@article{ART002727744},
author={Young Woo Rim and KWON JUNG JANG},
title={Implementation of a security system using the MITM attack technique in reverse},
journal={Journal of The Korea Society of Computer and Information},
issn={1598-849X},
year={2021},
volume={26},
number={6},
pages={9-17},
doi={10.9708/jksci.2021.26.06.009}
TY - JOUR
AU - Young Woo Rim
AU - KWON JUNG JANG
TI - Implementation of a security system using the MITM attack technique in reverse
JO - Journal of The Korea Society of Computer and Information
PY - 2021
VL - 26
IS - 6
PB - The Korean Society Of Computer And Information
SP - 9
EP - 17
SN - 1598-849X
AB - In this paper, we propose a reversely using the “Man In The Middle Attack” attack technique as a way to introduce network security without changing the physical structure and configuration of the existing network, a Virtual Network Overlay is formed with only a single Ethernet Interface.
Implementing In-line mode to protect the network from external attacks, we propose an integrated control method through a micro network security sensor and cloud service. As a result of the experiment, it was possible to implement a logical In-line mode by forming a Virtual Network Overlay with only a single Ethernet Interface, and to implement Network IDS/IPS, Anti-Virus, Network Access Control, Firewall, etc.,. It was possible to perform integrated monitor and control in the service. The proposed system in this paper is helpful for small and medium-sized enterprises that expect high-performance network security at low cost, and can provide a network security environment with safety and reliability in the field of IoT and embedded systems.
KW - Network protection;MITM Attack;ARP Poisoning;Virual network overlay;IoT Cloud
DO - 10.9708/jksci.2021.26.06.009
ER -
Young Woo Rim and KWON JUNG JANG. (2021). Implementation of a security system using the MITM attack technique in reverse. Journal of The Korea Society of Computer and Information, 26(6), 9-17.
Young Woo Rim and KWON JUNG JANG. 2021, "Implementation of a security system using the MITM attack technique in reverse", Journal of The Korea Society of Computer and Information, vol.26, no.6 pp.9-17. Available from: doi:10.9708/jksci.2021.26.06.009
Young Woo Rim, KWON JUNG JANG "Implementation of a security system using the MITM attack technique in reverse" Journal of The Korea Society of Computer and Information 26.6 pp.9-17 (2021) : 9.
Young Woo Rim, KWON JUNG JANG. Implementation of a security system using the MITM attack technique in reverse. 2021; 26(6), 9-17. Available from: doi:10.9708/jksci.2021.26.06.009
Young Woo Rim and KWON JUNG JANG. "Implementation of a security system using the MITM attack technique in reverse" Journal of The Korea Society of Computer and Information 26, no.6 (2021) : 9-17.doi: 10.9708/jksci.2021.26.06.009
Young Woo Rim; KWON JUNG JANG. Implementation of a security system using the MITM attack technique in reverse. Journal of The Korea Society of Computer and Information, 26(6), 9-17. doi: 10.9708/jksci.2021.26.06.009
Young Woo Rim; KWON JUNG JANG. Implementation of a security system using the MITM attack technique in reverse. Journal of The Korea Society of Computer and Information. 2021; 26(6) 9-17. doi: 10.9708/jksci.2021.26.06.009
Young Woo Rim, KWON JUNG JANG. Implementation of a security system using the MITM attack technique in reverse. 2021; 26(6), 9-17. Available from: doi:10.9708/jksci.2021.26.06.009
Young Woo Rim and KWON JUNG JANG. "Implementation of a security system using the MITM attack technique in reverse" Journal of The Korea Society of Computer and Information 26, no.6 (2021) : 9-17.doi: 10.9708/jksci.2021.26.06.009