Hello, I'm security defender PR.
Can we hide behind anonymity today to find out who the increasingly aggressive and ugly comment unit and the modulated IP via VPN are?I'm going to talk about something.
The conclusion is 100% clear.
I'll let you know the reason for now.
Today, we will not talk about anonymity guarantee on the Internet or about pros and cons of preventing damage from comment manipulation or about individuals posting malicious comments.
The topic will talk about whether security technologies can detect the use of modulated IP via VPN or proxy and the unilateral use of multiple IDs by individuals or organizations to slander and comment to gain advantage.
VPNs are common in forces instigating fake news and manipulation of public opinion in Drewking.
Can I talk to you about VPN for a second.
VPN stands for virtual privacy, which encrypts Internet traffic and protects your online identity.
It is not a technology that modulates IP, but a security technology that encrypts a user's Internet traffic interval through a VPN server on a typical Internet network.
In the picture, all the data that sends traffic, A that receives traffic, B that receives traffic, is encrypted.
Encrypted data cannot be read by a hacker in the middle.
However, VPN technology is being used to hide their IPs.
If you access the server through VPN and leave comments, you leave the IP of the VPN server, not your own IP.
And if you use a lot of VPNs around the world, it's even harder to find.
The Sapjaru Pangil incident is a meticulous and vicious event to set up a marketing company in the Philippines and use the 300 IDs accessed through VPN to hide IPs and use overseas traffic for complete crimes, and to incite young students to their purpose by using large amounts of IDs.
But the server is supposed to leave a lot of information in addition to the IP and user ID to identify you.
That's the browser fingerprint browser Fingerprint, which contains the browser information that you use to view the website.
Can you identify a user like a fingerprint in a person's hand?
Think of your browser thumbprint as your own personal information.
The default information sent by the server that runs the browser and the website includes information about the type of browser, the operating system (OS) on your PC, and whether cookies are used (browser settings).
You can also use Adobe Flash, Java Virtual Machine, which you use to implement a variety of recent website features, to collect information such as versions of programs that support the functionality of your browser, the standard time (time), screen resolution, and the fonts and colors that your PC has.
This is how the browser gathers the information that occurs when it communicates with the server and becomes the browser fingerprint.
Even if you hide the IP as a VPN, you collect the information above and get a single unique fingerprint.
You can just figure out who you are.
What is SIEM?
Security Information & Event Management (SIEM)
It is a solution that integrates security-related general information (login history, information access history) and security information management (SIM) used for post-analysis purposes into security event management used for violation detection and response purposes.
SIEM is an integrated log management analysis solution that collects and analyzes log data from all equipment in the enterprise.
It's a product that many security companies now use to detect internal and external security events.
How will the former security company detect an attack?I mentioned it briefly in .
SIEM combines server thumbprint, user ID, comment writing patterns, and network access history.
Scenario-based correlation allows you to identify 100% of users.
I'll organize the posts today.
It is illegal and punishable for some people behind anonymity to manipulate and incite as if it were the majority opinion.
What is the truth? What is false? In an obscure world, we live.
I think it's harsh to judge a lot of the truth in front of you and not to be instigated by your own personal judgment.
That's why you need a system that knows the least reliability.
For example, if a user who keeps posting comments changes his or her ID on the same PC via an overseas channel and posts the same comment, what percentage of the comments are suspected of manipulation, so that the viewer can refer to their reliability, or do they have a history of purchasing favorable comments? No? How long has it been since you bought it and have you ever purchased it again? Even if you do not correlate and disclose your back, the perception that illegal comments must be punished by being able to see and controlled by internal administrators should be expanded.
Personally, illegal comments such as the nation's largest portal site or online lecture site that can influence users with a large number of opinions.
We would like to recognize the seriousness of the problem and provide a service to capture illegal advertisements or comments.
댓글