• Title/Summary/Keyword: 스푸핑 공격

Search Result 125, Processing Time 0.03 seconds

Vulnerability Analysis and Demonstration of a GPS Spoofing Attack: Based on Product A (드론 환경에서의 GPS 스푸핑 공격 취약점 분석 및 실증: A 드론을 대상으로)

  • Youngjae Lee;Jinwook Kim;Wonbin Jung;Kyungroul Lee
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2024.01a
    • /
    • pp.109-111
    • /
    • 2024
  • 군사 목적으로 개발된 드론은 최근 다양한 산업 및 민간 분야로 확대되고 있으며, 이러한 확대에 따라, 드론이 급격하게 발전하여, 농업이나 무인 드론 택배와 같은 산업 전반적으로 긍정적인 효과를 창출하는 추세이다. 그러나 이러한 발전에 반하여, 드론에 장착된 카메라를 통한 사생활 침해나 테러 목적으로 활용하는 것과 같은 부정적인 측면이 드러나기 시작하였다. 특히, 드론의 위치와 밀접한 연관이 있는 GPS와 관련하여, 무인 이동체의 특성상, GPS 신호에 의존하여 사용자에게 드론의 위치를 전달하지만, 이러한 GPS 신호를 송신하는 위성은 거리가 매우 멀리 위치하고, 이에 따라, 신호 세기가 비교적 약한 문제점을 가진다. 이와 같은 문제점을 악용하는 GPS 스푸핑 공격이 등장하였으며, 이 공격은 만약 공격자가 GPS 신호를 조작하여 송신한다면, 드론에 장착된 GPS 수신기는 조작된 GPS 위치를 수신하며, 이에 따라, 드론의 제어권을 탈취하거나 충돌 유발, 비정상적인 비행 경로 유도와 같은 문제점이 발생한다. 본 논문에서는 최신의 상용화된 드론을 대상으로, GPS 스푸핑 공격의 취약점을 분석하고 실증한다. 이를 위하여, 공격자가 비행 금지 구역에 해당하는 GPS 신호를 조작하는 것으로 공격을 시도하고, 이에 따른 드론에서 준비된 동작인 강제 착륙과 같은 비정상적인 행위를 유발하여, 드론의 임무 수행 능력을 제한하는 취약점을 분석하고 실험을 통하여 실증한다. 본 논문의 결과를 토대로, 최신 드론에서 발생 가능한 보안 위협을 도출함으로써, 드론의 안전성을 향상시키기 위한 자료로 활용될 수 있을 것으로 사료된다.

  • PDF

A Lightweight RFID Authentication Protocol Based on Hash Chain (해시체인기반의 경량화 RFID 인증 프로토콜)

  • Youn, Keun-Young;Kim, Dong-Seong;Park, Jong-Sou
    • Convergence Security Journal
    • /
    • v.6 no.1
    • /
    • pp.45-53
    • /
    • 2006
  • It has been proposed that several RFID authentication protocols based on hash chain. Status based authentication protocol and challenge-response based authentication protocol are secured against location tracking attacks, spoofing attacks, replay attacks, traffic analysis attacks but are vulnerable to Dos attacks. RFID authentication protocol with strong resistance against traceability and denial of service attack is secured against location tracking attack, spoofing attacks, replay attacks, DoS attacks but are vulnerable to traffic analysis attacks. The present study suggests a more secure and lightweight RFID authentication protocol which is combining the advantages of hash-chain authentication protocol and RFID authentication protocol with strong resistance against traceability and denial of service attack. The results of the secure analysts for a proposed protocol are illustrated that it is secured against location tracking attacks, spoofing attacks, replay attacks, traffic analysis attacks, Dos attacks and is a lightweight operation between server and tag.

  • PDF

A Study on the Phishing Attack Protection using RUL Spoofing (URL 스푸핑을 이용한 피싱 공격의 방어에 관한 연구)

  • Min Dong-og;Shon Tae-shik;Moon Jong-sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.5
    • /
    • pp.35-45
    • /
    • 2005
  • There has recently been an increase of phishing attacks, attacks which lure users into revealing their personal information to an attacker who in turn exploits this information for economic gain. The conventional methods of fooling the user with similarly modified mail or address are constantly evolving and have diversified to include the forgery of mail or domain addresses. Recently the injury incurred by these attacks has greatly increased as attackers exploit the weaknesses found on a few web browsers and used these to conduct phishing attacks based on URL spoofing. Furthermore we are now witnessing the entrance of highly advanced phishing techniques that no longer simply rely on vulnerabilities, but employ ordinary script, HTML, DNS sniffing, and the list goes on. In this paper we first discuss means of investigating and preventing the advanced URL spoofing techniques used in phishing attacks, and then propose a scheme for fundamentally restricting them altogether.

Efficient Detction and Defence Model against IP Spoofing Attack through Cooperation of Trusted Hosts (신뢰 호스트 상호 협력을 통한 IP 스푸핑 공격의 효율적 탐지 및 방어 모델 설계)

  • Lee, Hae-Dong;Ha, Hyeon-Tae;Baek, Hyun-Chul;Kim, Chang-Gun;Kim, Sang-Bok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.12
    • /
    • pp.2649-2656
    • /
    • 2012
  • Today, many enterprises have invested heavily for the part of information security in order to protect the internal critical information assets and the business agility. However, there is a big problem that big budget and too many manpower are needed to set the internal corporate network up to the same high level of defense for all of part. On the distributed enterprise networks in this paper, a defense model for effective and rapid response on the IP spoofing attack was designed to protect the enterprise network through the exchange of information between the trust hosts when an attacker attacked any target system using other trusted host.

RFID Mutual Authentication Protocol Providing Stronger Security (강력한 보안성을 제공하는 RFID 상호 인증 프로토콜)

  • Ahn, Hae-Soon;Bu, Ki-Dong;Yoon, Eun-Jun;Nam, In-Gil
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.325-334
    • /
    • 2009
  • This paper demonstrates that an attacker can impersonate a random RFID tag and then perform the spoofing attack in the previous RFID authentication protocol. To resolve such a security problem, we also propose a new secure and efficient RFID mutual authentication protocol. The proposed RFID mutual authentication protocol is not only to resolve many security problems with the existing RFID authentication mechanism and the vulnerability against spoofing attack, but also to guarantee reliable authentication time as reducing computational overhead performing by tag. As a result, the proposed RFID mutual authentication protocol provides stronger security including the forward secrecy and more efficiency.

Federated Learning modeling for defense against GPS Spoofing in UAV-based Disaster Monitoring Systems (UAV 기반 재난 재해 감시 시스템에서 GPS 스푸핑 방지를 위한 연합학습 모델링)

  • Kim, DongHee;Doh, InShil;Chae, KiJoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.05a
    • /
    • pp.198-201
    • /
    • 2021
  • 무인 항공기(UAV, Unmanned Aerial Vehicles)는 높은 기동성을 가지며 설치 비용이 저렴하다는 이점이 있어 홍수, 지진 등의 재난 재해 감시 시스템에 이용되고 있다. 재난 재해 감시 시스템에서 UAV는 지상에 위치한 사물인터넷(IoT, Internet of Things) 기기로부터 데이터를 수집하는 임무를 수행하기 위해 계획된 항로를 따라 비행한다. 이때 UAV가 정상 경로로 비행하기 위해서는 실시간으로 GPS 위치 확인이 가능해야 한다. 만일 UAV가 계산한 현재 위치의 GPS 정보가 잘못될 경우 비행경로에 대한 통제권을 상실하여 임무 수행을 완료하지 못하는 결과가 초래될 수 있다는 취약점이 존재한다. 이러한 취약점으로 인해 UAV는 공격자가 악의적으로 거짓 GPS 위치 신호를 전송하는GPS 스푸핑(Spoofing) 공격에 쉽게 노출된다. 본 논문에서는 신뢰할 수 있는 시스템을 구축하기 위해 지상에 위치한 기기가 송신하는 신호의 세기와 GPS 정보를 이용하여 UAV에 GPS 스푸핑 공격 여부를 탐지하고 공격당한 UAV가 경로를 이탈하지 않도록 대응하기 위해 연합학습(Federated Learning)을 이용하는 방안을 제안한다.

An Improved Model Design for Traceback Analysis Time Based on Euclidean Distance to IP Spoofing Attack (IP 스푸핑 공격 발생 시 유클리드 거리 기반의 트레이스 백 분석시간 개선 모델)

  • Liu, Yang;Baek, Hyun Chul;Park, Jae Heung;Kim, Sang Bok
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.11-18
    • /
    • 2017
  • Now the ways in which information is exchanged by computers are changing, a variety of this information exchange method also requires corresponding change of responding to an illegal attack. Among these illegal attacks, the IP spoofing attack refers to the attack whose process are accompanied by DDoS attack and resource exhaustion attack. The way to detect an IP spoofing attack is by using traceback information. The basic traceback information analysis method is implemented by comparing and analyzing the normal router information from client with routing information existing in routing path on the server. There fore, Such an attack detection method use all routing IP information on the path in a sequential comparison. It's difficulty to responding with rapidly changing attacks in time. In this paper, all IP addresses on the path to compute in a coordinate manner. Based on this, it was possible to analyze the traceback information to improve the number of traceback required for attack detection.

Analysis of Deregistration Attacks in 5G Standalone Non-Public Network

  • Kim, Keewon;Park, Kyungmin;Park, Tae-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.9
    • /
    • pp.81-88
    • /
    • 2021
  • In this paper, we analyze the possibility of deregistration attack in 5G SNPN (Standalone Non-Public Network) based on 3GPP standard document. In the deregistraion attack, the attacker pretends to be a UE that is normally registered with AMF (Access and Mobility Management Function) and attempts to establish a spoofed RRC (Radio Resource Control) connection, causing AMF to deregister the existing UE. The existing deregistration attack attempts a spoofed RRC connection to the AMF in which the UE is registered. In addition, this paper analyzes whether deregistration attack is possible even when an attacker attempts to establish a spoofed RRC connection to a new AMF that is different from the registered AMF. When the 5G mobile communication network system is implemented by faithfully complying with the 3GPP standard, it is determined that a deregistration attack of a UE is impossible.

A study on the detection of DDoS attack using the IP Spoofing (IP 스푸핑을 통한 DDoS 공격 탐지 방안에 대한 연구)

  • Seo, Jung-Woo;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.147-153
    • /
    • 2015
  • Since the DoS(Denial of Service) attack is still an important vulnerable element in many web service sites, sites including public institution should try their best in constructing defensive systems. Recently, DDoS(Distributed Denial of Service) has been raised by prompting mass network traffic that uses NTP's monlist function or DoS attack has been made related to the DNS infrastructure which is impossible for direct defense. For instance, in June 2013, there has been an outbreak of an infringement accident where Computing and Information Agency was the target. There was a DNS application DoS attack which made the public institution's Information System impossible to run its normal services. Like this, since there is a high possibility in having an extensive damage due to the characteristics of DDoS in attacking unspecific information service and not being limited to a particular information system, efforts have to be made in order to minimize cyber threats. This thesis proposes a method for using TTL (Time To Live) value in IP header to detect DDoS attack with IP spoofing, which occurs when data is transmitted under the agreed regulation between the international and domestic information system.

Design of RFID Mutual Authentication Protocol using One Time Random Number (일회성 난수를 이용한 안전한 RFID 상호인증 프로토콜 설계)

  • Kim, Dae-Jung;Jun, Moon-Seog
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.3
    • /
    • pp.243-250
    • /
    • 2008
  • Recently, researched RFID authentication protocols still have vulnerability of attack, such as location tracking attack, replay attack. spoofing attack etc. This paper designed method of making one time random number in DB server side unlike previously researched protocols, and it protects RFID communication from location tracking, replay attack and spoofing attack.