• Title/Summary/Keyword: IP Security

Search Result 739, Processing Time 0.029 seconds

Mutual Authentication and Secure Session Termination Scheme in iATA Protocol

  • Ong, Ivy;Lee, Shirly;Lee, Hoon-Jae;Lim, Hyo-Taek
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.4
    • /
    • pp.437-442
    • /
    • 2010
  • Ubiquitous mobile computing is becoming easier and more attractive in this ambient technological Internet world. However, some portable devices such as Personal Digital Assistant (PDAs) and smart phones are still encountering inherent constraints of limited storages and computing resources. To alleviate this problem, we develop a cost-effective protocol, iATA to transfer ATA commands and data over TCP/IP network between mobile appliances and stationary servers. It provides mobile users a virtual storage platform which is physically resided at remote home or office. As communications are made through insecure Internet connections, security risks of adopting this service become a concern. There are many reported cases in the history where attackers masquerade as legitimate users, illegally access to network-based applications or systems by breaking through the poor authentication gates. In this paper, we propose a mutual authentication and secure session termination scheme as the first and last defense steps to combat identity thief and fraud threat in particular for iATA services. Random validation factors, large prime numbers, current timestamps, one-way hash functions and one-time session key are deployed accordingly in the scheme. Moreover, we employ the concept of hard factorization problem (HFP) in the termination phase to against fraud termination requests. Theoretical security analysis discussed in later section indicates the scheme supports mutual authentication and is robust against several attacks such as verifiers' impersonation, replay attack, denial-of-services (DoS) attack and so on.

Mutual Authentication and Key Agreement Scheme between Lightweight Devices in Internet of Things (사물 인터넷 환경에서 경량화 장치 간 상호 인증 및 세션키 합의 기술)

  • Park, Jiye;Shin, Saemi;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.9
    • /
    • pp.707-714
    • /
    • 2013
  • IoT, which can be regarded as an enhanced version of M2M communication technology, was proposed to realize intelligent thing to thing communications by utilizing Internet connectivity. Things in IoT are generally heterogeneous and resource constrained. Also such things are connected with each other over LLN(low power and lossy Network). Confidentiality, mutual authentication and message origin authentication are required to make a secure service in IoT. Security protocols used in traditional IP Networks cannot be directly adopted to resource constrained devices in IoT. Under the respect, a IETF standard group proposes to use lightweight version of DTLS protocol for supporting security services in IoT environments. However, the protocol can not cover up all of very constrained devices. To solve the problem, we propose a scheme which tends to support mutual authentication and session key agreement between devices that contain only a single crypto primitive module such as hash function or cipher function because of resource constrained property. The proposed scheme enhances performance by pre-computing a session key and is able to defend various attacks.

An AAA Mechanism using ID-based Ticket offer Anonymity (익명성을 지원하는 ID기반 티켓을 이용한 AAA 메커니즘)

  • Moon, Jong-Sik;Paek, Chang-Hyun;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.87-98
    • /
    • 2007
  • AAA protocol is an information protection technology which systematically provides authentication, authorization and accounting function not only in the existing wire network but also in the rapidly developing wireless network, various services and protocol. Nowadays, standardization of the various application services is in progress with the purpose of AAA standardization fer the mobile user in the wireless network. And various researches are being conducted fur using AAA in the roaming service and mobile IPv6 network between heterogeneous networks. In this paper uses OTP and ID-based ticket for user authentication in the mobile device under the ubiquitous environment, and service is seamlessly provided even though the mobile device moves from the home network to the foreign network. In addition, with the ticket renewed from the foreign network, the overhead of the home authentication server can be reduced, and provides anonymity of service through the anonymity ID.

A Novel Application-Layer DDoS Attack Detection A1gorithm based on Client Intention (사용자 의도 기반 응용계층 DDoS 공격 탐지 알고리즘)

  • Oh, Jin-Tae;Park, Dong-Gue;Jang, Jong-Soo;Ryou, Jea-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.39-52
    • /
    • 2011
  • An application-layer attack can effectively achieve its objective with a small amount of traffic, and detection is difficult because the traffic type is very similar to that of legitimate users. We have discovered a unique characteristic that is produced by a difference in client intention: Both a legitimate user and DDoS attacker establish a session through a 3-way handshake over the TCP/IP layer. After a connection is established, they request at least one HTTP service by a Get request packet. The legitimate HTTP user waits for the server's response. However, an attacker tries to terminate the existing session right after the Get request. These different actions can be interpreted as a difference in client intention. In this paper, we propose a detection algorithm for application layer DDoS attacks based on this difference. The proposed algorithm was simulated using traffic dump files that were taken from normal user networks and Botnet-based attack tools. The test results showed that the algorithm can detect an HTTP-Get flooding attack with almost zero false alarms.

A Detailed Review on Recognition of Plant Disease Using Intelligent Image Retrieval Techniques

  • Gulbir Singh;Kuldeep Kumar Yogi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.77-90
    • /
    • 2023
  • Today, crops face many characteristics/diseases. Insect damage is one of the main characteristics/diseases. Insecticides are not always effective because they can be toxic to some birds. It will also disrupt the natural food chain for animals. A common practice of plant scientists is to visually assess plant damage (leaves, stems) due to disease based on the percentage of disease. Plants suffer from various diseases at any stage of their development. For farmers and agricultural professionals, disease management is a critical issue that requires immediate attention. It requires urgent diagnosis and preventive measures to maintain quality and minimize losses. Many researchers have provided plant disease detection techniques to support rapid disease diagnosis. In this review paper, we mainly focus on artificial intelligence (AI) technology, image processing technology (IP), deep learning technology (DL), vector machine (SVM) technology, the network Convergent neuronal (CNN) content Detailed description of the identification of different types of diseases in tomato and potato plants based on image retrieval technology (CBIR). It also includes the various types of diseases that typically exist in tomato and potato. Content-based Image Retrieval (CBIR) technologies should be used as a supplementary tool to enhance search accuracy by encouraging you to access collections of extra knowledge so that it can be useful. CBIR systems mainly use colour, form, and texture as core features, such that they work on the first level of the lowest level. This is the most sophisticated methods used to diagnose diseases of tomato plants.

Assessing Efficiency of Handoff Techniques for Acquiring Maximum Throughput into WLAN

  • Mohsin Shaikha;Irfan Tunio;Baqir Zardari;Abdul Aziz;Ahmed Ali;Muhammad Abrar Khan
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.172-178
    • /
    • 2023
  • When the mobile device moves from the coverage of one access point to the radio coverage of another access point it needs to maintain its connection with the current access point before it successfully discovers the new access point, this process is known as handoff. During handoff the acceptable delay a voice over IP application can bear is of 50ms whereas the delay on medium access control layer is high enough that goes up to 350-500ms. This research provides a suitable methodology on medium access control layer of the IEEE 802.11 network. The medium access control layer comprises of three phases, namely discovery, reauthentication and re-association. The discovery phase on medium access control layer takes up to 90% of the total handoff latency. The objective is to effectively reduce the delay for discovery phase to ensure a seamless handoff. The research proposes a scheme that reduces the handoff latency effectively by scanning channels prior to the actual handoff process starts and scans only the neighboring access points. Further, the proposed scheme enables the mobile device to scan first the channel on which it is currently operating so that the mobile device has to perform minimum number of channel switches. The results show that the mobile device finds out the new potential access point prior to the handoff execution hence the delay during discovery of a new access point is minimized effectively.

제어시스템 ICCP 프로토콜 사이버 보안 현황

  • Kim, SungJin;Shon, Taeshik
    • Review of KIISC
    • /
    • v.24 no.5
    • /
    • pp.32-38
    • /
    • 2014
  • 전력시스템에 IT를 결합한 스마트그리드에 대한 연구가 최근 활발히 진행되고 있다. 스마트그리드 중 전력시스템의 핵심이라 할 수 있는 전력시스템 제어센터 간 통신을 담당하는 것이 ICCP 프로토콜이며, 주로 중앙급전소와 지역급전소간의 전력망 정보들을 교환하는데 사용되고 있다. 이 프로토콜은 단지 전력망의 정보교환 뿐 아니라 전력기기제어 기능도 가지고 있다. ICCP 프로토콜은 TCP/IP 프로토콜을 기반으로 동작하기 때문에 잠재적으로 다양한 형태의 사이버 공격이 가능하다. 또한 이 프로토콜을 사용하는 중앙급전소의 경우 주요 국가기반시설로써 사이버테러에 더욱더 공고한 대응체계를 갖추어야 할 필요가 있다. 현재 ICCP 프로토콜을 사용하는 통신 구간은 일반적으로 외부 네트워크와 분리되어 그 안전성을 담보하고 있지만, 네트워크 분리를 통한 보안성 향상 기법이 체계적인 관리와 함께 수반되지 않으면 인적 취약성이나 새로운 형태의 모바일 기기를 통한 물리적 취약성에 지속적으로 노출 될 수 있는 잠재적 위험을 내포하고 있다. 따라서 이러한 보안 사고의 잠재적 발생 가능성으로 인해 외부네트워크와 분리된 제어센터들도 향후 더욱더 높은 수준의 보안 기술을 적용할 필요성이 강조되고 있다. 본 논문에서는 전력 제어센터 사이에서 사용되고 있는 ICCP 프로토콜의 사이버 보안 현황에 대해 살펴보고 해당 프로토콜의 보안 위험성과 이에 대한 대응방안을 고찰한다.

그룹의사결정지원을 위한 인터넷 기능개선 방향

  • Heo, Yeong-Jong
    • Asia pacific journal of information systems
    • /
    • v.6 no.2
    • /
    • pp.107-124
    • /
    • 1996
  • This research studied future directions of Internet technology toward supporting group decision making. From the previous research, this study classified requirements of group decision support systems into three categories which are information transfer, information provision, and communication control. For each of the category, this study analyzed the limits of current Internet functions. Next, this research discussed technological solutions, for each of the OSI 7 layers, toward supporting group decision making. Additional functions in Internet which are required for group supporting are tracing communications, application dependent coding, selection of communication modes, and security handling. For high speed data communication in Internet, this research discussed the potential of cell-switching technology for the lower level link in Internet. The conclusions of this research can be used for designing future group decision support systems and development of Internet.

  • PDF

Logical Design of Video Security System over Internet (인터넷 화상 방범 시스템 논리 설계)

  • 장명수;장종욱
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.10a
    • /
    • pp.439-447
    • /
    • 2000
  • 현재 방범 시스템은 적외선, 초음파 둥의 I-지기의 신호에 의존하여 외부로부터의 침입을 감지하고 있으나 방범 시스템이 설치된 환경에 따라 이런 감지기의 정확성이 달라지므로 오 동작의 가능성을 포함하며 신뢰성이 저하되고 있다. 실제 외부로부터의 침입을 확인하기 위해서는 화상과 음성 그리고 감지기의 신호를 조합하여 정확한 판단이 가능하지만 화상을 전송하기 위해서는 고가의 회선비용을 부담해야만 한다. 하지만 인터넷을 이용하여 화상을 전송하는 제품들이 출시되면서 Real-time 화상감시가 가능해졌다. 이런 화상감시 제품들은 Netscape, MS Explorer와 같은 표준 Web Browser을 통해 Real-time으르 전세계 어디서나 화상을 감시할 수 있다는 장점을 가지고 있다. 적용분야는 호텔주변, 관광지의 여러 명소에 설치 후 홈페이지에 링크시켜 홍보용으로 사용하거나 공장 주요시설, 교통상황 둥의 중요지역의 Monitoring에 활용하고 있다. 그러나 방범 시스템에 적용하기에는 감지기의 확장성, 방범 관제센터 시스템과의 연동이 부족하여 본 고에서는 현재 출시된 화상감시 시스템과 기존 방범시스템을 Integration하여 방범의 최종 목표인 화상과 감지기 신호의 조합에 따른 정확한 방범시스템의 구현에 대해서 기술하고자 한다. 화상방범시스템의 구현은 크게 두 가지로 나누어지며 첫째는 화상감시 시스템과 방범시스템간의 통신을 설계하는 것으로 기존 대부분의 방범시스템이 사용하는 RS-485 통신 프로토콜을 재설계하여 화상감시 시스템과의 통신을 설계하였으며 둘째는 화상감시시스템과 관제센터 시스템간의 통신을 설계하는 것으로 현재 화상감시 시스템의 TCP/IP 프로토콜을 이용한 socket 통신으로 관제센터 시스템과의 실시간 데이터 전송을 가능하게 했다. 이 시스템을 활용할 경우 고객들은 반드시 관제센터시스템의 인증을 거쳐야 하므로 고객의 DataBase를 축적할수 있으며 이 정보를 활용하여 인터넷 화상방범 서비스 Potal Site구축이 가능하다는 장점이 있다.

  • PDF

Development of Tagging Dataset for Named Entity Recognition in Security (정보보안 분야의 위협정보 개체명 인식 시스템 개발을 위한 데이터셋 구축)

  • Kim, GyeongMin;Hur, YunA;Kim, Kuekyeng;Lim, HeuiSeok
    • Annual Conference on Human and Language Technology
    • /
    • 2018.10a
    • /
    • pp.669-671
    • /
    • 2018
  • 개체명 인식(Named Entity Recognition)은 주로 인명(PS), 지명(LC), 기관명(OG) 등의 개체를 인식하기 위한 방식으로 많이 사용되어왔다. 그 이유는 해당 개체들이 데이터에서 중요한 의미를 가진 키워드이기 때문이다. 그러나 다른 도메인이 달라진다면 그동안 사용된 개체보다 더욱 중요한 의미를 갖는 개체가 존재할 수 있다. 특히 정보보안 분야에서는 악의적으로 사용되는 위협정보가 문서 내에서 중요한 의미를 갖는다. 보안 문서는 해시값, 악성코드명, IP, 도메인/URL 등 위협정보에 중요한 단서가 될 수 있는 다양한 정보를 담고 있다. 본 논문에서는 정보보안 분야의 위협정보를 탐지할 수 있는 개체명 시스템 개발을 위해 4개의 클래스와 20가지 속성으로 정의한 구축 방식을 구축하고 그 구축 방식에 대해 제안한다.

  • PDF