DOI QR코드

DOI QR Code

출구 릴레이 방법론을 이용한 Tor 보안 정책

A Tor Security Policy using Exit Relay Methodology

  • 투고 : 2017.03.30
  • 심사 : 2017.05.25
  • 발행 : 2017.06.30

초록

Tor proxy tool is studied which is most frequently used for ransomeware to penetrate into sensitive information. It will be researched for the malicious methods to spread virus by using Tor and considered a countermeasure to prevent them. We present exit relay methodology for Tor security policy, simulate it, and get a probability to detect the ransomeware. And we compare it with TSS technology which is able to protect the attack via virtual server on exit relay.

키워드

참고문헌

  1. KSN, KSN Repot: Ransomeware In 2014-2016, https://securelist.com/pc-ransomwarein-2014-2016/75145 (accessed Sep., 25, 2016).
  2. The Appearance of Cryptowall Updates and New Families of Ransomeware, https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/cryptowall-updates-new-families-of-ransomware-found (accessed Sep., 28, 2016).
  3. TOR, http://torproject.org (accessed Jul., 3, 2016).
  4. What Kind of Structure is Anonymous Communication Tor, http://techholic.co.kr/archives/46127 (accessed Dec., 10, 2016).
  5. Onion Routing, https://www.onion-router.net (accessed Aug., 30, 2016).
  6. TrendMicro, Cybercrime Hits the Unexpected, 1st Quarter Intimidation Report, 2014.
  7. Korea Internet and Security Agency, Kr CERT/cc, Case Analysis for the Principle of Tor Network and Relative Malicious Code, 2014.
  8. J.Y. Seo, A Study on Enhancing Performance and Secrecy of Tor Anonymous Communication System, Master's Thesis of Ajou University of Technology, 2009.
  9. Red Sox, Hacking Team Traceback In-depth Analysis, https://thenewspro.org/?p=13534 (accessed Sept., 15, 2016).
  10. Akamai, Akamai's State of the Internet/Security, 2015.
  11. D. Easley and J. Kleniberg, Networks, Crowds, and Markets : Reasoning about a High Connected World, Cambridge University Press, Cambridge, U.K., 2010.
  12. M.H. Choi, B.T. Ahn, S.J. Kim, S.K. Ryu, and H.S. Kang, "An Operating Strategy of Outer Networking of University According to Traffic Efficiency Analysis," Journal of Korea Multimedia Society, Vol. 8, No. 1, pp. 119-127, 2005.