최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Journal of Internet Computing and Services = 인터넷정보학회논문지, v.23 no.6, 2022년, pp.27 - 37
김다현 (Dept. of Software, Korea National University of Transportation) , 민지영 (Dept. of Software, Korea National University of Transportation) , 안준호 (Dept. of Software, Korea National University of Transportation)
Virtual private network (VPN) services are used in various environments related to national security, such as defense companies and defense-related institutions where digital communication environment technologies are diversified and access to network use is increasing. However, the number of cyber ...
Ministry of National Defense, "Ministry of National Defense, 2020 Defense Reform 2.0 and Smart Defense Innovation Promotion Inspection Meeting", 2020. https://www.mnd.go.kr/user/boardList.action?commandview&page1&boardIdI_7650984&boardSeqI_8449226&titleIdnull&idreform_020100000000&siteIdreform
Defense Acquisition Program Administration, "Comprehensive Plan for Defense Industry Technology Protection," 2021. https://eiec.kdi.re.kr/policy/callDownload.do?num221879&filenum5&dtime20211225083948
SBS News, ""Presidential event data also leaked"... Certain VPNs have been drilled," 2021. https://news.sbs.co.kr/news/endPage.do?news_idN1006376861
Korea Information and Communication Technology Association Information and Communication Terminology, Virtual Private Network http://terms.tta.or.kr/dictionary/dictionaryView.do?subject%EA%B0%80%EC%83%81+%EC%82%AC%EC%84%A4+%ED%86%B5%EC%8B%A0%EB%A7%9D
Dong-A Ilbo, "KAI breached in North Korea did not properly 'network separation' to prevent hacking," 2021. https://www.donga.com/news/Politics/article/all/20210709/107867900/1
KBS, "The Ministry of Defense PC was also hacked... "Possibility of North Korea," 2016. https://news.kbs.co.kr/news/view.do?ncd3245302&refA
Mazen Juma, Azza Abdel Monem and Khaled Shaalan, "Hybrid End-to-End VPN Security Approach for Smart IoT Objects," Journal of Network and Computer Applications, Vol. 158, pp. 102598, 2020. https://doi.org/10.1016/j.jnca.2020.102598
Veroniek Binkhorst, Tobias Fiebig, Katharina Krombholz, Wolter Pieters and Katsiaryna Labunets, "Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context," 31st USENIX Security Symposium, pp. 3433-3450, 2022. https://www.usenix.org/conference/usenixsecurity22/presentation/binkhorst
C. Jie, Y. Xing-Liang, C. Ying, F. Jia-Cheng and C. Chin-Ling, "A VPN-Encrypted Traffic Identification Method Based on Ensemble Learning," Applied Sciences, Vol. 12, No. 13, pp. 6434, 2022. https://doi.org/10.3390/app12136434
S. Hernan, S. Lambert, T. Ostwald and A Shostack, "Uncover Security Design Flaws Using The STRIDE Approach," MSDN Magazine, 2006. https://docs.microsoft.com/en-us/archive/msdn-magazine/2006/november/uncover-security-design-flaws-using-the-stride-approach
Tony UcedaVelez, Marco M. Morana, "Risk Centric Threat Modeling: process for attack simulation and threat analysis", Wiley Publishing, 2015.
Kim Wuyts, Wouter Joosen, "LINDDUN privacy threat modeling_ a tutorial", Department of Computer Science, KU Leuven; Leuven, Belgium, 2015.
Mark Curphey, Joel Scambray, Erik Olson, "Improving Web Application Security", Springer, 2014.
Christopher Alberts, Audrey Dorofee, James Stevens, Carol Woody, "Introduction to the OCTAVE Approach", Software Engineering Institute, 2003.
ETSI, European Telecommunications Standard Institute: Telecommunications andf Internet converged Services and Protocols for Advanced Networking (TISPAN); Methods and protocols; Part 1: Method and proforma for Threat, Risk, Vulnerability Analysis, ETSI TS 165-1 V5.2.3, 2017.
S. Shinwoo, I. Sun-young, R. Han-eul, J. Sung-goo and K. Taekyu, "Threat Analysis of the Smart Doorlock Systems Using Threat Modeling," The Journal of Korean Institute of Communications and Information Sciences(JKICS), Vol. 445, No. 11, pp. 1868-1877, 2020. http://doi.org/10.7840/kics.2020.45.11.1868
ITSCC, "AXGATE SSL V2.1 Certification Report," 2020. https://www.itscc.kr/certprod/view.do?product_id1043&product_class1
ITSCC, "NetSpliter Certification Report", 2021. https://www.itscc.kr/certprod/view.do?product_id1095&product_class1
ITSCC, "eWalker SSL VPN V10 Certification Report", 2022. https://www.itscc.kr/certprod/view.do?product_id1168&product_class1
H. Sawalmeh, M. Malayshi, S. Ahmad and A. Awad, "VPN Remote Access OSPF-based VPN Security Vulnerabilities and Counter Measurements," International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT), pp. 236-241, 2021. https://doi.org/10.1109/3ICT53449.2021.9581512.
S. Shunmuganathan, R. D. Saravanan and Y.Palanichamy, "Securing VPN from insider and outsider bandwidth flooding attack," Microprocessors and Microsystems, Vol. 79, pp. 103279, 2020. https://doi.org/10.1016/j.micpro.2020.103279.
Visual Paradigm Online, "DFD Using Yourdon and DeMarco Notation," https://online.visual-paradigm.com/knowledge/software-design/dfd-using-yourdon-and-demarco
Microsoft Documentation, "Microsoft Threat Modeling Tool," 2020. https://docs.microsoft.com/en-us/azure/security/develop/threat-modeling-tool#feedback
CVE, https://cve.mitre.org/
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.