File Multi-analyses for Real-time Attack Source and Spread Site Trace

Recently, the illegal users with malicious intention utilize the file sharing site by making normal user's computer a zombie computer, which is a preliminary process for network intrusion attack. The propose scheme is divided into the method for real-time analysis for real-time tracking and the method of cooperative analysis method for non-real time analysis. By allowing the supervisors to choose the relevant analysis method selectively, we can conduct variable analysis depending on the network threat.