• Title/Summary/Keyword: DoS detection

Search Result 540, Processing Time 0.026 seconds

Marking Algorithm based Attack Origin Detection in IP Traceback (Marking Algorithm 기반 IP 역추적의 공격 진원지 발견 기법)

  • 김수덕;김기창;김범룡
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.814-816
    • /
    • 2002
  • 최근 급증하고 있는 인터넷 사용자들을 위한 인터 서비스 업체들의 증가와 더불어 악의적인 공격자의공격 또한 증가하고 있다. 이러한 공격으로 인한 인터넷 업체들에게 치명적일 수 있는 신용에 대한 불신임과 서비스의 불안정이라는 피해는 기업의 이미지를 실추시키는 등 막대한 영향을 끼칠 수도 있다. 이러한 악의적인 공격 형태 중 가장 최근 가장 빈번하게 그리고 큰 피해를 주는 공격형태가 DoS(Denial-of-Service)[1]공격이다. 그러나 DoS공격에 대한 적당한 대응방법이 아직까지 미비한 상태이고, 공격에 대응하여 방어한다고 해도 그 진원지를 찾아내지 못한다면 추후 동일한 공격자(attack)에 의해 재차 공격을 받을 가능성을 배제할 수 없는 실정이다. 이에 본 논문은 DoS공격에 대한 적당한 대응하는 하나의 방법으로 공격 경로(attack path)를 찾아내고 더 나아가 공격 진원지(attack origin)의 MAC address를 알아냄으로써 공격의 진원지를 찾아내는 방법을 제안한다.

  • PDF

An Attack-based Filtering Scheme for Slow Rate Denial-of-Service Attack Detection in Cloud Environment

  • Gutierrez, Janitza Nicole Punto;Lee, Kilhung
    • Journal of Multimedia Information System
    • /
    • v.7 no.2
    • /
    • pp.125-136
    • /
    • 2020
  • Nowadays, cloud computing is becoming more popular among companies. However, the characteristics of cloud computing such as a virtualized environment, constantly changing, possible to modify easily and multi-tenancy with a distributed nature, it is difficult to perform attack detection with traditional tools. This work proposes a solution which aims to collect traffic packets data by using Flume and filter them with Spark Streaming so it is possible to only consider suspicious data related to HTTP Slow Rate Denial-of-Service attacks and reduce the data that will be stored in Hadoop Distributed File System for analysis with the FP-Growth algorithm. With the proposed system, we also aim to address the difficulties in attack detection in cloud environment, facilitating the data collection, reducing detection time and enabling an almost real-time attack detection.

A Study on the Design for Lightning Detection System of AOA methods for 3D Lightning Detection (낙뢰의 3차원 관측 위한 AOA 방식 낙뢰감지기 설계에 관한 연구)

  • Woo, J.W.;Kwak, J.S.;Moon, J.D.;Kawasaki, Zenichiro
    • The Transactions of the Korean Institute of Electrical Engineers C
    • /
    • v.55 no.11
    • /
    • pp.527-531
    • /
    • 2006
  • Since 1996, KEPCO has been operating a wide range lightning detection system, LPATS, and been accumulating relative application techniques and statistical analysis skills. So, KEPRI already has its own basis to develope more accurate advanced detection technology and references to do comparative study. For three-dimensional imaging of lightning channels, UHF/VHF antenna systems were installed at 2 sites. The distance between two sites is about 30 km. These systems were used the AOA(Angle of Arrival) methods for lightning detection. In this paper, we would like to introduce about our system and its results.

Observer Design for H- Fault Detection of Large Scale T-S Fuzzy Systems (대규모 T-S 퍼지 시스템의 H- 고장검출을 위한 관측기 설계)

  • Jee, Sung-Chul;Lee, Ho-Jae;Joo, Young-Hoon;Kim, Do-Wan
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.1
    • /
    • pp.15-20
    • /
    • 2010
  • In this paper, we discuss a decentralized observer design problem for the fault detection in the large-scale continuous-time T-S (Takagi-Sugeno) fuzzy system. Since the fault detection residual is desired to be as sensitive as possible, on the fault, we use $\mathfrak{H}_-$ index performance criterion. Sufficient conditions for the existence of such a observer is presented in terms of linear matrix inequalities. Simulation results show the effectiveness of the proposed method.

Design and Implementation of IDS based on Misuse Detection Models (오용탐지모델 기반의 침입 탐지시스템 설계 및 구현)

  • 강진수;김남진;김창수
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.05d
    • /
    • pp.930-935
    • /
    • 2002
  • 본 논문은 불법 침입 탐지를 위한 정보시스템 구축에 있어 많은 연구가 진행되고 있는 침입 탐지 시스템(IDS: Intrusion Detection System)중 네트워크 기반의 오용(Misuse) 탐지 모델을 이용하여 침입 탐지 시스템을 설계 및 구현하였다. 구현된 침입 탐지 시스템은 K4 인증 기준을 모델로 삼았으며, 탐지하는 시그너쳐의 분류상 Content, DoS, Probing을 대상으로 설계되었으며, 원격으로 시스템의 관리와 감독이 가능하도록 구현하였다.

  • PDF

A Detection of DDoS Attack using Pattern Matching Method (패턴 매칭 기법을 적용한 DDoS 공격 탐지)

  • Kim Sun-Young;Oh Chang-Suk
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.11a
    • /
    • pp.189-194
    • /
    • 2005
  • Present hacking technology is undergone a change on the distributed DoS Attack which cause a lot of traffic to the network or single host. In this paper, with giving mobility to the mean deviation per protocol and it's field, and with adapting pattern matching approach to DDoS attack detection technique, we propose a method to detect the DDoS attack, to have less misdetection and to detect these attacks correctly.

  • PDF

A Collision detection from division space for performance improvement of MMORPG game engine (MMORPG 게임엔진의 성능개선을 위한 분할공간에서의 충돌검출)

  • Lee, Sung-Ug
    • The KIPS Transactions:PartB
    • /
    • v.10B no.5
    • /
    • pp.567-574
    • /
    • 2003
  • Application field of third dimension graphic is becoming diversification by the fast development of hardware recently. Various theory of details technology necessary to design game such as 3D MMORPG (Massive Multi-play Online Role Flaying Game) that do with third dimension. Cyber city should be absorbed. It is the detection speed that this treatise is necessary in game engine design. 3D MMORPG game engine has much factor that influence to speed as well as rendering processing because it express huge third dimension city´s grate many building and individual fast effectively by real time. This treatise nay get concept about the collision in 3D MMORPG and detection speed elevation of game engine through improved detection method. Space division is need to process fast dynamically wide outside that is 3D MMORPG´s main detection target. 3D is constructed with tree construct individual that need collision using processing geometry dataset that is given through new graph. We may search individual that need in collision detection and improve the collision detection speed as using hierarchical bounding box that use it with detection volume. Octree that will use by division octree is used mainly to express rightly static object but this paper use limited OSP by limited space division structure to use this in dynamic environment. Limited OSP space use limited space with method that divide square to classify typically complicated 3D space´s object. Through this detection, this paper propose follow contents, first, this detection may judge collision detection at early time without doing all polygon´s collision examination. Second, this paper may improve detection efficiency of game engine through and then reduce detection time because detection time of bounding box´s collision detection.

Denial of Service Attack Detection in Zigbee Home Network (Zigbee 홈 네트워크에서의 DoS를 이용한 인증정보위조공격 탐지)

  • Jeon Hyo-Jin;Kim Dong-Kyoo;Lim Jae-Sung;Jeon Sang-Kyoo;Yang Sung-Hyun
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.419-422
    • /
    • 2006
  • Zigbee 홈 센서네트워크에서의 보안은 최근 떠오르는 중요한 문제 중 하나이다. 네트워크에 침입하거나 기능을 마비시키기 위해 여러 가지 공격방법들이 사용되고 있으며, 기 중 정상 노드로의 DoS(Denial of Service)공격은 네트워크에서 사용 중인 주파수를 알고 있다면 쉽게 수행될 수 있고 그 후 무력화된 노드의 인증정보를 이용해서 더 큰 문제를 발생시킬 수 있다. 본 논문에서는 zigbee 노드에 대한 DoS 공격과 인증정보위조 공격을 효율적으로 탐지해 낼 수 있는 방식을 제안한다.

  • PDF

Traffic Flooding Attack Detection using SNMP MIB (SNMP MIB 기반 트래픽 폭주공격 탐지)

  • Park, Jun-Sang;Park, Dai-Hee;Kim, Myung-Sup
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.935-938
    • /
    • 2008
  • DoS/DDoS 공격과 웜 공격으로 대표되는 트래픽 폭주 공격은 그 특성상 사전 차단이 어렵기 때문에 빠르고 정확한 탐지는 공격 탐지 시스템이 갖추어야 할 필수요건이다. 기존의 SNMP MIB 기반 트래픽 폭주공격 탐지 방법은 1 분 이상의 탐지 시간을 요구하였다. 본 논문은 SNMP MIB 객체의 상관 관계를 이용한 빠른 트래픽 폭주 공격 탐지 알고리즘을 제안한다. 또한 빠른 탐지 시간으로 발생되는 시스템의 부하와 탐지 트래픽을 최소화하는 방안도 함께 제시한다. 공격 탐지 방법은 3 단계로 구성되는데, 1 단계에서는 MIB 정보의 갱신주기를 바탕으로 탐지 시점을 결정하고, 2 단계에서는 MIB 정보간의 상관 관계를 이용하여 공격의 징후를 판단하고, 3 단계에서는 프로토콜 별 상세 분석을 통하여 공격 탐지뿐만 아니라 공격 유형까지 판단한다. 따라서 빠르고 정확하게 공격을 탐지할 수 있고, 공격 유형을 분류해 낼 수 있어 신속한 대처가 가능해 질 수있다.

A method for concrete crack detection using U-Net based image inpainting technique

  • Kim, Su-Min;Sohn, Jung-Mo;Kim, Do-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.10
    • /
    • pp.35-42
    • /
    • 2020
  • In this study, we propose a crack detection method using limited data with a U-Net based image inpainting technique that is a modified unsupervised anomaly detection method. Concrete cracking occurs due to a variety of causes and is a factor that can cause serious damage to the structure in the long term. In general, crack investigation uses an inspector's visual inspection on the concrete surfaces, which is less objective in judgment and has a high possibility of human error. Therefore, a method with objective and accurate image analysis processing is required. In recent years, the methods using deep learning have been studied to detect cracks quickly and accurately. However, when the amount of crack data on the building or infrastructure to be inspected is small, existing crack detection models using it often show a limited performance. Therefore, in this study, an unsupervised anomaly detection method was used to augment the data on the object to be inspected, and as a result of learning using the data, we confirmed the performance of 98.78% of accuracy and 82.67% of harmonic average (F1_Score).