• Title/Summary/Keyword: Denial of Service

Search Result 403, Processing Time 0.032 seconds

BMT Derivation of Evaluation Item about Anti-DDoS SW (Anti-DDoS SW BMT 평가항목 도출)

  • Shin, Suk-Jo;Lee, Jae-Guen;Jo, In-June;Shin, Seok Kyoo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.375-378
    • /
    • 2009
  • DDoS attacks make people can't using normal internet service, because DDoS attacks cause exhaustion of network bandwidth or exhaustion of computer system resources by using many personal computers or servers which already infected computer virus from hackers. Recent DDoS attacks attack government brach, financial institution, even IT security company. IT security companies make Anti-DDoS product for defense from DDoS attack. But, There is no standard for BMT of Anti-DDoS product. In this dissertation, Anti-DDoS product quality characteristics of the survey analysis to evaluate them by comparing the assessment items were derived.

  • PDF

A Study on Efficient DDoS Protection Techniques using Anycast and BGP ECMP (Anycast 구조와 BGP ECMP를 활용한 효율적인 DDoS 공격 방어 기법에 대한 연구)

  • Hong, Yun Seok;Han, Wooyoung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.125-128
    • /
    • 2022
  • As the number of online systems based on the internet gradually increases, cyber-scale attacks that interfere with the normal operation of web services are also on the rise. In particular, distributed denial-of-service attacks (DDoS) that interfere with normal web service operations are also increasing. Therefore, this paper presents an efficient DDoS attack defense technique utilizing Equal Cost Multi-Path (BGP ECMP) routing techniques in networks of Anycast type by operating PoP basis of major attack sources and describes how high-availability web services can be operated.

  • PDF

A Study on Intensified scheme to WLAN Secure based on IEEE 802.1x Framework (IEEE 802.1x 프레임워크 기반에서의 무선랜 보안 강화 방안에 관한 연구)

  • Lee Joon;Hong Seong-pyo;Shin Myeong-sook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.1
    • /
    • pp.136-141
    • /
    • 2006
  • The IEEE 802.1x can be using various user authentication mechanisms: One-Time Password, Certificate-Based TLS, Challenge/Response and Keberos through EAP(Extended Authentication Protocol). But, IEEE 802.1x also has vulnerabilities about the DoS, the session hijacking and the Man in the Middle attack due to the absence of AP authentication. In this paper, we propose a WLAN secure system which can offer a safety secure communication and a user authentications by intensified the vulnerability of spoofing and DoS attacks. The suppose system offers a safe secure communication because it offers sending message of integrity service and also it prevents DoS attack at authentication initial phase.

A study on Optimization of Using QoS and Ensuring the Security in IPv6 Multicast Network (IPv6 Multicast 네트워크에서 QoS 적용과 Security보장을 위한 최적화 연구)

  • Kim, Young-Rae;Lee, Hyo-Beom;Min, Sung-Gi
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.913-916
    • /
    • 2008
  • TPS(Triple Play Service)를 통한 IP-TV,인터넷, 전화 등이 통합되는 추세에서, IPv6 상용네트워크가 수 년 안에 구축될 필연성을 공감하고 있다. 그러나 [1] 현재 IP-TV 서비스에서 Delay, Jitter,전송장애등 QoS에 대한 사용자 불만이 계속 발생하고 있다. 또한 현재 서비스중지 (DoS : Denial of Service)를 유발하는 [2] 인터넷 침해 사고가 월 평균 2157건 이상 발생하는 등, Security Issue의 증가 문제가 지속 되고 있다. IPv4/IPv6 듀얼 스택 멀티 캐스트 네트워크를 구현하여, 라우팅, 멀티캐스트(PIM-SM), QoS, Security 이슈에 대한, 최적의 방안을 도출하여, 라우팅 구현시 IPv6 라우팅 프로토클 간에 재분배(Redistribution) 장애 해결책, IPv6 특성에 따른 멀티캐스트 그룹주소 지정시의 장애대책을 제시하였고, QoS 에서는 기존의 QoS 정책의 문제점과 IPv6의 고유한 패킷 구조의 장점을 활용한 Adaptive QoS 방법을 제시하고, IPv6 멀티캐스트 서비스 중지 공격 유형을 정의하여, 최적화된 IPv6 멀티캐스트 구성 모델을 제시 하였다. 결론적으로 구현된 시스템에서 IPv6 패킷 분석을 통해서 최적화된 경로 통신 및 차별화된 IPv6 패킷의 QoS 방안을 제시하였으며, 서비스 중지공격을 대응하는 Security 보장성을 갖고 있음을 검증하여, 향후 상용화된 IPv4/IPv6 네트워크 구현을 위한 최적화 방안을 제시 하였다.

DoS Attack Control Design of IoT System for 5G Era

  • Rim, Kwangcheol;Lim, Dongho
    • Journal of information and communication convergence engineering
    • /
    • v.16 no.2
    • /
    • pp.93-98
    • /
    • 2018
  • The Internet of Things (IoT) is a form of the emerging 4th industry in the 5G era. IoT is expected to develop naturally in our daily life in the 5G era in which high-speed communication will be completed. Along with the rise of IoT, concerns about security and malicious attacks are also increasing. This paper examines DoS attacks, which are one of the representative security threats of IoT and proposes a local detection and blocking system that are suitable for response to such attacks. First, systems of the LoRaWAN type, which are most actively researched in the IoT system field and DoS attacks that can occur in such systems were examined. Then, the inverse order tree algorithm using regional characteristics was designed as a cluster analysis form. Finally, a system capable of defending denial-of-service attacks in the 5G IoT system using local detection and blocking with the Euclidean distance was designed.

Detection of SIP Flooding Attacks based on the Upper Bound of the Possible Number of SIP Messages

  • Ryu, Jea-Tek;Roh, Byeong-Hee;Ryu, Ki-Yeol
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.5
    • /
    • pp.507-526
    • /
    • 2009
  • Since SIP uses a text-based message format and is open to the public Internet, it provides a number of potential opportunities for Denial of Service (DoS) attacks in a similar manner to most Internet applications. In this paper, we propose an effective detection method for SIP flooding attacks in order to deal with the problems of conventional schemes. We derive the upper bound of the possible number of SIP messages, considering not only the network congestion status but also the different properties of individual SIP messages such as INVITE, BYE and CANCEL. The proposed method can be easily extended to detect flooding attacks by other SIP messages.

Analysis of Security Effectiveness in according to DS-MAC attack (DS-MAC 공격에 따른 보안 영향 분석)

  • Hong, Jin-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.10
    • /
    • pp.4606-4611
    • /
    • 2011
  • In this paper, it is reviewed vulnerability of security in DS-MAC communication protocol of sensor network, and analyzed in the respect of security effectiveness, which is consumed at each stage of communication procedure in according to vulnerability of denial of service and modification attack. In this paper, we present about the respect of security effectiveness of transmission and reception in case of operation mode with or without authentication scheme between sensor node.

A Study on the Lived Experience in Adolescents with Physical Disability (지체장애 청소년의 장애경험)

  • Kang Kyung-Ah;Kim, Shin-Jeong
    • Child Health Nursing Research
    • /
    • v.7 no.4
    • /
    • pp.530-539
    • /
    • 2001
  • The purpose of this study is to explore and describe the lived experience of adolescents with physical handicap by means of the Colaizzi's phenomenological method. The participants were 15 adolescents, 10-19 years old, who were experiencing physical handicap. Significant statements from data were extracted. From these formulated meanings, 27 themes, 10 clusters of theme and 4 categories were constructed. Major theme clusters that were emerged from the analysis are 'denial', 'despair', ’social isolation', ’being despised', ’not being treated as a member of society', ’getting the power in love around people', ’accepting the physical handicap', ’feeling the joy and one's life worth living', ’depending on the religion', and 'the feeling of achievement by the effort and the service'. In order to help the adolescents with physical handicap overcome their difficulty and cope to the social environment, nurses need to understand the essential theme clusters of the experience of adolescents with physical disability.

  • PDF

Internet Worm Propagation Model Using Centrality Theory

  • Kwon, Su-Kyung;Choi, Yoon-Ho;Baek, Hunki
    • Kyungpook Mathematical Journal
    • /
    • v.56 no.4
    • /
    • pp.1191-1205
    • /
    • 2016
  • The emergence of various Internet worms, including the stand-alone Code Red worm that caused a distributed denial of service (DDoS), has prompted many studies on their propagation speed to minimize potential damages. Many studies, however, assume the same probabilities for initially infected nodes to infect each node during their propagation, which do not reflect accurate Internet worm propagation modelling. Thus, this paper analyzes how Internet worm propagation speed varies according to the number of vulnerable hosts directly connected to infected hosts as well as the link costs between infected and vulnerable hosts. A mathematical model based on centrality theory is proposed to analyze and simulate the effects of degree centrality values and closeness centrality values representing the connectivity of nodes in a large-scale network environment on Internet worm propagation speed.

Analysis of Power Efficiency in according to S-MAC attack in the Sensor Network (센서네트워크에서 S-MAC 공격에 따른 전력 효율성 분석)

  • Hong, Jin-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.2
    • /
    • pp.345-350
    • /
    • 2009
  • In this paper, it is reviewed vulnerability of security in S-MAC communication protocol of sensor network, and analyzed in the respect of power efficiency, which is consumed at each stage of communication procedure in according to vulnerability of denial of service. Therefore, from research results, it can be induced the need of authentication scheme, which is considered reliability, efficiency and security of normal S-MAC communication.