• Title/Summary/Keyword: Network Vulnerability

Search Result 416, Processing Time 0.028 seconds

IoT Security Channel Design Using a Chaotic System Synchronized by Key Value (키값 동기된 혼돈계를 이용한 IoT의 보안채널 설계)

  • Yim, Geo-Su
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.5
    • /
    • pp.981-986
    • /
    • 2020
  • The Internet of Things refers to a space-of-things connection network configured to allow things with built-in sensors and communication functions to interact with people and other things, regardless of the restriction of place or time.IoT is a network developed for the purpose of services for human convenience, but the scope of its use is expanding across industries such as power transmission, energy management, and factory automation. However, the communication protocol of IoT, MQTT, is a lightweight message transmission protocol based on the push technology and has a security vulnerability, and this suggests that there are risks such as personal information infringement or industrial information leakage. To solve this problem, we designed a synchronous MQTT security channel that creates a secure channel by using the characteristic that different chaotic dynamical systems are synchronized with arbitrary values in the lightweight message transmission MQTT protocol. The communication channel we designed is a method of transmitting information to the noise channel by using characteristics such as random number similarity of chaotic signals, sensitivity to initial value, and reproducibility of signals. The encryption method synchronized with the proposed key value is a method optimized for the lightweight message transmission protocol, and if applied to the MQTT of IoT, it is believed to be effective in creating a secure channel.

Vulnerability Analysis and Detection Mechanism against Denial of Sleep Attacks in Sensor Network based on IEEE 802.15.4 (IEEE 802.15.4기반 센서 네트워크에서 슬립거부 공격의 취약성 분석 및 탐지 메커니즘)

  • Kim, A-Reum;Kim, Mi-Hui;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.1-14
    • /
    • 2010
  • IEEE 802.15.4[1] has been standardized for the physical layer and MAC layer of LR-PANs(Low Rate-Wireless Personal Area Networks) as a technology for operations with low power on sensor networks. The standardization is applied to the variety of applications in the shortrange wireless communication with limited output and performance, for example wireless sensor or virtual wire, but it includes vulnerabilities for various attacks because of the lack of security researches. In this paper, we analyze the vulnerabilities against the denial of sleep attacks on the MAC layer of IEEE 802.15.4, and propose a detection mechanism against it. In results, we analyzed the possibilities of denial of sleep attacks by the modification of superframe, the modification of CW(Contention Window), the process of channel scan or PAN association, and so on. Moreover, we comprehended that some of these attacks can mount even though the standardized security services such as encryption or authentication are performed. In addition to, we model for denial of sleep attacks by Beacon/Association Request messages, and propose a detection mechanism against them. This detection mechanism utilizes the management table consisting of the interval and node ID of request messages, and signal strength. In simulation results, we can show the effect of attacks, the detection possibility and performance superiorities of proposed mechanism.

An Analysis of Fire Area in Jinju City Based on Fire Mobilization Time (화재 출동시간에 근거한 진주시 소방권역 분석)

  • Koo, Seul;Yoo, Hwan Hee
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.20 no.4
    • /
    • pp.127-134
    • /
    • 2012
  • This study analyzed the present status of services by fire-suppression mobilization time of fire station where is located in Jinju city, by using network analysis of GIS targeting fire station(five 119 safety centers, one 119 division) in Jinju city area. As a result, it was indicated to be 15.9% in the ratio with less than 5 minutes of mobilization time, 34.7% in the ratio with less than 8 minutes, 94% in the ratio with less than 20 minutes out of the whole fire service area in Jinju city. Even districts with more than 20 minutes were analyzed to reach 6%. Especially, to solve vulnerability to approach the fire service in uptown districts(Jinseong, Jisu, Sabong, Ilbanseong, the whole area of Ibanseong), the 119 division is installed more to be operated. However, accessibility is still remaining in low level. Also, in case of 119 safety center of Cheonjeon, the national industrial complex and the general industrial complex are being formed on a large scale. However, analyzing the fire service level in the corresponding area, the districts with more than 8 minutes and less than 20 minutes were existing broadly. In consequence of analyzing the fire service area in Jinju city with the fire-suppression mobilization time as the above, the fire service level is failing to escape largely from the status prior to the urban-rural consolidation compared to what the jurisdictional area was largely expanded by which the administrative districts were integrated by the urban-rural consolidation in locally small-and medium-sized city. Thus, there is a need of a measure for improving this.

Design of Intrusion Detection System to be Suitable at the Information System Organized by Homogeneous Hosts (동질형 호스트들로 구성된 정보시스템에 적합한 침입탐지시스템의 설계)

  • 이종성;조성언;조경룡
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.4 no.1
    • /
    • pp.267-282
    • /
    • 2000
  • With the development of computer&network technology and the growth of its dependance, computer failures not only lose human and material resources but also make organization's competition weak as a side-effect of information society. Therefore, people consider computer security as important factor. Intrusion Detection Systems (IDS) detect intrusions and take an appropriate action against them in order to protect a computer from system failure due to illegal intrusion. A variety of methods and models for IDS have been developed until now, but the existing methods or models aren't enough to detect intrusions because of the complexity of computer network the vulnerability of the object system, insufficient understanding for information security and the appearance of new illegal intrusion method. We propose a new IDS model to be suitable at the information system organized by homogeneous hosts and design for the IDS model and implement the prototype of it for feasibility study. The IDS model consist of many distributed unit sensor IDSs at homogeneous hosts and if any of distributed unit sensor IDSs detect anomaly system call among system call sequences generated by a process, the anomaly system call can be dynamically shared with other unit sensor IDSs. This makes the IDS model can effectively detect new intruders about whole information system.

  • PDF

The Development of Integrated Mobile Measurement System for Terrestrial DMB (지상파 DMB를 위한 통합 이동 측정 시스템 개발)

  • Kim Sang-Hun;Yim Zung-Kon;Chae Young-Seok;Kim Man-Sik
    • Journal of Broadcast Engineering
    • /
    • v.9 no.4 s.25
    • /
    • pp.411-423
    • /
    • 2004
  • In Korea, Eureka-147 DAB (Digital Audio Broadcasting) temporarily decided as the standard system for digital audio broadcasting was evolved into DMB (Digital Multimedia Broadcasting) to complement the technical vulnerability in mobile reception of terrestrial DTV. According to introducing video service in T-DMB (Terrestrial DMB), 'Terrestrial DMB Experimental Broadcasting for Video Service', a national project of the MIC (Ministry of Information and Communication), was done for verifying the possibility of video service via T-DMB. The main objective of the project is computing the effective field strength and coverage for making a plan to build T-DMB broadcasting network and developing transmitting and receiving equipment. In case of digital broadcasting, it is absolutely essential to measure BER (Bit Error Rate) and electric field strength in order to evaluate coverage and quality of received signal. In this paper, we implement an integrated mobile measurement system for T-DMB. For this purpose, we propose efficient data structure and algorithm for BER measurement. By adding GPS (Global Positioning System) and electric field strength measurement parts into BER measurement part, we complete the integrated mobile measurement system, and then verify it by experiments and field tests. The developed system was used in a national project, 'Terrestrial DMB Experimental Broadcasting for Video Service' and measurement results will be used as fundamental data for building T-DMB broadcasting network.

A System for SSL/TLS Vulnerability Detection of Servers (서버 SSL/TLS 취약점 자동 탐지를 위한 시스템 개발)

  • Cho, Sungwon;Choi, Hyunsang;Heo, Gyu;Cho, Sanghyun;Kim, Young-Gab
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.145-153
    • /
    • 2018
  • SSL (Secure Socket Layer) and TLS (Transport Layer Security) are widely used protocols for secure and encrypted communication over a computer network. However, there have been reported several security vulnerabilities of SSL/TLS over the years. The vulnerabilities can let an adversary carry out critical attacks on SSL/TLS enabled servers. In this paper, we have developed a system which can periodically scan SSL/TLS vulnerabilities on internal network servers and quickly detects, reports and visualizes the vulnerabilities. We have evaluated the system on working servers of Naver services and analyzed detected vulnerabilities. 816 vulnerabilities are found on 213 internal server domains (4.2 vulnerabilities on average) and most vulnerable servers are not opened to public. However, 46 server domains have old vulnerabilites which were found 2016. We could patch and response to SSL/TLS vulnerabilites of servers by leveraging the proposed system.

The Loss Prevention System of Smart Device Using by iBeacon (iBeacon을 이용한 스마트 디바이스 분실 방지 시스템)

  • Nam, ChoonSung;Jung, HyunHee;Shin, DongRyeol
    • Journal of Internet Computing and Services
    • /
    • v.15 no.6
    • /
    • pp.27-34
    • /
    • 2014
  • Todays, the rapid technical progress of smart device has been used for various social (wall-fare) services in our lives. Especially, most of these services are based on the Local-based Services (LBS) and this technology is getting popular more and more compared with before. Basically, LBS is able to support various types of geographical services such as vehicles' navigation services, Augmented reality services as using extensional local information such as GPS. However, LBS has serious mathematical vulnerability on the services frequently because of its miscalculated GPS data under interior and ambiguous geographical environment such like shadowed area. So, to overcome this limitation, iBeacon, which would be able to mitigate LBS miscalculation process, has been proposed recently among network experts. Compared with other wireless technologies, iBeacon is able to determine the accurate geographical data of certain local positions easily because it is not only designed based on low-powered data transmitting technology, but also, it can be much easy to be deployed. As users' dependency of smart devices are getting higher and higher and the use of smart device is also getting complex more and more, the users prefer to use various types of smart devices at one time. Therefore, in this paper, we propose the loss prevention system that is able to interwork smart devices networks as using iBeacon technology for users' better conveniences.

Web application firewall technology trends and testing methodology (웹방화벽 기술동향 파악 및 시험방법론)

  • Jo, In-june;Kim, Sun-young;Kim, Chan-joong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.132-138
    • /
    • 2012
  • Existing network layer firewall security support is one that does not support the higher layer, the application layer of a vulnerable web application security. Under these circumstances, the vulnerability of web applications to be able to defend a Web Application Firewall is positioned as a solver to solve the important security issues of businesses spotlighted in the next generation of security systems, and a very active market in the market other than domestic is expected to be formed. However, Firewall Web has not yet proposed a standard which can be used to test the performance of the Web Application Firewall Web Application Firewall and select the products of trust hardly Companies in BMT conduct their own individual problems and the cost of performance testing technologies, there is a limit. In this study, practically usable BMT model was developed to evaluate the firewall vendor. Product ratings ISO / IEC 9126, eight product characteristics meet the performance and characteristics of a web application firewall entries are derived. This can relieve the burden on the need to be evaluated in its performance testing of Web firewall, and can enhance the competitiveness of domestic-related sectors, by restoring confidence in the product can reduce the dependence on foreign products.

  • PDF

A Design of Secure Communication for Device Management Based on IoT (사물인터넷 기반 디바이스 관리를 위한 안전한 통신 프로토콜 설계)

  • Park, Jung-Oh;Choi, Do-Hyeon;Hong, Chan-Ki
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.55-63
    • /
    • 2020
  • The IoT technology is a field that applies and converges the technologies in the existing industrial environment, instead of new technologies. The IoT technology is releasing various application services converged with other industries such as smart home, healthcare, construction, and automobile, and it is also possible to secure the work efficiency and convenience of users of IoT-based technologies. However, the security threats occurring in the IoT-based technology environment are succeeding to the vulnerability of the existing wireless network environment. And the occurrence of new and variant attacks in the combination with the ICT convergence environment, is causing damages. Thus, in the IoT technology-based environment, it would be necessary to have researches on the safe transmission of messages in the communication environment between user and device, and device and device. This thesis aims to design a safe communication protocol in the IoT-based technology environment. Regarding the suggested communication protocol, this thesis performed the safety analysis on the attack techniques occurring in the IoT technology-based environment. And through the performance evaluation of the existing PKI-based certificate issuance system and the suggested communication protocol, this thesis verified the high efficiency(about 23%) of communication procedure. Also, this thesis verified the reduced figure(about 65%) of the issued quantity of certificate compared to the existing issuance system and the certificate management technique.

Vulnerability Assessment of the Climate Change on the Water Environment of Juam Reservoir (기후변화에 따른 주암호 수환경 취약성 평가)

  • Yoon, Sung Wan;Chung, Se Woong;Park, Hyung Seok
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2015.05a
    • /
    • pp.519-519
    • /
    • 2015
  • 2007년 발간된 IPCC의 4차 평가보고서에서 자연재해, 환경, 해양, 농업, 생태계, 보건 등 다양한 부분에 미치는 기후변화의 영향에 대한 과학적 근거들이 제시되면서 기후변화는 현세기 범지구적인 화두로 대두되고 있다. 또한, 기후변화에 의한 지구 온난화는 대규모의 수문순환 과정에서의 변화들과 연관되어 담수자원은 기후변화에 대단히 취약하며 미래로 갈수록 악영향을 받을 것으로 6차 기술보고서에서 제시하고 있다. 특히 우리나라는 지구온난화가 전 지구적인 평균보다 급속하게 진행될 가능성이 높기 때문에 기후변화에 대한 담수자원 취약성이 더욱 클 것으로 예상된다. 따라서 지표수에 용수의존도가 높은 우리나라의 댐 저수지를 대상으로 기후변화에 따른 수환경 변화의 정확한 분석과 취약성 평가는 필수적이다. 본 연구에서는 SRES A1B 시나리오를 적용하여 기후변화가 주암호 저수지의 수환경 변화에 미치는 영향을 분석하였다. 지역스케일의 미래 기후시나리오 생산을 위해 인공신경망(Artificial Neural Network.,ANN)기법을 적용하여 예측인자(강우, 상대습도, 최고온도, 최저온도)에 대해 강우-유출모형에 적용이 가능한 지역스케일로 통계적 상세화를 수행하였으며, 이를 유역모델에 적용하여 저수지 유입부의 유출량 및 부하량을 예측하였다. 유역 모델의 결과를 토대로 저수지 운영모델에 저수지 유입부의 유출량을 적용하여 미래 기간의 방류량을 산정하였으며, 최종적으로 저수지 모델에 유입량, 유입부하량 및 방류량을 적용하여 저수지 내 오염 및 영양물질 순환 및 분포 예측을 통해서 기후변화가 저수지 수환경에 미치는 영향을 평가하였다. 기후변화 시나리오에 따른 상세기 후전망을 위해서 기후인자의 미래분석 기간은 (I)단계 구간(2011~2040년), (II)단계 구간(2041~2070년), (III) 단계 구간(2071~2100년)의 3개 구간으로 설정하여 수행하였으며, Baseline인 1991~2010년까지의 실측값과 모의 값을 비교하여 검증하였다. 강우량의 경우 Baseline 대비 미래로 갈수록 증가하는 것으로 전망되었으며, 2011년 대비 2100년에서 연강수량 6.4% 증가한 반면, 일최대강수량이 7.0% 증가하는 것으로 나타나 미래로 갈수록 집중호우의 발생가능성이 커질 것으로 예측되었다. 유역의 수문 수질변화 전망도 강수량 증가의 영향으로 주암댐으로 유입하는 총 유량이 Baseline 대비 증가 하였으며, 유사량 및 오염부하량도 증가하는 것으로 나타났다. 저수지 수환경 변화 예측결과 유입량이 증가함에 따라서 연평균 체류시간이 감소하였으며, 기온 및 유입수온 상승의 영향으로 (I)단계 구간대비 미래로 갈수록 상층 및 심층의 수온이 상승하는 것으로 나타났다. 연중 수온성층기간 역시 증가하는 것으로 나타났으며, 남조류는 (I)단계 구간 대비 (III)단계 구간으로 갈수록 출현시기가 빨라지며 농도 역시 증가하였다. 또한 풍수년, 평수년에 비해 갈수년에 남조류의 연평균농도 상승폭과 최고농도가 크게 나타나 미래로 갈수록 댐 유입량이 적은 해에 남조류로 인한 피해 발생 가능성이 높아질 것으로 예상된다.

  • PDF