JOURNAL BROWSE
Search
Advanced SearchSearch Tips
A Study on Detecting of an Anonymity Network and an Effective Counterstrategy in the Massive Network Environment
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
A Study on Detecting of an Anonymity Network and an Effective Counterstrategy in the Massive Network Environment
Seo, Jung-woo; Lee, Sang-jin;
  PDF(new window)
 Abstract
Due to a development of the cable/wireless network infra, the traffic as big as unable to compare with the past is being served through the internet, the traffic is increasing every year following the change of the network paradigm such as the object internet, especially the traffic of about 1.6 zettabyte is expected to be distributed through the network in 2018. As the network traffic increases, the performance of the security infra is developing together to deal with the bulk terabyte traffic in the security equipment, and is generating hundreds of thousands of security events every day such as hacking attempt and the malignant code. Efficiently analyzing and responding to an event on the attack attempt detected by various kinds of security equipment of company is one of very important assignments for providing a stable internet service. This study attempts to overcome the limit of study such as the detection of Tor network traffic using the existing low-latency by classifying the anonymous network by means of the suggested algorithm about the event detected in the security infra.
 Keywords
Anonymity network;Tor;VPN;
 Language
Korean
 Cited by
 References
1.
John Brozycki, Eric Cole, "Detecting and Prevventing Anonymous Proxy Usage," SANS Institute InfoSec Reading Room, Sep 2008.

2.
Example of Analysis about principal of Tor network and related malware, Korea Internet & Security Agency, May 2014.

3.
Nicholas Hopper, Eugene Y. Vasserman, and Eric Chan-Tin, "How Much Anonymity does Network Latency Leak?," ACM Transactions on Information and System Security, Vol. 13, Feb. 2010.

4.
Stevens Le Blond, David Choffnes, Wenxuan Zhou, Peter Druschel, Hitesh Ballani and Paul Francis, "Towards Efficient Traffic-analysis Resistant Anonymity Networks," ACM SIGCOMM '13, pp. 303-314, 2013.

5.
Norman Danner, Danny Krizanc, and Marc Liberatore, "Detecting Denial of Service Attacks in Tor," Financial Cryptography and Data security LNCS 5628, pp. 273-284, 2009.

6.
Jun-Ki Lee, Kwang-Sun Park, "Countermeasure against Cyber Crime using VPN," Journal of Korean Digital Forensics Society, Dec 2013.

7.
Dingledine, R., Mathewson, N., Syverson, P., "The Second-generation onion router," Proceedings of the 13th USENIX Security Symposium, pp. 303-320, 2004.

8.
Sambuddho Chakravarty, Angelos Stavrou, and Angelos D. Keromytis, "Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwith Estimation," ESORICS 2010 LNCS 6345, pp. 249-267, 2010.

9.
Young-Jin Kim, Su-Yeon Lee, Hun-Yeong Kwon, and Jong-In Lim, "A Study on the Improvement of Effectiveness in National Cyber Security Monitoring and Control Services," Korea Institute of Information Security & Cryptology, Vol 19, pp. 103-111, 2009.

10.
Agrawal, D., Kesdogan, D., "Measuring Anonymity: The Disclosure Attack," IEEE Security & Privacy, pp. 27-34, 2003.

11.
Back, A., Moller, U., Stiglic, "Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems," Information Hiding, Vol 2137, pp. 245-257, Oct 2001.

12.
Bauer, K., McCoy, D., Grunwald, D., Kohno, T., Sicker, D., "Low-Resource Routing Attacks Against Tor," Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society, pp. 11-20, 2007.

13.
Borders, K., Prakash, A., "Web Tap: Detecting Covert Web Traffic," Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 110-120, Oct 2004.

14.
Burch, H., Cheswick, B., "Tracing Anonymous Packets to Their Approximate Source," Proceedings of the 14th USENIX Conference on System Administration, pp. 319-328, Dec 2000.

15.
H. AND KOPSELL, S., "JAP: Java anonymous proxy, " http://anon.inf.tu-dresden.de/, 2006.

16.
S. J. and DANEZIS, G., "Low-cost traffic analysis of Tor," In Proceedings of the 2005 IEEE Symposium on Security and Privacy, pp. 183-195, 2005.

17.
Kyungwan Ko, Daecheol Kim, "The Analyses of the Operational Efficiency and Efficiency Factors of Retail Stores Using DEA Model," The Korean Operations Research and Management Science Society, Vol 31, pp. 135-150, 2014.

18.
Banker, R.D., Charnes, A and Cooper, W.W, "Some models for estimating technical and scale inefficiencies in data envelopment analysis, Management Science, pp. 1078-1092, 1984.

19.
Lawrence M. Seiford, Joe Zhu, "Modeling undesirable factors in efficiency evaluation," European Journal of Operational Research, Vol 142, pp. 16-20, Oct 2002. crossref(new window)

20.
A. Kleine, "A general model framework for DEA," Omega, Vol 32, pp. 17-23, Feb 2004. crossref(new window)

21.
Barros, C. P., "Efficiency measurement among hypermarket and supermarket and the identification of the efficiency drivers : a case study," International Journal of Retail and Distribution Management, Vol.34, pp.135-154, 2006. crossref(new window)

22.
Taechang Ryu, "A Study on the Efficiency Evaluation of Traditional Market using a DEA Model" Korea Planning Association, Vol 46, pp. 257-270, Oct 2011.