• Title/Summary/Keyword: Active attack

Search Result 195, Processing Time 0.023 seconds

Active Response Mechanism to Distributed Denial of Service Attack on Active Networks (액티브 네트워크 기반의 분산 서비스 거부 공격 대응 메커니즘)

  • 김현주;나중찬;손승원
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.491-494
    • /
    • 2002
  • 기존의 네트워크 보안은 침입 징후를 탐지하여 외부 공격자로부터 오는 트래픽을 차단함으로써 자신의 도매인만을 보호하였다. 이는 공격자로 하여금 제 2, 제 3의 공격을 가능하게 하고 공격자에 대한 대응에 있어서도 각 도매인간의 협력이 없는 상태를 야기하였다. 따라서 각 도메인 간의 데이터의 상호 결합과 협력을 통해 공격자의 실제 위치를 추적하여 침입 근원지로부터의 트래픽을 차단함으로써 공격자를 네트워크로부터 고립시키고자 하는 연구가 진행되고 있지만, 이는 분산서비스거부 공격의 경우 제한적이다. 그러므로 본 논문은 분산서비스거부 공격에 있어 에이전트와 마스터의 위치를 추적하여 제거하고 실제 공격자를 고립시킬 수 대응 메커니즘에 대해 논의한다.

  • PDF

Effects of Alloying Elements on the Surface Characteristics of Fe-38Al Intermetallic Compounds (Fe-38 at.% Al계 금속간화합물의 표면특성에 미치는 합금원소의 영향)

  • 최한철
    • Journal of the Korean institute of surface engineering
    • /
    • v.37 no.2
    • /
    • pp.128-136
    • /
    • 2004
  • Effects of alloying elements on the surface characteristics of Fe-38Al intermetallic compounds were investigated using potentiostat. The specimens were casted by the vacuum arc melting. The subsequent homogenization and the stabilization led to the homogeneous DO$_3$ structure of the specimen. After the corrosion tests, the surface of the tested specimen was observed by the optical microscopy and scanning electron microscopy(SEM). For Fe-38 at.% Al intermetallic compound, the addition of Cr and Mo proved to be beneficial in decreasing the grain boundary attack by decreasing the active current density. Addition of Band Nb resulted in a higher active current density and also a higher passive current density. These results indicated the role of Cr and Mo in improving the pitting corrosion resistance of Fe-38 at.%Al intermetallic compound. Band Nb addition to Fe-38 at.%Al accelerated the granular corrosion. Fe-38 at.%Al containing Cr and Mo showed remarkably improved pitting corrosion resistance in comparison with Band Nb addition to Fe-38 at. %Al.

Prototype Design of Hornet Cloud using Virtual Honeypot Technique (가상 허니팟 기술의 호넷 클라우드의 프로타입 설계)

  • Cha, Byung-Rae;Park, Sun;Kim, Jong-Won
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.8
    • /
    • pp.891-900
    • /
    • 2015
  • Cloud Computing has recently begun to emerge as a new attack target. The malice DDoS attacks are ongoing to delay and disturb the various services of the Cloud Computing. In this paper, we propose the Hornet-Cloud using security Honeypot technique and resources of Cloud Computing, and design the concept of active-interaction and security functions of Hornet-Cloud simply.

Flexible Concept Applicable to Railway (유연성 원리를 이용한 철도변 사면보강시스템 적용사레연구)

  • Choi Yu-Kyung;Choi Seung-Il;Ro Byung-Don;Kim Hyung-Min
    • Proceedings of the KSR Conference
    • /
    • 2005.11a
    • /
    • pp.203-210
    • /
    • 2005
  • Rockey slopes adjacent to railways are disclosed from severe weathering and hazard of failure of themselves. Consequently it causes directly rockfall or landsliding on the railway. Conventional solutions-rigid system like rocksheds, shotcrete, retaining walls, etc to these causes are limited to protect train, rail, our properties and lives from the harmful attack - rockfall. debris flow and sliding. Flexible concept for solutions with passive and active type method based on Euro Code 7 capable of high energy absorption and light materials are rapidly replacing the rigid systems with natural friendly, early installation, cost and time saving and reducing danger in works all over the world.

  • PDF

Active Network for IP Traceback (IP 역추적을 위한 액티브 네트워크 기법 적용 방안)

  • 최병선;이성현;이재광
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.420-423
    • /
    • 2004
  • Advance of computer technique becomes efficient of business in recent years. It has become high-speed data transmission and large data transmission. Network and computer system need to increasingly security because advance of computer technique. So this paper analyzes IP Traceback system that prevent cyber attack as hacking and security vulnerability of network. And this paper design IP Traceback system that based on active network.

  • PDF

Revisited Security Evaluation on Midori-64 against Differential Cryptanalysis

  • Guoyong Han;Hongluan Zhao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.2
    • /
    • pp.478-493
    • /
    • 2024
  • In this paper, the Mixed Integer Linear Programming (MILP) model is improved for searching differential characteristics of block cipher Midori-64, and 4 search strategies of differential path are given. By using strategy IV, set 1 S-box on the top of the distinguisher to be active, and set 3 S-boxes at the bottom to be active and the difference to be the same, then we obtain a 5-round differential characteristics. Based on the distinguisher, we attack 12-round Midori-64 with data and time complexities of 263 and 2103.83, respectively. To our best knowledge, these results are superior to current ones.

Secure Location Information Protection Scheme from the Network Provider and the third party in Mobile Communication Environments (이동통신 환경에서 네트워크 제공자 및 제 3자로부터 안전한 위치정보 보호기법)

  • Kim, Soon-Seok;Lee, Chang-Hun
    • The KIPS Transactions:PartC
    • /
    • v.10C no.7
    • /
    • pp.867-878
    • /
    • 2003
  • In thls Paper, we Propose a new scheme, protecting information about the location of a mobile user against attacks from inside users of the mobile communication, especially the network providers. There have already been some proposals about how to protect location information of user in mobile communication environments〔1-5〕. Among them, Kesdogan et al.〔2, 3〕 proposed a new method, using so-called temporary pseudonyms and also described protection method against a passive and an active attack of network providers. However, the description of protection method against the active attack between the two is not clear. Moreover, there is an additional load that it should append a reachability manager〔1, 6〕 to the proposed system. Therefore, we propose a new scheme improving the above method of Kesdogan et al. and analyze its security and effectiveness.

A Design of An Active PID control using Immune Algorithm for Vibration Control of Building Structure (구조물 진동제어를 위한 Immune Algorithm을 이용한 Active PID 제어기 설계)

  • Lee, Young-Jin;Cho, Hyun-Cheol;Lee, Kwon-Soon
    • Proceedings of the KIEE Conference
    • /
    • 2005.05a
    • /
    • pp.72-74
    • /
    • 2005
  • In this paper, we propose an adaptive PID controller using a cell-mediated immune response to improve a PID control performance. The proposed controller is based on the specific immune response of the biological immune system that is cell-mediated immunity. The immune system of organisms in the real body regulates the antibody and the T-cells to protect an attack from the foreign materials like virus, germ cells, and other antigens. It has similar characteristics that are the adaptation and robustness to overcome disturbances and to control the plant of engineering application. We first build a model of the T-cell regulated immune response mechanism and then designed an I-PID controller focusing on the T-cell regulated immune response of the biological immune system. We apply the proposed methodology to building structures to mitigate vibrations due to strong winds for evaluation of control performances. Through computer simulations, system responses are illustrated and additionally compared to traditional control approaches.

  • PDF

A RFID Multi-Authentication Method for Logistics Systems (물류 시스템에 적합한 RFID 다중 인증방법)

  • Bae, Woo-Sik;Lee, Jong-Yun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.2
    • /
    • pp.313-319
    • /
    • 2009
  • Recently the RFID system, which can recognize multiple tags simultaneously through wireless communication, is emerging as a new technology that can replace the barcode system. Furthermore, related industries are carrying out active research on tags and authentication protocols with guaranteed security that are widely applicable to logistics, distribution, etc. The present study proposes a protocol with enhanced security by introducing the concept of RBAC to the authentication protocol, and a method with lower security for effective mass authentication. The proposed method is advantageous in that it guarantees security against spoofing attack, traffic analysis, replay attack, etc. based on hash function.

PSMS Design and Implementation for a Phishing Attack Intercept (피싱공격 차단을 위한 PSMS 설계 및 구현)

  • Yoo, Jae-Hyung;Lee, Dong-Hwi;Yang, Jae-Su;Park, Sang-Min;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.8 no.1
    • /
    • pp.49-56
    • /
    • 2008
  • Recently, Phising attack uses trick of URL and sites, and technical concealment method which infiltrates sophisticated malicious code. However, sometimes Phising security technology cannot cover all of Phising methods. Consequently, this research proposes inspection to solve this problem. First, we can install Proxy server for a strong open information exchange of web environment between web servers and clients. Therefore, it compares and analyzes harmful site and Phising URL with White domain list, and filters them. Finally, designs for stable web based information so that we can block Phising with least regulation and active control. So the purpose of this paper is introducing this design system and structure, and inspect them.

  • PDF