Browse > Article
http://dx.doi.org/10.33778/kcsa.2019.19.4.077

A Conceptual Study on the Development of Intelligent Detection Model for the anonymous Communication bypassing the Cyber Defense System  

Jung, Ui Seob (아주대학교/NCW학과)
Kim, Jae Hyun (아주대학교/NCW학과)
Jeong, Chan Ki (아주대학교/NCW학과)
Publication Information
Abstract
As the Internet continues to evolve, cyber attacks are becoming more precise and covert. Anonymous communication, which is used to protect personal privacy, is also being used for cyber attacks. Not only it hides the attacker's IP address but also encrypts traffic, which allows users to bypass the information protection system that most organizations and institutions are using to defend cyber attacks. For this reason, anonymous communication can be used as a means of attacking malicious code or for downloading additional malware. Therefore, this study aims to suggest a method to detect and block encrypted anonymous communication as quickly as possible through artificial intelligence. Furthermore, it will be applied to the defense to detect malicious communication and contribute to preventing the leakage of important data and cyber attacks.
Keywords
Military; Anonymous Communication; Artificial intelligence;
Citations & Related Records
연도 인용수 순위
  • Reference
1 한국인터넷진흥원, Tor 네트워크의 원리와 관련 악성코드 사례 분석, 2014. 05
2 한국인터넷진흥원, 2017년 인터넷이용실태조사, 2018. 03
3 Cisco 비주얼 네트워킹 인덱스 2017-2022년 전망 및 추세, 2018. 01
4 홍성대, Tor 네트워크 분석과 익명성 저해에 관한 연구, 성균관대학교 일반대학원, 2015.
5 https://www.dan.me.uk/tornodes, 검색일 : 2019. 9. 21.
6 A. Montieri, D. Ciuonzo, G. Aceto and A. Pescape, "Anonymity Services Tor, I2P, JonDonym: Classif ying in the Dark," 2017 29th International Teletra ffic Congress (ITC 29), Genoa, 2017, pp. 81-89.
7 Mitchell, T. (1997). Machine Learning. McGraw Hill. p. 2. ISBN 978-0-07-042807-2.
8 이정현,안관준,박원형,임종인. (2011). 익명네트워크를 이용한 사이버공격에 대한 대응방안 연구. 융합보안논문지, 11(3), 31-37.
9 https://2019.www.torproject.org
10 Sangeetha, K & Ravikumar, K. (2013). CONTR OL THE TRADEOFF BETWEEN PERFORMA NCE AND ANONYMITY THROUGH END-TO-END TUNABLE PATH SELECTION. Internati onal Journal of Computer Engineering and Technology 0976-6375. 4. 282-288.