats is considered to be impossible. The problem of monitoring against the threats has been an issue in literature, but its progress has not yet been met any practical need. Further, the inherent complexity of the problem in terms of any known approaches gives firm impressions that there are no practical solutions, and so fewer challenges have been made than those against virus and worms. This paper presents a new challenge of setting up traps against most interception threats that try to copy or read illicitly programs or data. Figuratively, traps are set up on the place where any legitimate program could not reach. The proposed technique uses sensor objects and is considered to be the best way of detecting unknown interception threats.