Indian Journal of Science and Technology
DOI: 10.17485/ijst/2015/v8i26/84140
Year: 2015, Volume: 8, Issue: 26, Pages: 1-9
Original Article
Byungho Park1* , Dukyun Kim1 and Daecheol Shin2
1 Ministry of National Defense, Seoul 140 – 701, Korea; [email protected]
2 Korea e-Government Exp Associations, Seoul 121 – 915, Korea
On the Web, internet sources not only read and view but also are saved in the computer. In addition, we conveniently download the image file which doesn’t know whether it contains a malicious code or not. Moreover, the Internet Image files are the passages which are easy enough to flow in a closed network, but a malicious code, which is secretly inserted into a picture file, can be performed as a malicious offensive code, that is, a hacking code with triggers such as HTML files or executable JavaScript code. So, we suggest an algorithm for safe use with a blocking method of the image file which doesn’t know whether to contain a malicious performance code in a closed network or not.
Keywords: Closed Network, Image Hacking, Malicious Code, Steganography, Stegosploit
Subscribe now for latest articles and news.