This paper relates to mobile malware detection for prevention against financial charge caused by the malicious behavior using SMS. In this paper, we propose the method that conducts malicious behavior monitoring and various analysis techniques to detect the attack. This method includes malware installation check, SMS sending and receiving analysis, and signature-based pattern matching. Therefore, we can effectively respond against SMS mobile malware attacks.
Abstract. Socially and economically, the distributed denial-of-service (DDoS) attacks have been serious threats in the cyber world. Despite of many researches, current defense methods can be vulnerable to the DDoS attacks of unknown traffic pattern to avoid the methods. That is because most of the defense policies configured for the methods are fixed thresholds that were mainly determined by the learning of traffic volume. To overcome the problem caused by the fixed thresholds, we introduce the endpoint mitigation method based on the dynamic thresholding of DDoS defense policies according to the usage changes of system resources. We focused on the fact that the usage changes of system resources show the abnormal statuses of server if the failure/delay of service is occurred by the DDoS attacks that have not been blocked by current defense thresholds. The proposed method detects the server overload as measuring the usage changes of system resources and automatically adjusts current defense thresholds in conjunction with the strength of usage change. As the result, the service problem caused by the DDoS attacks can be gradually mitigated by the automatic threshold controlling of our method.
Purpose – This research aims to provide standards for the judgment of “foreseeability” in the general principle of compensation for damages in Art. 74 of CISG. Design/Methodology/Approach – This research analyzes the legal interpretation of CISG’s provisions related to damage (Art.74~Art.77) and related precedents. Findings – The results revealed the “principle of rationality” as a criterion for judging the “foreseeability” of Art.74 of CISG. Research Implications – From a practical point of view, it is difficult to predict the outcome of disputes in a situation where there is no standard for “foreseeability” as to the extent of damages from the point of view of the party liable under CISG. Therefore, it can be said that the appropriate criteria for “foreseeability” are essential. This paper presents the “principle of rationality” as a standard for. The rationality principles were extracted from the following three provisions of Art.74, namely Art.75~Art.77. These criteria are that the item of recoverable loss must be reasonable, and the amount of recoverable damage must be reasonable. This research is meaningful in presenting standards of damages to trade transaction practitioners.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.