기업 사설 네트워크 우회 접속 분석 및 통제 대책 연구
Vol. 20, No. 6, pp. 183-194,
12월.
2010
10.13089/JKIISC.2010.20.6.183, Full Text:
Keywords: Covert Channel, Malicious Code, Remote Control, Reverse Connection, Private Network, Tunneling
Abstract Statistics
Cite this article
10.13089/JKIISC.2010.20.6.183, Full Text:
Keywords: Covert Channel, Malicious Code, Remote Control, Reverse Connection, Private Network, Tunneling
Abstract Statistics
Cite this article
[IEEE Style]
C. Lee, H. Kim, J. Lim, "A Study on Analysis and Control of Circumvent Connection to the Private Network of Corporation," Journal of The Korea Institute of Information Security and Cryptology, vol. 20, no. 6, pp. 183-194, 2010. DOI: 10.13089/JKIISC.2010.20.6.183.
[ACM Style]
Chul-Won Lee, Huy-Kang Kim, and Jong-In Lim. 2010. A Study on Analysis and Control of Circumvent Connection to the Private Network of Corporation. Journal of The Korea Institute of Information Security and Cryptology, 20, 6, (2010), 183-194. DOI: 10.13089/JKIISC.2010.20.6.183.