• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Current Result Document : 3 / 4 ÀÌÀü°Ç ÀÌÀü°Ç   ´ÙÀ½°Ç ´ÙÀ½°Ç

ÇѱÛÁ¦¸ñ(Korean Title) ½ºÆÔ ¸ÞÀÏ Â÷´ÜÀ» À§ÇÑ RBL°³³äÀÇ È®Àå¿¡ °üÇÑ ¿¬±¸
¿µ¹®Á¦¸ñ(English Title) Studying on Expansion of Realtime Blocking List Conception for Spam E-mail Filtering
ÀúÀÚ(Author) ±èÁ¾¹Î   ±èÇü±Ù   ±èºÀ±â   Jong-Min Kim   Hion-Gun Kim   Bong-Gi Kim  
¿ø¹®¼ö·Ïó(Citation) VOL 12 NO. 10 PP. 1808 ~ 1814 (2008. 10)
Çѱ۳»¿ë
(Korean Abstract)
º» ³í¹®¿¡¼­´Â ½ºÆÔ Â÷´ÜÀ» À§Çؼ­ »ç¿ëµÇ°í ÀÖ´Â RBLÀÇ ±â´É¿¡ ´õÇÏ¿©, ÃÖ±Ù À¯ÇàÇÏ´Â ½ºÆÔ ÇüÅ¿¡ È¿°úÀûÀ¸·Î ´ëÀÀÇÒ ¼ö ÀÖ´Â ¹æ¹ýÀ¸·Î ¸ÞÀÏ¿ø¹®¿¡ Æ÷ÇÔµÈ URLÀ» ÃßÃâÇÏ¿© RBL¿¡ Àû¿ëÇÏ¿© È®ÀåÇÒ ¼ö ÀÖ´Â ¹æ¹ýÀ» Á¦¾ÈÇÑ´Ù. ÃÖ±Ù ½ºÆÔ ¸ÞÀϹ߼ۿ¡ ¸¹ÀÌ »ç¿ëµÇ°í ÀÖ´Â º¿³ÝÀº À̸ÞÀÏ ½ºÆÔ¿¡¼­ ¸ÞÀÏ ¹ß¼Û ÁÖ¼ÒºÐÆ÷·Î ÇØ°áÇÒ ¼ö ¾ø´Â ¹®Á¦Á¡À» °¡Áö°í ÀÖ´Ù. ÀϹÝÀûÀ¸·Î ÀÌ·¯ÇÑ ½ºÆÔ ¸ÞÀÏÀº °¢ °³ÀÎÀÇ °¨¿°µÈ Á»ºñ PC¿¡¼­ ¹ß¼ÛµÇ¹Ç·Î, ¹ß¼Û ÁÖ¼Ò ÀÚü°¡ RBL¿¡¼­ »ç¿ëÇϱ⿡ È¿À²¼ºÀÌ ¶³¾îÁö°í ¹«ÀÇ¹Ì ÇÏ´Ù. µû¶ó¼­ º¿³Ý¿¡ ÀÇÇØ ¹ß¼ÛµÇ´Â ½ºÆÔ ¸ÞÀÏÀ» È¿°úÀûÀ¸·Î Â÷´ÜÇϱâ À§ÇÑ ¹æ¹ýÀ¸·Î½á, ½ºÆÔ ¸ÞÀÏÀÇ ¿ø¹®¿¡ Æ÷ÇÔµÈ URLÀ» ºÐ¼®ÇÏ°í, »ç¿ëÀÚ¸¦ À¯ÀÎÇÏ´Â URL »çÀÌÆ®¿¡ ´ëÇÑ ºÐÆ÷ ÀڷḦ ¹ÙÅÁÀ¸·Î È¿°úÀûÀ¸·Î Â÷´Ü·üÀ» Çâ»ó ½Ãų ¼ö ÀÖ´Â ¹æ¹ýÀ» Á¦¾ÈÇÑ´Ù. º» ³í¹®¿¡¼­´Â º¿³Ý¿¡¼­ÀÇ ½ºÆÔ¸ÞÀÏ ¹ß¼Û ¸ÞÄ¿´ÏÁò°ú, ÀÌ·¯ÇÑ À¯ÇüÀÇ ½ºÆÔ¸ÞÀÏÀ» ÆÇ´ÜÇϱâ À§ÇÏ¿© »ç¿ëÇÒ ¼ö ÀÖ´Â ¹æ¹ýÀ» Á¦¾ÈÇÏ°í ºÐ¼® °¡´ÉÇÑ ½ºÆÔ¸ÞÀÏÀÇ ¼öÁýÀ» À§ÇÏ¿© À̸ÞÀÏ ½ºÆÔ Æ®·¦ ½Ã½ºÅÛÀ» ±¸¼ºÇÏ¿© ½ÇÇèÇÑ´Ù. ÀÏÁ¤ÇÑ ½ÇÇè ±â°£ µ¿¾È ¼ö½ÅµÈ ½ºÆÔ¸ÞÀÏÀÇ ºÐ¼®À» ÅëÇÏ¿© ½ºÆÔ¸ÞÀÏ¿¡ Æ÷ÇÔµÈ URLÀ» ÀÌ¿ëÇÑ È®ÀåµÈ RBL±â¹ýÀÌ ½ºÆÔ¸ÞÀÏÀÇ °ËÃâ ºÐÆ÷¸¦ ³ôÀ̴µ¥ È¿°úÀûÀÓÀ» º¸¿©ÁØ´Ù.Àº ¿ä¾à¹® ÀÔ´Ï´Ù.
¿µ¹®³»¿ë
(English Abstract)
In addition to RBL function, which is used to applying for spam e-mail filtering, as an effective way to deal with the recently widespread spam types, this paper proposes how to extract URL that was comprised in the original e-mail, apply it to RBL, and expand it. The BotNet, which is used to using for sending spam mails these days, has a problem that it is not able to solve with the distributed addresses of sent mails in spam e-mails. In general, as these spam e-mails are sent from the infected Zombi PC of individual user, the sent address itself is not efficient and is meaningless to use in RBL. As an effective way to filter spam e-mail sent by BotNet, this paper analyzes URLs that contained in the original spam e-mail and proposes how to effectively improve filter rate, based on the distribution data of URL site tempting users. This paper proposes the sending mechanism of spam e-mails from BotNet and the methods to realize those types of spam e-mails. In order to gather analyzable spam e-mails, this paper also carries out an experiment by configuring trap system of spam e-mail. By analyzing spam e-mails, which have been received during the certain period of experiment, this paper shows that the expanded RBL method, using URLs that contained in spam e-mails, is effective way to improve the filter distribution of spam e-mail. Key words: Spam, RBL(Real-Time Blocking List), Spam URL, BotNet, Trap system of spam e-mail, Zombi PC.
Å°¿öµå(Keyword) ½ºÆÔ   RBL(Real-Time Blocking List)   ½ºÆÔURL   º¿³Ý   À̸ÞÀÏ ½ºÆÔ Æ®·¦ ½Ã½ºÅÛ   Á»ºñPC  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå