• Title/Summary/Keyword: DoS 공격

Search Result 359, Processing Time 0.093 seconds

The Effects of Preschool Children's Language Ability, Emotion Regulation, and Mothers' Parenting Behavior on Peer Competence and Aggressive Behavior (유아의 언어능력 및 정서조절능력과 어머니의 양육행동이 유아의 또래유능성과 또래공격행동에 미치는 영향)

  • Choi, Insuk
    • Journal of Families and Better Life
    • /
    • v.32 no.6
    • /
    • pp.47-58
    • /
    • 2014
  • The purpose of this study was to examine the effects of mothers' parenting behavior, preschool children's language ability and emotion regulation on peer competence and aggressive behavior. The subjects were 100 preschool children (49 girls and 51 boys; mean age, 70.30 months), their mothers and teachers, recruited from five daycare centers located in Gyeonggi-do area. Each child's language ability was assessed individually with the standardized measure, the Preschool Receptive-Expressive Language Scale and their teachers reported on the children's peer competence and aggressive behavior. Their mothers also reported on parenting behavior and their child's emotion regulation by questionnaire. The collected data was analyzed by correlation analysis and hierarchical regression. The main results of this study were as follows. First, preschool children's peer competence was positively related to maternal warmth and children's language ability. Their aggressive behavior was positively related to harsh maternal parenting but negatively related to emotion regulation. Second, hierarchical regression analyses revealed that children's language ability and maternal warmth predicted peer competence. Third, children's gender, emotion regulation, and harsh maternal parenting predicted aggressive behavior. These findings could provide basic information for programs and services to promote peer competence in preschool children.

A study on Optimization of Using QoS and Ensuring the Security in IPv6 Multicast Network (IPv6 Multicast 네트워크에서 QoS 적용과 Security보장을 위한 최적화 연구)

  • Kim, Young-Rae;Lee, Hyo-Beom;Min, Sung-Gi
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.913-916
    • /
    • 2008
  • TPS(Triple Play Service)를 통한 IP-TV,인터넷, 전화 등이 통합되는 추세에서, IPv6 상용네트워크가 수 년 안에 구축될 필연성을 공감하고 있다. 그러나 [1] 현재 IP-TV 서비스에서 Delay, Jitter,전송장애등 QoS에 대한 사용자 불만이 계속 발생하고 있다. 또한 현재 서비스중지 (DoS : Denial of Service)를 유발하는 [2] 인터넷 침해 사고가 월 평균 2157건 이상 발생하는 등, Security Issue의 증가 문제가 지속 되고 있다. IPv4/IPv6 듀얼 스택 멀티 캐스트 네트워크를 구현하여, 라우팅, 멀티캐스트(PIM-SM), QoS, Security 이슈에 대한, 최적의 방안을 도출하여, 라우팅 구현시 IPv6 라우팅 프로토클 간에 재분배(Redistribution) 장애 해결책, IPv6 특성에 따른 멀티캐스트 그룹주소 지정시의 장애대책을 제시하였고, QoS 에서는 기존의 QoS 정책의 문제점과 IPv6의 고유한 패킷 구조의 장점을 활용한 Adaptive QoS 방법을 제시하고, IPv6 멀티캐스트 서비스 중지 공격 유형을 정의하여, 최적화된 IPv6 멀티캐스트 구성 모델을 제시 하였다. 결론적으로 구현된 시스템에서 IPv6 패킷 분석을 통해서 최적화된 경로 통신 및 차별화된 IPv6 패킷의 QoS 방안을 제시하였으며, 서비스 중지공격을 대응하는 Security 보장성을 갖고 있음을 검증하여, 향후 상용화된 IPv4/IPv6 네트워크 구현을 위한 최적화 방안을 제시 하였다.

Security Issue in T-MAC Communication Protocol (T-MAC 통신 프로토콜에서 보안 이슈)

  • Hong, Jin-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.12
    • /
    • pp.4760-4765
    • /
    • 2010
  • Time out-medium access control (T-MAC) protocol is one of the well-known MAC protocols designed for wireless sensor networks (WSN), and is proposed to enhance the poor performance of the S-MAC protocol. In this paper, we are reviewed about security vulnerability in T-MAC, and analyzed the power which is consumed at each stage of T-MAC protocol according to vulnerability of denial of service (DoS) and replay problem. From our analytical results, it can be considered the need of power efficient authentication scheme which provides the reliability, efficiency, and security for a general T-MAC communication. This is the case study of possible DoS vulnerability and its power consumption in T-MAC.

Cryptanalysis of Remote User Authentication Scheme (원격 사용자 인증 구조의 암호학적 분석)

  • Choi, Jong-Seok;Shin, Seung-Soo;Han, Kun-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.2
    • /
    • pp.327-333
    • /
    • 2009
  • In 2004, Das et al. proposed a scheme for preserving a user anonymity. However, In 2005, Chien and Chen pointed out that Das et al. scheme fail to protect the user anonymity, and proposed a new scheme. And then in 2007, Hu et al. pointed out that Chien and Chen scheme also has some problems; it is Strong masquerading server/user attack, Restricted replay attack, Denial of service attack. it also slow wrong password detection, and proposed a new scheme. In 2008, Bindu et al. repeatedly pointed out on Chien and Chen scheme and proposed their scheme. However, we point out that all of their scheme also has some problems; it is not to protect the user anonymity and Denial of service attack. In addition, Bindu et al. is vulnerable to Strong masquerading server/user attack. Therefore, we demonstrate that their scheme also have some problems; it is the user anonymity and denial of service attack as above.

Aggressive Driving Behavior in the Protected/Permissive Left Turn(PPLT) Intersections (보호/비보호좌회전(PPLT) 교차로에서의 공격적 운전행태 연구)

  • Oh, Do Hyung;Jang, Tae Youn
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.16 no.3
    • /
    • pp.28-38
    • /
    • 2017
  • The study is to analyze the aggressive driving behavior in the protected/permissive left turn(PPLT) intersections in Gunsan City. As a result of the logistic regression model, increasing of driver's age and driving experience, non-peak time, no company, sedan and male have a tendency to behave aggressive driving to the opposite vehicles. When the vehicles try to turn the unprotected left in the PPLT intersection, the opposite vehicle drivers recognize them at the aggressive driving behavior if the distance to opposite vehicles is not enough. The relationship between driver characteristics and the distance to the opposite vehicles is analyzed under aggressive driving behavior. increasing of age and company, peak time tend to influence the short distance opposite vehicles while male and higher driving experience the middle and long distance. Sedan has the aggressive possibility to shorter distance opposite vehicles rather than others.

Automated Attack Path Enumeration Method based on System Vulnerabilities Analysis (시스템 취약점 분석을 통한 침투 경로 예측 자동화 기법)

  • Kim, Ji Hong;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1079-1090
    • /
    • 2012
  • As the number of information asset and their vulnerabilities are increasing, it becomes more difficult for network security administrators to assess security vulnerability of their system and network. There are several researches for vulnerability analysis based on quantitative approach. However, most of them are based on experts' subjective evaluation or they require a lot of manual input for deriving quantitative assessment results. In this paper, we propose HRMS(Hacking and Response Measurement System) for enumerating attack path using automated vulnerability measurement automatically. HRMS can estimate exploitability of systems or applications based on their known vulnerability assessment metric, and enumerate attack path even though system, network and application's information are not fully given for vulnerability assessment. With this proposed method, system administrators can do proactive security vulnerability assessment.

SDN/OpenFlow의 기술 분석 및 보안 측면의 이용 가능성

  • Kim, Jong-Soo;Im, Sul-Hwa;Kim, Hak-Beom
    • Review of KIISC
    • /
    • v.24 no.1
    • /
    • pp.65-74
    • /
    • 2014
  • 최근 네트워크 시장의 큰 화두가 되고있는 SDN(Software-Defined Network)은 OpenFlow를 활용한 차세대 네트워크 기술로 각광받고 있다. 아직까지의 SDN은 초기단계에 이르고 있으나 현재의 네트워크 산업이 가지는 한계점을 근본적으로 변화시킬 수 있는 기술로 상당한 잠재력이 내재되어 있다. 특히 SDN 기술을 보안 측면에서 이용하게 되면, 기존의 IDS/IPS 제품의 대응 범위를 게이트웨이에서 엔드 포인트까지의 인프라 전반으로 확장시킬 수 있다. 또한 유연한 트래픽 경로 재설정을 통한 DoS나 DDoS 공격에도 효과적으로 대비할 수 있다. 이에 따라 OpenFlow 및 SDN의 기술 분석과 보안 측면에서의 이용 가능성에 대해 기술하고자 한다.

Queueing Model for Traffic Loading Improvement of DDoS Attacks in Enterprise Networks (엔터프라이즈 네트워크에서 DDoS 공격의 부하 개선을 위한 큐잉 모델)

  • Ha, Hyeon-Tae;Lee, Hae-Dong;Baek, Hyun-Chul;Kim, Sang-Bok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.1
    • /
    • pp.107-114
    • /
    • 2011
  • Today the company adopts to use information management method at the network base such as internet, intranet and so on for the speed of business. Therefore the security of information asset protection and continuity of business within company in relation to this is directly connected to the credibility of the company. This paper secures continuity to the certified users using queuing model for the business interruption issue caused by DDoS attack which is faced seriously today. To do this I have reflected overloaded traffic improvement process to the queuing model through the analysis of related traffic information and packet when there occurs DDoS attack with worm/virus. And through experiment I compared and analyzed traffic loading improvement for general network equipment.

A Study on Fake Data Filtering Method of CCN (콘텐츠 중심 네트워킹 환경에서의 Fake Data Filtering Method 연구)

  • Kim, DaeYoub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.155-163
    • /
    • 2014
  • To enhance network efficiency, content-centric networking (CCN) proposes that intermediated network nodes on a content-delivery path temporally cache transmitted contents. Then if an intermediated node receives a content request message (Interest) for previously cached content, the node directly transmits the cached content as a response message (Data) to requestors and finishes the transmission of the received Interest. Since Interest is performed by intermediated network nodes, it is possible to efficiently transmit contents and to effectively solve a network congestion problem caused around contents sources. For that, CCN utilizes both content store to temporarily cache content and pending Interest table (PIT) to record Interest incoming Face. However, it has mentioned the possibility of denial service attack using both the limitation of PIT resource and fake Interests. In this paper, we briefly describe the presented PIT flooding attack utilizing fake Interest. Then we introduce new attack possibility using fake Data and propose a countermeasure for the proposed attack. Also we evaluate the performance of our proposal.

Design of A One-time Password Generator on A Mobile Phone Providing An Additional Authentication for A Particular Transaction (특정 트랜잭션용 추가 인증을 제공하는 휴대폰 상의 일회용 암호 생성기 설계)

  • Park, Jun-Cheol
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.6
    • /
    • pp.552-557
    • /
    • 2009
  • One-time passwords are used just once and discarded, which makes it more secure than the repeatedly used conventional passwords. This paper proposes a challenge-response based one-time password generator on a user's mobile phone always carried with the user. The generator can provide an additional authentication for a user to issue a money transfer request within his Internet banking session on a PC. A currently used device for Internet banking generates a password that changes every 30 seconds or so, which allows a man-in-the-middle to use it for stealing money within the 30 seconds. Unlike such a device, the proposed generator resists against the man-in-the-middle attack by a novel challenge-response scheme, provides better accessability and protection against stolen devices. As the currently used devices do, it prevents any unauthorized transfer even if the victim's all other credentials are revealed through his PC infected with spyware such as a keyboard logger.