DOI QR코드

DOI QR Code

A Tor Security Policy using Exit Relay Methodology

출구 릴레이 방법론을 이용한 Tor 보안 정책

  • Received : 2017.03.30
  • Accepted : 2017.05.25
  • Published : 2017.06.30

Abstract

Tor proxy tool is studied which is most frequently used for ransomeware to penetrate into sensitive information. It will be researched for the malicious methods to spread virus by using Tor and considered a countermeasure to prevent them. We present exit relay methodology for Tor security policy, simulate it, and get a probability to detect the ransomeware. And we compare it with TSS technology which is able to protect the attack via virtual server on exit relay.

Keywords

References

  1. KSN, KSN Repot: Ransomeware In 2014-2016, https://securelist.com/pc-ransomwarein-2014-2016/75145 (accessed Sep., 25, 2016).
  2. The Appearance of Cryptowall Updates and New Families of Ransomeware, https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/cryptowall-updates-new-families-of-ransomware-found (accessed Sep., 28, 2016).
  3. TOR, http://torproject.org (accessed Jul., 3, 2016).
  4. What Kind of Structure is Anonymous Communication Tor, http://techholic.co.kr/archives/46127 (accessed Dec., 10, 2016).
  5. Onion Routing, https://www.onion-router.net (accessed Aug., 30, 2016).
  6. TrendMicro, Cybercrime Hits the Unexpected, 1st Quarter Intimidation Report, 2014.
  7. Korea Internet and Security Agency, Kr CERT/cc, Case Analysis for the Principle of Tor Network and Relative Malicious Code, 2014.
  8. J.Y. Seo, A Study on Enhancing Performance and Secrecy of Tor Anonymous Communication System, Master's Thesis of Ajou University of Technology, 2009.
  9. Red Sox, Hacking Team Traceback In-depth Analysis, https://thenewspro.org/?p=13534 (accessed Sept., 15, 2016).
  10. Akamai, Akamai's State of the Internet/Security, 2015.
  11. D. Easley and J. Kleniberg, Networks, Crowds, and Markets : Reasoning about a High Connected World, Cambridge University Press, Cambridge, U.K., 2010.
  12. M.H. Choi, B.T. Ahn, S.J. Kim, S.K. Ryu, and H.S. Kang, "An Operating Strategy of Outer Networking of University According to Traffic Efficiency Analysis," Journal of Korea Multimedia Society, Vol. 8, No. 1, pp. 119-127, 2005.