Browse > Article
http://dx.doi.org/10.3745/KTCCS.2013.2.5.223

A Study on Countermeasures against Messenger Phishing using ARIT Technique  

Cho, Sung Kyu (숭실대학교 컴퓨터학과)
Jun, Moon Seog (숭실대학교 컴퓨터학과)
Publication Information
KIPS Transactions on Computer and Communication Systems / v.2, no.5, 2013 , pp. 223-230 More about this Journal
Abstract
With the rapid development of IT technologies, many people talk to each other in real time on-line using messenger or use the messenger to share files for work. However, using this convenience, phishing crimes occur: e.g. demanding money, and if a criminal uses a bypassing technique like proxy in order to hide the IP address the criminal has used to log on, it is in fact, difficult to find the criminal's real IP address. This paper will propose a plan to measure against messenger phishing that may occur in advance by collecting the IP address with which a user has used in a dual channel mode and the real IP address obtained by ARIT Agent using ARIT technique, going through a separate identification process and deciding whether the user has accessed in a normal method.
Keywords
Massenger; Phishing; IP Traceback; Proxy;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Kyu-Sung Ahn, Jin-Ku Chey, "The proposal of access blocking methods in messenger", Paper Collection of the Korea Information Science Society, Vol.37, No.1, pp.94-96, 2010.
2 JuHyun Kim, YoungJae Maeng, DaeHun Nyang, KyungHee Lee, "Cognitive Approach to Anti-Phishing and Anti- Pharming", The Korea Institute of Information Security and Cryptology, Vol.19, No.1, pp.113-124, 2009.   과학기술학회마을
3 TaeWon Kim, Messenger phishing occured 3.7 times a day[Internet], http://ktw.or.kr/contents/bbs/board.php? bo_ table=AOA&wr_id=492.
4 Geum-wuk Seo, "Messenger Structure Design using WCF", Micro Software, pp.320-326, 2007.
5 Shin-Beom Kang, Sang-Jin Lee, Jongin Lim, "A Study on the Criminal Threat and Privacy Protection with a Proxy Service", Vol.22, No.2, pp.317-326, 2012.   과학기술학회마을
6 Ji-won Gang, "IP Back-tracking Model using improved BPbT Technique", Doctoral Dissertation in Kyonggi University, 2012.
7 Yoeung-Jun Yoon, Kyoung-Hwan Pyo, Seung-Soo Sin, Kun-Hee Han, "Desing of Messenger for Secure Communication between Users", Spring Symposium Paper Collection of the Korea Academia-Industrial Cooperation Society, Vol.1, pp.81-84, 2010.
8 Bo-go Jung, Gwang-soo Rhee, "A Design and Implementation of Secure Instant Messenger", Journal of the Information Processing Society of Korea, Vol.8, pp.213-220, 2001.   과학기술학회마을
9 Byung-yun Park, "Even Correlation Analysis with Traceback for Network Security", Doctoral Dissertation in Kongju University, 2010.
10 Tae-soo Kim, "A Study on Design Analysis System for Analyzing DDoS Attack and IP Traceback on All-IP Network", Masteral Dissertation in Hanshin University, 2010.