Jaehan Jeong, Keunho Park, Wooyeon Jo, Taeshik Shon
{"title":"Backtracking and Visualization Techniques for Financial Network Security","authors":"Jaehan Jeong, Keunho Park, Wooyeon Jo, Taeshik Shon","doi":"10.1109/IICSPI.2018.8690462","DOIUrl":null,"url":null,"abstract":"Security has been constantly threatened since computers began. The greater the importance of computer roles, the greater the importance of security. Financial security involves a lot of personal information and money, and because it is directly linked to money, the damage is also great. The threat will continue unless you find and block these attackers. If you know the location of the attacker through backtracking, you can essentially block the attack. In addition, if you visualize the attacks, you can easily analyze the attack because you can see at a glance. Our research suggests monitoring attacks that are threatened by financial security and backtracking attackers.","PeriodicalId":6673,"journal":{"name":"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)","volume":"2 1","pages":"480-483"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IICSPI.2018.8690462","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Security has been constantly threatened since computers began. The greater the importance of computer roles, the greater the importance of security. Financial security involves a lot of personal information and money, and because it is directly linked to money, the damage is also great. The threat will continue unless you find and block these attackers. If you know the location of the attacker through backtracking, you can essentially block the attack. In addition, if you visualize the attacks, you can easily analyze the attack because you can see at a glance. Our research suggests monitoring attacks that are threatened by financial security and backtracking attackers.