Acknowledgement
This work was supported by the BB21+ Project in 2020
References
- H. G. Moon & D. J Park. (2020). Edge-Centric Metamorphic IoT Device Platform for Efficient On-Demand Hardware Replacement in Large- Scale IoT Applications. Journal of the Korea Institute of Information and Communication Engineering, 24(12), 1688-1696. https://doi.org/10.6109/JKIICE.2020.24.12.1688
- S. C Lee & D. H Shin. (2020). TCP/IP Using Minimal Resources in IoT Systems. Journal of the Korea Society of Computer and Information, 25(10). 125-133. https://doi.org/10.9708/JKSCI.2020.25.10.125
- H. E Yang, Y. M Oh & Y. J Lee. (2020). The Mobile Anti-Virus Game Using IoT. Proceedings of KIIT Conference.
- J. H. Seol & K. Y Lee. (2008). Implementation of Middleware Security System for Home Networking. Journal of the Korea Institute of Information and Communication Engineering, 12(5), 863-869. https://doi.org/10.6109/JKIICE.2008.12.5.863
- K. O Park & J. K Lee. (2017). A Countermeasure Technique for Attack of Reflection SSDP in Home IoT. Convergence Society for SMB, 7(2). 1-9.
- J. H Oh & K. H Lee. (2016). Attack Scenarios and Countermeasures using CoAP in IoT Environment. Journal of the Korea Convergence Society, 7(4), 33-28. https://doi.org/10.15207/JKCS.2016.7.4.033
- J. W. Seo & S. J. Lee. (2015). A study on the detection of DDoS attack using the IP Spoofing. Journal of the Korea Institute of Information Security & Cryptology, 25(1). 147-153. https://doi.org/10.13089/JKIISC.2015.25.1.147
- Y. Liu, H. C. Baek, J. H. Park & S. B. Kim. (2017). An Improved Model Design for Traceback Analysis Time Based on Euclidean Distance to IP Spoofing Attack. Journal of convergence security, 17(5), 11-18.
- H. D. Lee, H. T. Ha, H.C. Baek, C. G. Kim & S. B. Kim. (2012). Efficient Detction and Defence Model against IP Spoofing Attack through Cooperation of Trusted Hosts. Journal of the Korea Institute of Information and Communication Engineering, 16(12), 2649-2656. https://doi.org/10.6109/jkiice.2012.16.12.2649
- J. S. Jeon, Y. S. Jeong & W. Y. Soh. (2005). Design of Packet Generator for TCP/UDP Protocols Using Packet Sniffing and IP Spoofing. In Proceedings of the Korean Information Science Society Conference. (pp. 649-651).
- B. T. Kang & H. K. Kim. (2011). A study on the vulnerability of OTP implementation by using MITM attack and reverse engineering. Journal of the Korea Institute of Information Security & Cryptology, 21(6), 83-99. https://doi.org/10.13089/JKIISC.2011.21.6.83
- C. S. Lim, W. K. Lee & T. C. Jo. (2010). An Effective Protection Mechanism for SSL Man-in-theMiddle Proxy Attacks. Journal of KIISE : Computing Practices and Letters, 16(6), 693-697.
- S. J. Bang et el. (2018). A Security Analysis of IoT Hub by manufacturer through MITM Attack. The Korean Institute of Information Scientists and Engineers.
- M. Kuhrer, T. Hupperich, C. Rossow & T. Holz. (2014). Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks. 8th {USENIX} Workshop on Offensive Technologies ({WOOT} 14).
- N. K. Baik. (2020). Multi-level detection method for DRDoS attack. Journal of the Korea Institute of Information and Communication Engineering, 24(12), 1670-1675. https://doi.org/10.6109/JKIICE.2020.24.12.1670
- Y. A. Hur & K. H. Lee. (2015). A Study on Countermeasures of Convergence for Big Data and Security Threats to Attack DRDoS in U-Healthcare Device. Journal of the Korea Convergence Society, 6(4), 243-248. https://doi.org/10.15207/JKCS.2015.6.4.243
- H. S. Choi, H. D. Park & H. J. Lee. (2015). A Study on Amplification DRDoS Attacks and Defenses. Journal of Korea Institute of Information, Electronics, and Communication Technology, 8(5), 429-437. https://doi.org/10.17661/jkiiect.2015.8.5.429
- H. J. Kim, S. Y. Cjoi & S. S Shin. (2021). Designing a Response Scheme to Prevent Distributed Reflection Dos. Proceedings of the Korean Society for Internet Information.