• Title/Summary/Keyword: Hijacking

Search Result 73, Processing Time 0.026 seconds

A Study on Online Fraud and Abusing Detection Technology Using Web-Based Device Fingerprinting (웹 기반 디바이스 핑거프린팅을 이용한 온라인사기 및 어뷰징 탐지기술에 관한 연구)

  • Jang, Seok-eun;Park, Soon-tai;Lee, Sang-joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1179-1195
    • /
    • 2018
  • Recently, a variety of attacks on web services have been occurring through a multiple access environment such as PC, tablet, and smartphone. These attacks are causing various subsequent damages such as online fraud transactions, takeovers and theft of accounts, fraudulent logins, and information leakage through web service vulnerabilities. Creating a new fake account for Fraud attacks, hijacking accounts, and bypassing IP while using other usernames or email addresses is a relatively easy attack method, but it is not easy to detect and block these attacks. In this paper, we have studied a method to detect online fraud transaction and obsession by identifying and managing devices accessing web service using web-based device fingerprinting. In particular, it has been proposed to identify devices and to manage them by scoring process. In order to secure the validity of the proposed scheme, we analyzed the application cases and proved that they can effectively defend against various attacks because they actively cope with online fraud and obtain visibility of user accounts.

Future Warfare for Hyper Connected Era (초 연결시대의 미래전 양상)

  • Lee, Chang-In;Jung, Min-Sub;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.3
    • /
    • pp.99-103
    • /
    • 2020
  • The warfare caused a dramatic change when new technology was introduced to the battlefield or when the technology was matured to change the concept of operation. Thus, the rapid development of science since the 19th century is also rapidly changing the aspect and speed of war, and the recent speed of change is making it more difficult to predict future warfare than in the past In particular, in the past, it was difficult to predict the future warfare based on the latest science and technology, because it was difficult to spread and seize advanced science and technology. But global human exchange, technology hijacking by internet, and developing of asymmetric skills and methods caused more complex to technology based warfare prediction. In other words, the nature and principles of war, together with the development of science and technology, should be considered togther to predict future warfare. Therefore this study is based on the thory and principles of war and the latest science and technology to predict the future warfare situation that the military will face.

Implementation of User Connection Prevention System through LAN Monitoring from Internet Harmful Site (LAN 모니터링을 통한 인터넷 유해 사이트의 사용자 접속 방지 시스템 개발)

  • Park, Hyoung-Bae;Chung, Joong-Soo
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.8
    • /
    • pp.1-7
    • /
    • 1999
  • The Internet is emerging as a powerful tool in the area of information and communication technology. The WWW has been especially contributed to increase the internet demand because of its browser which has "Graphic User Interface". Nowadays number of hosts that supply harmful information such as pornographic materials, and the infringement of human rights is rapidly increased. Access to such materials is very easy. Therefore security system which will protect young users from access to harmful host is needed. This paper presents implementation of user system has database about harmful hosts at the Internet and monitors that the user traffic over LAM get touch with the hosts. The system can not make the user access the harmful host because it can over LAN. The performance analysis on the developed system monitoring the traffic over LAN of Andong university is carried out. The performance analysis of monitoring results satisfies with preventing users from the connection to the internet harmful sites.

  • PDF

Wireless LAN System based on IEEE 802.1x EAP-TLS Authentication Mechanism (IEEE 802.1x EAP-TLS 인증 메커니즘 기반 Wireless LAN 시스템)

  • Hong, Seong-Pyo;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.9
    • /
    • pp.1983-1989
    • /
    • 2012
  • The IEEE 802.1x standard provides an architectural framework which can be used various authentication methods. But, IEEE 802.1x also has vulnerabilities about the DoS(Denial of Service), the session hijacking and the MiM(Man in the Middle) attack due to caused by structural of authentication protocol. In this paper, we propose a WLAN system which can offer safety communication by complement of IEEE 802.1x vulnerabilities. The WLAN system accomplishes mutual authentications between authentication servers, clients and the AP using PKI and prevents an illegal user from intervening in communication to disguise oneself as a client, the AP or authentication servers. Also, we guarantee the safety of the communication by the Dynamic WEP key distribution between clients and the AP.

Piracy: Its Nature, Development and Countermeasures (해적행위의 본질, 발생현황 및 조직.기술적 대응 방안에 관한 연구)

  • 최진태
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.4 no.2
    • /
    • pp.69-83
    • /
    • 1998
  • Sea transportation has long been a vital component of the transport systems of the world. The great majority of imports and exports to and enlarge their national merchant marines. This effort is meant partly to arrest earlier trends of having their trade carried by ships from outside the region and partly to promote regional integration and improve the national balance of payments. However, sea transportation has been exposed to various types of threats on the high seas, in coastal waters and in port areas. Piracy is any robbery or other violent action, for private ends and without authorization by public authority, committed on the seas. Because piracy has been regarded as an offense against the law of nations, the public vessels of any state have been permitted to seize a pirate ship, to bring it into port, to try the crew(regardless of their nationality or domicile), and, if found guilty, to punish them and to confiscate the ship. Piracy has occurred in all stages of maritime history. The increased size of merchant vessels, the improved naval patrolling of most ocean highways, the regular administration of most islands and land areas of the world, and the general recognition by governments of piracy as an international offense resulted in a great decline in piracy in the 19th and 20th centuries. Piracy has, however, occurred in the 20th century, and the practice of hijacking ships has developed into a new form of piracy. The number of incidents of sea piracy against ships reported was 229 in 1997. Since 1991, 1,051 such acts have been reported. The purpose of this research is to examine the origin and development of the piracy to understand the current situation of such violence on the seas. In addition, what should be done by international community will be presented to prevent the piracy in the future.

  • PDF

Performance Analysis of SDR Communication System Based on MTD Technology (MTD 기법이 적용된 SDR 통신 시스템의 성능 분석)

  • Ki, Jang-Geun;Lee, Kyu-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.2
    • /
    • pp.51-56
    • /
    • 2017
  • With the rapid increase in the number of mobile terminals, demand for wireless technologies has sharply increased these days. While wireless communication provides advantages such as ease of deployment, mobility of terminals, continuity of session, and almost comparable transmission bandwidth to the wired communication, it has vulnerability to malicious radio attacks such as eavesdropping, denial of service, session hijacking, and jamming. Among a variety of methods of preventing wireless attacks, the MTD(Moving Target Defense) is the technique for improving the security capability of the defense system by constantly changing the ability of the system to be attacked. In this paper, in order to develop a resilient software defined radio communication testbed system, we present a novel MTD approach to change dynamically and randomly the radio parameters such as modulation scheme, operating frequency, packet size. The probability of successful attack on the developed MTD-based SDR communication system has been analysed in a mathematical way and verified through simulation.

Hijacking Attack using Wireless Network Security Vulnerability in Drone and Its Countermeasure (드론의 무선 네트워크 보안 취약점을 이용한 탈취 및 대응)

  • Son, Juhwan;Sim, Jaebum;Lee, Jae-Gu;Cheong, Il-Ahn
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.327-330
    • /
    • 2017
  • In recent years, Drone(lightweight unmanned aerial vehicle) is used for broadcast shooting, disaster scene, leisure, observation and military purposes. However, as the use of drones increases the threat of hacking is also rising. Especially when a flying drone is seized, a dangerous situation can occur which is abused regardless of the driver's intention. Already in Iran and China, there is a case of hacking and stealing the drones of other countries under reconnaissance. In this paper, we analyze the security vulnerabilities of Wi-Fi and Bluetooth communication in wireless network which are used in drones for stealing the commercial drones. The results provide a countermeasure to safeguard the drones against attempts by the unauthorized attacker to take out the drones.

  • PDF

A Study on Change of Aviation Law and System to Aviation Security for Major Countries after 9. 11 Aviation Terror (주요국가의 항공보안 관련 법 및 제도의 변화 연구)

  • Lee, Kang-Seok
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.21 no.2
    • /
    • pp.123-155
    • /
    • 2006
  • 2001. 9. 11 aviation terror showed us that there are lots of problems in aviation security and we need efficient counter-plans. According to this event, many countries are coming up with various countermeasures. After first hijacking in 1950, the aviation terror is occurring with more various methods until these days. And the scale is bigger than former so they're making much bigger damages. Especially, the case of 9.11 terror attracted people's eye of the world because of enormous casualties and damages. It aroused many people's self-awakening therefore as an important factor the security is given much weight in the aviation safety. In order to keep the step like this tendency and the development of aviation security, beginning with America lots of countries of the world are pursuing diverse aviation security's counter-plans of new side. At this point of time, for our development in aviation industry we should make efficient aviation security countermeasures. In this study, We compared our aviation security activities with major countries after 9.11 terror.

  • PDF

Aircraft Crime and the Damage Relief (항공 범죄와 그 피해구제)

  • Kim, Sun-Ihee;Ahn, Jin-Young
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.24 no.1
    • /
    • pp.3-35
    • /
    • 2009
  • A concept of Aircraft crime includes an Air range, unlawful seizure of aircraft and unlawful acts against the safety of civil aviation. There are international treaties and conventions which have mainly been enacted by ICAO. The following treaties and conventions are categorical and unconditional norms that any States are clearly condemned. Convention on Offences and Certain other Acts Committed on Board Aircraft, Convention for the Suppression of Unlawful Seizure of Aircraft, Convention for the suppression of unlawful acts against the safety of civil aviation, Protocol for the Suppression of Unlawful Acts of Violence at Airports Serving International Civil Aviation, Convention on the Marking of Plastic Explosives for the Purpose of Detection In this essay, I present the meaning of the aircraft crime mentioned on the treaties above and jurisdiction of the crime. Moreover, I explain how to demand reparation for damages onboard or on the surface when an aircraft crime is occurred. Lastly, I indicate legal bases of how to protect the victims of the aircraft crime by mentioning specific cases relating to the crime.

  • PDF

A Study on Robust Authentication and Privacy in Wireless LAN (무선랜 환경에서 사용자 인증 및 기밀성 강화 방안에 관한 연구)

  • Hong Seong-pyo;Lee Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.8
    • /
    • pp.1768-1773
    • /
    • 2005
  • The IEEE 802.1x standard provides an architectural framework which can be used various authentication methods. But, IEEE 802.1x also has vulnerabilities about the DoS, the session hijacking and the Man in the Middle attack due to the absence of AP authentication. In this paper, we propose a WLAN secure system which can offer a robust secure communication and a user authentications with the IEEE 802.1x framework. The user authentication on the WLAN secure system accomplishes mutual authentications between authentication severs, clients and the AP using PKI and prevents an illegal user from intervening in communication to disguise oneself as a client, the AP or authentication servers. Also, we guarantee the safety of the communication by doing secure communication between clients and the AP by the Dynamic WEP key distribution.