DOI QR코드

DOI QR Code

A Location Recognition and Notification Method of Attacker in Wireless Network Environment

모바일 환경에서의 공격자 위치 특정 및 알람 기법

  • 봉진숙 (숭실대학교 컴퓨터학과) ;
  • 박상진 (숭실대학교 컴퓨터학과)
  • Received : 2017.05.08
  • Accepted : 2017.07.20
  • Published : 2017.07.28

Abstract

Wireless network using dynamic IP and mobile IP technology provides the user with convenience of access and movement. However, this causes the attacker who disguises normal user(pretending to be a regular user) to have more opportunity in regard to access and acquisition of information. This paper help the network administrator and the service provider quickly to recognize the attacker's intention to access network and service. Therefore network administrator and service provider can specify and respond the location of the attacker appropriately. To achieve above, we define an entity (W_L_M) that manages user information of WiFi and LTE network, and propose messages and procedures for attacker's location identification and alarm. The performance evaluation of this paper is based on qualitative analysis. By using the proposed method, some cost (message creation, processing and transmission) occurred but it was analyzed to be less than the total network operation cost. The proposal of this paper is a management method that utilizes existing network information and structure. This method can be used as a reference material to enhance security.

유동 IP와 모바일 IP를 사용하는 무선 네트워크 기술은 사용자에게 접속과 이동의 편의성을 세공한다. 그러나, 이러한 IP 기술들은 악의적인 사용자에게 정상 사용자를 위장하여 네트워크 및 서비스에 접속할 수 있는 기회를 제공하기도 한다. 이에 본 논문은 네트워크 관리자와 서비스 제공자가 악의적인 사용자의 네트워크 및 서비스에 대한 접근 의도를 빠르게 인지하고, 악의적인 사용자의 위치를 특정하여 적절한 대응을 할 수 있도록 wifi, LTE 네트워크의 사용자 정보를 통합 관리하는 개체(W_L_M)와 위치 특정과 알람을 위한 메시지를 정의하고 그 절차를 제안하였다. 본 논문의 성능 평가는 정성적 분석을 통해 이루어졌으며 제안기법의 적용으로 인해 일부 새로운 비용이 발생하나 전체 네트워크 운용비용 대비 적은 수준으로 분석 되었다. 본 논문의 제안은 기존의 유, 무선네트워크 정보와 구조를 활용한 관리적인 방법으로 네트워크의 보안성을 높이고자 할 때, 참고 자료로 활용 될 수 있다.

Keywords

References

  1. J.H. Oh, K.H. Lee, "Attack Scenarios and Countermeasures using CoAP in IoT Environment", Journal of the Korea Convergence Society, Vol. 7. No. 4, pp. 33-37, 2016. https://doi.org/10.15207/JKCS.2016.7.4.033
  2. C.R. Seo, K.H. Lee, "ARP Spoofing attack scenarios and countermeasures using CoAP in IoT environment", Journal of the Korea Convergence Society, Vol. 7. No. 4, pp. 39-44, 2016. https://doi.org/10.15207/JKCS.2016.7.4.039
  3. S.W. Cho, W.J. Jang, H.W. Lee, "mVoIP Vulnerability Analysis And its Countermeasures on Smart Phone", Journal of the Korea Convergence Society, Vol. 3, No. 3, pp. 7-12, 2012.
  4. J.T. Kim, M.H. Han, J.H. Lee, J.H. Kim, I.K. Kim, "Technical Trends of the Cyber Attack Traceback", Electronics and Telecommunications Trends, Vol.29, No.1, pp.93-103, 2014.02.
  5. J.T. Kim, I.K. Kim, K.H. Kang, "Technical Trends of the Cyber Targeted Attack Traceback-Connection Chain & Traceback", Electronics and Telecommunications Trends, Vol. 30, No. 4, pp. 120-128, 2015.08.
  6. D.H. Lee, D.G. Yeo, J.h. Jang, H.Y. Youm, "Traceback technology trends at Ad-hoc network", Review of KIISC, Vol.20, No.4. pp.85-94, 2010.08.
  7. H.W. Lee, "TTL based Advanced Packet Marking Mechanism for Wireless Traffic Classification and IP Traceback on IEEE 802.1x Access Point", Journal of the Korea Contents Association, Vol.7. No.1. pp. 103-115, 2007.01 https://doi.org/10.5392/JKCA.2007.7.1.103
  8. H.G. Cho, "Trend and prospect of wireless LAN standards", TTA Journal, Vol.147, pp. 39-42, 2013.05. (in Korean)
  9. J.S. Lim, "Design of Fusion Multilabeling System Controlled by Wi-Fi Signals", Journal of the Korea Convergence Society, Vol. 6, No. 1, pp. 1-5, 2015. https://doi.org/10.15207/JKCS.2015.6.1.001
  10. H.C. Kwon, "Technologies for Next Generation Wireless LAN Security", 2015 Annual Security Users' Festival, 2015.11. (in Korean)
  11. M.S. Gu, Y.Z. Li, "A Study of Countermeasures for Advanced Persistent Threats attacks by malicious code," Journal of IT Convergence Society for SMB, Vol. 5, No. 4, pp. 37-42, 2015.
  12. S.H. Hong, Y.J. Seo, "Countermeasure of Sniffing Attack: Survey," Journal of IT Convergence Society for SMB, Vol. 6, No. 2, pp. 31-36, 2016.
  13. M.Y. Shin, S.H. Hong, "A Defending Method Against DDoS Attacks With Router Control," Journal of IT Convergence Society for SMB, Vol. 5, No. 1, pp. 21-26, 2015
  14. KISA, "A handbook for wireless LAN security", Korea Communications Commission, Korea Information Security Agency, 2010.01. (in Korean)
  15. J.H. Na, K.S. Kim, D.S. Kwon, H.K. Chung, "Technical Trends of Small Cell Base Stations for LTE", Electronics and Telecommunications Trends, Vol.30, No.1, pp.102-113, 2015.02.
  16. NMC Consulting Group, "LTE Security I: LTE Security Concept and LTE Authentication", Netmanias Technical Document, 2013.07.
  17. NMC Consulting Group, "EMM Procedure 1. Initial Attach - Part 2. Call Flow of Initial Attach", Netmanias Technical Document, 2014.01.
  18. C.M. Yoo, "Understanding the Basic Operations of DHCP", NETMANIAS TECH-BLOG, 2011.12
  19. R. Droms, Dynamic Host Configuration Protocol, RFC 2131, IETF, 1997.03.