Browse > Article
http://dx.doi.org/10.14702/JPEE.2021.113

Online Training Platform Network Packet Analysis  

Seo, Jin-beom (Department of Information Security, Daejeon University)
Jang, Ho-hyuk (Department of Information Security, Daejeon University)
Cho, Young-bok (Department of Information Security, Daejeon University)
Publication Information
Journal of Practical Engineering Education / v.13, no.1, 2021 , pp. 113-123 More about this Journal
Abstract
Recently, communication methods such as education and meetings are changing to keep social distance due to Corona 19. However, due to sudden changes in the communication method, security problems such as leakage of personal information due to the platform that is lacking in safety, leakage of meetings and training materials, and obstruction of classes and meetings through abnormal connections is occurring. In this paper, we focus on network packets using Wireshark to security in the ZOOM, Teams, and Google Meet environments used by most online education platforms.
Keywords
Corona; Network; Online Education Platform; Packet; Security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Y. B. Cho, "Diagnosis of communication security vulnerability of network printer using wireshark," Digital Contents Society, vol. 21, no. 3, pp. 601-607, March, 2020.   DOI
2 The Transport Layer Security (TLS) Protocol Version 1.2 [Internet]. Available:https://www.rfc-editor.org/info/rfc5246.
3 J. B. Seo, H. H. Jang, and Y. B. Cho, "Investigate realtime video chat program security issues," in Proceeding of the KIPEE Conference, vol. 12, no. 1, pp. 383-384, November, 2020.
4 J. H. Paik, K. H. Chung, and K. H. Choi, "Test executor and testing platform performance improvement suggestions using the UDP," in Proceedings of Symposium of the Korean Institute of Communications and Information Sciences, pp. 1532-1533, June, 2015.
5 S. W. Cho, H. S. Choi, G. Heo, S. H. Cho, and Y. G. Kim, "A system for SSL/TLS vulnerability detection of servers", Journal of The Korea Institute of Information Security & Cryptology, vol. 28, no. 1, pp. 145-153, February, 2018.   DOI
6 S. H. Kim, D. H. Kim, and K. H. Jung, "A study on detection of information hiding through packet analysis," in Proceedings of the Institute of Electronics and Information Engineers, 2017 Summer Conference, pp. 1351-1354, June, 2017.
7 P. Goyal and A. Goyal, "Comparative study of two most popular packet sniffing tools-tcpdump and wireshark," in Proceedings of the 2017 9th International Conference on Computational Intelligence and Communication Networks (CICN), Girne, 2017, pp. 77-81, doi: 10.1109/CICN.2017.8319360.   DOI
8 Microsoft, Security and Microsoft Teams [Internet]. Available: https://docs.microsoft.com/ko-kr/microsoftteams/teams-security-guide.
9 D. Stebila and N. Sullivan, "An analysis of TLS handshake proxying," in Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA, Helsinki, 2015, pp. 279-286, doi: 10.1109/Trustcom.2015.385.   DOI
10 The Transport Layer Security (TLS) Protocol Version 1.3 [Internet]. Available: https://www.rfc-editor.org/info/rfc8446.
11 H. C. Baek, T. G. Son, D. H. Hyun, M. A. Kim, and D. W. Chung, "Technology trends of TCP flow control," Current Industrial and Technological Trends in Aerospace, vol. 18, no. 1, pp. 105-118, July, 2020.