• Title/Summary/Keyword: IP Security

Search Result 742, Processing Time 0.029 seconds

An Analysis on Security Attacks and Their Response Methods on Transferring into IPv6 (IPv6 전환 과정의 보안위협 분석 및 대응방안)

  • Kim, Sang-Soo;Cho, Gi-Hwan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.949-952
    • /
    • 2011
  • 현재 IPv4 에서 IPv6 로의 전환은 매우 시급한 상태이다. 하지만 IPv6 로의 전환에 앞서 IPv4 에서 제기되었던 많은 보안 문제점이 IPv6 로의 전환에 걸림돌이 되고 있다. 차세대 인터넷 구축에 반드시 필요한 IPv6로의 변환 과정에 있어, 기존의 IPv4 와 IPv6 의 서로 다른 방식으로 인한 이질성으로 예상치 못한 보안상 문제점들이 드러나고 있다. 본 논문에서는 IPv4 에서 IPv6 로 전환 시 발생할 수 있는 보안상 위협에 대해서 분석한다. 또한 터널링 방법에서의 패킷 헤더 변조 공격을 방지하기 위해 패킷 무결성 검증에 의한 패킷 필터링 방법과 IPv4 주소 할당 방법에 있어 주소 할당 서버의 IP pool 주소 고갈 공격 문제를 해결하기 위한 방안을 제시 하였다.

Server security system using active Internet address self-mutation and OTP (능동형 인터넷 주소 자가변이와 OTP 를 활용한 서버 보안 시스템)

  • Ko, Hyug-Jun;Han, Seong-Soo;Jeong, Chang-Sung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.431-433
    • /
    • 2020
  • 4 차 산업혁명의 시대를 맞아 사물인터넷 및 5G 를 활용한 수많은 사물들이 인터넷을 기반으로 연결되고 있다. 또한 이러한 사물들을 관제 및 유지 보수하기 위해서 장비들에 보안 관제 시스템을 구축하고 모니터링을 하기 위한 많은 비용과 관리의 어려움을 겪고 있다. 만약, 장비들이 스스로 능동적인 방어를 하게 된다면 유지관리의 가장 큰 문제가 해결될 것이다. 이러한 능동적인 보안을 통해 보호대상 시스템의 다양한 특징들을 시간의 변화에 따라 역동적으로 변경하는 MTD(Moving Target Defense)기법들이 개발되고 있다. 본 논문에서는 네트워크 기반의 NMTD(Network-based MTD)를 이용하여 호스트 서버에 IP 와 PORT 로 접속하는 SSH 에 적용하여 능동적으로 보호하고, OTP 를 활용하여 사용자 식별을 통해 SSH 에 대한 내부자 접속에 대한 보안을 강화하는 시스템을 설계 및 구현하였다.

A RealTime DNS Query Analysis System based On the Web (웹 기반 실시간 DNS 질의 분석 시스템)

  • Jang, Sang-Dong
    • Journal of Digital Convergence
    • /
    • v.13 no.10
    • /
    • pp.279-285
    • /
    • 2015
  • In this paper, we present the design and implementation of a realtime DNS Query Analysis System to detect and to protect from DNS attacks. The proposed system uses mirroring to collect data in DMZ, then analizes the collected data. As a result of the analysis, if the proposed system finds attack information, the information is used as a filtering information of firewall. statistic of the collected data is viewed as a realtime monitoring information on the web. To verify the effictiveness of the proposed system, we have built the proposed system and conducted some experiments. As the result, Our proposed system can be used effectively to defend DNS spoofing, DNS flooding attack, DNS amplification attack, can prevent interior network's attackers from attacking and provides realtime DNS query statistic information and geographic information for monitoring DNS query using GeoIP API and Google API. It can be useful information for ICT convergence and the future work.

Attack Scenarios and Countermeasures using CoAP in IoT Environment (IoT기기에서 SSDP 증폭 공격을 이용한 공격기법 및 대응 방안)

  • Oh, Ju-Hye;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.4
    • /
    • pp.33-38
    • /
    • 2016
  • DDoS attack has been continuously utilized that caused the excessively large amount of traffic that network bandwidth or server was unable to deal with paralyzing the service. Most of the people regard NTP as the biggest cause of DDoS. However, according to recently executed DDoS attack, there have been many SSDP attack in the use of amplified technique. According to characteristics of SSDP, there is no connection for making a forgery of source IP address and amplified resources feasible. Therefore, it is frequently used for attack. Especially, as it is mostly used as a protocol for causing DDoS attack on IoT devices that constitute smart home including a wireless router, media server, webcam, smart TV, and network printer. Hereupon, it is anticipated for servers of attacks to gradually increase. This might cause a serious threat to major information of human lives, major government bodies, and company system as well as on IoT devices. This study is intended to identify DDoS attack techniques in the use of weakness of SSDP protocol occurring in IoT devices and attacking scenario and counter-measures on them.

International Benchmarking on Factors Affecting the Number of Country Domain Name (국가도메인 네임 등록 수에 영향을 미치는 요인에 관한 국제 비교)

  • Kim, So-ra;Jun, Hyo-Jung;Kim, Tae-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.12
    • /
    • pp.2434-2442
    • /
    • 2015
  • With the arrival of the era of the Internet of Things (IoT), identification of an individual object is gaining significance. Internet address resources such as domain name, IP address, and OID are expected to play the role of an identifier and demand for them is also expected to increase. Accordingly, it becomes important to obtain the Internet address resources. As the Internet address resources market development, Internet address resources at the present time there is a need to gauge whether the potential to develop into industry. For this purpose, we have selected factors affecting the number of country domain name with 18 countries among OECD member countries as research target and carried out a regression analysis.

A study on Prevention of Large Scale Identity Theft through the Analysis of Login Pattern(Focusing on IP/Account Blocking System in Online Games) (로그인 패턴 분석을 통한 대규모 계정도용 차단 방안에 관한 연구(온라인 게임 IP/계정 차단시스템을 중심으로))

  • Yeon, Soo-Kwon;Yoo, Jin-Ho
    • Journal of Korea Game Society
    • /
    • v.16 no.2
    • /
    • pp.51-60
    • /
    • 2016
  • The incidents of massive personal information being leaked are occurring continuously over recent years. Personal information leaked outside is used for an illegal use of other's name and account theft. Especially it is happening on online games whose virtual goods, online game money and game items can be exchanged with real cash. When we research the real identity theft cases that happened in an online game, we can see that they happen massively in a short time. In this study, we define the characteristics of the mass attacks of the automated identity theft cases that occur in online games. Also we suggest a system to detect and prevent identity theft attacks in real time.

Evaluation of Convention Destination Images for 2006 and 2010: Importance-Performance Analysis of Meeting and Exhibition Planners' Perceptions (IP분석에 의한 회의 및 전시 기획가의 컨벤션 개최지 이미지 평가)

  • Kim, Si-Joong
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.14 no.1
    • /
    • pp.19-32
    • /
    • 2011
  • This study compares the results of two Importance-Performance Analyses (IPA) on the convention destination images in Korea by meeting and exhibition planners. Meeting and convention planners carefully evaluate convention destinations by considering meeting room facilities, hotel service quality, safety/security, air transportation access and hotel room availability as the most important attributes of a convention destination. On the other hand, night life, exhibition facilities, scenery/sightseeing opportunities, food and lodging costs and restaurant facilities are considered as the least important attributes of a convention destination. The study revealed that convention destination attributes ranking is dynamic and continuous evaluation should be done to determine the current perception of the meeting and exhibition planners. Meeting and exhibition planners' importance grid of the convention attributes is dynamic and changed with the environment and needs of their clientele. In this study it was noted that the ranking for some attributes has dramatically changed.

  • PDF

Study on the mechanism for the dynamic traversing of multiple firewalls using the concept of one-time master key (일회용 마스터 키 개념을 이용한 다중 방화벽 동적 통과 메커니즘 연구)

  • Park, Hyoung-Woo;Kim, Sang-Wan;Kim, Jong-Suk Ruth.;Jang, Haeng-Jin
    • The Journal of Korean Association of Computer Education
    • /
    • v.13 no.5
    • /
    • pp.103-110
    • /
    • 2010
  • If an exterior computer wants to join the Grid/cloud computing platform for a while, all of the related firewalls' filtering rule should be immediately updated. As the platform of Internet application is gradually evolving into the Grid/Cloud environment, the R&D requirement for the dynamic traversing of the multiple firewalls by a single try is also increasing. In this paper, we introduce the new mechanism for the dynamic traversing of the multiple firewalls using the concept of the one-time master key that can dynamically unlock the tiers of firewalls simultaneously instead of the existed filtering rule based method like a lock management at each firewall. The proposed master keys are like one-time password, consisted of IP addresses, port numbers, and TCP's initial sequence numbers, and generated by end users not administrators. They're exchanged mutually in advance and used to make a hole at local-side firewalls for the other's packet incoming. Therefore, the proposed mechanism can function regardless of the number or type of firewalls.

  • PDF

A study on revitalization plans of digital cinema (디지털영화 활성화 방안에 관한 연구)

  • Seo, Seong-Hee
    • Journal of Broadcast Engineering
    • /
    • v.12 no.5
    • /
    • pp.445-451
    • /
    • 2007
  • This study was started to not only resolve structural problems such as lack of contents, an unstable structure of earnings, and reduction of an additional market in Korean film industry through revitalizing digital cinema, but also make digital cinema become a power for growing Korean film industry furthermore. In the section of revitalizing digital cinema production, I suggest that expanding an audience base of low budget art cinema using digital technology will contribute to diversity film contents, and joint production with broadcasters by digital technology will expedite growing film industry as well as revitalizing digital cinema production. In the section of revitalizing digital cinema distribution, I insist, we should make effort positively to build reasonable hold-back and so on in order that film industry's positive participation in the market of digital film distribution and new media such as DMB or IP-TV may become an additional market to film industry. In conclusion, we can gain a foothold to leap toward a Position of cultural technology Power through efforts to resolve problems inherent in digital cinema.

Attacker Response Framework using Mobile Code (이동 코드를 이용한 공격자 대응 프레임워크)

  • Bang Hyo-Chan;Him Jin-Oh;Na Jung-Chan;Jang Joong-Su;Lee Young-Suk
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.959-970
    • /
    • 2004
  • It has become more difficult to correspond an cyber attack quickly as patterns of attack become various and complex. However, current so curity mechanisms just have passive defense functionalities. In this paper, we propose new network suity architecture to respond various cyber attacks rapidly and to chase and isolate the attackers through cooperation between security zones. The proposed architecture makes it possible to deal effectively with cyber attacks such as IP spoofing or DDoS(Distributed Denial of Service), by using active packet technology including a mobile code on active network. Also, it is designed to have more active correspondent than that of existing mechanisms. We im-plemented these mechanisms in Linux routers and experimented on a testbed to verify realization possibility of attacker response framework using mobile code. The experimentation results are analyzed.