• Title/Summary/Keyword: DDoS attack

Search Result 259, Processing Time 0.022 seconds

Design and Implementation of Traceback Simulator for Distributed Reflector DoS Attack on Computer Network (네트워크 분산반사 서비스 거부 공격(DRDoS)에 대한 역추적 시뮬레이터 설계 및 구현)

  • Lee, Hyung-Woo
    • The Journal of Korean Association of Computer Education
    • /
    • v.8 no.1
    • /
    • pp.65-72
    • /
    • 2005
  • In this study, we suggest a new mechanism on the design and implementation of IP Traceback system against DDos/DRDoS by Zombie and Reflector attack based on spoofed IP packets. After analysis and comparing on the state-of-arts of several IP traceback mechanisms, we can find their own pros and cons primitives. And then we performed simulations on reflector based DRDoS network packets. In first, we suggest a NS-2 based IP traceback module and implement it for finding its real DRDoS attacker. As a results, we can find advanced new IP traceback scheme for providing enhanced proactive functionality against DRDoS attack.

  • PDF

A study on DDoS Attack, Detecting and Defence in ubiquitous system (유비쿼터스환경에서의 DDoS의 공격과 탐지, 방어시스템에 관한 연구)

  • Jung, Chang-Duk;Cha, Joo-Won;Hwang, Sun-Il
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2009.11a
    • /
    • pp.544-548
    • /
    • 2009
  • The underlying success of logistics depends on the flow of data and information for effective management. Over the last 30 years, we have seen the power of microprocessors double about every 18months. This continuing trend means that computers will become considerably smaller, cheaper, and more abundant; indeed, they are becoming ubiquitous and are even finding their way into everyday objects, resulting in the creation of smart things. In the long term, ubiquitous technologies will take on great economic significance. Industrial products will become smart because of their integrated information processing capacity, or take on an electronic identity that can be queried remotely, or be equipped with sensors for detecting their environment, enabling the development of innovative products and totally new services. The global marketplace runs on logistics, security, speed, agility and flexibility..In this paper we report that pairing these traditional logistics functions with RFID technology can be a huge value-driver for companies. This winning combination yields increased logistics management effectiveness and more efficient visibility into the supply chain management.

  • PDF

Cyber-Resilience-based Virtual Honeypot Service: Framework Sketch and Feasibility Verification (사이버 탄력성 기반 가상 허니팟 서비스 프레임워크 구상 및 가능성 검증)

  • Cha, Byung Rae;Park, Sun;Kim, Jong Won
    • Smart Media Journal
    • /
    • v.5 no.2
    • /
    • pp.65-76
    • /
    • 2016
  • Cloud Computing has recently begun to emerge as a new attack target. The malice DDoS attacks are ongoing to delay and disturb the various services of the Cloud Computing. In this paper, we propose the Hornet-Cloud using security Honeypot technique and resources of Cloud Computing, define and design the concept of security functions about active low-interaction framework by cyber resilience simply. In addition, for virtual honeypot service, we simulated and vitrified the possibility of functions of the low-interaction vHoneypot using cyber resilience.

A Study of N-IDS Detection regarding a DoS Attack and Packet Analysis (DoS공격에 대한 N-IDS 탐지 및 패킷 분석 연구)

  • Chun, Woo-Sung;Park, Dae-Woo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2008.06a
    • /
    • pp.175-182
    • /
    • 2008
  • 2008년에 있었던 우리나라 금융기관과 정부기관에 대한 DoS 공격에 대한 연구이다. 실험실 환경에서 실제 DoS 공격 툴을 이용하여 공격을 실시한다. DoS 공격을 탐지하기 위하여 네트워크 상에서 Snort를 이용한 N-IDS를 설치하고, 패킷을 탐지하기 위한 Winpcap과 패킷의 저장 및 분석하기 위한 MySQL, HSC, .NET Framework 등을 설치한다. e-Watch 등의 패킷 분석 도구를 통해 해커의 DoS 공격에 대한 패킷량과 TCP, UDP 등의 정보, Port, MAC과 IP 정보 등을 분석한다. 본 논문 연구를 통하여 유비쿼터스 정보화 사회의 역기능인 사이버 DoS, DDoS 공격에 대한 자료를 분석하여 공격자에 대한 포렌식자료 및 역추적 분석 자료를 생성하여 안전한 인터넷 정보 시스템을 확보하는데 의의가 있다.

  • PDF

Research on DDoS Detection using AI in NFV (인공지능 기술을 이용한 NFV 환경에서의 DDoS 공격 탐지 연구)

  • Kim, HyunJin;Park, Sangho;Ryou, JaeCheol
    • Journal of Digital Contents Society
    • /
    • v.19 no.4
    • /
    • pp.837-844
    • /
    • 2018
  • Recently, the cloud technology has made dynamical network changes by enabling the construction of a logical network without building a physical network. Despite recent research on the cloud, it is necessary to study security functions for the identification of fake virtual network functions and the encryption of communication between entities. Because the VNFs are open to subscribers and able to implement service directly, which can make them an attack target. In this paper, we propose a virtual public key infrastructure mechanism that detects a fake VNFs and guarantees data security through mutual authentication between VNFs. To evaluate the virtual PKI, we built a management and orchestration environment to test the performance of authentication and key generation for data security. And we test the detection of a distributed denial of service by using several AI algorithms to enhance the security in NFV.

Methods of Defense DoS Attack by Traffic Metering and Controlling Technique in a Router (트래픽 감지 기법을 통한 라우터에서의 서비스 거부 공격 방지 기법)

  • 이호균;김정녀
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.814-816
    • /
    • 2003
  • 분산 서비스 거부 공격 기법이 점점 더 향상되어감에 따라 이에 대한 대응 기법 또한 여러가지가 제안되고 있다. 기존의 탐지에 기반을 둔 기법들은 공격을 탐지하기 위한 Rule이 미리 준비되어야 한다는 점에서 실제 트래픽과 구별이 어려운 DDoS 공격의 경우 효율적인 대응이 될 수 없다. 이를 극복하기 위해서 트래픽 감지와 QoS 기법에 기반을 둔 대응 방안이 활발히 연구 중에 있다. 본 논문에서는 현재까지 나와 있는 트래픽 감지 기반의 대응 기법 연구들을 정리하고 라우터 기반의 보안기능 개발 연구에서 트래픽 감지 기반의 대응 방안 적용 과정을 소개한다.

  • PDF

An Attack Origin Traceback Mechanism using ICMP Message on Ad-hoc Network (Ad-hoc 네트워크에서 ICMP메시지를 이용한 공격 근원지 역추적 기법)

  • Jeong, Gi Seog
    • Convergence Security Journal
    • /
    • v.13 no.3
    • /
    • pp.47-54
    • /
    • 2013
  • Ad-hoc network is composed of mobile nodes and has a vulnerability of attack like on conventional wire networks. So, many studies have been conducted to apply the traceback mechanism on wire network to Ad-hoc network. In this paper, a new mechanism that can trace back to IP source of spoofing DDoS packet using iTrace message on Ad-hoc network is proposed. The proposed mechanism implements ICMP Traceback message and the traceback path between agents allocated in local network and a server located in management network. Also the proposed mechanism can trace the position of attacker even after an attack is over and has extendability through standardization by using a mechanism that IETF proposed. Result of performance evaluation shows a great improvement in terms of load, integrity, safety, traceback function as compared with conventional mechanisms.

Attacker Response Framework using Mobile Code (이동 코드를 이용한 공격자 대응 프레임워크)

  • Bang Hyo-Chan;Him Jin-Oh;Na Jung-Chan;Jang Joong-Su;Lee Young-Suk
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.959-970
    • /
    • 2004
  • It has become more difficult to correspond an cyber attack quickly as patterns of attack become various and complex. However, current so curity mechanisms just have passive defense functionalities. In this paper, we propose new network suity architecture to respond various cyber attacks rapidly and to chase and isolate the attackers through cooperation between security zones. The proposed architecture makes it possible to deal effectively with cyber attacks such as IP spoofing or DDoS(Distributed Denial of Service), by using active packet technology including a mobile code on active network. Also, it is designed to have more active correspondent than that of existing mechanisms. We im-plemented these mechanisms in Linux routers and experimented on a testbed to verify realization possibility of attacker response framework using mobile code. The experimentation results are analyzed.

Fail-over Mechanisms based on Anycast for Stable IPv6 Recursive DNS Services (안정적인 IPv6 리커시브 DNS 서비스를 위한 애니캐스트 기반의 실패 복구 방안 연구)

  • Suh, Yu-Hwa;Kim, Kyung-Min;Shin, Yong-Tae;Song, Kwang-Ho;Kim, Weon;Park, Chan-Ki
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.2B
    • /
    • pp.108-117
    • /
    • 2007
  • Recursive DNS is configured as primary or secondary DNS on user PC and performs domain name resolution corresponding user's DNS query. At present, the amount of DNS traffic is occupied high rate in the total internet traffic and the internet traffic would be increased by failure of IPv6 DNS queries and responses as IPv6 transition environment. Also, existing Recursive DNS service mechanisms is unstable on malicious user's attack same as DoS/DDoS Attack and isn't provide to user trust DNS service fail-over. In this paper, we propose IPv6 Recursive DNS service mechanisms for based on anycast for improving stability. It is that fail-over Recursive DNS is configured IPv6 Anycast address for primary Recursive DNS's foil-over. this mechanisms increases reliability and resiliency to DoS/DDoS attacks and reduces query latency and helps minimize DNS traffic as inducing IPv6 address.

Traceback Mechanism for Spoofed IP Attack on Active Network (액티브 네트워크 기반의 위조 IP 공격 대응 메커니즘)

  • 이영석;방효찬;나중찬
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04a
    • /
    • pp.287-289
    • /
    • 2003
  • 최근 인터넷을 통한 사이버 공격의 형태가 다양해지고 복잡해지면서 효과적인 탐지 및 대응이 어려워지고 있다. 특히 UDP 계열의 DoS. DDoS 공격에서 IP 패킷 내의 근원지 IP 주소를 타인의 IP 주소로 위조하여 공격하는 경우 패킷의 실제 송신자를 추적하고 고립화 시키는 것은 불가능하다. 본 논문에서는 이러한 공격에 쉽게 대응할 수 있는 보안 구조로서 액티브 네트워크를 이용한 보안 관리 프레임워크를 설계하고, 위조 IP 공격에 보다 능동적인 대응이 가능한 메커니즘을 제안한다.

  • PDF