Jaehan Jeong, Keunho Park, Wooyeon Jo, Taeshik Shon
{"title":"金融网络安全回溯与可视化技术","authors":"Jaehan Jeong, Keunho Park, Wooyeon Jo, Taeshik Shon","doi":"10.1109/IICSPI.2018.8690462","DOIUrl":null,"url":null,"abstract":"Security has been constantly threatened since computers began. The greater the importance of computer roles, the greater the importance of security. Financial security involves a lot of personal information and money, and because it is directly linked to money, the damage is also great. The threat will continue unless you find and block these attackers. If you know the location of the attacker through backtracking, you can essentially block the attack. In addition, if you visualize the attacks, you can easily analyze the attack because you can see at a glance. Our research suggests monitoring attacks that are threatened by financial security and backtracking attackers.","PeriodicalId":6673,"journal":{"name":"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)","volume":"2 1","pages":"480-483"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Backtracking and Visualization Techniques for Financial Network Security\",\"authors\":\"Jaehan Jeong, Keunho Park, Wooyeon Jo, Taeshik Shon\",\"doi\":\"10.1109/IICSPI.2018.8690462\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security has been constantly threatened since computers began. The greater the importance of computer roles, the greater the importance of security. Financial security involves a lot of personal information and money, and because it is directly linked to money, the damage is also great. The threat will continue unless you find and block these attackers. If you know the location of the attacker through backtracking, you can essentially block the attack. In addition, if you visualize the attacks, you can easily analyze the attack because you can see at a glance. Our research suggests monitoring attacks that are threatened by financial security and backtracking attackers.\",\"PeriodicalId\":6673,\"journal\":{\"name\":\"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)\",\"volume\":\"2 1\",\"pages\":\"480-483\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IICSPI.2018.8690462\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IICSPI.2018.8690462","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Backtracking and Visualization Techniques for Financial Network Security
Security has been constantly threatened since computers began. The greater the importance of computer roles, the greater the importance of security. Financial security involves a lot of personal information and money, and because it is directly linked to money, the damage is also great. The threat will continue unless you find and block these attackers. If you know the location of the attacker through backtracking, you can essentially block the attack. In addition, if you visualize the attacks, you can easily analyze the attack because you can see at a glance. Our research suggests monitoring attacks that are threatened by financial security and backtracking attackers.