Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

New detection method and countermeasure of cyber attacks in mix networks

Full metadata record
DC Field Value Language
dc.contributor.authorPark, Kwang Cheol-
dc.contributor.authorShin, Hoon-
dc.contributor.authorPark, Won Hyung-
dc.contributor.authorLim, Jong In-
dc.date.accessioned2021-09-04T14:02:54Z-
dc.date.available2021-09-04T14:02:54Z-
dc.date.created2021-06-18-
dc.date.issued2015-08-
dc.identifier.issn1380-7501-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/92954-
dc.description.abstractRecently, studies on the Mixed Networking which guarantees the anonymity in Internet environment are actively carried. Since this technology uses the coded communication and its communication paths are changed frequently, it is difficult to detect attacks of the hackers. In this situation, if the cyber-attack occurs between countries, there shall be a high potential for the hackers to use the anonymous network technology in order to hide themselves. Anyway, the anonymous network technology is continuously being updated by the hackers and a new technology is under development. Thus, this paper verified statistically the attacking methods which the hackers shall create by increasing the data transmission rate of TOR through manipulating the speed of the anonymous network, and proposed political countermeasures to detect hacker's attacks effectively which use this technology.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherSPRINGER-
dc.titleNew detection method and countermeasure of cyber attacks in mix networks-
dc.typeArticle-
dc.contributor.affiliatedAuthorLim, Jong In-
dc.identifier.doi10.1007/s11042-014-2127-7-
dc.identifier.scopusid2-s2.0-84939266911-
dc.identifier.wosid000359864700027-
dc.identifier.bibliographicCitationMULTIMEDIA TOOLS AND APPLICATIONS, v.74, no.16, pp.6509 - 6518-
dc.relation.isPartOfMULTIMEDIA TOOLS AND APPLICATIONS-
dc.citation.titleMULTIMEDIA TOOLS AND APPLICATIONS-
dc.citation.volume74-
dc.citation.number16-
dc.citation.startPage6509-
dc.citation.endPage6518-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.subject.keywordAuthorMix networks-
dc.subject.keywordAuthorTOR-
dc.subject.keywordAuthorCyber attack-
dc.subject.keywordAuthorExt node-
dc.subject.keywordAuthorBlacklist IP-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE