• Title/Summary/Keyword: 회피 공격

Search Result 91, Processing Time 0.026 seconds

스마트폰 보안 위협에 따른 사용자 중심의 대응방법 동향

  • Kang, SungBae;Nyang, DaeHun
    • Review of KIISC
    • /
    • v.24 no.3
    • /
    • pp.36-43
    • /
    • 2014
  • 스마트폰의 보급률이 높아지고 많은 업무가 PC에서 스마트폰으로 옮겨 가면서 개인신상정보, 금융 정보와 같은 중요한 정보들도 함께 옮겨가고 있다. 최근에 이러한 중요한 정보들을 보호하기 위한 스마트폰 보안이 다양하게 연구되고 있다. 스마트폰의 휴대성 덕분에 사용자는 언제, 어디서나 다양한 업무를 수행할 수 있지만, 공격자도 마찬가지로 사용자에게 더욱 접근하기가 쉬워졌으며 스마트폰 사용자는 PC 환경보다 더욱 다양한 취약점에 처하게 되었다. 이러한 다양한 취약점 때문에 스마트폰을 겨냥한 다양한 종류의 공격 방법들이 생겨나고 있다. 본 논문에서는 스마트폰 보안 위협으로써 네트워크, 악성코드, 훔쳐보기 공격 등의 위협이 개인정보 유출이나 금전적 손실과 같은 직접적인 피해로 이루어지기 쉬우므로 해당 위협들에 대해 설명하고, 해당 위협을 완화하거나 회피할 수 있는 사용자 중심적인 최신 기술 동향을 소개한다.

Cooperative Architecture for Botnet Detection and Management (봇넷의 탐지 및 관제 시스템 설계)

  • Jonghoon Kwon;Chaetae Im;Hyunsang Choi;Hyuncheol Jeong;Heejo Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.1517-1520
    • /
    • 2008
  • 최근의 사이버 공격은 경쟁사에 대한 DDoS 공격과 기밀정보 유출, 일반 사용자들의 금융정보 유출, 광고성 스팸메일의 대량 발송 등 불법 행위를 대행해주고 경제적 이득을 취하려는 의도로 바뀌어 가고 있다. 그 중심에 있는 봇넷은 봇이라 불리는 감염된 호스트들의 네트워크 집단으로서 일련의 거의 모든 사이버 공격에 이용되고 있다. 이러한 봇넷은 수 많은 변종과 다양한 탐지 회피 기술로 그 세력을 확장해가고 있지만 마땅한 총괄적 대책은 미흡한 것이 현실이다. 이 논문에서는 날이 갈수록 위협을 더해가는 봇넷을 빠르게 탐지하고 대응하기 위해 ISP 사업자들 간, 혹은 국가 간에 걸친 사회 전반적인 협력을 통한 봇넷 탐지 및 관리 시스템 구조를 제안한다.

Design and Implementation of a Stealth Game featuring Avoidance (회피를 이용한 잠입 액션 게임의 기획 및 구현)

  • Choi, Yoonji;Han, Sang-Goo;Moon, Gyu-Song;Paik, Doowon;Oh, Kyoungsu
    • Journal of Korea Game Society
    • /
    • v.16 no.4
    • /
    • pp.25-34
    • /
    • 2016
  • Recent stealth games are mainly action games with frontal confrontation or combat features. In this paper, we designed and implemented an stealth game, where characters are weak person and play is conducted by avoiding the situation, not by frontal confrontation. We chose the light as the key factor for the avoidance. The players can survive and fulfill the missions by blocking the enemy's vision. After implementing the first version, we found that the game using only the avoidance is not as fun as expected. To make the game more interesting, we added limited attack function, provided mini map for better user interface, and this paper describes the options we had and experiences of the decision making process to make the better game.

Device RDoS Attack Determination and Response System Design (디바이스의 DDoS 공격 여부 판단 및 대응 시스템 설계)

  • Kim, Hyo-jong;Choi, Su-young;Kim, Min-sung;Shin, Seung-soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.108-110
    • /
    • 2021
  • Since 2015, attacks using the IoT protocol have been continuously reported. Among various IoT protocols, attackers attempt DDoS attacks using SSDP(Simple Service Discovery Protocol), and as statistics of cyber shelters, Korea has about 1 million open SSDP servers. Vulnerable SSDP servers connected to the Internet can generate more than 50Gb of traffic and the risk of attack increases gradually. Until recently, distributed denial of service attacks and distributed reflective denial of service attacks have been a security issue. Accordingly, the purpose of this study is to analyze the request packet of the existing SSDP protocol to identify an amplification attack and to avoid a response when an amplification attack is suspected, thereby preventing network load due to the occurrence of a large number of response packets due to the role of traffic reflection amplification.

  • PDF

A Study on the Problems of Procedural Law Against Cyber Crimes in Korea - On the Trend of Procedural Law Against Cyber Crimes of U.S - (우리 사이버범죄 대응 절차의 문제점에 관한 연구 - 미국의 사이버범죄대응절차법을 중심으로 -)

  • Lim Byoung-Rak;Oh Tae-Kon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.4 s.42
    • /
    • pp.231-241
    • /
    • 2006
  • When current cyber attacks to information and communication facilities are examined, technologies such as chase evasion technology and defense deviation technology have been rapidly advanced and many weak systems worldwide are often used as passages. And when newly-developed cyber attack instruments are examined, technologies for prefect crimes such as weakness attack, chase evasion and evidence destruction have been developed and distributed in packages. Therefore, there is a limit to simple prevention technology and according to cases, special procedures such as real-time chase are required to overcome cyber crimes. Further, cyber crimes beyond national boundaries require to be treated in international cooperation and relevant procedural arrangements through which the world can fight against them together. However, in current laws, there are only regulations such as substantial laws including simple regulations on Punishment against violation. In procedure, they are treated based on the same procedure as that of general criminal cases which are offline crimes. In respect to international cooperation system, international criminal private law cooperation is applied based on general criminals, which brings many problems. Therefore, this study speculates the procedural law on cyber crimes and presents actual problems of our country and its countermeasures.

  • PDF

Corporate Social Responsibility Performance, CEO turnover and Tax Avoidance (기업의 CSR성과, CEO교체 및 조세회피)

  • Seo, Gab-Soo;Choi, Mi-Hwa
    • Management & Information Systems Review
    • /
    • v.36 no.3
    • /
    • pp.255-268
    • /
    • 2017
  • This study examines whether firms with tax avoidance of Corporate Social Responsibility(CSR) performance is tempered by the extent firms engage in CEO turnovers. Considering the increasing interest in CSR activities of the firm to secure sustainable growth of national economy, this paper investigates the benefit and cost of CSR activities by combining the agency theory using the firm level data. Prior studies document that investors positively value tax avoidance. The rationale for this finding is that tax avoidance provides cash savings that can be used by firm managers to generate future shareholder wealth. Prior studies also show that investors' valuations are sensitive to the risk of future negative tax outcomes. Assuming that many types of CSR performances are low risk, low yielding uses of firm resources, we posit that higher levels of CSR performance may signal to investors that cash generated via tax avoidance has not been fully used to generate a return sufficient to offset the risk associated with aggressive tax planning strategies. Consistent with this argument, we predict and find that the positive association between CSR performance and tax avoidance is significantly weakened when firms have higher positive levels of CEO turnovers. Further, we predict and find that 'philanthropic' types of CSR activities in particular are associated with investor discounting of tax avoidance. We interpret our results as suggesting the equity market views CSR activities to be ostensibly funded through cash savings generated via tax avoidance.

  • PDF

Development of an electronic protection simulator using decoy antenna (디코이 안테나를 이용한 전파회피 모사기 개발)

  • Lim, Joong-Soo;Chae, Gyoo-Soo;Kim, Min-Nyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.7
    • /
    • pp.2528-2533
    • /
    • 2010
  • This paper describes on a software simulator that can be used for an anti-ARM system. The proposed simulator is a valuable tool for investigating the optimum deployment of decoy antennas which are widely using for anti-ARM and calculating the electromagnetic field at the ARM receiver. To verify the effect of decoy antennas, we analyze the field intensity and phase at the receiver. We conduct an analysis of ARM attack in case of using multiple decoy antennas and the proposed simulator can be used to decide the optimum positions of the decoys.

Development of an electronic protection simulator using decoy antenna (디코이 안테나를 이용한 전파회피 시뮬레이터 개발)

  • Lim, Joong-Soo;Chae, Gyoo-Soo;Kim, Min-Nyun
    • Proceedings of the KAIS Fall Conference
    • /
    • 2010.11a
    • /
    • pp.134-137
    • /
    • 2010
  • 본 논문에서는 대방미사일(ARM: Anti Radiation Missile)로부터 레이다를 보호하기 위하여 디코이 안테나를 이용한 전파회피기술을 효과적으로 모의하기위한 시뮬레이터를 제안하자 한다. 제안된 시뮬레이터는 디코이(Decoy) 안테나의 효과적인 배치와 ARM 수신기에 수신되는 전파의 특성 분석이 가능하도록 설계되었다. 디코이 안테나의 배치 효과를 검증하기위해서 ARM 수신기에 도달하는 디코이 안테나 신호의 위상과 진폭을 분석 결과를 제시하였다. 또한 다수 디코이 안테나를 사용하는 경우 ARM의 공격효과를 다양하게 분석하였으며 ARM 방어를 위한 효과적인 디코이 배치에 유용하게 활용 될 것이다.

  • PDF

Taint Analysis based Malicious Code Detection Approach (Taint Analysis 기반 악성코드 탐지 방안)

  • Lee, Tai-Jin;Oh, Joo-Hyung;Jung, Hyun-Cheol
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06d
    • /
    • pp.109-110
    • /
    • 2011
  • 악성코드는 루트킷, Anti-VM/디버깅, 실행압축 등 기술사용으로 점차 지능화된 형태로 발전하고 있다. 이에 대응하기 위해, user 및 kernel level에서의 다양한 행위 기반 분석기술이 연구되고 있으나, 이를 회피하는 악성코드가 지속적으로 출현하고 있다. 본 논문에서는 Taint Analysis 기반 악성코드 탐지방안을 제시한다. 본 대응기술은 공격자에 의해 회피하기 어렵고, 의심스러운 데이터 유형별 선별적 분석이 가능하여 행위 기반 대응기술의 한계를 보완할 수 있다.

Classifying the Latent Group of Elementary School Students Based on Social Achievement Goals Types and the Exploration of Peer Status and Aggression (초등학생의 사회적 성취목표 유형에 따른 잠재집단 분류와 또래지위 및 공격성과의 관련성 탐색)

  • Choi, Eun-Young
    • Korean Journal of School Psychology
    • /
    • v.17 no.2
    • /
    • pp.223-241
    • /
    • 2020
  • The purpose of this study was to explore the latent profiles of social achievement goals and to investigate the differences in peer status (perceived popularity, social preference) and aggression (overt, relational, cyber) among those profile groups. Social achievement goals and cyber aggression data was acquired through self-reporting, and perceived popularity, social preference, and overt and relational aggression were assessed through peer nomination. Applying the latent profile analysis(LPA) to 1,239 elementary school students, three distinct groups of social achievement goals were identified: a development-oriented achievement goal group, an average social goal group, and a overall-high social achievement goal group. Using logistic regression analysis, the relationships between the latent group, peer status, and aggression were examined. The result indicated that the higher the social preference, the lower the probability of belonging to the 'overall-high social achievement goal group'. And the higher the cyber aggression, the lower the probability of belonging to the 'development-oriented achievement goal group'. In addition, the higher the relational aggression of the second time, the higher the probability of belonging to the 'overall-high social achievement goal group' as compared to the 'average social goal group'.