Policy Proposal to Improve Illegal Web Blocking Policy Based on SNI Blocking Technique |
Park, Jeonghun
(Dept. of Convergence Information Security, Graduate School, Jeju National University)
Jeong, Wonchi (Dept. of Convergence Information Security, Graduate School, Jeju National University) Oh, Sangik (Dept. of Convergence Information Security, Graduate School, Jeju National University) Park, Namje (Dept. of Computer Education, Teachers College, Jeju National University) |
1 | W.M. Shbair, T. Cholez, A. Goichot, and I. Chrisment, "Efficiently Bypassing SNI-based HTTPS Filtering," Proceeding of 2015 IFIP/IEEE International Symposium on Integrated Network Management, 2015. pp. 990-995. |
2 | Is It Only Korea that Blocks SNI?, http://www.ajunews.com/view/20190316234958215 (accessed March 19, 2019). |
3 | A Petition of the People, https://www1.president.go.kr/petitions/522031 (accessed March 19, 2019). |
4 | Why Citizens Are So Angry about 'Https Issue', http://www.pressian.com/news/article/?no=231388&ref=google#09T0 (accessed March 19, 2019). |
5 | H. Kim and C. Kim, "A Study on Generational Differences in the Internet Use and Privacy Paradox," Journal of Korea Multimedia Society, Vol. 22, No. 9, pp. 1046-1054, 2019. DOI |
6 | T. Kim, "Study on Providing Anonymity of HTTPS Web Site Blocking," Journal of the Korea Society of Digital Industry and Information Management, Vol. 14, No. 1, pp. 53-59, 2019. |
7 | R. Ferreira and R.L. Aguiar, "Repositioning Privacy Concerns: Web Servers Controlling URL Metadata," Journal of Information Security and Applications, Vol. 46, pp. 121-137, 2019. DOI |
8 | A. Nadler, A. Aminov, and A. Shabtai, "Detection of Malicious and Low Throughput Data Exfiltration Over the DNS Protocol," Journal of Computers and Security, Vol. 80, pp. 36-53, 2019. DOI |
9 | K. Lee and H. Lee, "An Automated Technique for Illegal Site Detection Using the Sequence of HTML Tags," Journal of Korean Institute of Information Scientists and Engineers, Vol. 43, No. 10, pp. 1173-1178, 2016. |
10 | Y. Jung, "A Study on Blocking Criminal Websites Based on Internet Domain Registration Data of Phishing Sites," Journal of Digital Forensics, Vol. 9, No. 2, pp. 79-96, 2015. DOI |
11 | W.M. Shbair, T. Cholez, J. Francois, and I. Chrisment, "Improving SNI-based HTTPS Security Monitoring," Proceedings of 2016 IEEE 36th International Conference on Distributed Computing Systems Workshops, pp. 72-77, 2016. |
12 | J.Y. Kim, "China's Mobile Internet Development and Regime Stability in the Era of Xi jinping," Journal of Asiatic Studies, Vol. 60, No. 2, pp. 456-487, 2017. |
13 | J.Y. Kim, "Mechanism of China's Internet Regulation," Informatization Policy, Vol. 20, No. 1, pp. 61-84, 2013. |
14 | D. Lee and N. Park, "Geocasting-based Synchronization of Almanac on the Maritime Cloud for Distributed Smart Surveillance," Journal of Supercomputing, Vol. 73, No. 3, pp. 1-16, 2016. |
15 | Freedom on the Net 2019, https://www.freedomonthenet.org/report/freedom-onthe-net/2019/the-crisis-of-social-media (accessed November 25, 2019). |
16 | The Laws of Life, http://easylaw.go.kr/CSP/CnpClsMain.laf?popMenu=ov&csmSeq=901&ccfNo=3&cciNo=1&cnpClsNo=1 (accessed November 24, 2019). |
17 | N. Park and M. Kim, "Implementation of Load Management Application System Using Smart Grid Privacy Policy in Energy Management Service Environment," Cluster Computing, Vol. 17, Issue 3, pp. 653-664, 2014. DOI |
18 | D. Lee and N. Park, "Electronic Identity Information Hiding Methods Using a Secret Sharing Scheme in Multimedia-centric Internet of Things Environment," Personal and Ubiquitous Computing, Vol. 22, Issue 1, pp. 3-10, 2018. DOI |
19 | N. Park and N. Kang, "Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle," Sensors, Vol. 16, No. 1, pp. 1-16, 2015. DOI |
20 | J. Kim, N. Park, G. Kim, and S. Jin, "CCTV Video Processing Metadata Security Scheme Using Character Order Preserving-transformation in the Emerging Multimedia," Electronics, Vol. 8, No. 4, pp. 412, 2019. DOI |
21 | D. Lee, N. Park, G.W. Kim, and S.H. Jin, "Deidentification of Metering Data for Smart Grid Personal Security in Intelligent CCTV-based P2P Cloud Computing Environment," Peerto-Peer Networking and Applications, Vol. 11, No. 6, pp. 1299-1308, 2018. DOI |
22 | N. Park, H. Hu, and Q. Jin, "Security and Privacy Mechanisms for Sensor Middleware and Application in Internet of Things (IoT)," International Distributed Sensor Networks, Vol. 12, No. 1, pp. 1-3, 2016. |
23 | J. Kim and N. Park, "Lightweight knowledge-based authentication model for intelligent closed circuit television in mobile personal computing," Personal and Ubiquitous Computing, 2019. https://doi.org/10.1007/s00779-019-01299-w. |
24 | N. Park, J. Kwak, S. Kim, D. Won, and H. Kim, "WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment," Journal of Advanced Web and Network Technologies, and Applications, Lecture Noes in Computer Science, Vol. 3842, pp. 741-748, No. 8, 2006. DOI |
25 | N. Park, B.G. Kim, and J. Kim, "A Mechanism of Masking Identification Information Regarding Moving Objects Recorded on Visual Surveillance Systems by Differentially Implementing Access Permission," Electronics, Vol. 8, No. 7, pp. 735, 2019. DOI |
26 | J. Kim and N. Park, "Dynamic / Static Object Segmentation and Visual Encryption Mechanism for Storage Space Management of Image Information," Journal of Korea Multimedia Society, Vol. 22, No. 10, pp. 1199-1207, 2019. |
27 | D. Lee and N. Park, "Blockchain based privacy preserving multimedia intelligent video surveillance using secure Merkle tree," Multimedia Tools and Applications, 2020. https://doi.org/10.1007/s11042-020-08776-y. |
28 | P. Khan, Y. Byun and N. Park, "A Data Verification System for CCTV Surveillance Cameras Using Blockchain Technology in Smart Cities," Electronics, Vol. 9, No. 3, pp. 484, 2020. https://doi.org/10.3390/electronics9030484. DOI |
29 | N. Park, Y. Sung, Y. Jeong, S. B. Shin and C. Kim, "The Analysis of the Appropriateness of Information Education Curriculum Standard Model for Elementary School in Korea," International Conference on Computer and Information Science, Vol.791, pp. 1-15, 2018. |
30 | N. Park and H. Bang, "Mobile middleware platform for secure vessel traffic system in IoT service environment," Security and Communication Networks, Vol. 9, No, 6, pp. 500-512, 2016. DOI |
31 | J. Kim and N. Park, "Development of a board game-based gamification learning model for training on the principles of artificial intelligence learning in elementary courses," Journal of The Korean Association of Information Education, Vol. 23, No, 3, pp. 229-235, 2019. DOI |
32 | J. Park and S. Shin, "Analysis of Security Weakness on Secure Deduplication Schemes in Cloud Storage," Journal of Korea Multimedia Society, Vol. 21, No. 8, pp. 909-916, 2018. DOI |
33 | I. Kim and N. Park, "Blockchain Based Data-Preserving AI Learning Environment Model for Cyber Security System," The Journal of Korean Institute of Information Technology, Vol. 17, No, 12, pp. 125-134, 2019. DOI |