• Title/Summary/Keyword: 무력화

Search Result 170, Processing Time 0.04 seconds

Defense Mechanism against Replay Attack on Remote Keyless Entry System (원격 키리스 엔트리시스템에 대한 재생공격 무력화 기법)

  • Kim, Young Min;Kim, Seong Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.247-250
    • /
    • 2019
  • The first-generation RKE(Remote Keyless Entry) system is very vulnerable to replay attacks and the encryption of the second-generation RKE system is known to be disabled by four to eight signal receptions and analysis. In order to enhance the security of the RKE system, we introduce a physical-layer security methods in the RKE system and propose a technique to disable the replay attack by reducing the quality of the signal received by an eavesdropper.

  • PDF

Replay Attack based Neutralization Method for DJI UAV Detection/Identification Systems (DJI UAV 탐지·식별 시스템 대상 재전송 공격 기반 무력화 방식)

  • Seungoh Seo;Yonggu Lee;Sehoon Lee;Seongyeol Oh;Junyoung Son
    • Journal of Aerospace System Engineering
    • /
    • v.17 no.4
    • /
    • pp.133-143
    • /
    • 2023
  • As drones (also known as UAV) become popular with advanced information and communication technology (ICT), they have been utilized for various fields (agriculture, architecture, and so on). However, malicious attackers with advanced drones may pose a threat to critical national infrastructures. Thus, anti-drone systems have been developed to respond to drone threats. In particular, remote identification data (R-ID)-based UAV detection and identification systems that detect and identify illegal drones with R-ID broadcasted by drones have been developed, and are widely employed worldwide. However, this R-ID-based UAV detection/identification system is vulnerable to security due to wireless broadcast characteristics. In this paper, we analyze the security vulnerabilities of DJI Aeroscope, a representative example of the R-ID-based UAV detection and identification system, and propose a replay-attack-based neutralization method using the analyzed vulnerabilities. To validate the proposed method, it is implemented as a software program, and verified against four types of attacks in real test environments. The results demonstrate that the proposed neutralization method is an effective neutralization method for R-ID-based UAV detection and identification systems.

Implementation of User Environment in IPMP System (IPMP 시스템 사용자 환경의 구현)

  • 김장하;방한성;김상욱
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04c
    • /
    • pp.645-647
    • /
    • 2003
  • 인터넷의 확장과 함께 광대역폭을 이용한 다양한 멀티미디어 데이터의 전승이 더욱 가속화되고 있다. 상용화 추세에 접어들고 있는 멀티미디어 데이터 서비스에서 지적 재산권의 관리와 보호는 컨텐츠 유통에서 반드시 요구되는 사항이다. 컨텐츠에 적용된 보안 체계를 무력화하기 위한 공격자들의 공격 유형이 점점 다양해짐에 따라 사용자 환경 차원에서 새로운 보안요소를 적용하여 단말 재생기의 환경을 제어함으로 악의를 가진 사용자들의 컨텐츠 보안체계 공격을 무력화시키고 안전한 컨텐츠 유통 환경을 제공하는 보안 시스템을 구현한다.

  • PDF

Analysing and Neutralizing the Stuxnet's Stealthing Techniques (Stuxnet의 파일 은닉 기법 분석 및 무력화 방법 연구)

  • Lee, Kyung-Roul;Yim, Kang-Bin
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.6
    • /
    • pp.838-844
    • /
    • 2010
  • This paper introduces Stuxnet, a malicious ware that presently stimulates severity of the cyber warfare worldwide, analyses how it propagates and what it affects if infected and proposes a process to cure infected systems according to its organization. Malicious wares such as Stuxnet secretes themselves within the system during propagation and it is required to analyze file hiding techniques they use to detect and remove them. According to the result of the analysis in this paper, Stuxnet uses the library hooking technique and the file system filter driver technique on both user level and kernel level, respectively, to hide its files. Therefore, this paper shows the results of the Stuxnet's file hiding approach and proposes an idea for countermeasure to neutralize it. A pilot implementation of the idea afterward shows that the stealthing techniques of Stuxnet are removed by the implementation.

코너를 특징점으로 이용한 감시카메라 공격 검출

  • Park, Moo-Kyung
    • Review of KIISC
    • /
    • v.20 no.3
    • /
    • pp.58-61
    • /
    • 2010
  • 최근 영상압축 및 전송기술의 발달과 저장매체의 대용량화 등 IT 기술의 발달로 영상기반의 보안시스템은 누구나 쉽게 사용할 수 있는 보편화된 시스템이 되고 있다. 그리고 프로세서의 발달로 인해 감시카메라에서 취득한 영상을 영상처리를 통해 자동으로 해석하는 지능형 영상감시 시스템은 주목 받고 있다. 하지만 외부로부터 카메라가 공격을 당해 감시불능인 상태가 되면 아무리 뛰어난 지능형 영상감시 시스템이라고 해도 무용지물이 되기 때문에 카메라 무력화를 감시하는 알고리즘은 반드시 필요하다. 카메라 무력화 검지 알고리즘은 사용자로 하여금 시스템을 편리하게 사용할 수 있게 해 주지만 아직 많은 알고리즘들은 조명변화와 같은 일상적인 상황에 잦은 오보를 출력함으로 시스템의 신뢰도를 떨어뜨리고 오히려 사용자에게 불편을 주고 있다. 따라서 본 논문에서는 조명변화에 강건하도록 입력영상의 코너를 특징점으로 이용하여 감시카메라의 공격을 검출하는 방법을 제안한다.

A study on neutralization malicious code using Windows Crypto API and an implementation of Crypto API hooking tool (윈도우즈 Crypto API를 이용한 악성코드 무력화 방안 연구 및 도구 구현)

  • Song, Jung-Hwan;Hwang, In-Tae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.111-117
    • /
    • 2011
  • Advances in encryption technology to secret communication and information security has been strengthened. Cryptovirus is the advent of encryption technology to exploit. Also, anyone can build and deploy malicious code using windows CAPI. Cryptovirus and malicious code using windows CAPI use the normal windows API. So vaccine software and security system are difficult to detect and analyze them. This paper examines and make hooking tool against Crytovirus and malicious code using windows CAPI.

인터넷과 통신사업: 영향, 전망 및 시사점

  • Ju, Gi-In
    • 정보화사회
    • /
    • s.123
    • /
    • pp.24-30
    • /
    • 1998
  • 인터넷은 향후 통신사업 영역에 있어서 국제, 시외 및 시내 서버간의 거리구별을 무력화하여 적어도 거리구분에 기초한 기존의 통신사업영역 및 규제 접근의 효력을 약화시킬 것이다.

  • PDF

Address Auto-Resolution Network System for Neutralizing ARP-Based Attacks (ARP 기반 공격의 무력화를 위한 주소 자동 결정 네트워크 시스템)

  • Jang, RhongHo;Lee, KyungHee;Nyang, DaeHun;Youm, HeungYoul
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.4
    • /
    • pp.203-210
    • /
    • 2017
  • Address resolution protocol (ARP) is used for binding a logical address to a physical address in many network technologies. However, since ARP is an stateless protocol, it always abused for performing ARP-based attacks. Researchers presented many technologies to improve ARP protocol, but most of them require a high implementation cost or scarify the network performance for improving security of ARP protocol. In this paper, we present an address auto-resoultion (AAR) network system to neutralize the ARP-based attacks. The AAR turns off the communication function of ARP messages(e.g. request and reply), but does not disable the ARP table. In our system, the MAC address of destination was designed to be derived from destination IP address so that the ARP table can be managed statically without prior knowledge (e.g., IP and MAC address pairs). In general, the AAR is safe from the ARP-based attacks since it disables the ARP messages and saves network traffics due to so.

An Analysis on Anti-Drone Technology Trends of Domestic Companies Using News Crawling on the Web (뉴스 기사의 크롤링을 통한 국내 기업의 안티 드론에 사용되는 기술 현황 분석)

  • Kim, Kyuseok
    • Journal of Advanced Navigation Technology
    • /
    • v.24 no.6
    • /
    • pp.458-464
    • /
    • 2020
  • Drones are being spreaded for the purposes such as construction, logistics, scientific research, recording, toy and so on. However, anti-drone related technologies which make the opposite drones neutralized are also widely being researched and developed because some drones are being used for crime or terror. The range of anti-drone related technologies can be divided into detection, identification and neutralization. The drone neutralization methods are divided into Soft-kill one which blocks the detected drones using jamming and Hard-kill one which destroys the detected ones physically. In this paper, Google and Naver domestic news articles related to anti-drone were gathered. Analyzing the domestic news articles, 8 of related technologies using RF, GNSS, Radar and so on were found. Regarding as this, the general features and usage status of those technologies were described and those on anti-drone for each company and agency were gathered and analyzed.