DOI QR코드

DOI QR Code

A Study on Countermeasures against Messenger Phishing using ARIT Technique

ARIT 기법을 이용한 메신저 피싱 대응방안에 관한 연구

  • Received : 2013.02.04
  • Accepted : 2013.03.18
  • Published : 2013.05.31

Abstract

With the rapid development of IT technologies, many people talk to each other in real time on-line using messenger or use the messenger to share files for work. However, using this convenience, phishing crimes occur: e.g. demanding money, and if a criminal uses a bypassing technique like proxy in order to hide the IP address the criminal has used to log on, it is in fact, difficult to find the criminal's real IP address. This paper will propose a plan to measure against messenger phishing that may occur in advance by collecting the IP address with which a user has used in a dual channel mode and the real IP address obtained by ARIT Agent using ARIT technique, going through a separate identification process and deciding whether the user has accessed in a normal method.

IT기술의 급속한 발전으로 인해 인터넷 상에서 많은 사람들이 메신저를 이용해 실시간으로 대화를 나누거나 업무처리를 위한 파일 공유 등에 메신저를 사용하고 있다. 하지만 이런 편리성을 이용해 금전 요구 등의 메신저 피싱 범죄가 발생하고 있으며, 범죄자가 자신이 접속한 IP 주소를 은닉하기 위하여 Proxy와 같은 우회기법을 사용할 경우 범죄자의 Real IP 주소를 확인하는 것은 어려운 실정이다. 본 논문은 ARIT 기법을 이용해 2채널 방식으로 접속 IP 주소와 ARIT Agent를 이용해 얻은 Real IP 주소를 수집하여 별도의 확인 과정을 거친 후, 사용자가 정상적인 방법으로 접속했는지 여부를 판단하여 사전에 발생할 수 있는 메신저 피싱에 대응할 수 있는 방안에 대해 제시하고자 한다.

Keywords

References

  1. Kyu-Sung Ahn, Jin-Ku Chey, "The proposal of access blocking methods in messenger", Paper Collection of the Korea Information Science Society, Vol.37, No.1, pp.94-96, 2010.
  2. JuHyun Kim, YoungJae Maeng, DaeHun Nyang, KyungHee Lee, "Cognitive Approach to Anti-Phishing and Anti- Pharming", The Korea Institute of Information Security and Cryptology, Vol.19, No.1, pp.113-124, 2009.
  3. TaeWon Kim, Messenger phishing occured 3.7 times a day[Internet], http://ktw.or.kr/contents/bbs/board.php? bo_ table=AOA&wr_id=492.
  4. Geum-wuk Seo, "Messenger Structure Design using WCF", Micro Software, pp.320-326, 2007.
  5. Shin-Beom Kang, Sang-Jin Lee, Jongin Lim, "A Study on the Criminal Threat and Privacy Protection with a Proxy Service", Vol.22, No.2, pp.317-326, 2012.
  6. Ji-won Gang, "IP Back-tracking Model using improved BPbT Technique", Doctoral Dissertation in Kyonggi University, 2012.
  7. Yoeung-Jun Yoon, Kyoung-Hwan Pyo, Seung-Soo Sin, Kun-Hee Han, "Desing of Messenger for Secure Communication between Users", Spring Symposium Paper Collection of the Korea Academia-Industrial Cooperation Society, Vol.1, pp.81-84, 2010.
  8. Bo-go Jung, Gwang-soo Rhee, "A Design and Implementation of Secure Instant Messenger", Journal of the Information Processing Society of Korea, Vol.8, pp.213-220, 2001.
  9. Byung-yun Park, "Even Correlation Analysis with Traceback for Network Security", Doctoral Dissertation in Kongju University, 2010.
  10. Tae-soo Kim, "A Study on Design Analysis System for Analyzing DDoS Attack and IP Traceback on All-IP Network", Masteral Dissertation in Hanshin University, 2010.