• Title/Summary/Keyword: 우회모델

Search Result 104, Processing Time 0.025 seconds

A New Trace Model of Internet Indirect Connection (우회 경로를 통한 인터넷 연결의 차세대 역추적 모델)

  • Han, Dae-Il;An, Chang-Hoon;Ha, Ok-Hyun;Eom, Doo-Seop
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.1123-1126
    • /
    • 2002
  • 연구와 군사 목적으로 발전한 인터넷은 현재 많은 기업들과 일반인들이 사용하는 현대 사회의 중요한 기반 시설로 자리잡게 되었으며, 아울러 인터넷이 사회에 끼치는 영향이 커짐에 따라 여러 가지 목적으로 자신의 접속 위치를 우회하여 숨기고 인터넷 보안 모델의 취약점을 공격하는 침입자가 증가하고 있다. 따라서, 침입에 사용되는 기술과 그에 대한 대응 기법 또한 보다 복잡하고 정교해 지고 있으나 근본적으로 악의적 침입을 근절하는 능동적인 대응은 미약한 현실이다. 본 논문에서는 인터넷 환경에서 여러 가지 우회 경로를 통해 접근한 침입자의 실제 접속 위치를 효율적으로 추적하기 위해 기존 역추적 연구의 유형과 문제점을 살펴보고 차세대 인터넷 환경에서 활용 가능한 역추적 기법의 모델을 제시한다. 따라서, 기존 역추적 기법의 현실적으로 적용이 어려운 구성과 침입자의 보안 설정에 따른 추적 제한 등의 문제점을 살펴보고 그 해결 방안이 되는 새로운 역추적 시스템의 모델을 제시한다. 그리고, 본 연구에서 제시하는 모델은 기존의 연결 경로를 거슬러 추적하는 기법과 달리 프록시 등 우회 경로를 통해 접근한 침입자에 대해 직접 연결되는 프로토콜을 자동 실행 되도록 구성하여 접근한 침입자의 위치를 파악하는 모델이나. 이 모델을 적용할 경우 실제 적용 가능한 구성과 효율적인 추적 특성을 가지게 되며 구성 비용의 손실 또한 줄일 수 있게 되는 장점을 가지게 된다.

  • PDF

Indirection based Multilevel Security Model and Application of Rehabilitation Psychology Analysis System (재활심리분석시스템의 다중 우회기반 접근통제 모델 및 응용)

  • Kim, Young-Soo;Jo, Sun-Goo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.10
    • /
    • pp.2301-2308
    • /
    • 2013
  • These days, Rehabilitation psychology analysis system is being used by world wide web in everyday's life. And on the other hand, we are facing spam messages' problems. To block these spam message, we are using filtering or pricing systems. But these solutions are raising other problems such as impediment in reception or availability caused by false positive or payment resistance. To solve these problems, we propose an Indirect Model on Message Control System(IMMCS) which controls an unsolicited message and prevents an useful message from discarding. We design and implement the IMMCS to enhance the usefulness and the availability. Being tested the IMMCS to verify the usability and the efficiency, it gave us a very successful result.

Indirection Model and Application of Electronic Mail Control System Considering High Availability (고가용성을 고려한 전자메일통제시스템의 우회 모델 및 응용)

  • Kim Young Soo;Suh Jung Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.2
    • /
    • pp.348-354
    • /
    • 2005
  • These days, Electronic mail is being used in everyday's life. And on the other hand, we are facing spam mails' problems. Spam mails are widely used by means of marketing in e-Commerce. To block these spam mails, we are using filtering or pricing systems. But these solutions are raising other problems such as impediment in reception or availability caused by false positive or payment resistance. To solve these problems, we propose an Indirect Model on Electronic Mail Control System(IMEMCS) which controls an unsolicited electronic mail and prevents an useful electronic mail from discarding. We design and implement the IMEMCS to enhance the usefulness and the availability. Being tested the IMEMCS to verify the usability and the efficiency, it gave us a very successful result.

Interconnection Network for Routing Distributed Video Stream on Popularity - Independent Multimedia-on-Demand Server (PIMODS서버에서 분산 비디오스트림의 전송을 위한 상호연결망)

  • 임강빈;류문간;신준호;김상중;최경희;정기현
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.36C no.11
    • /
    • pp.35-45
    • /
    • 1999
  • This paper presents an interconnection network for load balancing on a multimedia server and proposes a simple probabilistic model of the interconnection network for analysing the traffic characteristics. Because the switch uses deflection algorithm for routing, the traffic load on the switch seriously affects deflection probability. In this paper, we trace the deflection probability as a function of the traffic load according to the model. By comparing the result with the empirical result, we prove that the model is useful for estimating the deflection probability and traffic saturation point against the amount of packets getting into the switch.

  • PDF

A study on the threat hunting model for threat detection of circumvent connection remote attack (우회 원격공격의 위협탐지를 위한 위협 헌팅 모델 연구)

  • Kim, Inhwan;Ryu, Hochan;Jo, Kyeongmin;Jeon, Byungkook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.4
    • /
    • pp.15-23
    • /
    • 2021
  • In most hacking attacks, hackers intrudes inside for a long period of time and attempts to communicate with the outside using a circumvent connection to achieve purpose. research in response to advanced and intelligent cyber threats has been mainly conducted with signature-based detection and blocking methods, but recently it has been extended to threat hunting methods. attacks from organized hacking groups are advanced persistent attacks over a long period of time, and bypass remote attacks account for the majority. however, even in the intrusion detection system using intelligent recognition technology, it only shows detection performance of the existing intrusion status. therefore, countermeasures against targeted bypass rwjqthrwkemote attacks still have limitations with existing detection methods and threat hunting methods. in this paper, to overcome theses limitations, we propose a model that can detect the targeted circumvent connection remote attack threat of an organized hacking group. this model designed a threat hunting process model that applied the method of verifying the origin IP of the remote circumvent connection, and verified the effectiveness by implementing the proposed method in actual defense information system environment.

A Study on Object Detection and Warning Model for the Prevention of Right Turn Car Accidents (우회전 차량 사고 예방을 위한 객체 탐지 및 경고 모델 연구)

  • Sang-Joon Cho;Seong-uk Shin;Myeong-Jae Noh
    • Journal of Digital Policy
    • /
    • v.2 no.4
    • /
    • pp.33-39
    • /
    • 2023
  • With a continuous occurrence of right-turn traffic accidents at intersections, there is an increasing demand for measures to address these incidents. In response, a technology has been developed to detect the presence of pedestrians through object detection in CCTV footage at right-turn areas and display warning messages on the screen to alert drivers. The YOLO (You Only Look Once) model, a type of object detection model, was employed to assess the performance of object detection. An algorithm was also devised to address misidentification issues and generate warning messages when pedestrians are detected. The accuracy of recognizing pedestrians or objects and outputting warning messages was measured at approximately 82%, suggesting a potential contribution to preventing right-turn accidents

IDS Evasion Detection System with Packet Reassemble Funtion (패킷 재조립 기능을 가진 IDS 우회공격 탐지 시스템)

  • Youk Sang-Jo;Park Myung-Ho;Lee Geuk
    • Journal of Digital Contents Society
    • /
    • v.4 no.1
    • /
    • pp.101-113
    • /
    • 2003
  • IDS(Intrusion Detection System) evasion is a technology which uses vulnerability of IDS in order not to be detected by IDS. In this paper, at first, we classify IDS evasion technology. Second, we propose detection model of IDS evasion technology. Finally, we design and implement IDS evasion detection system with packet reassemble function.

  • PDF

A Design and Implementation of Detection System against Evasional Attack to IDS (IDS 우회공격 탐지 시스템 설계 및 구현)

  • Gil, Min-Wook;Cha, Jun-Nam;Lee, Geuk
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.165-177
    • /
    • 2002
  • IDS(Intrusion Detection System) evasion is a technology which uses vulnerability of IDS in order not to be detected by IDS. In this paper, at first, we classify IDS evasion technology. Second, we propose detection model of IDS evasion technology. Finally, we design and implement detection system of IDS evasion.

  • PDF

Relative Service Differentiation with Dynamic Wavelength Allocations and Preemptions in JET based Optical Burst-Switched Networks with Deflection Routing (JET 기반 우회 경로 방식의 광 버스트 스위치 네트워크에서 동적 파장 할당과 선취권 방식에 의한 상대적 서비스 차별화 방안)

  • Paik, Jung-Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.9
    • /
    • pp.1906-1914
    • /
    • 2012
  • In this paper, relative service differentiation in JET based optical burst-switched networks with deflection routing is presented. It differs from conventional schemes in that it tries to make the loss rate of high class bursts as low as possible while maintaining the desired proportional ratio between the high class bursts and low class bursts. Strategies applied to it are dynamic wavelength allocation and the preemption which are combined to deflection routing. With dynamic wavelength allocation, the number of wavelengths allocated to high class bursts are dynamically changed. Preemption which gives more preference to high class bursts is also applied to decrease its loss rate. To lower the loss rate, deflection routing is applied for any kind of traffic. With those strategies, the suggested scheme shows desired properties that the loss rate of high class traffic is as lowered as possible. A queueing model for the scheme is developed to approximate loss ratio and the numerical results show that the proposed scheme provisions relative service differentiation.

Defense Techniques of Smishing Attacks Using Electronic signature on Network Environment (전자서명을 이용한 스미싱 공격 방어 기법)

  • Choi, Byung-Hwan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.399-402
    • /
    • 2014
  • 본 논문에서는 스미싱 공격에 대해서 Host기반에 의한 탐지가 아닌 네트워크 기반에서 전자서명을 이용한 모델을 제안한다. 본 모델은 네트워크 기반에서 유입된 트래픽 중 문자 메시지를 분석하여, 문자메시지 중에서 URL이 포함된 경우 트래픽을 우회하여 라우팅을 전환시켜 URL을 포함한 문자메시지 트래픽에 대해서 별도의 망구간으로 분리를 시킨다. 별도 분리된 URL이 포함된 트래픽에 대해서 apk파일 다운로드가 없는 경우에는 통과를 시키고, apk 파일 다운로드를 시도하는 트래픽에 대해서는 전자서명을 검사후, 등록이 안되어 있는 경우 차단을 한다. 이는 기본적으로 전자서명이 되지 않은 apk파일에 대한 다운로드를 원천적으로 봉쇄함으로써 스미싱 공격에 대한 근복적인 방어를 하는 방식이다. 본 모델은 Host기반에서 발생할 수 있는 우회공격을 방지하여 스미싱 위협을 해소할 수 있다. 기존 Host기반 스미싱 방지 모델의 동작 방식과 설계를 통해 장점과 단점을 언급하고 네트워크 기반에서 전자서명을 이용한 스미싱 방어의 타당성을 증명하도록 한다.