Analysis and countermeasures of security vulnerability on portal sites

Kyoungju Kwak, Kwangwoo Lee, Dongho Won, Seung-Joo Kim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Recently, major portal sites are suffering from a number of attacks and it is growing exponentially. July 2009, there has been system failure on government sites and some of the major portal sites due to the DDoS (Distributed Denial of Service) attack. Moreover, portal sites are exploited by a cross-site scripting vulnerability in 2010. To solve these problems, each portal site made an effort to eliminate the security vulnerability of the website and to protect personal information such as ID and password. However, portal sites still have the security vulnerabilities against ARP (Address Resolution Protocol) poisoning attack and the certificate spoofing attack. In this paper, we show the results of our penetration test and present the countermeasures on the ARP (Address Resolution Protocol) poisoning attack and the certificate spoofing attack.

Original languageEnglish
Title of host publicationProceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011
DOIs
Publication statusPublished - 2011 May 20
Externally publishedYes
Event5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011 - Seoul, Korea, Republic of
Duration: 2011 Feb 212011 Feb 23

Other

Other5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011
CountryKorea, Republic of
CitySeoul
Period11/2/2111/2/23

Fingerprint

Network protocols
Websites
Denial-of-service attack

Keywords

  • ARP poisoning attack
  • Certificate spoofing
  • Portal site

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Information Systems

Cite this

Kwak, K., Lee, K., Won, D., & Kim, S-J. (2011). Analysis and countermeasures of security vulnerability on portal sites. In Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011 [98] https://doi.org/10.1145/1968613.1968728

Analysis and countermeasures of security vulnerability on portal sites. / Kwak, Kyoungju; Lee, Kwangwoo; Won, Dongho; Kim, Seung-Joo.

Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011. 2011. 98.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kwak, K, Lee, K, Won, D & Kim, S-J 2011, Analysis and countermeasures of security vulnerability on portal sites. in Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011., 98, 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011, Seoul, Korea, Republic of, 11/2/21. https://doi.org/10.1145/1968613.1968728
Kwak K, Lee K, Won D, Kim S-J. Analysis and countermeasures of security vulnerability on portal sites. In Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011. 2011. 98 https://doi.org/10.1145/1968613.1968728
Kwak, Kyoungju ; Lee, Kwangwoo ; Won, Dongho ; Kim, Seung-Joo. / Analysis and countermeasures of security vulnerability on portal sites. Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011. 2011.
@inproceedings{b9a1628253fb4493a2a8cf83d4f14a7d,
title = "Analysis and countermeasures of security vulnerability on portal sites",
abstract = "Recently, major portal sites are suffering from a number of attacks and it is growing exponentially. July 2009, there has been system failure on government sites and some of the major portal sites due to the DDoS (Distributed Denial of Service) attack. Moreover, portal sites are exploited by a cross-site scripting vulnerability in 2010. To solve these problems, each portal site made an effort to eliminate the security vulnerability of the website and to protect personal information such as ID and password. However, portal sites still have the security vulnerabilities against ARP (Address Resolution Protocol) poisoning attack and the certificate spoofing attack. In this paper, we show the results of our penetration test and present the countermeasures on the ARP (Address Resolution Protocol) poisoning attack and the certificate spoofing attack.",
keywords = "ARP poisoning attack, Certificate spoofing, Portal site",
author = "Kyoungju Kwak and Kwangwoo Lee and Dongho Won and Seung-Joo Kim",
year = "2011",
month = "5",
day = "20",
doi = "10.1145/1968613.1968728",
language = "English",
isbn = "9781450305716",
booktitle = "Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011",

}

TY - GEN

T1 - Analysis and countermeasures of security vulnerability on portal sites

AU - Kwak, Kyoungju

AU - Lee, Kwangwoo

AU - Won, Dongho

AU - Kim, Seung-Joo

PY - 2011/5/20

Y1 - 2011/5/20

N2 - Recently, major portal sites are suffering from a number of attacks and it is growing exponentially. July 2009, there has been system failure on government sites and some of the major portal sites due to the DDoS (Distributed Denial of Service) attack. Moreover, portal sites are exploited by a cross-site scripting vulnerability in 2010. To solve these problems, each portal site made an effort to eliminate the security vulnerability of the website and to protect personal information such as ID and password. However, portal sites still have the security vulnerabilities against ARP (Address Resolution Protocol) poisoning attack and the certificate spoofing attack. In this paper, we show the results of our penetration test and present the countermeasures on the ARP (Address Resolution Protocol) poisoning attack and the certificate spoofing attack.

AB - Recently, major portal sites are suffering from a number of attacks and it is growing exponentially. July 2009, there has been system failure on government sites and some of the major portal sites due to the DDoS (Distributed Denial of Service) attack. Moreover, portal sites are exploited by a cross-site scripting vulnerability in 2010. To solve these problems, each portal site made an effort to eliminate the security vulnerability of the website and to protect personal information such as ID and password. However, portal sites still have the security vulnerabilities against ARP (Address Resolution Protocol) poisoning attack and the certificate spoofing attack. In this paper, we show the results of our penetration test and present the countermeasures on the ARP (Address Resolution Protocol) poisoning attack and the certificate spoofing attack.

KW - ARP poisoning attack

KW - Certificate spoofing

KW - Portal site

UR - http://www.scopus.com/inward/record.url?scp=79956008671&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=79956008671&partnerID=8YFLogxK

U2 - 10.1145/1968613.1968728

DO - 10.1145/1968613.1968728

M3 - Conference contribution

AN - SCOPUS:79956008671

SN - 9781450305716

BT - Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011

ER -