• Title/Summary/Keyword: 위협적 메시지

Search Result 92, Processing Time 0.023 seconds

Analysis of Research Trend and Performance Comparison on Message Authentication Code (메시지 인증 코드에 대한 연구 동향 분석 및 성능 비교)

  • Kim, Minwoo;Kwon, Taekyoung
    • Journal of KIISE
    • /
    • v.43 no.11
    • /
    • pp.1245-1258
    • /
    • 2016
  • Cryptographic technologies providing confidentiality and integrity such as encryption algorithms and message authentication codes (MACs) are necessary for preventing security threats in the Internet of Things (IoT) where various kinds of devices are interconnected. As a number of encryption schemes that have passed security verification are not necessarily suitable for low-power and low-performance IoT devices, various lightweight cryptographic schemes have been proposed. However, a study of lightweight MACs is not sufficient in comparison to that of lightweight block ciphers. Therefore, in this paper, we reviewed various kinds of MACs for their classification and analysis and then, we presented a new way for future MAC development. We also implemented major MAC algorithms and performed experiments to investigate their performance degradation on low-end micro-controllers.

자율주행자동차 V2V 통신환경에서의 DoS 공격 및 대응기술 동향 연구

  • Lee, Sung-young;Kim, Ji-min;Ji, Cheong-min;Hong, Man-pyo
    • Review of KIISC
    • /
    • v.30 no.2
    • /
    • pp.41-48
    • /
    • 2020
  • 최근 자율주행 자동차의 발전은 자동차제조업체뿐만 아니라 ICT 기업도 참여하면서 매우 빠르게 발전하고 있다. 자율주행기술이 발달함에 따라 외부와의 통신을 통해 더욱 안전한 자율주행이 가능할 것이다. 하지만 외부와의 연결은 외부 IT 시스템의 위협이 차량 내부에 영향을 미치게 될 수 있고 이는 인명피해로 이어질 수 있다. 자율주행자동차의 통신은 실시간으로 다양한 메시지를 처리해야 하기 때문에 가용성이 매우 중요하다. 기존 IT 시스템에 존재하는 가용성을 위협하는 공격은 대표적으로 DoS 공격이 있다. 본 논문에서는 자율주행자동차 V2V 통신을 위해 사용되는 프로토콜을 살펴보고 발생할 수 있는 DoS 공격유형과 현재 연구되고 있는 대응기술에 대한 동향을 소개한다.

A Study of Secure Massaging System Using XML based on Internet Environment (인터넷 환경 하에서의 XML 기반의 안전한 메시징 시스템 연구)

  • Ahn, Kyeong-Rim;Chung, Jin-Wook
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11c
    • /
    • pp.2211-2214
    • /
    • 2002
  • 사업 영역 확대와 네트워크 발달로 인해 전자상거래(Electronic Commerce)는 점차 국제적 환경으로 확대되고 있으며, 장소나 시간에 구애받지 알고 정보를 전송할 수 있게 되었다. 거래되는 업무가 증가됨에 따라 거래내용, 결제 내용(계좌번호, 카드번호 등), 비밀번호 등 교환되는 정보의 종류도 다양해져 보안의 중요성이 대두되었다. 이에 데이터 사용 효율과 응용 가능성을 높이기 위해 차세대 인터넷 표준으로 대두되고 있는 XML을 메시지 처리 단위로 정의하고, XML 기반의 인터넷 메시징 시스템인 IMSX (Internet Messaging System based on XML)을 설계하였으며, 보안 위협으로부터 대응하기 위해 암호화(Encryption)와 전자서명(Digital Signature) 등의 메시지 레벨의 응용 보안을 적용하였다. 또한 문서 송신, 문서 수신, 검색, 문서 변환, 템플릿(Template) 제공, 보안 서비스 등을 선정하여 구현하였다.

  • PDF

A Design of on the Security protocol in Optical Burst Switching Networks (OBS 기반 광 네트워크에서 정보보호 프로토콜 설계)

  • Kim, Soo-Hyeon;;Kim, Hyo-Won;Lee, Bong-Su;Shin, Seong-Jun;Ahn, Joung-Chol
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.257-260
    • /
    • 2005
  • 인터넷 사용자의 증가에 따른 데이터 수요와 트래픽 증가에 따라 오늘날의 네트워크는 빠른 전송 속도와 넓은 대역폭을 요구한다. OBS 기반 광 네트워크는 이러한 요구사항을 만족시킬 수 있는 방안으로 활발히 연구가 진행되고 있으나, 도청, 위장, DoS 등의 보안 위협에 취약하다. 본 논문에서는 OBS 기반 광 네트워크에서 존재하는 보안 취약점 및 보안 공격을 분석하며, 이를 기반으로 안전한 서비스 제공을 위해 인증 및 키 분배 가능한 정보보호 프로토콜을 제시한다. 본 논문에서는 OBS 기반 광 네트워크에서 보안 기능을 강화하기 위해 제어 메시지를 이용하여 명시적 인증을 제공하며, 공통키값을 이용하여 제어 메시지를 보호한다.

  • PDF

Patient Referral System using XML Security Technology (XML보안 기술을 적용한 환자의뢰시스템)

  • Roh, Hyung-Kyu;Kim, Hang-Chan;Kim, Il-Kon;Cho, Hune;Kwak, Yeon-Sick
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10b
    • /
    • pp.778-780
    • /
    • 2003
  • 최근 XML 문서가 여러 분야의 시스템에서 정보 교환과 메시지 전송을 위한 표준으로 자리 잡으면서 의료계에서도 응용 프로그램 간의 메시지 전송 혹은 병원 간 환자의료정보를 교환하기 위한 XML기반의 정보 교환 프로토콜 표준화가 계속 진행 중에 있다. 하지만 이러한 환자의료정보가 인터넷을 통해 병원간에 이동할 때, 여러 보안상의 위협에 노출될 수 있다. 이에 본 논문에서는 기존의 보안 메커니즘의 한계점을 보완하면서 XML 기반의 정보를 보호하기 위한 가장 효율적인 메커니즘으로 인정받은 XML 보안기술을 적용한 환자의뢰시스템을 시스템을 구현하고 보안 메커니즘 적용 시 부득이하게 발생할 수 있는 성능 저하 정도를 알아보기 위해 성능 평가 테스트를 실시한다.

  • PDF

The Detection of Signaling Dos on 4G LTE Cellular Network (4G LTE 이동통신망에서의 시그널링 DoS 탐지 기술)

  • Jang, Woung;Kim, Se-Kwon;Oh, Joo-Hyung;Im, Chae-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.146-149
    • /
    • 2013
  • For in recently years, global cellular network service is changing rapidly to 4G. However, the fast introducing of 4G has been going with not enough research about security threat, it could be many kind of vulnerability. Therefore the research about security threat on 4G network is ongoing in external countries, but not sufficient in domestic. particularly in domestic situation of rapidly increased subscribers, The security threats which are hindering stability and usability could make a fatal effect on many users. 4G network should be considered about the feature of mobile network to protect 4G network stable. Mobile network has limited radio resources, it releases the radio resource which is not used in selected time and reallocate when detected the data transmission. Many signaling messages are transferred in the network entities to allocate or release the radio resource. In this paper, it will be introduced the technology to detect signaling DoS traffic hindering the stability and usability of network entities managing the radio resources by huge signaling message from the repetitive wireless connection/release message.

  • PDF

A Study of End-to-End Message Security Protocol Based on Lightweight Ciphers for Smart IoT Devices (스마트 IoT 디바이스를 위한 경량 암호기반 종단간 메시지 보안 프로토콜)

  • Kim, Hee-jeong;Kim, Jeong Nyeo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1309-1317
    • /
    • 2018
  • Although the IoT market is steadily growing, there is still a lack of consideration for increasing security threats in the IoT environment. In particular, it is difficult to apply existing IP security technology to resource-constrained devices. Therefore, there is a demand for reliable end-to-end communication security measures to cope with security threats such as information tampering and leakage that may occur during communication between heterogeneous networks do. In this paper, we propose an end-to-end message security protocol based on lightweight cipher that increases security and lowers security overhead in resource-constrained IoT device communication. Through simulation of processing time, we verified that the proposed protocol has better performance than the existing AES-based protocol.

Implementing an Intrusion Detection Message Exchange Library for Realtime Interaction between SDMS-RTIR and Heterogeneous Systems (이기종의 침입탐지 시스템과 SDMS-RTIR의 실시간 상호연동을 지원하는 침입탐지 메시지 교환 라이브러리 구현)

  • Yun, Il-Sun;Lee, Dong-Ryun;Oh, Eun-Sook
    • The KIPS Transactions:PartC
    • /
    • v.10C no.5
    • /
    • pp.565-574
    • /
    • 2003
  • This paper implements an intrusion detection message exchange protocol library (IDMEPL) for SDMS-RTIR, which Korea Information Security Agency (KISA) has developed to hierarchically detect and respond to network vulnerability scan attacks. The IDMEPL, based on the IDMEF and the IAP of the IDWG, enables SDMS-RTIR to interact with other intrusion detection systems (IDS) in realtime, and supports the TLS protocol to prevent security threats in exchanging messages between its server and its agents. Especially, with the protocol selection stage, the IDMEPL can support various protocols such as the IDXP besides the IAP. Furthermore, it can allow for agents to choose an appropriate security protocol for their own network, achieving security stronger than mutual authentication. With the IDMEPL, SDMS-RTIR can receive massive intrusion detection messages from heterogeneous IDSes in large-scale networks and analyze them.

A Research on the Regulations and Perception of Interactive Game in Data Broadcasting: Special Emphasis on the TV-Betting Game (데이터방송 인터랙티브 게임 규제 및 이용자 인식에 관한 연구: 승부게임을 중심으로)

  • Byun, Dong-Hyun;Jung, Moon-Ryul;Bae, Hong-Seob
    • Korean journal of communication and information
    • /
    • v.35
    • /
    • pp.250-291
    • /
    • 2006
  • This study examines the regulatory issues and introduction problems of TV-betting data broadcasts in Korea by in-depth interview with a panel group. TV-betting data broadcast services of card games and horse racing games are widely in use in Europe and other parts of the world. In order to carry out the study, a demo program of TV-betting data broadcast in the OCAP(OpenCableTM Application Platform Specification) system environment, which is the data broadcasting standard for digital cable broadcasts in Korea was exposed to the panel group and then they were interviewed after watching and using the program. The results could be summarized as below. First of all, while TV-betting data broadcasts have many elements of entertainment, the respondents thought that it would be difficult to introduce TV-betting in data broadcasts as in overseas countries largely due to social factors. In addition, in order to introduce TV-betting data broadcasts, they suggested that excessive speculativeness must be suppressed through a series of regulatory system devices, such as by guaranteeing credibility of the media based on safe security systems for transactions, scheduling programs with effective time constraints to prevent the games from running too frequently, limiting the betting values, and by prohibiting access to games through set-top boxes of other data broadcast subscribers. The general consensus was that TV-betting could be considered for gradual introduction within the governmental laws and regulations that would minimize its ill effects. Therefore, the government should formulate long-term regulations and policies for data broadcasts. Once the groundwork is laid for safe introduction of TV-betting on data broadcasts within the boundary of laws and regulations, interactive TV games are expected to be introduced in Korea not only for added functionality of entertainment but also for far-ranging development of data broadcast and new media industries.

  • PDF

A Study on the Security Structure of Next Generation E-mail System (차세대 이메일 보안 기술에 관한 연구)

  • Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.183-189
    • /
    • 2008
  • E-mail's role has been increased due to its merit which is sending demanded information in real-time anywhere, anytime. However, Today's E-mail security threats have being changed intelligently to attack against the specific agency. The threat is a limit to respond. Therefore precise definition and development of security technology is needed to analyze changing environment and technologies of e-mail so that remove fundamental security threat. we proposed Next Generation E-mail System Security Structure and the Next Generation fusion System using authentication As a result, in this study, we development of Next Generation E-mail System Security Structure. This system can protect E-mail user from social engineering hacking technique, spam, virus, malicious code and fabrication.

  • PDF