• Title/Summary/Keyword: 해킹 대응

Search Result 349, Processing Time 0.034 seconds

Convergence Security Approach for Motor Vehicle Communication Network Hacking Attack Prevention: Focus on Bluetooth Cases (자동차 내부망 통신네트워크 해킹범죄예방을 위한 융합보안적 대응방안: Bluetooth 활용사례를 중심으로)

  • Choi, Kwan;Kim, Minchi
    • Convergence Security Journal
    • /
    • v.16 no.6_2
    • /
    • pp.99-107
    • /
    • 2016
  • The purpose of this study is to analyse motor vehicle communication network hacking attacks and to provide its prevention. First, the definition of motor vehicle communication network was provided and types of in-vehicle communication network were discussed. Also, bluetooth hacking attack cases were analysed in order to illustrate dangers of hacking attacks. Based on the analysis, two preventive measures were provided. First, Motor Vehicle Safety Standard Law should be revised. Although the law provides the definition of electronic control system and its standards as well as manufacturing and maintenance for safe driving standards, the law does not have standards for electronic control system hacking prevention and defensive security programs or firmware. Second, to protect motor vehicle communication network, it is necessary to create new laws for motor vehicle communication network protection.

ICN 해킹 공격 및 대응 방안 연구 동향

  • Huh, Misuk
    • Review of KIISC
    • /
    • v.26 no.6
    • /
    • pp.36-41
    • /
    • 2016
  • ICN은 증가하는 콘텐츠 트래픽을 효율적으로 수용하려는 목적으로 새롭게 제안된 미래 인터넷 기술이다. 기존 host-centric 구조와 다르게 콘텐츠의 경로의 보안성 보다는 콘텐츠 자체의 안전성을 고려한 것이 큰 특징이다. 본 논문에서는 ICN의 naming, routing, caching 및 그 외 특성들을 살펴보고 그와 관련된 공격 유형 및 현재까지 제안된 대응 방안에 대해 살펴본다.

Design of DDoS attack detection system based network packet (네트워크 패킷 기반 DDoS 공격 탐지 시스템 설계)

  • Lee Won-Ho;Han Kun-Hee;Seo Jung-Taek
    • Proceedings of the KAIS Fall Conference
    • /
    • 2004.06a
    • /
    • pp.155-157
    • /
    • 2004
  • 본 논문에서는 최근의 가장 대표적인 해킹 방법인 DDoS 공격도구들을 분석하고, DDoS 공격에 대한 기존에 제시된 대응방안들을 검토하여 보다 적절한 대응을 할 수 있는 DDoS 공격 탐지 및 대응 시스템을 설계한다. 제안된 시스템은 탐지 모듈에서 탐지된 공격에 대해 관리자에게 보고하여 적절한 대응을 하고 침입으로 판정되는 패킷들에 대해서는 필터링을 실시하여 네트워크 레벨에서 필터링하고 차단할 수 있는 장점을 살릴 수 있다.

  • PDF

Intelligence Report and the Analysis Against the Phishing Attack Which Uses a Social Engineering Technique (사회공학기법을 이용한 피싱 공격 분석 및 대응기술)

  • Lee, Dong-Hwi;Choi, Kyong-Ho;Lee, Dong-Chun;J. Kim, Kui-Nam;Park, Sang-Min
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.171-177
    • /
    • 2006
  • The hacking aspect of recent times is changing, the phishing attack which uses a social engineering technique is becoming the threat which is serious in Information Security. It cheats the user and it acquires a password or financial information of the individual and organization. The phishing attack uses the home page which is fabrication and E-mail and acquires personal information which is sensitive and financial information. This study proposes the establishment of National Fishing Response Center, complement of relation legal system Critical intelligence distribution channel of individual and enterprise.

  • PDF