• Title/Summary/Keyword: 침입 대응

Search Result 355, Processing Time 0.03 seconds

A Method for Detecting Distributed Denial-of-Service Flooding Attacks using Entropy (엔트로피를 이용한 DDoS 공격 탐지 방법)

  • Jun, Jae-Hyun;Choi, Yong-Do;Yu, Zhibin;Cho, Jeong-Hyun;Kim, Sung-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.713-716
    • /
    • 2011
  • 인터넷 유저가 증가하면서 DDoS 공격은 인터넷 안정성에 매우 중요한 위협을 가하고 있다. 서비스 거부 공격이란 서비스를 제공하는데 있어 필요한 컴퓨팅 및 통신 자원을 고갈시키는 공격으로 원천적으로 해결하기가 매우 힘든 것으로 알려져 있다. 인터넷과 같은 대규모 망을 대상으로 한 네트워크 공격은 효과적인 탐지 방법이 요구된다. 그러므로 대규모 망에서 침입 탐지 시스템은 효율적인 실시간 탐지가 필요하다. 본 논문에서는 DDoS 공격에 따른 비정상적인 트래픽 범람을 방지하고 합법적인 트래픽 전송을 보장하기 위하여 엔트로피기반의 DDoS 공격 대응 기법을 제안한다. OPNET을 이용해 구현한 결과 DDoS 공격중에 원활한 서비스를 제공할 수 있는 것을 확인하였다.

Design and Implementation of Secure-NIC System for DDoS Attack Response (분산 서비스 거부 공격 대응을 위한 Secure-NIC 시스템 설계 및 구현)

  • Kim, Byoungkoo;Kim, Daewon;Oh, Jin-tae;Jang, Jong-soo;Kim, Ikkyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.996-998
    • /
    • 2011
  • 인터넷의 발전과 더불어 네트워크 상에서의 침입 시도가 갈수록 증가되고 다변화되고 있으며, 특히, 네트워크나 서버의 가용성을 위협하는 형태의 서비스 거부(DoS: Denial of Servie) 공격이 최근 급증하고 있다. 따라서, 본 논문에서는 인터넷 서버의 정상적인 서비스 제공을 방해하는 형태의 분산 서비스 거부(DDoS: Distributed Denial of Service) 공격으로부터 서버를 보호하고 원활한 서비스를 제공하기 위한 Secure-NIC 시스템의 설계 및 구현에 대해서 설명한다. 이는 "CISGDP : CPU-Independent Service Guaranteed DDoS Protection" 이라는 설계 개념하에서, 각종 인터넷 서버에 장착되어 DDoS 공격 등의 네트워크 공격에 대하여 서버의 고유 서비스가 지속적으로 보장될 수 있도록 자체 보안 기능을 NIC(Network Interface Card) 형태로 제공한다.

Implement Image Logging Server for Web Forensics (웹 포렌식을 위한 이미지 로깅 서버 구현)

  • Seung-hee Yoo;Dong-sub Cho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.1138-1141
    • /
    • 2008
  • 현재 컴퓨터와 인터넷, 정보기술의 발전은 사용자에게 편리함을 가져다 주었으나, 사이버 범죄라는 새로운 역기능을 가지게 되었다. 결국 이는 특정 목적을 가진 범죄자를 낳게되고 정보화 사회의 발전을 저해하는 커다란 걸림돌로 작용하게 되었으며, 이에 대응하는 정보보호기술은 개인의 사생활 보호와 국가 경쟁력을 판단하는 척도로 자리잡게 되었고, 현대에는 정보보호 기술 자체가 국가 간 정보전 형태를 띠면서 그 중요성은 매우 커지고 있다. 이러한 정보보호 기술은 방화벽과 침입탐지 시스템의 꾸준한 개발로 이어졌으나, 아직 컴퓨터 범죄를 다루는 피해 시스템의 증거수집, 복구 및 분석을 하는 컴퓨터 포렌식 기술은 아직 활발히 연구되지는 않고 있다. 본 연구에서는 로그파일이 기록되는 시간의 웹 URL 페이지 이미지를 저장하여 이미지 로그파일을 만드는 멀티 쓰레드 TCP 서버를 구현하여 컴퓨터 사이버범죄에 대한 증거자료로서 디지털 포렌식인 이미지 로그파일을 제안하여 보았다.

A Map-Based Boundray Input Method for Video Surveillance (영상 감시를 위한 지도기반 감시영역 입력 방법)

  • Kim, Jae-Hyeok;Maeng, Seung-Ryol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.1
    • /
    • pp.418-424
    • /
    • 2014
  • In this paper, we propose a boundary input method for video surveillance systems. Since intrusion of a moving object is decided by comparition of its position and the surveillance boundary, the boundary input method is a basic function in video surveillance. Previous methods are difficult to adapt to the change of surveillance environments such as the size of surveillance area, the number of cameras, and the position of cameras because those build up the surveillance boundary using the captured image in the center of each camera. In our approach, the whole surveillance boundary is once defined in the form of polygon based on the satellite map and transformed into each camera environment. Its characteristics is that the boundary input is independent from the surveillance environment. Given the position of a moving object, the time complexity of its intrusion detection shows O(n), where n is the number of polygon vertices. To verify our method, we implemented a 3D simulation and assured that the input boundary can be reused in each camera without any redefinition.

Design and Implementation of Internet Throats and Vulnerabilities Auto Collector for Cyber Threats Management (사이버위협 관리를 위한 인터넷 위협 및 취약점 정보 수집기 설계 및 구현)

  • Lee, Eun-Young;Paek, Seung-Hyun;Park, In-Sung;Yun, Joo-Beom;Oh, Hung-Geun;Lee, Do-Hoon
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.21-28
    • /
    • 2006
  • Beginning flag security it was limited in Firewall but currently many information security solutions like Anti-virus, IDS, Firewall are come to be many. For efficiently managing different kinds of information security products ESM (Enterprise Security management) are developed and operated. Recently over the integrated security management system, TMS (Threat Management System) is rising in new area of interest. It follows in change of like this information security product and also collection information is being turning out diversification. For managing cyber threats, we have to analysis qualitative information (like vulnerabilities and malware codes, security news) as well as the quantity event logs which are from information security products of past. Information Threats and Vulnerability Auto Collector raises the accuracy of cyber threat judgement and can be utilized to respond the cyber threat which does not occur still by gathering qualitative information as well as quantity information.

  • PDF

Study on the distribution of crime in urban space - Gwangju metropolitan city from the perspective of the environmental criminology - (도시공간의 범죄분포특성에 관한 연구 - 환경범죄학의 관점에서 광주광역시를 대상으로 -)

  • Kim, Young-Hwan;Mun, Jeong-Min;Chang, Dong-Kuk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.5
    • /
    • pp.235-241
    • /
    • 2007
  • AThis research is rather on the crime occurrence of target area's space scope than on the approach to the cause of specific area's crime occurrence from the perspective of the environmental criminology emphasizing the crime prevention. By observing the composition of crime distribution, it is intended to search the strategies of crime prevention actually corresponded to the crime problems. For this, after segmenting the city into six sectors, targeting city crimes in Gwangju metropolitan city, in 2004, the basic materials about the crime frequency are analyzed through dividing the types on the base of the present state of crime occurrence, the types of crime, the locations of crime occurrence, the purposes of buildings, the types of intruders, the forms of intrusions. As a result of research. it is suggested that the activation method of community police activities is necessary for the prevention of community crime prevention.

  • PDF

Study of Conversions Security Management System, Co-Relation Rule-Set scenario and architecture for incidence detection (융합보안관제환경을 위한 아키텍처 구축 및 활용 방안에 대한 연구)

  • Hwang, Donguk;Lee, Sanghun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.353-371
    • /
    • 2014
  • We already have seen many studies and articles about the methodology responding the security risks and threats. But we still have some controversial subjects to be settled. Now, we are living in the era that we should focus on how to use the security systems instead of how to make it. In this point of view, a company need to find out the answer for these questions, which security risks have to be handled in a corporate, which system is better for responding the security threats, and how we can build necessary security architecture in case of developing systems. In this article, we'd like to study on-site scenarios threatening the corporate assets, the limit on dealing with these threats, and how to consolidate the security events and information from enormous assets. Also, we'd like to search for the direction form the actual cases which have shown the desired effect from converging the assets and network informations.

Active Security System using IP Traceback Technology (IP 역추적 기술을 이용한 능동형 보안 시스템)

  • Kim, Jae-Dong;Chae, Cheol-Joo;Lee, Jae-Kwang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.5
    • /
    • pp.933-939
    • /
    • 2007
  • There is a tremendous increase in the growth of Internet making people's life easy. The rapid growth in technology has caused misuse of the Internet like cyber Crime. There are several vulnerabilities in current firewall and Intrusion Detection Systems (IDS) of the Network Computing resources. Automatic real time station chase techniques can track the internet invader and reduce the probability of hacking Due to the recent trends the station chase technique has become inevitable. In this paper, we design and implement Active Security system using ICMP Traceback message. In this design no need to modify the router structure and we can deploy this technique in larger network. Our Implementation shows that ICMP Traceback system is safe to deploy and protect data in Internet from hackers and others.

A Feature Set Selection Approach Based on Pearson Correlation Coefficient for Real Time Attack Detection (실시간 공격 탐지를 위한 Pearson 상관계수 기반 특징 집합 선택 방법)

  • Kang, Seung-Ho;Jeong, In-Seon;Lim, Hyeong-Seok
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.59-66
    • /
    • 2018
  • The performance of a network intrusion detection system using the machine learning method depends heavily on the composition and the size of the feature set. The detection accuracy, such as the detection rate or the false positive rate, of the system relies on the feature composition. And the time it takes to train and detect depends on the size of the feature set. Therefore, in order to enable the system to detect intrusions in real-time, the feature set to beused should have a small size as well as an appropriate composition. In this paper, we show that the size of the feature set can be further reduced without decreasing the detection rate through using Pearson correlation coefficient between features along with the multi-objective genetic algorithm which was used to shorten the size of the feature set in previous work. For the evaluation of the proposed method, the experiments to classify 10 kinds of attacks and benign traffic are performed against NSL_KDD data set.

  • PDF

A New Method to Detect Anomalous State of Network using Information of Clusters (클러스터 정보를 이용한 네트워크 이상상태 탐지방법)

  • Lee, Ho-Sub;Park, Eung-Ki;Seo, Jung-Taek
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.545-552
    • /
    • 2012
  • The rapid development of information technology is making large changes in our lives today. Also the infrastructure and services are combinding with information technology which predicts another huge change in our environment. However, the development of information technology brings various types of side effects and these side effects not only cause financial loss but also can develop into a nationwide crisis. Therefore, the detection and quick reaction towards these side effects is critical and much research is being done. Intrusion detection systems can be an example of such research. However, intrusion detection systems mostly tend to focus on judging whether particular traffic or files are malicious or not. Also it is difficult for intrusion detection systems to detect newly developed malicious codes. Therefore, this paper proposes a method which determines whether the present network model is normal or abnormal by comparing it with past network situations.