• Title/Summary/Keyword: 전자 공격

Search Result 811, Processing Time 0.029 seconds

YA-RFID Authentication Protocol providing Strong Privacy (강한 프라이버시를 제공하는 YA-RFID 인증 프로토콜)

  • Yoon, Eun-Jun;Bu, Gi-Dong;Yoo, Kee-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1459-1462
    • /
    • 2009
  • 최근 Yang과 An은 기존의 RFID 인증 메커니즘들이 가지고 있는 프라이버시 침해 문제를 분석하고 보다 안전하고 효율적인 사용자의 프라이버시를 보호할 수 있는 RFID(YA-RFID) 인증 프로토콜을 제안하였다. 그들은 제안한 YA-RFID 인증 프로토콜이 공격자의 재전송 공격, 스푸핑 공격, 그리고 위치 트래킹 공격에 대해 안전하다고 주장하였다. 하지만 본 논문에서는 그들의 주장과는 달리 YA-RFID 프로토콜이 여전히 위치 트래킹 공격에 취약함을 증명하며, 더 나아가 동일한 연산 효율성을 보장하며 위치 트래킹 공격을 막을 수 있는 간단히 개선된 일회성 난수와 안전한 일방향 해쉬 함수 기반의 RFID 인증 프로토콜을 제안한다.

MARINE-based Man in the Middle Attack Detection Method Using Traffic Information Accumulated in IoV (IoV에서 축적된 교통 정보를 활용한 MARINE 기반 중간자 공격 탐지 방법)

  • Wonjin Chung;Taeho Cho
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.01a
    • /
    • pp.97-100
    • /
    • 2023
  • 차량 인터넷은 목적지까지 스스로 주행하는 자율 주행 자동차의 최적 경로 설정을 도와주는 차세대 네트워크이다. 자율 주행 자동차의 원활한 자율 주행을 위해서는 도로 위 객체 인지뿐만 아니라 실시간 교통 정보가 수신되어야 한다. 공격자는 자동차로 전달되는 메시지를 탈취하여 내용을 변경하거나 메시지를 제거하는 중간자 공격을 시도할 수 있다. 중간자 공격을 탐지하기 위해 MARINE 기법이 제안되었지만, 주행하는 자동차가 적은 환경에서 중간자 공격을 탐지하기 어렵다. 제안 방법은 이러한 문제를 해결하기 위해 교통 정보 센터에 축적된 교통 정보를 이용하여 자동차에 전달되는 메시지를 분석하고 중간자 공격을 탐지하는 방법을 제안한다.

  • PDF

A Detect and Defense Mechanism of Stateful DRDoS Attacks (상태기반 DRDoS 공격에 대한 탐지 및 방어기법)

  • Kim, Minjun;Seo, Kyungryong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.5
    • /
    • pp.127-134
    • /
    • 2014
  • In DRDoS(Distributed Reflective Denial of Service) attacks, the victim is bombarded by packets from legitimate reflector unlike DDoS(Distributed Denial of Service) attacks through zombie, which is more dangerous than DDoS attack because it is in stronger disguise. Therefore, the method of filtering packet method on router are useless. Moreover SCTP(Stream Control Transmission Protocol) multi-homing feature, such as with an improved transmission protocol allows detecting attacks is more difficult and the effect of the attack can be maximized. In this paper we propose a DRDoS detection mechanism based on DRDoS utilizing attention to the characteristics of stateful protocols. The proposed scheme is backed by stateful firewall, and detect DRDoS attacks through a rules table and perform a defense treatment against DRDoS attack. Rules table with a simple structure is possible to easily adapt for any kind of stateful protocol can used by DRDoS attack. The experimental result confirm that our proposed scheme well detect DRDoS attacks using SCTP, the next-generation transmission protocol which not known by victim, and reduce the attacking packets rapidly.

The core information protection mechanism in the BcN(Broadband Convergence Network) (BcN(Broadband Convergence Network) 환경에서의 중요정보에 대한 도청방지 메카니즘)

  • Oh, Sek-Hoan;Lee, Jae-Yong;Kim, Byung-Chul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.1
    • /
    • pp.14-26
    • /
    • 2008
  • IP over Ethernet technology widely used as Internet access uses the ARP(Address Resolution Protocol) that translates an ip address to the corresponding MAC address. recently, there are ARP security attacks that intentionally modify the IP address and its corresponding MAC address, utilizing various tools like "snoopspy". Since ARP attacks can redirect packets to different MAC address other than destination, attackers can eavesdrop packets, change their contents, or hijack the connection. Because the ARP attack is performed at data link layer, it can not be protected by security mechanisms such as Secure Shell(SSH) or Secure Sockets Layer(SSL). Thus, in this paper, we classify the ARP attack into downstream ARP spoofing attack and upstream ARP redirection attack, and propose a new security mechanism using DHCP information for acquisition of IP address. We propose a "DHCP snoop mechanism" or "DHCP sniffing/inspection mechanism" for ARP spoofing attack, and a "static binding mechanism" for ARP redirection attack. The proposed security mechanisms for ARP attacks can be widely used to reinforce the security of the next generation internet access networks including BcN.

Method of Detecting and Isolating an Attacker Node that Falsified AODV Routing Information in Ad-hoc Sensor Network (애드혹 센서 네트워크에서 AODV 라우팅 정보변조 공격노드 탐지 및 추출기법)

  • Lee, Jae-Hyun;Kim, Jin-Hee;Kwon, Kyung-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.12
    • /
    • pp.2293-2300
    • /
    • 2008
  • In ad-hoc sensor network, AODV routing information is disclosed to other nodes because AODV protocol doesn't have any security mechanisms. The problem of AODV is that an attacker can falsify the routing information in RREQ packet. If an attacker broadcasts the falsified packet, other nodes will update routing table based on the falsified one so that the path passing through the attacker itself can be considered as a shortest path. In this paper, we design the routing-information-spoofing attack such as falsifying source sequence number and hop count fields in RREQ packet. And we suggest an efficient scheme for detecting the attackers and isolating those nodes from the network without extra security modules. The proposed scheme doesn't employ cryptographic algorithm and authentication to reduce network overhead. We used NS-2 simulation to evaluate the network performance. And we analyzed the simulation results on three cases such as an existing normal AODV, AODV under the attack and proposed AODV. Simulation results using NS2 show that the AODV using proposed scheme can protect the routing-information-spoofing attack and the total n umber of received packets for destination node is almost same as the existing norm at AODV.

New Power Analysis Attack on The Masking Type Conversion Algorithm (마스킹 형태 변환 알고리즘에 대한 새로운 전력 분석 공격)

  • Cho, Young-In;Kim, Hee-Seok;Han, Dong-Guk;Hong, Seok-Hie;Kang, Ju-Sung
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.47 no.1
    • /
    • pp.159-168
    • /
    • 2010
  • In the recent years, power analysis attacks were widely investigated, and so various countermeasures have been proposed. In the case of block ciphers, masking methods that blind the intermediate results in the algorithm computations(encryption, decryption, and key-schedule) are well-known. The type conversion of masking is unavoidable since Boolean operation and Arithmetic operation are performed together in block cipher. Messerges proposed a masking type conversion algorithm resistant general power analysis attack and then it's vulnerability was reported. We present that some of exiting attacks have some practical problems and propose a new power analysis attack on Messerges's algorithm. After we propose the strengthen DPA and CPA attack on the masking type conversion algorithm, we show that our proposed attack is a practical threat as the simulation results.

A Practical Design and Implementation of Android App Cache Manipulation Attacks (안드로이드 앱 캐시 변조 공격의 설계 및 구현)

  • Hong, Seok;Kim, Dong-uk;Kim, Hyoungshick
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.205-214
    • /
    • 2019
  • Android uses app cache files to improve app execution performance. However, this optimization technique may raise security issues that need to be examined. In this paper, we present a practical design of "Android app cache manipulation attack" to intentionally modify the cache files of a target app, which can be misused for stealing personal information and performing malicious activities on target apps. Even though the Android framework uses a checksum-based integrity check to protect app cache files, we found that attackers can effectively bypass such checks via the modification of checksum of the target cache files. To demonstrate the feasibility of our attack design, we implemented an attack tool, and performed experiments with real-world Android apps. The experiment results show that 25 apps (86.2%) out of 29 are vulnerable to our attacks. To mitigate app cache manipulation attacks, we suggest two possible defense mechanisms: (1) checking the integrity of app cache files; and (2) applying anti-decompilation techniques.

Study on Neuron Activities for Adversarial Examples in Convolutional Neural Network Model by Population Sparseness Index (개체군 희소성 인덱스에 의한 컨벌루션 신경망 모델의 적대적 예제에 대한 뉴런 활동에 관한 연구)

  • Youngseok Lee
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.16 no.1
    • /
    • pp.1-7
    • /
    • 2023
  • Convolutional neural networks have already been applied to various fields beyond human visual processing capabilities in the image processing area. However, they are exposed to a severe risk of deteriorating model performance due to the appearance of adversarial attacks. In addition, defense technology to respond to adversarial attacks is effective against the attack but is vulnerable to other types of attacks. Therefore, to respond to an adversarial attack, it is necessary to analyze how the performance of the adversarial attack deteriorates through the process inside the convolutional neural network. In this study, the adversarial attack of the Alexnet and VGG11 models was analyzed using the population sparseness index, a measure of neuronal activity in neurophysiology. Through the research, it was observed in each layer that the population sparsity index for adversarial examples showed differences from that of benign examples.

통신 대역에서 전파 위치 측정 시스템 개발

  • 나인석;변영관
    • The Proceeding of the Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.11 no.4
    • /
    • pp.83-88
    • /
    • 2000
  • 전자전이란 적의 지휘.통제.통신 및 전자 무기 체계의 기능을 마비시키고 적의 전자전 활동으로부터 아군의 무기 체계를 보호하는 제반 활동으로 설명할 수 있다. 통신 신호에 대한 전자전은 주로 VHF~UHF 주파수 대역의 전술 무선 통신에 대해 수행하며, 첩보의 이득을 가지기 위해 적의 통신 내용을 도청하는 통신 감청, 적의 통신을 마비시키는 전자 공격, 적 통신소 및 적 통신원의 위치를 탐지하는 방향 탐지 등 여러 분야가 있다. 그 중 한 분야인 방향 탐지에서 얻어지는 정보는 적 통신소의 방향에 대한 정보를 제공하여 전자 공격에 도움을 주며, 적 통신원 발생 위치를 파악 및 추적할 수 있다. 본 논문에서는 전파 신호원의 위치를 측정하는 시스템의 개발 방안을 살펴보고 전파 신호원의 위치 측정에 중요한 요소인 전파의 도래 방향 및 전파의 발생 위치 측정 방안을 설명하였다.

  • PDF