{"title":"忍者黑客的防范措施研究","authors":"Byungho Park, R. Kim, Y. B. Park","doi":"10.1109/ICISA.2014.6847344","DOIUrl":null,"url":null,"abstract":"Anonymous declared that it would hack North Korea, the world-wide closing country on June 25 in 2013, using internal supporters, but it is not known to have succeeded in hacking concretely. However, our previous study suggested hacking with Ninja gate, not with the existing method by connected routing. As a result of this study, we mentioned that even though it is a closing network, it will need a separate measure. This study suggests a countermeasure against Ninja Hacking.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Study on Preventative Measures for Ninja Hacking\",\"authors\":\"Byungho Park, R. Kim, Y. B. Park\",\"doi\":\"10.1109/ICISA.2014.6847344\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Anonymous declared that it would hack North Korea, the world-wide closing country on June 25 in 2013, using internal supporters, but it is not known to have succeeded in hacking concretely. However, our previous study suggested hacking with Ninja gate, not with the existing method by connected routing. As a result of this study, we mentioned that even though it is a closing network, it will need a separate measure. This study suggests a countermeasure against Ninja Hacking.\",\"PeriodicalId\":117185,\"journal\":{\"name\":\"2014 International Conference on Information Science & Applications (ICISA)\",\"volume\":\"31 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-05-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 International Conference on Information Science & Applications (ICISA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICISA.2014.6847344\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Information Science & Applications (ICISA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICISA.2014.6847344","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Study on Preventative Measures for Ninja Hacking
Anonymous declared that it would hack North Korea, the world-wide closing country on June 25 in 2013, using internal supporters, but it is not known to have succeeded in hacking concretely. However, our previous study suggested hacking with Ninja gate, not with the existing method by connected routing. As a result of this study, we mentioned that even though it is a closing network, it will need a separate measure. This study suggests a countermeasure against Ninja Hacking.