Security Vulnerability Analysis and Forensic Data Research to Attacks on Mobile Stock Trading System in WiBro Network

Summary A financial transaction is becoming activation, and financial accident is frequently occurring at mobile terminals by a spread of the Ubiquitous Era on the latest date. We execute an attack regarding mobile stocks transactions system from WiBro networks at this paper, and we study a Security Vulnerability Analysis infringement attack accidents. We generate Forensic data use WireShark, and monitoring calls an actual stock trading process in WiBro networks in order to analyze mobile stocks transactions, and analyze, and detect Vulnerability, and analyzing a packet. We ensure a basis of study detect port, and detect Security Vulnerability through analyses aggressive analysis aggressive viral penetration, authentication packet analysis, analysis aggressive a DDoS network, analysis aggressive a terminal mobile WiBro, a HTS program that there was in order to open through the scanning that used NetScan Tools, and analyze, and generate Forensic data, and to be able to be used as to criminal investigation and legal data.

[1]  Dea-Woo Park,et al.  A Study on New Treatment Way of a Malicious Code to Use a DLL Injection Technique , 2006 .

[2]  Mahmoud Reza Hashemi,et al.  A Secure m-Payment Protocol for Mobile Devices , 2006, 2006 Canadian Conference on Electrical and Computer Engineering.

[3]  Seo Jeong-Man,et al.  A Study of Security Method against Attack in TCP/IP , 2005 .

[4]  Tzi-cker Chiueh,et al.  Architecture and algorithms for an IEEE 802.11-based multi-channel wireless mesh network , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[5]  Dea-Woo Park A study about dynamic intelligent network security systems to decrease by malicious traffic , 2006 .

[6]  Weili Han,et al.  Anti-Phishing by Smart Mobile Device , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).

[7]  Toshihiko Yamakami MobileWeb 2.0: Lessons from Web 2.0 and Past Mobile Internet Development , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).

[8]  Dea-Woo Park,et al.  A Study on Extraction of Mobile Forensic Data and Integrity Proof , 2007 .

[9]  Angela Orebaugh,et al.  Wireshark & Ethereal Network Protocol Analyzer Toolkit , 2007 .

[10]  M. N. Doja,et al.  Image Authentication Schemes against Key-Logger Spyware , 2008, 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing.