Browse > Article

A Study on the Countermeasure of Cyber Attacks Using Anonymous Network  

Lee, Jung-Hyun (고려대학교 정보보호대학원)
Ahn, Kwan-Joon (고려대학교 정보보호대학원)
Park, Won-Hyung (서울과학기술대학교 산업정보시스템공학과)
Lim, Jong-In (고려대학교 정보보호대학원)
Publication Information
Abstract
Recently on tile network to ensure the anonymity of Mixed networking has been actively researched. It uses encrypted communications between Nodes and communications path is changed often to the attacker traceback and response, including the difficult thing is the reality. National institutions and infrastructure in these circumstances, the attack on the national level, if done on a large scale can be disastrous in. However, an anonymous network technology to cover up their own internet communication, it malicious form of Internet use by people who enjoy being continually updated and new forms of technology being developed is a situation continuously. In addition, attacks in the future application of these technologies is expected to continue to emerge. However, this reality does not deserve this thesis is prepared. In this paper, anonymously using a network to respond effectively to a cyber attack on the early detection research is to proceed.
Keywords
Mixed Network; TOR(The Onion Router); Early Detection; Cyber Attack;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Tor Network Status, http://Torstatus.blutmagie.de
2 Steven J. Murdoch, "Tor: Anonymous Internet Communication System", University of Cambridge, Computer LaboraTory, 2006
3 K. Bauer et al, "Low-Resource Routing Attacks Against Tor", WPES 2007, page 11-20, New York, 2007
4 Timothy G. et al, "Browser-Based Attacks on Tor", http:web.mit.edu/tabbott/www/papers/Tor.pdf, 2007
5 Tor Project, http://www.Torproject.org
6 Mike Perry, "Securing the Tor Network", http://www.blackhat.com, 2007
7 K.W.J. et al, "Egregious use of Tor servers?", RechtenForum, 2007
8 Mike Perry, "TorFlow, Tor Network Analysis", In HotPETs 2009, page 14, 2009
9 김정욱, 조화제, 박원형, 임종인 "악성도메인 IP주소 추적을 통한 효과적인 보안관제 방안 연구", 정보보안논문지, 제9권 제1호, 2009.3
10 Martin Suess, "Breaking Tor Anonymity", http://www.csnc.ch/misc/files/publications/the_onion_router_vl.1.pdf, 2008
11 Steven J. Murdoch et al, "Low-Cost Traffic Analysis of Tor", IEEE Symposium on Security and Privacy, 2007