• Title/Summary/Keyword: Page Redirection

Search Result 3, Processing Time 0.016 seconds

Page Redirection Techniques of Mirroring Environment (미러링 환경에서의 페이지 리다이렉션 기술)

  • Jung, Seungil;Park, Jae-Kyung
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.07a
    • /
    • pp.63-66
    • /
    • 2015
  • 본 논문에서는 미러링 환경에서 동작하는 악성링크 차단 및 URL 필터링 시스템에서 URL 접속을 차단할 수 있는 페이지 리다이렉션 기술을 소개한다. 미러링(Mirroring: Out of Path) 환경에서 URL 패킷을 차단하기 위해서 많이 사용하고 있는 방법으로는 RST (Reset) 패킷을 전송하여 세션을 종료하는 방법이다. 이 방법은 요청 서버에 RST(Reset) 패킷을 보내 강제로 종료하는 방식이기 때문에 사용자에게 접근 차단과 관련된 상태 등의 정보를 알려줄 수 없다. 현재 인라인(In-line) 방식에서 사용되고 있는 페이지 리다이렉션 기술을 미러링 환경에서 구현하여 사용자에게 차단 정보를 보여줄 수 있으며 다양한 장비 개발 환경에서 유용하게 사용할 수 있는 기술이라고 판단한다.

  • PDF

A Snoop-Based Kernel Introspection System against Address Translation Redirection Attack (메모리 주소 변환 공격을 탐지하기 위한 Snoop기반의 커널 검사 시스템)

  • Kim, Donguk;Kim, Jihoon;Park, Jinbum;Kim, Jinmok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1151-1160
    • /
    • 2016
  • A TrustZone-based rootkit detecting solution using a secure timer ensures the integrity of monitoring system, because ARM TrustZone technology provides isolated environments from a monitored OS against intercepting and modifying invoke commands. However, it is vulnerable to transient attack due to periodic monitoring. Also, Address Translation Redirection Attack (ATRA) cannot be detected, because the monitoring is operated by using the physical address of memory. To ameliorate this problem, we propose a snoop-based kernel introspection system. The proposed system can monitor a kernel memory in real-time by using a snooper, and detect memory-bound ATRA by introspecting kernel pages every context switch of processes. Experimental results show that the proposed system successfully protects the kernel memory without incurring any significant performance penalty in run-time.

Detection Models and Response Techniques of Fake Advertising Phishing Websites (가짜 광고성 피싱 사이트 탐지 모델 및 대응 기술)

  • Eunbeen Lee;Jeongeun Cho;Wonhyung Park
    • Convergence Security Journal
    • /
    • v.23 no.3
    • /
    • pp.29-36
    • /
    • 2023
  • With the recent surge in exposure to fake advertising phishing sites in search engines, the damage caused by poor search quality and personal information leakage is increasing. In particular, the seriousness of the problem is worsening faster as the possibility of automating the creation of advertising phishing sites through tools such as ChatGPT increases. In this paper, the source code of fake advertising phishing sites was statically analyzed to derive structural commonalities, and among them, a detection crawler that filters sites step by step based on foreign domains and redirection was developed to confirm that fake advertising posts were finally detected. In addition, we demonstrate the need for new guide lines by verifying that the redirection page of fake advertising sites is divided into three types and returns different sites according to each situation. Furthermore, we propose new detection guidelines for fake advertising phishing sites that cannot be detected by existing detection methods.