Browse > Article
http://dx.doi.org/10.9717/kmms.2020.23.3.430

Policy Proposal to Improve Illegal Web Blocking Policy Based on SNI Blocking Technique  

Park, Jeonghun (Dept. of Convergence Information Security, Graduate School, Jeju National University)
Jeong, Wonchi (Dept. of Convergence Information Security, Graduate School, Jeju National University)
Oh, Sangik (Dept. of Convergence Information Security, Graduate School, Jeju National University)
Park, Namje (Dept. of Computer Education, Teachers College, Jeju National University)
Publication Information
Abstract
The government of the Republic of Korea has introduced SNI blocking method since February 2019 to block illegal sites. Currently, this policy has been considered as a controversial policy in South Korea therefore, about 270,000 South Koreans have been calmed down by and the presidential office petition because people believe that blocking https by SNI would invasion of privacy and freedom of use of the Internet. As soon as the SNI blocking method was used, the bypass method was opened to the Internet, causing side effects. In this study, identifies the development of Internet blocking technology and the development of new technology that bypasses the technology. It also examines Internet censorship in other countries and identifies problems in blocking technology. Through this study would present policy suggestions and technical methodologies for sound Internet use.
Keywords
SNI; Censorship HTTPS; Blocking HTTPS; Blocking Web Service; Illgal Website; RADIUS;
Citations & Related Records
Times Cited By KSCI : 12  (Citation Analysis)
연도 인용수 순위
1 W.M. Shbair, T. Cholez, A. Goichot, and I. Chrisment, "Efficiently Bypassing SNI-based HTTPS Filtering," Proceeding of 2015 IFIP/IEEE International Symposium on Integrated Network Management, 2015. pp. 990-995.
2 Is It Only Korea that Blocks SNI?, http://www.ajunews.com/view/20190316234958215 (accessed March 19, 2019).
3 A Petition of the People, https://www1.president.go.kr/petitions/522031 (accessed March 19, 2019).
4 Why Citizens Are So Angry about 'Https Issue', http://www.pressian.com/news/article/?no=231388&ref=google#09T0 (accessed March 19, 2019).
5 H. Kim and C. Kim, "A Study on Generational Differences in the Internet Use and Privacy Paradox," Journal of Korea Multimedia Society, Vol. 22, No. 9, pp. 1046-1054, 2019.   DOI
6 T. Kim, "Study on Providing Anonymity of HTTPS Web Site Blocking," Journal of the Korea Society of Digital Industry and Information Management, Vol. 14, No. 1, pp. 53-59, 2019.
7 R. Ferreira and R.L. Aguiar, "Repositioning Privacy Concerns: Web Servers Controlling URL Metadata," Journal of Information Security and Applications, Vol. 46, pp. 121-137, 2019.   DOI
8 A. Nadler, A. Aminov, and A. Shabtai, "Detection of Malicious and Low Throughput Data Exfiltration Over the DNS Protocol," Journal of Computers and Security, Vol. 80, pp. 36-53, 2019.   DOI
9 K. Lee and H. Lee, "An Automated Technique for Illegal Site Detection Using the Sequence of HTML Tags," Journal of Korean Institute of Information Scientists and Engineers, Vol. 43, No. 10, pp. 1173-1178, 2016.
10 Y. Jung, "A Study on Blocking Criminal Websites Based on Internet Domain Registration Data of Phishing Sites," Journal of Digital Forensics, Vol. 9, No. 2, pp. 79-96, 2015.   DOI
11 W.M. Shbair, T. Cholez, J. Francois, and I. Chrisment, "Improving SNI-based HTTPS Security Monitoring," Proceedings of 2016 IEEE 36th International Conference on Distributed Computing Systems Workshops, pp. 72-77, 2016.
12 J.Y. Kim, "China's Mobile Internet Development and Regime Stability in the Era of Xi jinping," Journal of Asiatic Studies, Vol. 60, No. 2, pp. 456-487, 2017.
13 J.Y. Kim, "Mechanism of China's Internet Regulation," Informatization Policy, Vol. 20, No. 1, pp. 61-84, 2013.
14 D. Lee and N. Park, "Geocasting-based Synchronization of Almanac on the Maritime Cloud for Distributed Smart Surveillance," Journal of Supercomputing, Vol. 73, No. 3, pp. 1-16, 2016.
15 Freedom on the Net 2019, https://www.freedomonthenet.org/report/freedom-onthe-net/2019/the-crisis-of-social-media (accessed November 25, 2019).
16 The Laws of Life, http://easylaw.go.kr/CSP/CnpClsMain.laf?popMenu=ov&csmSeq=901&ccfNo=3&cciNo=1&cnpClsNo=1 (accessed November 24, 2019).
17 N. Park and M. Kim, "Implementation of Load Management Application System Using Smart Grid Privacy Policy in Energy Management Service Environment," Cluster Computing, Vol. 17, Issue 3, pp. 653-664, 2014.   DOI
18 D. Lee and N. Park, "Electronic Identity Information Hiding Methods Using a Secret Sharing Scheme in Multimedia-centric Internet of Things Environment," Personal and Ubiquitous Computing, Vol. 22, Issue 1, pp. 3-10, 2018.   DOI
19 N. Park and N. Kang, "Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle," Sensors, Vol. 16, No. 1, pp. 1-16, 2015.   DOI
20 J. Kim, N. Park, G. Kim, and S. Jin, "CCTV Video Processing Metadata Security Scheme Using Character Order Preserving-transformation in the Emerging Multimedia," Electronics, Vol. 8, No. 4, pp. 412, 2019.   DOI
21 D. Lee, N. Park, G.W. Kim, and S.H. Jin, "Deidentification of Metering Data for Smart Grid Personal Security in Intelligent CCTV-based P2P Cloud Computing Environment," Peerto-Peer Networking and Applications, Vol. 11, No. 6, pp. 1299-1308, 2018.   DOI
22 N. Park, H. Hu, and Q. Jin, "Security and Privacy Mechanisms for Sensor Middleware and Application in Internet of Things (IoT)," International Distributed Sensor Networks, Vol. 12, No. 1, pp. 1-3, 2016.
23 J. Kim and N. Park, "Lightweight knowledge-based authentication model for intelligent closed circuit television in mobile personal computing," Personal and Ubiquitous Computing, 2019. https://doi.org/10.1007/s00779-019-01299-w.
24 N. Park, J. Kwak, S. Kim, D. Won, and H. Kim, "WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment," Journal of Advanced Web and Network Technologies, and Applications, Lecture Noes in Computer Science, Vol. 3842, pp. 741-748, No. 8, 2006.   DOI
25 N. Park, B.G. Kim, and J. Kim, "A Mechanism of Masking Identification Information Regarding Moving Objects Recorded on Visual Surveillance Systems by Differentially Implementing Access Permission," Electronics, Vol. 8, No. 7, pp. 735, 2019.   DOI
26 J. Kim and N. Park, "Dynamic / Static Object Segmentation and Visual Encryption Mechanism for Storage Space Management of Image Information," Journal of Korea Multimedia Society, Vol. 22, No. 10, pp. 1199-1207, 2019.
27 D. Lee and N. Park, "Blockchain based privacy preserving multimedia intelligent video surveillance using secure Merkle tree," Multimedia Tools and Applications, 2020. https://doi.org/10.1007/s11042-020-08776-y.
28 P. Khan, Y. Byun and N. Park, "A Data Verification System for CCTV Surveillance Cameras Using Blockchain Technology in Smart Cities," Electronics, Vol. 9, No. 3, pp. 484, 2020. https://doi.org/10.3390/electronics9030484.   DOI
29 N. Park, Y. Sung, Y. Jeong, S. B. Shin and C. Kim, "The Analysis of the Appropriateness of Information Education Curriculum Standard Model for Elementary School in Korea," International Conference on Computer and Information Science, Vol.791, pp. 1-15, 2018.
30 N. Park and H. Bang, "Mobile middleware platform for secure vessel traffic system in IoT service environment," Security and Communication Networks, Vol. 9, No, 6, pp. 500-512, 2016.   DOI
31 J. Kim and N. Park, "Development of a board game-based gamification learning model for training on the principles of artificial intelligence learning in elementary courses," Journal of The Korean Association of Information Education, Vol. 23, No, 3, pp. 229-235, 2019.   DOI
32 J. Park and S. Shin, "Analysis of Security Weakness on Secure Deduplication Schemes in Cloud Storage," Journal of Korea Multimedia Society, Vol. 21, No. 8, pp. 909-916, 2018.   DOI
33 I. Kim and N. Park, "Blockchain Based Data-Preserving AI Learning Environment Model for Cyber Security System," The Journal of Korean Institute of Information Technology, Vol. 17, No, 12, pp. 125-134, 2019.   DOI