A study on design and implementation of tapping alert protocol네트워크 도청 경고 프로토콜의 설계와 구현에 관한 연구

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 421
  • Download : 0
DC FieldValueLanguage
dc.contributor.advisorKim, Kwang-Jo-
dc.contributor.advisor김광조-
dc.contributor.authorAhn, Gook-Whan-
dc.contributor.author안국환-
dc.date.accessioned2011-12-28T02:47:43Z-
dc.date.available2011-12-28T02:47:43Z-
dc.date.issued2001-
dc.identifier.urihttp://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=392090&flag=dissertation-
dc.identifier.urihttp://hdl.handle.net/10203/54758-
dc.description학위논문(석사) - 한국정보통신대학원대학교 : 공학부, 2001, [ viii, 55 p. ]-
dc.description.abstractWith the wide spread use of the Internet, numerous techniques have been devised such that attackers can break into the network, and then steal, forge, and destroy data in the target computer system. Tapping is one of the most popular network attacking methods appeared since early 1980s and is to eavesdrop on a session of a connection while data are transferred between the computers. Due to this, an attacker can easily extract the data including user-ids and the corresponding passwords. In order to protect network systems from tapping, there are some countermeasures to avoid tapping and there are some programs to detect tapping on a remote computer in a local area network. This thesis proposes a new protocol called tapping alert protocol (TAP), which detects if any computer is eavesdropping on the network. When tapping is detected, TAP alerts the network users on the danger of tapping. It can also detect tapping on a remote computer of the remote network across routers. In designing the protocol, a model is developed for an attacker who sniffs the network and breaks down the proposed protocol, and the requirements on the protocol in terms of security are defined. We also describe how to detect if a network interface card on a remote computer is in the sniffing mode. The proposed protocol employs cryptographic primitives to guarantee authentication of the code monitoring tapping operation and integrity and confidentiality of the data being sent. This protocol should also provide a secure area to make the private key and session key secure. To achieve this, this protocol employs a smart card which a CPU and memory are built in. We also describe typical implementation using how to work and to gather the host information on the network automatically in timely manner. Finally, we verified that the proposed protocol can protect authorized users from illegal eavesdropping on the network.eng
dc.languageeng-
dc.publisher한국정보통신대학원대학교-
dc.subjectImplementation-
dc.subject도청 경고 프로토콜-
dc.subjectTapping Alert Protocol-
dc.titleA study on design and implementation of tapping alert protocol-
dc.title.alternative네트워크 도청 경고 프로토콜의 설계와 구현에 관한 연구-
dc.typeThesis(Master)-
dc.identifier.CNRN392090/225023-
dc.description.department한국정보통신대학원대학교 : 공학부, -
dc.identifier.uid000993877-
dc.contributor.localauthorKim, Kwang-Jo-
dc.contributor.localauthor김광조-
Appears in Collection
School of Engineering-Theses_Master(공학부 석사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0