Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

기업 사설 네트워크 우회 접속 분석 및 통제 대책 연구

Full metadata record
DC Field Value Language
dc.contributor.author이철원-
dc.contributor.author김휘강-
dc.contributor.author임종인-
dc.date.accessioned2021-09-08T06:50:25Z-
dc.date.available2021-09-08T06:50:25Z-
dc.date.created2021-06-17-
dc.date.issued2010-
dc.identifier.issn1598-3986-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/117489-
dc.description.abstractA company’s private network protected by a firewall and NAT(Network Address Translation) is not accessible directly through an external internet. However, as Reverse Connection technology used by NetCat extends to the technologies such as SSH Tunnel or HTTP Tunnel, now anyone can easily access a private network of corporation protected by a firewall and NAT. Furthermore, while these kinds of technologies are commercially stretching out to various services such as a remote control and HTTP Tunnel, security managers in a company or general users are confused under the circumstances of inner or outer regulation which is not allowed to access to an internal system with a remote control. What is more serious is to make a covert channel invading a company’s private network through a malicious code and all that technologies. By the way, what matters is that a given security system such as a firewall cannot shield from these perceived dangers. So, we analyze the indirect access of technological methods and the status quo about a company’s internal network and find a solution to get rid of the related dangers.-
dc.languageKorean-
dc.language.isoko-
dc.publisher한국정보보호학회-
dc.title기업 사설 네트워크 우회 접속 분석 및 통제 대책 연구-
dc.title.alternativeA Study on Analysis and Control of Circumvent Connection to the Private Network of Corporation-
dc.typeArticle-
dc.contributor.affiliatedAuthor김휘강-
dc.contributor.affiliatedAuthor임종인-
dc.identifier.bibliographicCitation정보보호학회논문지, v.20, no.6, pp.183 - 194-
dc.relation.isPartOf정보보호학회논문지-
dc.citation.title정보보호학회논문지-
dc.citation.volume20-
dc.citation.number6-
dc.citation.startPage183-
dc.citation.endPage194-
dc.type.rimsART-
dc.identifier.kciidART001509185-
dc.description.journalClass2-
dc.description.journalRegisteredClasskci-
dc.subject.keywordAuthorCovert Channel-
dc.subject.keywordAuthorMalicious Code-
dc.subject.keywordAuthorRemote Control-
dc.subject.keywordAuthorReverse Connection-
dc.subject.keywordAuthorPrivate Network-
dc.subject.keywordAuthorTunneling-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE