• Title/Summary/Keyword: Network hacking

Search Result 244, Processing Time 0.029 seconds

Traffic Analysis Algorithm for Detecting DDoS Attacks (DDoS 공격을 검출하기 위한 트래픽 분석 알고리즘)

  • 유대성;박원주;김선영;서동일;오창석
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.11a
    • /
    • pp.105-108
    • /
    • 2003
  • The recent hacking trend is a traffic flooding attack against a bandwidth in the network grows more and more. On the other hand, technology, which extracts attack traffic in the network from these threats, is still short. Therefore, we propose methodology which can measure traffic that threaten network services, and algorithm which can detect DDoS attacks effectively.

  • PDF

A survey on Android Security : Hacking and countermeasure (안드로이드 해킹 사례 및 향후 보안 대책)

  • Im, Jeoung-Kwan;Shim, Jae-Hwa;Kang, Seung-Gu;Lee, Hoon-Jae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.689-692
    • /
    • 2012
  • 최근 스마트폰의 보급이 증가하면서 그 사용자 역시 급증하고 있는 추세이다. 이 중 안드로이드 기반의 스마트폰의 경우 Borderless Application, No limit, 다양한 플랫폼에서의 개발 및 오픈소스 등의 장점으로 인해 시장 점유율이 급속도로 증가한 반면, 그에 따른 보안이 시스템 개발속도를 따라가지 못하면서 각종 보안 취약점 및 해킹 공격 등에 위협을 받고 있다. 이에 본 논문에서는 안드로이드의 기본 구조 및 보안, 그리고 여러 가지 보안 위협 사례들을 분석하여 공격 유형을 파악한다. 또한 이를 통해 현재 보안 수준 및 문제점에 대한 향후 보안 대책과 권고사항에 대하여 고찰한다.

A Study on Signature-based Wireless Intrusion Detection Systems (시그니처 기반의 무선 침입 탐지 시스템에 관한 연구)

  • Park, Sang-No;Kim, A-Yong;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.5
    • /
    • pp.1122-1127
    • /
    • 2014
  • WLAN is affordability, flexibility, and ease of installation, use the smart device due to the dissemination and the AP (Access Point) to the simplification of the Office building, store, at school. Wi-Fi radio waves because it uses the medium of air transport to reach areas where security threats are always exposed to illegal AP installation, policy violations AP, packet monitoring, AP illegal access, external and service access, wireless network sharing, MAC address, such as a new security threat to steal. In this paper, signature-based of wireless intrusion detection system for Snort to suggest how to develop. The public can use hacking tools and conduct a mock hacking, Snort detects an attack of hacking tools to verify from experimental verification of the suitability of the thesis throughout.

A Study on Hacking Attack of Wire and Wireless Voice over Internet Protocol Terminals (유무선 인터넷전화 단말에 대한 해킹 공격 연구)

  • Kwon, Se-Hwan;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.299-302
    • /
    • 2011
  • Recently, Voice over Internet protocol(VoIP) in IP-based wired and wireless voice, as well as by providing multimedia information transfer. Wired and wireless VoIP is easy on illegal eavesdropping of phone calls and VoIP call control signals on the network. In addition, service misuse attacks, denial of service attacks can be targeted as compared to traditional landline phones, there are several security vulnerabilities. In this paper, VoIP equipment in order to obtain information on the IP Phone is scanning. And check the password of IP Phone, and log in successful from the administrator's page. Then after reaching the page VoIP IP Phone Administrator Settings screen, phone number, port number, certification number, is changed. In addition, IP Phones that are registered in the administrator page of the call records check and personal information is the study of hacking.

  • PDF

Emergency Service Model for Networked Appliance in Home Network Environment (홈 네트워크 환경에서 정보가전 위기관리 서비스 모델)

  • Jean, Byoung-Chan;Kim, Hyeock-Jin
    • Journal of the Korea Computer Industry Society
    • /
    • v.7 no.5
    • /
    • pp.487-494
    • /
    • 2006
  • By development of the superhigh speed network and the Networked appliance, a home network environment was equipped quickly around the cyber apartment. The home network environment provides the abundant family life style which numerous appliance and tools are connected with the network. Recently it is caused by with appearance of the Networked appliance which is connected with the network, the service demand is augmented to hacking, wrong operation, breakdown, crime prevention in home automation, fire, and break-in. This paper planned and proposed the integrated crisis management service model in the environment of home network and Networked appliance. Namely, it classifies the Networked appliance crisis management service and it defines a crisis management message with the XML. The message where the crisis situation occurs is notified and controlled in wireless PDA or the hand phone or the specific authorization.

  • PDF

A Distributed Communication Model of Intrusion Detection System in Active Network

  • Park, Soo-Young;Park, Sang-Gug
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1577-1580
    • /
    • 2005
  • With remarkable growth of using Internet, attempts to try intrusions on network are now increasing. Intrusion Detection System is a security system which detects and copes illegal intrusions. Especially with increasing dispersive attacks through network, concerns for this Distributed Intrusion Detection are also rising. The previous Intrusion Detection System has difficulty in coping cause it detects intrusions only on particular network and only same segment. About same attacks, system lacks capacity of combining information and related data. Also it lacks cooperations against intrusions. Systematic and general security controls can make it possible to detect intrusions and deal with intrusions and predict. This paper considers Distributed Intrusion Detection preventing attacks and suggests the way sending active packets between nodes safely and performing in corresponding active node certainly. This study suggested improved E-IDS system which prevents service attacks and also studied sending messages safely by encoding. Encoding decreases security attacks in active network. Also described effective ways of dealing intrusions when misuses happens thorough case study. Previous network nodes can't deal with hacking and misuses happened in the middle nodes at all, cause it just encodes ends. With above suggested ideas, problems caused by security services can be improved.

  • PDF

A Hacking Analysis and Counterplan under large-scale network environment (대규모 네트워크 환경하에서의 해킹 분석 및 대책)

  • 김상춘
    • Convergence Security Journal
    • /
    • v.1 no.1
    • /
    • pp.83-99
    • /
    • 2001
  • 인터넷이 발전해감에 따라 사이버 세계라고 하는 대규모 네트워크 환경이라는 또 다른 세상이 창출되었다. 그러나 대규모 네트워크 환경하에서는 정보보호의 취약성 때문에 인터넷 서비스를 이용하는 네티즌들의 안전성이 보장되지 않는다. 이처럼 불법 침입자들로부터 선의의 이용자를 보호하기 위해서는 그들이 해킹 기법과 그 대응책을 숙지해야 할 것이다. 이 논문에서는 대규모 네트워크 환경하에서 발생되고 있는 해킹에 대하여 분석하고 그에 대한 대책을 제시하는데 그 목적이 있다.

  • PDF

Implementation of Firewall System Using Packet Filtering Method in the Linux OS (Linux 운영체제에서 Packet Filtering 방식을 이용한 방화벽 시스템의 구현)

  • 한상현;안동언;정성종
    • Proceedings of the IEEK Conference
    • /
    • 2003.11b
    • /
    • pp.77-80
    • /
    • 2003
  • Complying with highly demand of information through internet. the utility of computer and network is rapidly provided with to schools. This situation brings about many problems. For example, the stolen information through false identification(Hacking) is the most greatest concern. In this paper it tells that the efficient way of preservating computer use is by using operating system of Open Source, which is Linux system. Further more, it shows the system which was organized by IP-Tabling (offered service-Packet Filtering method from the Linux system) functions well as a security system.

  • PDF

Effective traffic analysis in DDos attack (DDos 공격에서 효율적인 트래픽 분석)

  • 구향옥;백순화;오창석
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.05a
    • /
    • pp.268-272
    • /
    • 2004
  • Recently most of hacking attack are either DDos attack or worm attack. However detection algorithms against those attacks are insufficient. In this paper, we propose a method which is able to detect attack traffic very efficiently by reducing traffic overhead. In this scheme, network traffics are collected using SNMP and classified. if they are identified as normal traffic, traffic analysis delay timer is started to reduce traffic overhead.

  • PDF

Suggest to Organization Algorithm for Data Security when Hacking to Encryption Algorithm's key in Network Data Communication (네트워크 통신에서 패킷의 암호화 알고리즘의 키 해킹시 데이터 보안을 위한 조립알고리즘 제안)

  • Jang, Seung-Chul;Jun, Moon-Suk
    • Proceedings of the KAIS Fall Conference
    • /
    • 2010.05a
    • /
    • pp.207-209
    • /
    • 2010
  • 오늘날 네트워크 통신은 다양한 해킹방법들로부터 데이터를 보호하기 위하여 다양한 암호화 알고리즘을 사용하여 통신하고 있다. 이렇게 사용되는 암호화 알고리즘에서 키가 누출되어 해킹되었을 경우 데이터에 대한 정보누출 및 수정, 삭제 등의 데이터 가공을 당하게 된다. 본 논문에서는 이러한 문제를 보완하기 위하여 본래의 데이터를 섞고, 재조립하는 조립알고리즘을 제안한다.

  • PDF