A Study on the Countermeasure of Cyber Attacks Using Anonymous Network |
Lee, Jung-Hyun
(고려대학교 정보보호대학원)
Ahn, Kwan-Joon (고려대학교 정보보호대학원) Park, Won-Hyung (서울과학기술대학교 산업정보시스템공학과) Lim, Jong-In (고려대학교 정보보호대학원) |
1 | Tor Network Status, http://Torstatus.blutmagie.de |
2 | Steven J. Murdoch, "Tor: Anonymous Internet Communication System", University of Cambridge, Computer LaboraTory, 2006 |
3 | K. Bauer et al, "Low-Resource Routing Attacks Against Tor", WPES 2007, page 11-20, New York, 2007 |
4 | Timothy G. et al, "Browser-Based Attacks on Tor", http:web.mit.edu/tabbott/www/papers/Tor.pdf, 2007 |
5 | Tor Project, http://www.Torproject.org |
6 | Mike Perry, "Securing the Tor Network", http://www.blackhat.com, 2007 |
7 | K.W.J. et al, "Egregious use of Tor servers?", RechtenForum, 2007 |
8 | Mike Perry, "TorFlow, Tor Network Analysis", In HotPETs 2009, page 14, 2009 |
9 | 김정욱, 조화제, 박원형, 임종인 "악성도메인 IP주소 추적을 통한 효과적인 보안관제 방안 연구", 정보보안논문지, 제9권 제1호, 2009.3 |
10 | Martin Suess, "Breaking Tor Anonymity", http://www.csnc.ch/misc/files/publications/the_onion_router_vl.1.pdf, 2008 |
11 | Steven J. Murdoch et al, "Low-Cost Traffic Analysis of Tor", IEEE Symposium on Security and Privacy, 2007 |