http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
ARP 스푸핑 툴 기반의 포이즈닝 공격 탐지 및 차단 모델
최준호(Jun-Ho Choi),백용진(Yong-Jin Baek),서영건(Yeong-Geon Seo) 한국디지털콘텐츠학회 2021 한국디지털콘텐츠학회논문지 Vol.22 No.5
Today, the network environment is rapidly evolving into an environment where end users can easily access the information they need and then receive services. However, this dependence on the network is also causing related security issues. There are various problems with network-based security incidents, among which ARP-based attack techniques have steadily increased the number of damage cases since the vulnerability was discovered. ARP Poising is an attack that repeatedly sends abnormal ARP response packets to the target system and then exploits them to change ARP cache table information. Then, attempt an illegal access to the target system and then make a sniffing attack. This paper proposes a technique that can substantially demonstrate its attack process against ARP Poising and then defend it. To this end, we analyze ARP poising attack patterns and detect and block ARP poising attacks based on the data that analyzed the error range for the response time of the corresponding signal.