Skip to main content
Log in

A Study of Integrity on the Security Patches System Using PM-FTS

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

A variety of operating systems and application programs on the internet have weak points in terms of security. Intelligent attacks on such weak points have been spreading rapidly, causing a lot of damage. In particular, the files downloaded use Application Programming Interface, an intermediate interface between operating systems and application programs, for their running. At that time, attacks on weak points of the application programs are made. In such a principle, users are infected with the malicious codes disguised in the process of updating security patches. Therefore, this work tries to propose a system for integrity security patch updating using PM-FTS (Patch Management–File Transfer System).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. http://www.kcc.go.kr/tsi/etc/search/search/ASC_integrationsearch.jsp?page=A1001000.

  2. Tankard, C. (2011). Persistent threats and how to monitor and deter them. Network security, 2011(8), 16–19.

    Article  Google Scholar 

  3. Symantec, Symantec internet security threat report. Symantec, Vol. 17, 2011.

  4. Coviello, A. W. (2011). Open letter to RSA customers. www.rsa.com/node.aspx?id=3872.

  5. Han, S. B., & Hong, S. K. (2013). A study on responses against in the financial sector for APT attack. Korea Institute of Information Security & Cryptology, 23(1), 44–53.

    Google Scholar 

  6. http://www.hauri.co.kr/customer/security/colum_view.html?intSeq=93&page=1.

  7. Sung, A., Zu, J., Chavez, P., Mukkamala, S. (2004). Static analyzer for vicious executavles (SAVE). In 20th annual computer security applications conference, pp. 326–334.

  8. Bergeron, J., Debbabi, M., Desharnais, J., Erhioui, M. M., Lavoie, Y., Tawbi, N. (2001). Static detection of malicious code in executable programs, SREIS ‘01.

  9. Masood, S. G. (2004). Malware analysis for administrators, http://www.securityfocus.com/infocus/1780.

  10. Chaang, C.-W., Tsai, D.-R., Tsai, J.-M. (2005). A cross-site patch management model and architecture design for large scale heterogeneous environment. Security Technology 2005, CCST ‘05. 39th, IEEE, pp. 41–46.

  11. Shon, T., Moon, J., Lee, C., Im, E. G., & Seo, J. T. (2003). Safe patch distribution architecture in intranet environments. Securtiy and Management, 2003, 455–460.

    Google Scholar 

  12. Tak, B. C., Chung, Y. D., & Kim, M. H. (2005). Improving fault tolerance for high-capacity shared distributed file systems using the rotational lease under network Partitioning. Korea Institute of Information Scientists and Engineers, 32(6), 616–628.

    Google Scholar 

  13. Curtis, P. W. (2002). Using SANs and NAS. Cambridge: O’Reilly.

    Google Scholar 

  14. Gibson, G. A., & Meter, R. V. (2000). Network attached storage architecture. Communications of the ACM, 43(11), 37–45.

    Article  Google Scholar 

  15. Lee, W. B., & Park, J. W. (2007). Application of Group Master Cachefor the Integrated Environment of SAN and NAS. Korea Society for Simulation, 16(2), 9–15.

    Google Scholar 

Download references

Acknowledgments

This work was supported by Kyonggi University Research Grant 2013.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Minsu Kim.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kim, K.J., Kim, M. A Study of Integrity on the Security Patches System Using PM-FTS. Wireless Pers Commun 94, 165–173 (2017). https://doi.org/10.1007/s11277-015-3162-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-015-3162-z

Keywords

Navigation