참고문헌
- KrCERT, "ARP attack analysis and countermeasures", KISA, Technical Report, TR-2007-001_ARP_Spoofing, 2007.
- WEF, "WEF_Global_IT_Report_2015", World Economic Forum, pp. 183-291, 2015.
- C. S. Lim, W. K. Lee, "An Effective Protection Mechanism for SSL Man-in-the-Middle Proxy Attacks", Journal of Computing Science and Engineering vol. 16, no. 6, pp. 693-697, 2010.
- Mohan Gowda G S, Janardhan Singh, "Secure Search Engine for Mobile Users for Countering the Attacks over Internet", International Journal of Innovative Technology and Exploring Engineering, vol. 4, no. 2, pp. 7-10, 2014.
- T.H. Song, "A Study on the Defense Against MITM with Message-Level Security", MA dissertation, University of Seoul, Graduate School of Science and Technology, 2013.
- Man-in-the-middle attack [Internet]. Available: https://en.wikipedia.org/wiki/Man-in-the-middle_attack
- M. S. Song, "A study on Detection and Protection for ARP Spoofing Attack based on Routing Trace", MA dissertation, Seoul National University of Science and Technology, 2013.
- IETF RFC. 826, IEFF An Ethernet Address Resolution Protocol, IETF, David C. Plummer, 1982.
- I. H. Jung, "An Internet Stopper Using ARP Spoofing with Automatic Node Identification", Institute of Internet, Broadcasting and Communication, vol. 11, no. 6, pp93-106, 2011.
- Risk of Wi-Fi [Internet]. Available: http://blogsabo.ahnlab.com/1872
- S. B. Choi, C. H. Lim, "SSL Compare Products and classification of SSL acceleration technology", Cryptography & Network Security Center, Future Systems, Inc., Technical Report, FS-TR01-05,pp.16-17, 2001.
- sslstrip is a tool that demonstrates the HTTPS stripping attacks, [Internet]. Available: http://www.thoughtcrime. org/software/sslstrip/
- Vivek Ramachandran and Sukumar Nandi, "Detection ARP spoofing: An active technique", Cisco Systems, Inc., 2005.
- Kozierok, C.M. "TCP/IP Guide. 1 edn. No Starch Press", 2005.
- Ferdous A Barbhuiya, Santosh Biswas and Sukumar Nandi, "An active host-based detection mechanism for ARP Related attacks.", International Journal of Network Security & Its Applications, vol. 3, no. 3, 2011.
- arpwatch [Internet]. Available: http://www.arpalert.rg
- arpguard [Internet]. Available: https://www.arp-guard.com
- xarp [Internet]. Available: http://www.xarp.net/
- Configuring Dynamic ARP Inspection [Internet]. Available: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst 3750/software/release/12-2_25_see/configuration/guide/scg/swdynarp.html#wp1038527
- SG Secure Switch [Internet]. Available: http://handream. net/product/switch/sg/
- TiFRONT Secure Switch [Internet]. Available: http://www.piolink.co.kr/TiFRONT/sec/sec_01.asp
- S. P. Hong, "An efficient prevention technique using the reliable ARP table for ARP spoofing attacks", MA dissertation, Dept. Computing, Graduate School of Soongsil University, pp.9-10, 2011.
- JavaScript [Internet]. Available: https://en.wikipedia.org/wiki/JavaScript
- KISA, "Software Development Security Guide for e-government software development and Operators", Ministry of Government Administration and Home Affairs, (11-1311000-000330-10), pp. 4-6, 2013.
피인용 문헌
- SW 취약점의 보안성 강화를 위한 진단원의 교육 양성 연구 vol.21, pp.5, 2017, https://doi.org/10.6109/jkiice.2017.21.5.945
- 클라우드 환경에서의 대용량 데이터 전송의 효율성과 보안성 강화를 위한 부분 암호화 방법 vol.6, pp.9, 2016, https://doi.org/10.3745/ktccs.2017.6.9.397