기업 사설 네트워크 우회 접속 분석 및 통제 대책 연구
DC Field | Value | Language |
---|---|---|
dc.contributor.author | 이철원 | - |
dc.contributor.author | 김휘강 | - |
dc.contributor.author | 임종인 | - |
dc.date.accessioned | 2021-09-08T06:50:25Z | - |
dc.date.available | 2021-09-08T06:50:25Z | - |
dc.date.created | 2021-06-17 | - |
dc.date.issued | 2010 | - |
dc.identifier.issn | 1598-3986 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/117489 | - |
dc.description.abstract | A company’s private network protected by a firewall and NAT(Network Address Translation) is not accessible directly through an external internet. However, as Reverse Connection technology used by NetCat extends to the technologies such as SSH Tunnel or HTTP Tunnel, now anyone can easily access a private network of corporation protected by a firewall and NAT. Furthermore, while these kinds of technologies are commercially stretching out to various services such as a remote control and HTTP Tunnel, security managers in a company or general users are confused under the circumstances of inner or outer regulation which is not allowed to access to an internal system with a remote control. What is more serious is to make a covert channel invading a company’s private network through a malicious code and all that technologies. By the way, what matters is that a given security system such as a firewall cannot shield from these perceived dangers. So, we analyze the indirect access of technological methods and the status quo about a company’s internal network and find a solution to get rid of the related dangers. | - |
dc.language | Korean | - |
dc.language.iso | ko | - |
dc.publisher | 한국정보보호학회 | - |
dc.title | 기업 사설 네트워크 우회 접속 분석 및 통제 대책 연구 | - |
dc.title.alternative | A Study on Analysis and Control of Circumvent Connection to the Private Network of Corporation | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | 김휘강 | - |
dc.contributor.affiliatedAuthor | 임종인 | - |
dc.identifier.bibliographicCitation | 정보보호학회논문지, v.20, no.6, pp.183 - 194 | - |
dc.relation.isPartOf | 정보보호학회논문지 | - |
dc.citation.title | 정보보호학회논문지 | - |
dc.citation.volume | 20 | - |
dc.citation.number | 6 | - |
dc.citation.startPage | 183 | - |
dc.citation.endPage | 194 | - |
dc.type.rims | ART | - |
dc.identifier.kciid | ART001509185 | - |
dc.description.journalClass | 2 | - |
dc.description.journalRegisteredClass | kci | - |
dc.subject.keywordAuthor | Covert Channel | - |
dc.subject.keywordAuthor | Malicious Code | - |
dc.subject.keywordAuthor | Remote Control | - |
dc.subject.keywordAuthor | Reverse Connection | - |
dc.subject.keywordAuthor | Private Network | - |
dc.subject.keywordAuthor | Tunneling | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.