• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

Çмú´ëȸ ÇÁ·Î½Ãµù

Ȩ Ȩ > ¿¬±¸¹®Çå > Çмú´ëȸ ÇÁ·Î½Ãµù > Çѱ¹Á¤º¸Åë½ÅÇÐȸ Çмú´ëȸ > 2015³â Ãß°èÇмú´ëȸ

2015³â Ãß°èÇмú´ëȸ

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) ³×Æ®¿öÅ© Ãë¾àÁ¡À» ÅëÇÑ °øÀ¯±â °ø°Ýµ¿Çâ ¹× ¿¹¹æ¹æ¹ý
¿µ¹®Á¦¸ñ(English Title) Trends and methods of preventing router attacks using network vulnerability
ÀúÀÚ(Author) ÀÌ¿µÇö   ±è±âȯ   ÀÌÈÆÀç   Young-Hyeon Lee   Ki-Hwan Kim   Hoon-Jae Lee  
¿ø¹®¼ö·Ïó(Citation) VOL 19 NO. 02 PP. 0262 ~ 0265 (2015. 10)
Çѱ۳»¿ë
(Korean Abstract)
Çö´ë»çȸ¿¡¼­ ÄÄÇ»ÅÍ¿Í ½º¸¶Æ®ÆùÀÇ º¸±ÞÀ¸·Î ÀÎÅͳÝÀº »ýÈ°ÀÇ ÀϺΰ¡ µÇ¾úÀ¸¸ç, À̸¦ À§ÇØ ´ëºÎºÐÀÇ Àå¼Ò¿¡´Â À¯/¹«¼± °øÀ¯±â°¡ ¼³Ä¡µÇ¾î ÀÖ´Ù. Å©·¡Ä¿´Â ³×Æ®¿öÅ©ÀÇ Ãë¾àÁ¡À» ¾Ç¿ëÇÏ¿© °øÀ¯±â¸¦ »ç¿ëÇÏ´Â »ç¿ëÀÚ¸¦ ´Ù¾çÇÑ ¹æ¹ýÀ¸·Î °ø°ÝÇÒ ¼ö ÀÖ´Ù. °ø°Ý±â¹ý °¡¿îµ¥ Á¤»óÀûÀÎ ÀÎÅÍ³Ý ÁÖ¼Ò¸¦ ¿äûÇßÁö¸¸ °øÀ¯±âÀÇ DNS º¯Á¶¸¦ ÅëÇØ Å©·¡Ä¿°¡ ¸¸µç ¼­¹ö·Î À¯µµÇÏ´Â °ø°Ý±â¹ýÀ» ÅëÇØ ¸¹Àº »ç¶÷µéÀÌ ÇÇÇظ¦ ÀÔ°í ÀÖ´Ù. ÀÌ¿¡ º» ³í¹®¿¡¼­´Â ´ëÇ¥ÀûÀÎ ³×Æ®¿öÅ© °ø°Ý¿¡ ´ëÇÏ¿© »ìÆ캸°í °¢ °ø°Ý¿¡ ¿¹¹æÇÏ´Â ¹æ¹ýÀ» »ìÆ캻´Ù.
¿µ¹®³»¿ë
(English Abstract)
In modern society, the spread of computers and smart phones, the Internet has become part of life. Therefore, the most places, wired/wireless router is installed. Crackers can attack the user to use the router by exploiting network vulnerabilities. therefore, the administrator is able to try cracker variety of attacks sloppy router, vaccine is installed also computer and smartphone users , appearance and address of the usual Internet is not deer medium and similar. In this paper, we look at a method for preventing in each attack seen for typical network attacks.
Å°¿öµå(Keyword) °øÀ¯±â   ÀÎÅͳݠ  DNS spoofing   Man In The Middle Attack   Evil Twin Attack  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå