• 제목/요약/키워드: Network hacking

검색결과 243건 처리시간 0.029초

A Design of Evaluation Tool for Information Security System (정보보호 시스템 평가 도구 설계)

  • 정연서;김환국;서동일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 한국해양정보통신학회 2003년도 추계종합학술대회
    • /
    • pp.669-672
    • /
    • 2003
  • Computing and Networking technologies are rapidly developed. A lot of hacking events are occurring. As a result, people have a interesting for security in these days. Network security systems have come to be widely used in our networks. But, objective testing method to evaluate network sorority system is not established. Therefore we have difficulties that select a system. In this paper, we investigate evaluation methods for network sorority systems(Firewall, IDS, IPS etc.) and, design a evaluation tool for network security systems.

  • PDF

Security and Hacking on Wireless Networking for Small and Medium Business: Survey (중소기업형 무선 네트워크의 해킹과 보안)

  • Shin, Pan-Seop;Kim, Jeong-Min
    • Journal of Convergence Society for SMB
    • /
    • 제4권3호
    • /
    • pp.15-20
    • /
    • 2014
  • Wireless network is convenient as compared to the wire, and it is also easy. Therefore, SMEs in the country is the trend that many SMEs prefer the radio using a lot of radio as an extension of the wired network modification felt the burden of fixed installations. Wireless networks are vulnerable to security together than a wired network, since it passes the packet through the broadcasting. Therefore, analyzing the vulnerability of wireless networks, and proposes countermeasures about wireless network security in small and medium-sized businesses.

  • PDF

Active Network for IP Traceback (IP 역추적을 위한 액티브 네트워크 기법 적용 방안)

  • 최병선;이성현;이재광
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 한국해양정보통신학회 2004년도 춘계종합학술대회
    • /
    • pp.420-423
    • /
    • 2004
  • Advance of computer technique becomes efficient of business in recent years. It has become high-speed data transmission and large data transmission. Network and computer system need to increasingly security because advance of computer technique. So this paper analyzes IP Traceback system that prevent cyber attack as hacking and security vulnerability of network. And this paper design IP Traceback system that based on active network.

  • PDF

Safe Web Using Scrapable Headless Browser in Network Separation Environment

  • Jung, Won-chi;Park, Jeonghun;Park, Namje
    • Journal of the Korea Society of Computer and Information
    • /
    • 제24권8호
    • /
    • pp.77-85
    • /
    • 2019
  • In this paper, we propose a "Safe Web Using Scrapable Headless Browse" Because in a network separation environment for security, It does not allow the Internet. The reason is to physically block malicious code. Many accidents occurred, including the 3.20 hacking incident, personal information leakage at credit card companies, and the leakage of personal information at "Interpark"(Internet shopping mall). As a result, the separation of the network separate the Internet network from the internal network, that was made mandatory for public institutions, and the policy-introduction institution for network separation was expanded to the government, local governments and the financial sector. In terms of information security, network separation is an effective defense system. Because building a network that is not attacked from the outside, internal information can be kept safe. therefore, "the separation of the network" is inefficient. because it is important to use the Internet's information to search for it and to use it as data directly inside. Using a capture method using a Headless Web browser can solve these conflicting problems. We would like to suggest a way to protect both safety and efficiency.

Anomaly Detection Mechanism based on the Session Patterns and Fuzzy Cognitive Maps (퍼지인식도와 세션패턴 기반의 비정상 탐지 메커니즘)

  • Ryu Dae-Hee;Lee Se-Yul;Kim Hyeock-Jin;Song Young-Deog
    • Journal of the Korea Society of Computer and Information
    • /
    • 제10권6호
    • /
    • pp.9-16
    • /
    • 2005
  • Recently, since the number of internet users is increasing rapidly and, by using the Public hacking tools, general network users can intrude computer systems easily, the hacking problem is setting more serious. In order to prevent the intrusion. it is needed to detect the sign in advance of intrusion in a Positive Prevention by detecting the various forms of hackers intrusion trials to know the vulnerability of systems. The existing network-based anomaly detection algorithms that cope with port-scanning and the network vulnerability scans have some weakness in intrusion detection. they can not detect slow scans and coordinated scans. therefore, the new concept of algorithm is needed to detect effectively the various. In this Paper, we propose a detection algorithm for session patterns and FCM.

  • PDF

BlueTooth Snarfing attacks and security aspects (BlueTooth Snarfing 공격 및 보안측면)

  • Park, Hyun Uk;Kim, Hyun Soo;Kim, Ki Hawn;Lee, Hoon-jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 한국정보통신학회 2015년도 춘계학술대회
    • /
    • pp.811-814
    • /
    • 2015
  • There are many modern societies use the digital products in everyday life in the Middle, convenience, give him plenty of Bluetooth is one of the users. Bluetooth (IEEE 802.15.1) means equipment in the close range between the low-power wireless communication standard for the connection to use the technology. Currently, Bluetooth earphone, Bluetooth speaker, wearable mounted devices also used a lot because it takes people to exploit the benefits had been lifted and thereby increases your damage. So, reducing the damage the user's further research about the security technique that can stop completely. I am sure that many Bluetooth hacking techniques, a Bluetooth device firmware vulnerability within the stored data to allow the approach to attacking the BlueTooth Snarfing and want to analyze.

  • PDF

SIEM OWASP-ZAP and ANGRY-IP Vulnerability Analysis Module and Interlocking (SIEM과 OWASP-ZAP및ANGRY-IP취약점분석모듈과 연동구현)

  • Yoon, Jong Moon
    • Convergence Security Journal
    • /
    • 제19권2호
    • /
    • pp.83-89
    • /
    • 2019
  • In accordance with information security compliance and security regulations, there is a need to develop regular and real-time concepts for cyber-infringement attacks against network system vulnerabilities in branch and periodic forms. Vulnerability Analysis Analysis It is judged that it will be a countermeasure against new hacking attack in case of concept validation by interworking with TOOL. Vulnerability check module is standardized in event attribute management and ease of operation. Opening in terms of global sharing of vulnerability data, owasp zap / Angry ip Etc. were investigated in the SIEM system with interlocking design implementation method. As a result, it was proved that the inspection events were monitored and transmitted to the SIEM console by the vulnerability module of web and network target. In consideration of this, ESM And SIEM system In this paper, we propose a new vulnerability analysis method based on the existing information security consultation and the results of applying this study. Refer to the integrated interrelationship analysis and reference Vulnerability target Goal Hacking It is judged to be a new active concept against invasion attack.

Rationalization of Network Segregation for Continuity of Financial Services Following COVID-19

  • Choi, Manyong;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권11호
    • /
    • pp.4163-4183
    • /
    • 2021
  • As measures for protecting users and ensuring security of electronic financial transactions, such as online banking, financial institutions in South Korea have implemented network segregation policies. However, a revision of such domain-centered standardized network segregation policies has been increasingly requested because of: 1) increased demand for remote work due to changes resulting from COVID-19 pandemic; and 2) the difficulty of applying new technologies of fintech companies based on information and communications technologies (ICTs) such as cloud services. Therefore, in this study, problems of the remote work environment arising from the network segregation policy currently applied to the financial sector in South Korea and those from the application of new ICTs such as fintech technology have been investigated. In addition, internal network protection policies of foreign financial sectors, such as those of the United States, United Kingdom, European Union, and Russia, and internal network protection policies of non-financial sectors, such as control systems, have been analyzed. As measures for the effective improvement of the current network segregation policy, we propose a policy change from domain-based to data-centric network segregation. Furthermore, to resolve threats of hacking at remote work, recently emerging as a global problem due to COVID-19 pandemic, a standard model for remote work system development applicable to financial companies and a reinforced terminal security model are presented, and an alternative control method applicable when network segregation is not applied is proposed.

A Study of the Performance Degradation Factors of An Internal Network (내부 네트워크의 성능저하요인에 관한 연구)

  • Jeon, Jeon-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제36권1B호
    • /
    • pp.43-50
    • /
    • 2011
  • Recently, Hacking Attacks are appearing as a various Attack techniques with evolution of the Network and most of the network through a various Security Systems are responding to an attack. In addition, it should be placed adding the Security Systems to protect the Internal Network's Information Assets from External attacks. But, The use of Security Systems and Network deployment inside the network makes a significant impact on Security and Performance. Therefore, In this paper, it will be to analyze the Performance Degradation Factors of the Internal Network according to the Security System's use and placement. In a future, This paper is expected to serve as a valuable information for the Network Performance and Security improvements.

The Design of Router Security Management System for Secure Networking

  • Jo, Su-Hyung;Kim, Ki-Young;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2005년도 ICCAS
    • /
    • pp.1594-1597
    • /
    • 2005
  • A rapid development and a wide use of the Internet have expanded a network environment. Further, the network environment has become more complex due to a simple and convenient network connection and various services of the Internet. However, the Internet has been constantly exposed to the danger of various network attacks such as a virus, a hacking, a system intrusion, a system manager authority acquisition, an intrusion cover-up and the like. As a result, a network security technology such as a virus vaccine, a firewall, an integrated security management, an intrusion detection system, and the like are required in order to handle the security problems of Internet. Accordingly, a router, which is a key component of the Internet, controls a data packet flow in a network and determines an optimal path thereof so as to reach an appropriate destination. An error of the router or an attack against the router can damage an entire network. This paper relates to a method for RSMS (router security management system) for secure networking based on a security policy. Security router provides functions of a packet filtering, an authentication, an access control, an intrusion analysis and an audit trail in a kernel region. Security policy has the definition of security function against a network intrusion.

  • PDF