과제정보
This work was supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIT) (No. 2018R1C1B5083789).
참고문헌
- Y. B. Cho, "Diagnosis of communication security vulnerability of network printer using wireshark," Digital Contents Society, vol. 21, no. 3, pp. 601-607, March, 2020. https://doi.org/10.9728/dcs.2020.21.3.601
- J. B. Seo, H. H. Jang, and Y. B. Cho, "Investigate realtime video chat program security issues," in Proceeding of the KIPEE Conference, vol. 12, no. 1, pp. 383-384, November, 2020.
- H. C. Baek, T. G. Son, D. H. Hyun, M. A. Kim, and D. W. Chung, "Technology trends of TCP flow control," Current Industrial and Technological Trends in Aerospace, vol. 18, no. 1, pp. 105-118, July, 2020.
- J. H. Paik, K. H. Chung, and K. H. Choi, "Test executor and testing platform performance improvement suggestions using the UDP," in Proceedings of Symposium of the Korean Institute of Communications and Information Sciences, pp. 1532-1533, June, 2015.
- S. W. Cho, H. S. Choi, G. Heo, S. H. Cho, and Y. G. Kim, "A system for SSL/TLS vulnerability detection of servers", Journal of The Korea Institute of Information Security & Cryptology, vol. 28, no. 1, pp. 145-153, February, 2018. https://doi.org/10.13089/JKIISC.2018.28.1.145
- The Transport Layer Security (TLS) Protocol Version 1.2 [Internet]. Available:https://www.rfc-editor.org/info/rfc5246.
- The Transport Layer Security (TLS) Protocol Version 1.3 [Internet]. Available: https://www.rfc-editor.org/info/rfc8446.
- D. Stebila and N. Sullivan, "An analysis of TLS handshake proxying," in Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA, Helsinki, 2015, pp. 279-286, doi: 10.1109/Trustcom.2015.385.
- S. H. Kim, D. H. Kim, and K. H. Jung, "A study on detection of information hiding through packet analysis," in Proceedings of the Institute of Electronics and Information Engineers, 2017 Summer Conference, pp. 1351-1354, June, 2017.
- P. Goyal and A. Goyal, "Comparative study of two most popular packet sniffing tools-tcpdump and wireshark," in Proceedings of the 2017 9th International Conference on Computational Intelligence and Communication Networks (CICN), Girne, 2017, pp. 77-81, doi: 10.1109/CICN.2017.8319360.
- Microsoft, Security and Microsoft Teams [Internet]. Available: https://docs.microsoft.com/ko-kr/microsoftteams/teams-security-guide.