Analysis and countermeasures of security vulnerability on portal sites

Kyoungju Kwak, Kwangwoo Lee, Dongho Won, Seungjoo Kim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Recently, major portal sites are suffering from a number of attacks and it is growing exponentially. July 2009, there has been system failure on government sites and some of the major portal sites due to the DDoS (Distributed Denial of Service) attack. Moreover, portal sites are exploited by a cross-site scripting vulnerability in 2010. To solve these problems, each portal site made an effort to eliminate the security vulnerability of the website and to protect personal information such as ID and password. However, portal sites still have the security vulnerabilities against ARP (Address Resolution Protocol) poisoning attack and the certificate spoofing attack. In this paper, we show the results of our penetration test and present the countermeasures on the ARP (Address Resolution Protocol) poisoning attack and the certificate spoofing attack.

Original languageEnglish
Title of host publicationProceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011
DOIs
Publication statusPublished - 2011
Externally publishedYes
Event5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011 - Seoul, Korea, Republic of
Duration: 2011 Feb 212011 Feb 23

Publication series

NameProceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011

Other

Other5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011
Country/TerritoryKorea, Republic of
CitySeoul
Period11/2/2111/2/23

Keywords

  • ARP poisoning attack
  • Certificate spoofing
  • Portal site

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Information Systems

Fingerprint

Dive into the research topics of 'Analysis and countermeasures of security vulnerability on portal sites'. Together they form a unique fingerprint.

Cite this