<?xml version="1.0" encoding="utf-8" standalone="no"?>
<dublin_core schema="dc">
<dcvalue element="contributor" qualifier="author">박정민</dcvalue>
<dcvalue element="contributor" qualifier="author">김은경</dcvalue>
<dcvalue element="contributor" qualifier="author">정유경</dcvalue>
<dcvalue element="contributor" qualifier="author">채기준</dcvalue>
<dcvalue element="contributor" qualifier="author">나중찬</dcvalue>
<dcvalue element="date" qualifier="accessioned">2024-01-21T01:01:23Z</dcvalue>
<dcvalue element="date" qualifier="available">2024-01-21T01:01:23Z</dcvalue>
<dcvalue element="date" qualifier="created">2022-01-10</dcvalue>
<dcvalue element="date" qualifier="issued">2007-06</dcvalue>
<dcvalue element="identifier" qualifier="issn">1598-2858</dcvalue>
<dcvalue element="identifier" qualifier="uri">https:&#x2F;&#x2F;pubs.kist.re.kr&#x2F;handle&#x2F;201004&#x2F;134339</dcvalue>
<dcvalue element="description" qualifier="abstract">유비쿼터스&#x20;네트워크&#x20;환경에서&#x20;개인정보의&#x20;유출은&#x20;다양한&#x20;사이버&#x20;범죄를&#x20;야기하며&#x20;개인정보의&#x20;상품화로&#x20;프라이버시의&#x20;침해가&#x20;증가하므로&#x20;개인정보의&#x20;유출을&#x20;탐지하는&#x20;것은&#x20;매우&#x20;중요하다.&#x20;본&#x20;논문은&#x20;네트워크의&#x20;트래픽&#x20;특성을&#x20;기반으로&#x20;한&#x20;개인정보&#x20;유출&#x20;탐지&#x20;기법을&#x20;제안하고자&#x20;한다.&#x20;실제&#x20;대학망에서&#x20;정상&#x20;상태의&#x20;트래픽을&#x20;수집하여&#x20;트래픽의&#x20;특성을&#x20;분석함으로써&#x20;네트워크&#x20;트래픽이&#x20;자기유사성을&#x20;지님을&#x20;확인하였다.&#x20;개인정보의&#x20;유출을&#x20;시도하는&#x20;악성코드의&#x20;사전정보수집단계를&#x20;모사한&#x20;비정상적인&#x20;트래픽에&#x20;대하여&#x20;정상&#x20;트래픽에서의&#x20;자기유사성과의&#x20;변화를&#x20;살펴봄으로써&#x20;이상을&#x20;조기&#x20;감지할&#x20;수&#x20;있었다.</dcvalue>
<dcvalue element="language" qualifier="none">Korean</dcvalue>
<dcvalue element="publisher" qualifier="none">한국정보처리학회</dcvalue>
<dcvalue element="title" qualifier="none">네트워크&#x20;트래픽&#x20;특성을&#x20;이용한&#x20;개인정보유출&#x20;탐지기법</dcvalue>
<dcvalue element="title" qualifier="alternative">Detection&#x20;of&#x20;Personal&#x20;Information&#x20;Leakage&#x20;using&#x20;the&#x20;Network&#x20;Traffic&#x20;Characteristics</dcvalue>
<dcvalue element="type" qualifier="none">Article</dcvalue>
<dcvalue element="description" qualifier="journalClass">2</dcvalue>
<dcvalue element="identifier" qualifier="bibliographicCitation">정보처리학회논문지C,&#x20;v.14,&#x20;no.3,&#x20;pp.199&#x20;-&#x20;208</dcvalue>
<dcvalue element="citation" qualifier="title">정보처리학회논문지C</dcvalue>
<dcvalue element="citation" qualifier="volume">14</dcvalue>
<dcvalue element="citation" qualifier="number">3</dcvalue>
<dcvalue element="citation" qualifier="startPage">199</dcvalue>
<dcvalue element="citation" qualifier="endPage">208</dcvalue>
<dcvalue element="description" qualifier="isOpenAccess">N</dcvalue>
<dcvalue element="description" qualifier="journalRegisteredClass">kci</dcvalue>
<dcvalue element="identifier" qualifier="kciid">ART001062710</dcvalue>
<dcvalue element="subject" qualifier="keywordAuthor">개인정보</dcvalue>
<dcvalue element="subject" qualifier="keywordAuthor">개인정보유출</dcvalue>
<dcvalue element="subject" qualifier="keywordAuthor">자기유사성</dcvalue>
<dcvalue element="subject" qualifier="keywordAuthor">트래픽특성</dcvalue>
<dcvalue element="subject" qualifier="keywordAuthor">Personal&#x20;information</dcvalue>
<dcvalue element="subject" qualifier="keywordAuthor">Personal&#x20;information&#x20;leakage</dcvalue>
<dcvalue element="subject" qualifier="keywordAuthor">Self-similarity</dcvalue>
<dcvalue element="subject" qualifier="keywordAuthor">Traffic&#x20;characteristics</dcvalue>
</dublin_core>
