• Title/Summary/Keyword: 이슈 탐지

Search Result 128, Processing Time 0.025 seconds

Intrusion detection agents on the wireless network design (무선네트워크 상에서의 침입탐지 에이전트 설계)

  • Yun, Dong Sic
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.59-70
    • /
    • 2013
  • Along with the rapid development of the wireless network (Wireless Network) technology for secure wireless communications, security problems have emerged as an important issue. In order to operate the wireless network intrusion detection system detects the agent installed on each wireless node should be. Ad-hoc network structures scattered in the AP over a wireless network without the node is a structure that makes it possible to communicate to connect. Intrusion detection agent to be installed on the node, and the corresponding energy consumption occurs when the survival time is reduced. On a node that can monitor a lot of traffic in order to increase the effect of intrusion detection, an intrusion detection agent should be placed. Therefore, in this paper, by taking advantage of the structure of Ad-hoc wireless network, considering the maximum living time of the network, while at the same time, the effectiveness of intrusion detection and intrusion detection by proposing a plan for installing the agent. Also improve the system performance by reducing the network load on each network, a system designed for data aggregation to reduce data redundancy, network energy consumption by reducing.

A Study on Minimizing Infection of Web-based Malware through Distributed & Dynamic Detection Method of Malicious Websites (악성코드 은닉사이트의 분산적, 동적 탐지를 통한 감염피해 최소화 방안 연구)

  • Shin, Hwa-Su;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.89-100
    • /
    • 2011
  • As the Internet usage with web browser is more increasing, the web-based malware which is distributed in websites is going to more serious problem than ever. The central type malicious website detection method based on crawling has the problem that the cost of detection is increasing geometrically if the crawling level is lowered more. In this paper, we proposed a security tool based on web browser which can detect the malicious web pages dynamically and support user's safe web browsing by stopping navigation to a certain malicious URL injected to those web pages. By applying these tools with many distributed web browser users, all those users get to participate in malicious website detection and feedback. As a result, we can detect the lower link level of websites distributed and dynamically.

Anomaly Detection Analysis using Repository based on Inverted Index (역방향 인덱스 기반의 저장소를 이용한 이상 탐지 분석)

  • Park, Jumi;Cho, Weduke;Kim, Kangseok
    • Journal of KIISE
    • /
    • v.45 no.3
    • /
    • pp.294-302
    • /
    • 2018
  • With the emergence of the new service industry due to the development of information and communication technology, cyber space risks such as personal information infringement and industrial confidentiality leakage have diversified, and the security problem has emerged as a critical issue. In this paper, we propose a behavior-based anomaly detection method that is suitable for real-time and large-volume data analysis technology. We show that the proposed detection method is superior to existing signature security countermeasures that are based on large-capacity user log data according to in-company personal information abuse and internal information leakage. As the proposed behavior-based anomaly detection method requires a technique for processing large amounts of data, a real-time search engine is used, called Elasticsearch, which is based on an inverted index. In addition, statistical based frequency analysis and preprocessing were performed for data analysis, and the DBSCAN algorithm, which is a density based clustering method, was applied to classify abnormal data with an example for easy analysis through visualization. Unlike the existing anomaly detection system, the proposed behavior-based anomaly detection technique is promising as it enables anomaly detection analysis without the need to set the threshold value separately, and was proposed from a statistical perspective.

Offline Based Ransomware Detection and Analysis Method using Dynamic API Calls Flow Graph (다이나믹 API 호출 흐름 그래프를 이용한 오프라인 기반 랜섬웨어 탐지 및 분석 기술 개발)

  • Kang, Ho-Seok;Kim, Sung-Ryul
    • Journal of Digital Contents Society
    • /
    • v.19 no.2
    • /
    • pp.363-370
    • /
    • 2018
  • Ransomware detection has become a hot topic in computer security for protecting digital contents. Unfortunately, current signature-based and static detection models are often easily evadable by compress, and encryption. For overcoming the lack of these detection approach, we have proposed the dynamic ransomware detection system using data mining techniques such as RF, SVM, SL and NB algorithms. We monitor the actual behaviors of software to generate API calls flow graphs. Thereafter, data normalization and feature selection were applied to select informative features. We improved this analysis process. Finally, the data mining algorithms were used for building the detection model for judging whether the software is benign software or ransomware. We conduct our experiment using more suitable real ransomware samples. and it's results show that our proposed system can be more effective to improve the performance for ransomware detection.

An Intelligent Bluetooth Intrusion Detection System for the Real Time Detection in Electric Vehicle Charging System (전기차 무선 충전 시스템에서 실시간 탐지를 위한 지능형 Bluetooth 침입 탐지 시스템 연구)

  • Yun, Young-Hoon;Kim, Dae-Woon;Choi, Jung-Ahn;Kang, Seung-Ho
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.11-17
    • /
    • 2020
  • With the increase in cases of using Bluetooth devices used in the electric vehicle charging systems, security issues are also raised. Although various technical efforts have beed made to enhance security of bluetooth technology, various attack methods exist. In this paper, we propose an intelligent Bluetooth intrusion detection system based on a well-known machine learning method, Hidden Markov Model, for the purpose of detecting intelligently representative Bluetooth attack methods. The proposed approach combines packet types of H4, which is bluetooth transport layer protocol, and the transport directions of the packet firstly to represent the behavior of current traffic, and uses the temporal deployment of these combined types as the final input features for detecting attacks in real time as well as accurate detection. We construct the experimental environment for the data acquisition and analysis the performance of the proposed system against obtained data set.

Beam Scheduling and Task Design Method using TaP Algorithm at Multifunction Radar System (다기능 레이다 시스템에서 TaP(Time and Priority) 알고리즘을 이용한 빔 스케줄링 방안 및 Task 설계방법)

  • Cho, In-Cheol;Hyun, Jun-Seok;Yoo, Dong-Gil;Shon, Sung-Hwan;Cho, Won-Min;Song, Jun-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.1
    • /
    • pp.61-68
    • /
    • 2021
  • In the past, radars have been classified into fire control radars, detection radars, tracking radars, and image acquisition radars according to the characteristics of the mission. However, multi-function radars perform various tasks within a single system, such as target detection, tracking, identification friend or foe, jammer detection and response. Therefore, efficient resource management is essential to operate multi-function radars with limited resources. In particular, the target threat for tracking the detected target and the method of selecting the tracking cycle based on this is an important issue. If focus on tracking a threat target, Radar can't efficiently manage the targets detected in other areas, and if you focus on detection, tracking performance may decrease. Therefore, effective scheduling is essential. In this paper, we propose the TaP (Time and Priority) algorithm, which is a multi-functional radar scheduling scheme, and a software design method to construct it.

Monitoring and Sensing Disaster Issues from Social Media (소셜미디어 재난이슈 탐지 및 모니터링)

  • Choi, Seon-Hwa;Choi, Woo-Jeong;Lee, Jong-Kook
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.332-335
    • /
    • 2013
  • 최근 IT기술발전으로 데이터 저장 및 처리비용은 하락하고 소셜네트워크 서비스 등이 확대되어 데이터의 양적 팽창이 가속화되면서 빅데이터에서 가치를 창출하려는 시도가 늘어나고 있다. 특히, 국내 스마트폰 이용자가 3천만을 넘어서면서 모바일 기기는 대량 데이터 생산의 원천이 되고 있다. 모바일 기기는 스마트시대 대표 통신채널인 소셜미디어 활용을 가속화 시키며 다양한 분야에서 영향력을 발휘하고 있다. 특히 일본과 아이티 지진피해, 강남역 침수 등 재난발생 시 피해상황 파악 및 경보, 정보교환 등에 소셜미디어 채널이 활발히 활용되면서 새로운 매체로 떠오르고 있다. 본 논문에서는 언어분석을 통해 소셜미디어 속에 재난이슈를 모니터링하고 소셜미디어가 재난예방 및 대응에 적극 활용되기 위해 필요한 기술개발 방안을 제시하고자 한다.

A Study of Realtime Detection of Web Application Attack using Bayesian (베이지언을 이용한 웹 어플리케이션 공격의 실시간 탐지에 관한 연구)

  • Mo, Jeong-Hoon;Lim, Jong-In;Moon, Jong-Sub
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2007.02a
    • /
    • pp.75-78
    • /
    • 2007
  • 인터넷 사용의 대중화에는 웹 서비스의 힘이 컸다고 할 수 있다 지금까지도 웹 기반의 서비스가 점차 확대되고 있고 이에 따라 웹 공격과 웹 보안이 이슈가 되고 있다. 웹 서비스를 이용하는 어플리케이션은 기존 보안도구를 통한 분석 작업과 모니터링에 관리자의 개입이 많이 요구되었고, 자동화된 방법 중의 하나인 로그를 이용한 분석 방법들은 실시간으로 확인하고 대응 할 수 없는 단점이 있다. 본 논문에서는 기존의 웹 공격 탐지 방법과 시각화 방법들의 개선사항들을 제안한다.

  • PDF

A SimCache Structural Analysis and A Detection tool for Anti-Forensics Tool Execution Evidence on Windows 10 (Windows 10에서의 심캐시(ShimCache) 구조 분석과 안티 포렌식 도구 실행 흔적 탐지 도구 제안)

  • Kang, Jeong Yoon;Lee, Seung A;Lee, Byong Gul
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.07a
    • /
    • pp.215-218
    • /
    • 2021
  • 심캐시(Shimcache, AppCompatCache) 파일은 Windows 운영체제에서 응용 어플리케이션 간의 운영체제 버전 호환성 이슈를 관리하는 파일이다. 호환성 문제가 발생한 응용 어플리케이션에 대한 정보가 심캐시에 기록되며 프리패치 (Prefetch) 파일이나 레지스트리의 UserAssist 키 등과 같이 응용 어플리케이션의 실행 흔적을 기록한다는 점에서 포렌식적 관점에서 중요한 아티팩트이다. 본 논문에서는 심캐시의 구조를 분석하여 심캐시 파일을 통해 얻을 수 있는 응용 어플리케이션의 정보를 소개하고, 기존 툴 상용도구의 개선을 통해 완전 삭제 등 안티 포렌식 도구의 실행 흔적을 탐지하는 방법을 제시한다.

  • PDF

A Energy Efficient Misused Key Detection in Wireless Sensor Networks (무선 센서 네트워크에서 에너지 효율적인 오용키 탐지 방법)

  • Park, Min-Woo;Kim, Jong-Myoung;Han, Young-Ju;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1214-1217
    • /
    • 2009
  • 무선 센서 네트워크에서 각각의 센서 노드들은 무선 통신을 통해 서로 간에 통신을 수행한다. 과거에는 이러한 센서 노드간의 통신을 제 3 자로부터 안전하게 지키는 것이 중요한 보안 이슈였다. 특히 보안 서비스를 제공 하기 위한 키 관리 기법들이 주요 연구방향이었다. 하지만 안전하게 만들어진 확률론적 키(key)를 기반으로 하는 키 사전분배 방법은 공격받은 다른 노드로 인해 자신의 키가 노출 될 수 있다. 공격자는 노출된 공유키(shared key)를 통해 노출되지 않은 정상 노드(non-compromised node) 사이의 대칭키(pairwise key)를 얻을 수 있으며, 공격자는 네트워크에 심각한 영향을 줄 수 있는 메시지 삽입 및 수정 공격을 감행할 수 있다. 이와 같은 오용된 키를 폐기하고 메시지 삽입 및 수정 공격을 막기 위해 Liu and Dong 은 오용키 탐지 방법을 제안하였다. 하지만 이들의 방법에는 한계점이 있어 이를 보완하기 위한 에너지 효율적인 오용키 탐지 기법을 제안한다.