New detection method and countermeasure of cyber attacks in mix networks
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Park, Kwang Cheol | - |
dc.contributor.author | Shin, Hoon | - |
dc.contributor.author | Park, Won Hyung | - |
dc.contributor.author | Lim, Jong In | - |
dc.date.accessioned | 2021-09-04T14:02:54Z | - |
dc.date.available | 2021-09-04T14:02:54Z | - |
dc.date.created | 2021-06-18 | - |
dc.date.issued | 2015-08 | - |
dc.identifier.issn | 1380-7501 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/92954 | - |
dc.description.abstract | Recently, studies on the Mixed Networking which guarantees the anonymity in Internet environment are actively carried. Since this technology uses the coded communication and its communication paths are changed frequently, it is difficult to detect attacks of the hackers. In this situation, if the cyber-attack occurs between countries, there shall be a high potential for the hackers to use the anonymous network technology in order to hide themselves. Anyway, the anonymous network technology is continuously being updated by the hackers and a new technology is under development. Thus, this paper verified statistically the attacking methods which the hackers shall create by increasing the data transmission rate of TOR through manipulating the speed of the anonymous network, and proposed political countermeasures to detect hacker's attacks effectively which use this technology. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | SPRINGER | - |
dc.title | New detection method and countermeasure of cyber attacks in mix networks | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lim, Jong In | - |
dc.identifier.doi | 10.1007/s11042-014-2127-7 | - |
dc.identifier.scopusid | 2-s2.0-84939266911 | - |
dc.identifier.wosid | 000359864700027 | - |
dc.identifier.bibliographicCitation | MULTIMEDIA TOOLS AND APPLICATIONS, v.74, no.16, pp.6509 - 6518 | - |
dc.relation.isPartOf | MULTIMEDIA TOOLS AND APPLICATIONS | - |
dc.citation.title | MULTIMEDIA TOOLS AND APPLICATIONS | - |
dc.citation.volume | 74 | - |
dc.citation.number | 16 | - |
dc.citation.startPage | 6509 | - |
dc.citation.endPage | 6518 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.subject.keywordAuthor | Mix networks | - |
dc.subject.keywordAuthor | TOR | - |
dc.subject.keywordAuthor | Cyber attack | - |
dc.subject.keywordAuthor | Ext node | - |
dc.subject.keywordAuthor | Blacklist IP | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.