• Title/Summary/Keyword: Sniffing 공격

Search Result 47, Processing Time 0.023 seconds

A Study on analysis and visualization of data communication protocol by using Sniffing technology. (스니핑 기술을 이용한 데이터 통신 프로토콜 분석 및 시각화에 대한 연구)

  • Song, MooSong;cho, EunJin;Han, HaeRi;Park, Jinho;Kim, Youngjong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.05a
    • /
    • pp.223-224
    • /
    • 2019
  • 데이터가 오고 가는 네트워크를 사용하는 곳들에서는 패킷을 필히 수집하고 분석한다. 하지만 패킷 스캐닝을 통해 공격 대상에 대한 정보를 수집하고 2차적 공격 시나리오를 구상하는데 악용하는 경우가 발생한다. 본 시스템은 IP/TCP를 중심으로 패킷분석에 대한 전문적인 지식이 없어도 쉽게 확인 가능한 프로그램을 제공할 예정이다.

A Rogue AP Detection Method Based on DHCP Snooping (DHCP 스누핑 기반의 비인가 AP 탐지 기법)

  • Park, Seungchul
    • Journal of Internet Computing and Services
    • /
    • v.17 no.3
    • /
    • pp.11-18
    • /
    • 2016
  • Accessing unauthorized rogue APs in WiFi environments is a very dangerous behavior which may lead WiFi users to be exposed to the various cyber attacks such as sniffing, phishing, and pharming attacks. Therefore, prompt and precise detection of rogue APs and properly alarming to the corresponding users has become one of most essential requirements for the WiFi security. This paper proposes a new rogue AP detection method which is mainly using the installation information of authorized APs and the DHCP snooping information of the corresponding switches. The proposed method detects rogue APs promptly and precisely, and notify in realtime to the corresponding users. Since the proposed method is simple and does not require any special devices, it is very cost-effective comparing to the wireless intrusion prevention systems which are normally based on a number of detection sensors and servers. And it is highly precise and prompt in rogue AP detection and flexible in deployment comparing to the existing rogue AP detection methods based on the timing information, location information, and white list information.

A Study on SCADA system Security Improvement using RSS (RSS를 활용한 SCADA 시스템 보안 향상에 관한 연구)

  • Jung, Sung-Mo;Kim, Seok-Soo;Song, Jae-Gu;Kim, Tai-Hoon
    • Proceedings of the KAIS Fall Conference
    • /
    • 2009.05a
    • /
    • pp.386-389
    • /
    • 2009
  • SCADA 시스템은 대개 생산 공정을 감시하고 제어하는데 사용되는 소프트웨어 패키지로써, 대부분 대규모 플랜트 상태를 감시하고 제어하기 위해 사용된다. 특히, 전력, 댐 철도, 원자력 등과 같은 주요 핵심기반시설에서 이를 활용한다. 기존 SCADA 시스템은 일반적으로 분리된 독자적 네트워크상에서 존재했기 때문에 보안에 소홀할 수밖에 없었다. 그러나 최근 기업정보시스템과의 연동 필요성으로 인해 아주 적게나마 원격에서 접속가능한 지점이 존재하고 이로 인한 취약성이 드러나고 있다. 이처럼 외부 공격에서의 취약성 분석을 통한 연구는 현재 진행 중에 있지만, 물리적인 접속을 통한 RTU Master와 Slave의 데이터를 직접적인 변조에 대한 연구는 이루어지지 않고 있다. Modbus RS485통신을 사용하는 SCADA 시스템의 특성상 RTU Master와 Slave는 RJ11 케이블을 통해 1km까지도 연결될 수 있는 상황이므로, 이러한 케이블에 물리적인 접속을 통하여 데이터를 Sniffing하고 Spoofing하는 것이 가능하다. 따라서 본 논문에서는 이러한 물리적인 접속을 통한 데이터 변조 공격에 대비하기 위하여 RSS를 활용한 보안 향상 방안에 대하여 연구하였고, 이러한 데이터 변조 공격을 검출해 낼 수 있는 모니터링 시스템에 대하여 제안하였다.

  • PDF

Analysis & defence of detection technology in network Attacker (네트워크 침입자탐지기법 분석과 대응)

  • Yun, Dong Sic
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.155-163
    • /
    • 2013
  • Connection hijacking attack using the vulnerability of the TCP protocol to redirect TCP stream goes through your machine actively (Active Attack). The SKEY such as one-time password protection mechanisms that are provided by a ticket-based authentication system such as Kerberos or redirection, the attacker can bypass.Someone TCP connection if you have access on TCP packet sniffer or packet generator is very vulnerable. Sniffer to defend against attacks such as one-time passwords and token-based authentication and user identification scheme has been used. Active protection, but these methods does not sign or encrypt the data stream from sniffing passwords over insecure networks, they are still vulnerable from attacks. For many people, an active attack is very difficult and so I think the threat is low, but here to help break the illusion successful intrusion on the UNIX host, a very aggressive attack is presented. The tools available on the Internet that attempt to exploit this vulnerability, known as the recent theoretical measures is required. In this paper, we propose analysis techniques on a wireless network intruder detection.

A Design Secure QR-Login User Authentication Protocol and Assurance Methods for the Safety of Critical Data Using Smart Device (스마트 기기를 이용한 안전한 QR-Login 사용자 인증 프로토콜의 설계 및 중요 정보의 안전성 보증을 위한 방법)

  • Lee, Jae-Sik;You, Han-Na;Cho, Chang-Hyun;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.10
    • /
    • pp.949-964
    • /
    • 2012
  • Our PC have been under constant threat of malicious codes and viruses today. As many new ways of cyber attacks are being developed, such as zero-day-attack, nobody's PC is guaranteed to be safe from the attacks. In case where a user uses the existing verification protocol on a unsecured PC, the user's verification information may well be threatened by sniffing or man-in-the-middle attack. Especially, deadly attacks like memory hacking would give hard time for users to even recognize any symptom of virus infection. Therefore, this paper designs secured QR-Login user verification protocol for smart devices that are ready to communicate with QR-Code and proposes a way to keep critical data safe when using the internet. This way, user would be able to safeguard his/her critical data even when under attack by unknown attacks and safely carry out extremely sensitive task, like financial trading, on the device.

An Effective Protection Mechanism for SSL Man-in-the-Middle Proxy Attacks (SSL MITM 프록시 공격에 대한 효과적 방어방법)

  • Lim, Cha-Sung;Lee, Woo-Key;Jo, Tae-Chang
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.6
    • /
    • pp.693-697
    • /
    • 2010
  • In current e-commerce system, it happens that client's confidential information such as credit card numbers, pin numbers, or digital certificate may pass through a web proxy server or an altered proxy server without client's awareness. Even though the confidential information is encrypted and sent through SSL(Secure Sockets Layer) or TLS(Transport Layer Security) protocol, it can be exposed to the risk of sniffing by the digital certificate forgery at the proxy server, which is called the SSL MITM(Man-In-The-Middle) Proxy attack. In this paper, current credit card web-payment systems, which is weak at proxy information alternation attack, are analyzed. A resolution with certificate proxy server is also proposed to prevent the MITM attack.

A Repulsive Force based High-Reliable Data Routing Scheme in Wireless Sensor Networks (무선 센서 네트워크 환경에서 반발력 기반 고-신뢰 데이터 라우팅 기법)

  • Seong, Dong-Ook;Lee, Yun-Jeong;Park, Jun-Ho;Yoo, Jae-Soo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06d
    • /
    • pp.171-174
    • /
    • 2011
  • 무선 센서 네트워크를 이용한 응용에서는 데이터 저장 및 처리 기술, 데이터 전송 기술 등과 같은 다양한 기반 기술들이 요구된다. 특히 응용을 실제 환경에 적용하기 위해서는 데이터 보안 기술은 필수적이다. 본 논문은 여러 해킹 기술 중 하나인 스니핑(Sniffing) 공격으로부터 원천적인 방어를 위해 데이터 전송 경로를 위험 요소로부터 물리적으로 회피시키기 위한 라우팅 기법을 제안한다. 제안하는 기법은 크기와 방향 정보를 가지는 반발력 이라는 개념을 기반으로 위험 요소의 인근에 위치한 센서 노드들에게 반발력 정보를 설정한다. 데이터 라우팅 과정에서 반발력이 설정된 노드를 지나갈 경우 해당 정보를 이용하여 안전한 경로로 우회 라우팅을 수행한다. 본 논문에서는 제안하는 기법의 효과를 보이기 위해 시뮬레이션을 통한 동작 모습을 보인다.

Implementation of the Personal Information Infringement Detection Module in the HTML5 Web Service Environment (HTML5 웹 서비스 환경에서의 개인정보 침해 탐지 모듈 구현)

  • Han, Mee Lan;Kwak, Byung Il;Kim, Hwan Kuk;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.1025-1036
    • /
    • 2016
  • The conversion of the international standard web utilization HTML5 technology is being developed for improvement of the internet environment based on nonstandard technology like ActiveX. Hyper Text Markup Language 5 (HTML5) of basic programming language for creating a web page is designed to consider the security more than HTML4. However, the range of attacks increased and a variety of security threats generated from HTML4 environment inherited by new HTML5 API. In this paper, we focus on the script-based attack such as CSRF (Cross-Site Request Forgery), Cookie Sniffing, and HTML5 API such as CORS (Cross-Origin Resource Sharing), Geolocation API related with the infringement of the personal information. We reproduced the infringement cases actually and embodied a detection module of a Plug-in type diagnosed based on client. The scanner allows it to detect and respond to the vulnerability of HTML5 previously, thereby self-diagnosing the reliability of HTML5-based web applications or web pages. In a case of a new vulnerability, it also easy to enlarge by adding another detection module.

A Study on Secure Mobile Payment Service for the Market Economy Revitalization (시장 경제 활성화를 위한 안전한 모바일 전자결제 방안 연구)

  • Kim, Hyung-Uk;Jung, Yong-Hoon;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.41-48
    • /
    • 2017
  • Recently, there has been a lot of ongoing research regarding financial transactions and payments due to the emergence of financial technology (FinTech). Payments have been processed through cash and credit cards, and payment methods have been simplified and are more convenient, with mobile payment via mobile cards and mobile phones. This study offers a new mobile payment method by using a mobile phone instead of a card reader or terminal. For payments, authentication is processed with the user's biometrics and a built-in fingerprint scanner, and the payment is processed after receiving an authentication code issued by the authorizing institution to confirm the user's identity. User biometrics and payment information is secured from any kind of malicious hacker by saving it in a Fast Identity Online (FIDO) Trusted Execution Environment (TEE) section in a smartphone. Regarding key security, every key is securely created in the FIDO TEE section, providing secure mobile payment by neutralizing various malicious attacks, including sniffing and the man-in-the middle attack.

An Authentication Scheme Using OAuth and Cyber Physical Social System (Cyber-Physical-Social 시스템과 OAuth를 이용한 IoT 인증 기법)

  • Cho, Jeong-woo;Lee, Kuk-young;Lee, Ki Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.348-351
    • /
    • 2016
  • Recently on IoT environment, there is necessary of protected network, which is only specific user can access it. Applying OAuth protocol on IoT, it can be easier to construct network authentication system, but it is hard to construct protected network authentication system. And there is weakness of OAuth protocol, which is easily attacked by sniffing Token by attacker. So, it is necessary to secondary authentication for OAuth. In ultimate IoT, the fog computing is essential. Fog computing is extension of cloud that enables networking not only in core system but also in edge system and communication node to node. Strength of fog computing is location awareness, support for mobility, and so on. If authentication in fog computing uses this strength, it can be more specialized in Fog Computing. So, in secondary Authentication, using Cyber-Physical-Social System will increase convenience of user than using existing authentication system, such as authentication certificate, id/password and group key, which is inconvenient for user. This study is about authentication based Cyber-Physical-Social System.

  • PDF