• 제목/요약/키워드: DoS 공격

Search Result 359, Processing Time 0.026 seconds

The Taxonomy Criteria of DoS Attack Pattern for Enhanced Intrusion Detection System (향상된 침입 탐지 시스템을 위한 DoS 공격 유형의 분류 체계)

  • Kim, Kwang-Deuk;Park, Seung-Kyun;Lee, Tae-Hoon;Lee, Sang-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.12
    • /
    • pp.3606-3612
    • /
    • 1999
  • System(IDS) hasn't Protection capability for various security attacks perfectly. Because, It is probably affected by IDS's workload caused by treating all kind of the characteristics and attack patterns of system and can't probe all of the attack types being intelligently different with attack patterns. In this paper, we propose a new taxonomy criteria about DoS(denial of service attacks) to make more efficient and new real time probing system. It's started with an idea that most of the goal oriented systems make the state of system operation more unambiguous than general purpose system. A new event caused the state of the system operation to change and classifying a category of the new events may contribute to design the IDS.

  • PDF

An analysis and design on the security node for guaranteeing availability against network based DoS (네트워크 기반 서비스 거부 공격에 대응한 가용성 유지를 위한 보안 노드 분석 및 설계)

  • 백남균;김지훈;신화종;이완석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.4C
    • /
    • pp.550-558
    • /
    • 2004
  • In order to design network node for guaranteeing availability against network based DoS attack, some restrictions such as the relationship analysis on upper and lower layer bandwidth, buffer capacity, attack resources, a number of attack session and loss probability are analyzed. And then, to make good use of network resource, the relationship between required resources for satisfying loss probability and cost is discussed. The results of this study are expected to be applied to the effective security node design against network DoS.

Detection Mechanism of Attacking Web Service DoS using Self-Organizing Map (SOM(Self-Organizing Map)을 이용한 대용량 웹 서비스 DoS 공격 탐지 기법)

  • Lee, Hyung-Woo;Seo, Jong-Won
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.5
    • /
    • pp.9-18
    • /
    • 2008
  • Web-services have originally been devised to share information as open services. In connection with it, hacking incidents have surged. Currently, Web-log analysis plays a crucial clue role in detecting Web-hacking. A growing number of cases are really related to perceiving and improving the weakness of Web-services based on Web-log analysis. Such as this, Web-log analysis plays a central role in finding out problems that Web has. Hence, Our research thesis suggests Web-DoS-hacking detective technique In the process of detecting such problems through SOM algorithm, the emergence frequency of BMU(Best Matching Unit) was studied, assuming the unit with the highest emergence frequency, as abnormal, and the problem- detection technique was recommended through the comparison of what's called BMU as input data.

A study on the detection of DDoS attack using the IP Spoofing (IP 스푸핑을 통한 DDoS 공격 탐지 방안에 대한 연구)

  • Seo, Jung-Woo;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.147-153
    • /
    • 2015
  • Since the DoS(Denial of Service) attack is still an important vulnerable element in many web service sites, sites including public institution should try their best in constructing defensive systems. Recently, DDoS(Distributed Denial of Service) has been raised by prompting mass network traffic that uses NTP's monlist function or DoS attack has been made related to the DNS infrastructure which is impossible for direct defense. For instance, in June 2013, there has been an outbreak of an infringement accident where Computing and Information Agency was the target. There was a DNS application DoS attack which made the public institution's Information System impossible to run its normal services. Like this, since there is a high possibility in having an extensive damage due to the characteristics of DDoS in attacking unspecific information service and not being limited to a particular information system, efforts have to be made in order to minimize cyber threats. This thesis proposes a method for using TTL (Time To Live) value in IP header to detect DDoS attack with IP spoofing, which occurs when data is transmitted under the agreed regulation between the international and domestic information system.

유비쿼터스 네트워크에서 서비스 거부(Denial of Service) 공격의 특성 및 위험성 분석

  • 이병주;홍순좌;이승형
    • Review of KIISC
    • /
    • v.14 no.1
    • /
    • pp.35-45
    • /
    • 2004
  • 미래 유비쿼터스 컴퓨팅 환경의 네트워크 인프라 구축을 위한 핵심기술은 무선 ad hoc 네트워크이다. 이러한 ad hoc 네트워크에 대한 보안은 일반 네트워크와 마찬가지로 보안성, 무결성, 가용성 등이 요구되지만. 일반적으로 무선네트워크라는 점, 고정 인프라가 없다는 점, 네트워크 토폴로지가 수시로 변한다는 점 등 때문에 보안문제는 훨씬 어려운 것으로 인식되고 있다. 본 논문에서는 보안 요구사항 중에서 가용성에 중점을 두어, 일반 네트워크와는 다른 유비쿼터스 네트워크에서의 DoS 공격의 여러 가지 유형을 분석한다. 또한 이러한 DoS 공격이 유비쿼터스 네트워크에 미치는 영향을 컴퓨터 시뮬레이션을 통해 전송성능과 생존성의 측면에서 분석한다. 본 논문의 실험결과는 같은 유형의 DoS 공격이더라도 무선 ad hoc 네트워크가 일반적인 네트워크에 비해 더 심각한 피해를 당할 수 있음을 보여준다.

자율주행자동차 V2V 통신환경에서의 DoS 공격 및 대응기술 동향 연구

  • Lee, Sung-young;Kim, Ji-min;Ji, Cheong-min;Hong, Man-pyo
    • Review of KIISC
    • /
    • v.30 no.2
    • /
    • pp.41-48
    • /
    • 2020
  • 최근 자율주행 자동차의 발전은 자동차제조업체뿐만 아니라 ICT 기업도 참여하면서 매우 빠르게 발전하고 있다. 자율주행기술이 발달함에 따라 외부와의 통신을 통해 더욱 안전한 자율주행이 가능할 것이다. 하지만 외부와의 연결은 외부 IT 시스템의 위협이 차량 내부에 영향을 미치게 될 수 있고 이는 인명피해로 이어질 수 있다. 자율주행자동차의 통신은 실시간으로 다양한 메시지를 처리해야 하기 때문에 가용성이 매우 중요하다. 기존 IT 시스템에 존재하는 가용성을 위협하는 공격은 대표적으로 DoS 공격이 있다. 본 논문에서는 자율주행자동차 V2V 통신을 위해 사용되는 프로토콜을 살펴보고 발생할 수 있는 DoS 공격유형과 현재 연구되고 있는 대응기술에 대한 동향을 소개한다.

Attack Origin Traceback with Advanced Packet Making Mechanism on Ad-Hoc Network (Ad-Hoc 네트웨크에서의 패킷 마킹 기법을 이용한 공격 근원지 역추적 기법)

  • 김길한;이형우
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2004.05a
    • /
    • pp.21-24
    • /
    • 2004
  • Ad Hoc 네트워크는 이동 노드만으로 구성된 자율/수평적 네트워크로서, 이동 노드는 중재자의 도움 없이 능동적인 연결 선정을 통해 무선 네트워크 환경을 제공한다. 이와 같은 Ad Hoc 네트워크에서도 일반적인 유선 기반 네트워크와 동일하게 서비스 거부 공격(DoS)이 가능하다. DDoS은 해킹 공격자가 공격 근원지 IP 주소를 스누핑하여 공격목표로 하는 시스템의 가용자원을 고갈시키거나 과도한 부하를 유발시켜 서비스를 중단시킨다. 이에 대한 대응 기술로 제시된 IP 역추적 기술은 DDoS 공격의 근원지를 판별하고 공격 패킷이 네트워크 상에서 전달된 경로를 재구성하는 기법이다 본 연구에서는 기존의 역추적 기술인 패킷 마킹 기법에서 DDoS 공격에 대한 판별 과정 없이 임의의 패킷에 대해 역추적 정보를 생성 즉 DDoS 공격에 능동적으로 대응하고 있지 못하는 단점에 착안하여 DDoS 공격 패킷에 대해 개선된 패킷 마킹 기법을 제시하고, 또한 TTL을 통하석 스누핑된 IP 근원지를 효율적으로 역추적하는 방안을 제시하였으며. 실험 결과 네트워크 부하를 줄이면서도 역추적 성능을 향상시킬 수 있었다.

  • PDF

Detecting Jamming Attacks in MANET (MANET에서의 전파방해 공격 탐지)

  • Shrestha, Rakesh;Lee, Sang-Duk;Choi, Dong-You;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.3
    • /
    • pp.482-488
    • /
    • 2009
  • Mobile Ad-hoc Networks provide communication without a centralized infrastructure, which makes them suitable for communication in disaster areas or when quick deployment is needed. On the other hand, they are susceptible to malicious exploitation and have to face different challenges at different layers due to its open Ad-hoc network structure which lacks previous security measures. Denial of service (DoS) attack is one that interferes with the radio transmission channel causing a jamming attack. In this kind of attack, an attacker emits a signal that interrupts the energy of the packets causing many errors in the packet currently being transmitted. In harsh environments where there is constant traffic, a jamming attack causes serious problems; therefore measures to prevent these types of attacks are required. The objective of this paper is to carry out the simulation of the jamming attack on the nodes and determine the DoS attacks in OPNET so as to obtain better results. We have used effective anomaly detection system to detect the malicious behaviour of the jammer node and analyzed the results that deny channel access by jamming in the mobile Ad-hoc networks.

Structural vulnerability analysis and improvement of a biometrics-based remote user authentication scheme of Li and Hwang's (Li & Hwang's 생체기반 인증스킴에 대한 취약성 분석 및 개선)

  • Shin, Kwang-Cheul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.7
    • /
    • pp.107-115
    • /
    • 2012
  • Recently, Li and Hwang scheme proposed a biometrics-based remote user authentication scheme using smart card. It is asserted that this scheme has very excellent benefits by the operation cost efficiency based on the smart card, one-way function and biometrics using random numbers. But this scheme cannot provide the properly authentication, especially, it is analyzed as the vulnerable security scheme for Denial-of-Service(DoS) attacks by impersonate attacks. The attacker controls the insecure channel, they can easily fabricate messages to pass the user's or server's authentication, and the malicious attacker can impersonate the user to cheat the server and can impersonate the server to cheat the user without knowing any secret information. This paper proposes the strong improved scheme which can respond to multiple attacks by supplementing the function of integrity check from the server which applied variable authenticator and OSPA without exposing the user's password information. It is supplemented pregnable of disguise attack and mutual authentication of Li and Hwang scheme.

Machine Learning-based Detection of DoS and DRDoS Attacks in IoT Networks

  • Yeo, Seung-Yeon;Jo, So-Young;Kim, Jiyeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.7
    • /
    • pp.101-108
    • /
    • 2022
  • We propose an intrusion detection model that detects denial-of-service(DoS) and distributed reflection denial-of-service(DRDoS) attacks, based on the empirical data of each internet of things(IoT) device by training system and network metrics that can be commonly collected from various IoT devices. First, we collect 37 system and network metrics from each IoT device considering IoT attack scenarios; further, we train them using six types of machine learning models to identify the most effective machine learning models as well as important metrics in detecting and distinguishing IoT attacks. Our experimental results show that the Random Forest model has the best performance with accuracy of over 96%, followed by the K-Nearest Neighbor model and Decision Tree model. Of the 37 metrics, we identified five types of CPU, memory, and network metrics that best imply the characteristics of the attacks in all the experimental scenarios. Furthermore, we found out that packets with higher transmission speeds than larger size packets represent the characteristics of DoS and DRDoS attacks more clearly in IoT networks.