• Title/Summary/Keyword: 공격 분석

Search Result 3,034, Processing Time 0.035 seconds

사회공학적 공격방법을 통한 개인정보의 유출기술 및 대응방안 분석

  • 최양서;서동일
    • Review of KIISC
    • /
    • v.16 no.1
    • /
    • pp.40-48
    • /
    • 2006
  • 개인정보 유출을 위한 공격이 발생하기 시작한 것은 이미 오래전이다. 이런 공격은 고도의 기술을 이용하여 사용자가 인지하지 못한 상황에서 시도되는 경우도 있었으나 대부분의 경우 정보보호에 대한 상식이 부족한 일반인들을 대상으로 자신의 중요 정보를 직접 제공하게 만드는 사회공학적인 공격 방법이 주류를 이루었다. 이러한 사회 공학적인 공격 방법은 비록 매우 허술해 보이지만. 해커들 사이에서는 아직까지도 가장 쉽게 정보를 획득할 수 있는 방법으로 인식되고 있다 최근에는 피싱(Phishing), 파밍(Pharming) 등과 같은 사회 공학적인 공격 방법과, 인터넷이라는 전자 매체, 그리고, 고도의 공격 기술 등이 복합적으로 적용된 개인정보 유출 공격이 시도되고 있다. 이에 본고에서는 개인정보 유출을 위해 시도되는 공격에는 어떠한 방법들이 있는지 알아보고, 이들이 사용하는 기술적인 공격 방법에 대해 분석하며, 이를 극복하기 위한 방안에 대해 살펴보기로 한다.

The Analysis of the APT Prelude by Big Data Analytics (빅데이터 분석을 통한 APT공격 전조 현상 분석)

  • Choi, Chan-young;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.6
    • /
    • pp.1129-1135
    • /
    • 2016
  • The NH-NongHyup network and servers were paralyzed in 2011, in the 2013 3.20 cyber attack happened and classified documents of Korea Hydro & Nuclear Power Co. Ltd were leaked on december in 2015. All of them were conducted by a foreign country. These attacks were planned for a long time compared to the script kids attacks and the techniques used were very complex and sophisticated. However, no successful solution has been implemented to defend an APT attacks(Advanced Persistent Threat Attacks) thus far. We will use big data analytics to analyze whether or not APT attacks has occurred. This research is based on the data collected through ISAC monitoring among 3 hierarchical Korean Defense System. First, we will introduce related research about big data analytics and machine learning. Then, we design two big data analytics models to detect an APT attacks. Lastly, we will present an effective response method to address a detected APT attacks.

The Analysis of the APT Prelude by Big Data Analytics (빅데이터 분석을 통한 APT공격 전조 현상 분석)

  • Choi, Chan-young;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.317-320
    • /
    • 2016
  • The NH-NongHyup network and servers were paralyzed in 2011, in the 2013 3.20 cyber attack happened and Classified documents of Korea Hydro & Nuclear Power Co. Ltd were leaked on December in 2015. All of them were conducted by a foreign country. These attacks were planned for a long time compared to the script kids attacks and the techniques used were very complex and sophisticated. However, no successful solution has been implemented to defend an APT attack thus far. Therefore, we will use big data analytics to analyze whether or not APT attack has occurred in order to defend against the manipulative attackers. This research is based on the data collected through ISAC monitoring among 3 hierarchical Korean defense system. First, we will introduce related research about big data analytics and machine learning. Then, we design two big data analytics models to detect an APT attack and evaluate the models' accuracy and other results. Lastly, we will present an effective response method to address a detected APT attack.

  • PDF

CHES 2020로 살펴본 부채널 분석 보안 컨퍼런스 연구 동향

  • ;Kim, Hui-Seok
    • Review of KIISC
    • /
    • v.30 no.6
    • /
    • pp.67-81
    • /
    • 2020
  • CHES는 암호 알고리즘의 하드웨어/소프트웨어 구현의 설계 및 분석에 대한 다양한 성과가 발표되는 부채널 분석 분야 최대 규모의 보안 컨퍼런스이다. 본 기고는 CHES 컨퍼런스에 발표된 논문들에 대하여 부채널 공격 관점, 부채널 대응 및 구현 관점, CHES에서 주제로 다루는 암호 알고리즘의 추이 관점으로 구분하여 동향을 분석한다. 이를 위하여 오류주입 공격, 머신러닝 기반 부채널 공격, 캐시공격, 부채널 누출 검증 방법론과 부채널 역공학 기술 등 다양한 부채널 공격을 소개하고 최신 논문 주제의 흐름에 대하여 논의한다. 또한, 소프트웨어 고차 마스킹과 하드웨어 TI, PUF/난수 발생기 등의 부채널 대응기술 및 구현 동향을 분석하며, CHES에 발표된 논문들이 주제로 다루는 대칭키, 공개키 암호 및 화이트박스 암호 추이를 분석한다. 이러한 CHES 컨퍼런스의 주제별 연구 동향 분석 결과는 부채널 분석 연구자에게 유용한 정보를 제공하고 향후 연구 방향에 대한 중요한 지표가 될 수 있을 것이다.

Study On Identifying Cyber Attack Classification Through The Analysis of Cyber Attack Intention (사이버공격 의도분석을 통한 공격유형 분류에 관한 연구 - 사이버공격의 정치·경제적 피해분석을 중심으로 -)

  • Park, Sang-min;Lim, Jong-in
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.103-113
    • /
    • 2017
  • Cyber attacks can be classified by type of cyber war, terrorism and crime etc., depending on the purpose and intent. Those are mobilized the various means and tactics which are like hacking, DDoS, propaganda. The damage caused by cyber attacks can be calculated by a variety of categories. We may identify cyber attackers to pursue trace-back based facts including digital forensics etc. However, recent cyber attacks are trying to induce confusion and deception through the manipulation of digital information or even conceal the attack. Therefore, we need to do the harm-based analysis. In this paper, we analyze the damage caused during cyber attacks from economic and political point of view and by inferring the attack intent could classify types of cyber attacks.

A Profiling Case Study to Phishing Mail Attack Group (피싱 메일 공격조직에 대한 프로파일링 사례 연구)

  • Lee, Jae-il;Lee, Yong-joon;Kwon, Hyuk-jin
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.91-97
    • /
    • 2020
  • Recently, phishing attacks targeting those involved in defense, security and unification have been on the rise. In particular, hacking attack organization Kimsuky has been engaged in activities to collect important information from public organizations through phishing attacks since 2013. In this paper, profiling analysis of phishing mail attack organization was performed. Through this process, we estimated the purpose of the attack group and suggested countermeasures.

Attack Categorization based on Web Application Analysis (웹 어플리케이션 특성 분석을 통한 공격 분류)

  • 서정석;김한성;조상현;차성덕
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.97-116
    • /
    • 2003
  • Frequency of attacks on web services and the resulting damage continue to grow as web services become popular. Techniques used in web service attacks are usually different from traditional network intrusion techniques, and techniques to protect web services are badly needed. Unfortunately, conventional intrusion detection systems (IDS), especially those based on known attack signatures, are inadequate in providing reasonable degree of security to web services. An application-level IDS, tailored to web services, is needed to overcome such limitations. The first step in developing web application IDS is to analyze known attacks on web services and characterize them so that anomaly-based intrusion defection becomes possible. In this paper, we classified known attack techniques to web services by analyzing causes, locations where such attack can be easily detected, and the potential risks.

Relationship of Stress and Aggression on Schoolchildren with Physical disability (학령기 지체장애 아동의 스트레스와 공격성 비교연구)

  • Kim, Hee-Jung;Kim, Dong-Hyun
    • The Journal of Korean society of community based occupational therapy
    • /
    • v.6 no.2
    • /
    • pp.31-38
    • /
    • 2016
  • Purpose : The purpose of this study was to know the relationship of stress and aggression of children with physical disability. The study also tried to search the factors affecting aggression and offer the information to the department of occupational therapy for intervention. Method : We distributed questionnaire to 105 children who have disability grades from hospitals in Gyeongsangbukdo, Gyeongsangnamdo, Daegu, and Busan and collected the data. We used descriptives for analysis of general characteristics, t-test and one-way ANOVA for stress and aggression according to characteristics, and Pearson correlation coefficient and stepwise regression for stress and aggression. Result : The first, stress score was 2.65, aggression was 2.53, and physical aggression was 3.01 that is the highest score in the items. The second, there was a significant difference of physical aggression(p=.021) in comparison of the grades. There was a significant difference of stress(p=.048), total aggression(p=.040), and physical aggression(p=.047) in comparison of gender. There was significant difference of stress(p=.035) and total aggression(p=.042) in satisfaction of school. The third, there was a significant correlation of total aggression(r=.475), physical aggression(r=.568), language aggression(r=.311), anger(r=.397), and hostility (r=.491) quantitatively in correlation of stress and aggression. The fourth, the factors affecting aggression of children with physical disability were stress, male, and satisfaction of school(F=61.187, p<.01). Conclusion : We knew that factors affecting aggression of children with physical disability were their stress and some of general characteristics.

The convergence study of beliefs supporting aggression and aggression in elementary students: Focusing on mediating effects of self-esteem (초등학생의 공격신념과 공격성에 대한 융합 연구: 자아존중감의 매개효과를 중심으로)

  • Yoo, Sun-Yee
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.8
    • /
    • pp.327-334
    • /
    • 2019
  • This study was conducted to understand the relationship between elementary students' beliefs supporting aggression, aggression and self-esteem. In addition, we aimed to provide basic data for controlling the aggression of children and developing effective coping strategies. This study population consisted of 184 elementary school students. Data were analyzed using SPSS 24.0 program. As a result, the aggression of elementary school students showed a significant positive correlation with beliefs supporting aggression(r=.39, p<.001) and a significant negative correlation with self-esteem(r=-.46, p<.001). In addition, Results of the hierarchical regression analysis revealed that self-esteem has the mediating effect on the relationship between beliefs supporting aggression and aggression(${\beta}=.26$, p<.001). In other words, the higher the beliefs supporting aggression, the higher the aggression, and self-esteem means to act as a mediating effect in the relationship between them. Therefore, when arranging an intervention plan to control the aggression of elementary school students, it is necessary to find strategies to control the beliefs spporting aggression and increase self-esteem.

Real-time Web-Sewer Intrusion Detection Using Web-Log Mining (웹 로그 마이닝을 통한 실시간 웹 서버 침입 탐지)

  • 진홍태;박종서
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.313-315
    • /
    • 2004
  • 인터넷 사용이 보편화됨에 따라 기존의 방화벽만으로는 탐지가 불가능한 웹 서비스의 취약점을 이용한 공격이 증가하고 있다. 그 중에서도 특히 웹 어플리케이션의 프로그래밍 오류를 이용한 침입이 공격 수단의 대부분을 차지하고 있다. 본 논문에서는 웹 어플리케이션의 동작을 분석한 후 취약점 발생 부분에 대해 웹 로그 마이닝 기법을 사용하여 실시간으로 로그를 분석함으로서 공격 패턴을 비교ㆍ분석한다. 또한 프로세스 분석기를 통한 결정(decision) 과정을 통해 침입으로 판단되면 해당 접속 프로세스(pid)를 제거 한 후 공격 아이피를 차단함으로서 침입을 탐지하는 메커니즘을 제시한다.

  • PDF