• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö > Á¤º¸°úÇÐȸ³í¹®Áö (Journal of KIISE)

Á¤º¸°úÇÐȸ³í¹®Áö (Journal of KIISE)

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) Ŭ¶ó¿ìµå ÄÄÇ»Æà ȯ°æ¿¡¼­ ÀÎÁõÅ×À̺íÀ» ÀÌ¿ëÇÑ ARP ½ºÇªÇÎ ¹æ¾î±â¹ý
¿µ¹®Á¦¸ñ(English Title) A Defense Technique against ARP Spoofing Attacks using a Keystone Authentication Table in the OpenStack Cloud Environment
ÀúÀÚ(Author) °­È¿¼º   È«Ãæ¼±   Hyo Sung Kang   Choong Seon Hong  
¿ø¹®¼ö·Ïó(Citation) VOL 45 NO. 08 PP. 0755 ~ 0760 (2018. 08)
Çѱ۳»¿ë
(Korean Abstract)
ÃÖ±Ù ¸¹Àº Àü ¼¼°è ±â¾÷µéÀº ºñ¿ëÀý°¨, ¼º´É°³¼±, ¾÷¹«ÇÁ·Î¼¼½ºÀÇ Çõ½ÅÀ» ¸ñÀûÀ¸·Î Ŭ¶ó¿ìµå ¼­ºñ½º¸¦ µµÀÔÇÏ°í ÀÖÁö¸¸ Ŭ¶ó¿ìµå ³» °¡»ó¸Ó½ÅÀ» ´ë»óÀ¸·Î ÇÏ´Â ¿ÜºÎ ½ºÇªÇÎ ¶Ç´Â Poison °ø°ÝÀ¸·Î ÀÎÇØ ¹ß»ý µÉ ¼ö Àִ Ŭ¶ó¿ìµå ½Ã½ºÅÛÀÇ ¼º´É ÀúÇϴ Ŭ¶ó¿ìµå ÄÄÇ»Æà ½Ã½ºÅÛ È®»ê¿¡ ¸¹Àº °É¸²µ¹ÀÌ µÇ°í ÀÖ´Ù. ÀÌ·± º¸¾È»ç°í¸¦ ¿¹¹æÇϱâÀ§ÇØ ¸¹Àº ¿¬±¸°¡ ÁøÇàµÇ¾úÁö¸¸ ½ÇÇö°¡´É¼ºÀÌ ³·Àº »õ·Î¿î ÇÁ·ÎÅäÄÝÀÇ Á¦¾È, ´ë±Ô¸ð ³×Æ®¿öÅ©¿¡ Àû¿ëÇϱ⠾î·Á¿î È®À强ÀÇ ÇѰ踦 °¡Áö°í ÀÖ´Ù. ÀÌ¿¡ º» ³í¹®¿¡¼­´Â ÃÖ±Ù ¸¹Àº Ŭ¶ó¿ìµå ¼­ºñ½º °³¹ß ȸ»ç°¡ Â÷¿ëÇÏ°í ÀÖ´Â ¿ÀǼҽº Ŭ¶ó¿ìµå Ç÷§ÆûÀÎ OpenStackÀ» ÀÌ¿ëÇÏ¿© Ŭ¶ó¿ìµåȯ°æÀ» ±¸ÃàÇÏ°í OpenStackÀÇ ÀÎÁõ¼­ºñ½º¸¦ Á¦°øÇÏ´Â KeystoneÀ» ÀÌ¿ëÇÑ ÀÎÁõ Å×À̺íÀ» ÅëÇÏ¿© ½ºÇªÇΠȤÀº PoisonÀ̶ó ºÒ¸®´Â ³×Æ®¿öÅ© °ø°Ý¿¡ ´ëÇÑ ¹æ¾î±â¹ýÀ» Á¦¾ÈÇÏ°íÀÚ ÇÑ´Ù.
¿µ¹®³»¿ë
(English Abstract)
Recently cloud service has been introduced to enable many enterprises to achieve their purposes such as improving efficiency, reducing costs, and revolutionizing business processes. However spoofing or poison attacks on VM inside the cloud deteriorate the cloud system and those attacks can be a stumbling block for spreading cloud services. To solve such problems, much research has been done, but it all seems to be impractical and limited in terms of finding techniques for detecting attacks and applying to large scale of networks. In this paper, we propose a way to prevent loss of VM resources because of such attacks on the OpenStack environment by using a reliable ARP table in a cloud computing environment and showing that the proposed mechanism is an effective way to defend against the ARP spoofing attacks.
Å°¿öµå(Keyword) ¿ÀǽºÅà  Keystone   ARP   ½ºÇªÇΠ  Ŭ¶ó¿ìµåº¸¾È   ÀÎÁõ¼­ºñ½º   openstack   keystone   ARP   spoofing   cloud security   authentication service  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå