• Title/Summary/Keyword: System Attack Technique

Search Result 205, Processing Time 0.024 seconds

Intelligence Report and the Analysis Against the Phishing Attack Which Uses a Social Engineering Technique (사회공학기법을 이용한 피싱 공격 분석 및 대응기술)

  • Lee, Dong-Hwi;Choi, Kyong-Ho;Lee, Dong-Chun;J. Kim, Kui-Nam;Park, Sang-Min
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.171-177
    • /
    • 2006
  • The hacking aspect of recent times is changing, the phishing attack which uses a social engineering technique is becoming the threat which is serious in Information Security. It cheats the user and it acquires a password or financial information of the individual and organization. The phishing attack uses the home page which is fabrication and E-mail and acquires personal information which is sensitive and financial information. This study proposes the establishment of National Fishing Response Center, complement of relation legal system Critical intelligence distribution channel of individual and enterprise.

  • PDF

Autopilot Design for Agile Missile with Aerodynamic Fin and Thrust Vecotring Control

  • Lee, Ho-Chul;Choi, Yong-Seok;Choi, Jae-Weon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.525-530
    • /
    • 2003
  • This paper is concerned with a control allocation strategy using the dynamic inversion which generates the nominal control input trajectories, and autopilot design using the time-varying control technique which is time-varying version of pole placement of linear time-invariant system for an agile missile with aerodynamic fin and thrust vectoring control. Dynamic inversion can decide the amount of the deflection of each control effector, aerodynamic fin and thrust vectoring control, to extract the maximum performance by combining the action of them. Time-varying control technique for autopilot design enhance the robustness of the tracking performance for a reference command. Nonlinear simulations demonstrates the dynamic inversion provides the effective nominal control input trajectories to achieve the angle of attack command, and time-varying control technique exhibits good robustness for a wide range of angle of attack.

  • PDF

Proposing a New Approach for Detecting Malware Based on the Event Analysis Technique

  • Vu Ngoc Son
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.107-114
    • /
    • 2023
  • The attack technique by the malware distribution form is a dangerous, difficult to detect and prevent attack method. Current malware detection studies and proposals are often based on two main methods: using sign sets and analyzing abnormal behaviors using machine learning or deep learning techniques. This paper will propose a method to detect malware on Endpoints based on Event IDs using deep learning. Event IDs are behaviors of malware tracked and collected on Endpoints' operating system kernel. The malware detection proposal based on Event IDs is a new research approach that has not been studied and proposed much. To achieve this purpose, this paper proposes to combine different data mining methods and deep learning algorithms. The data mining process is presented in detail in section 2 of the paper.

A Study on the Experimental Methods of the Power Analysis Attack in a Smartcard (스마트카드의 전력분석공격 실험 방법에 관한 연구)

  • 이훈재;장익훈;최희봉;박일환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.6A
    • /
    • pp.540-548
    • /
    • 2002
  • Attacks have been proposed that use side information as timing measurements, power consumption, electromagnetic emissions and faulty hardware. Elimination side-channel information or prevention it from being used to attack a secure system is an tractive ares of research. In this paper, differential power analysis techniques to attack the DES are experimented and analyzed. And we propose the prevention of DPA attack by software implementation technique.

Full-scale study of conical vortices and roof corner pressures

  • Wu, F.;Sarkar, P.P.;Mehta, K.C.
    • Wind and Structures
    • /
    • v.4 no.2
    • /
    • pp.131-146
    • /
    • 2001
  • A full-scale synchronized data acquisition system was set up on the roof of the experimental building at the Texas Tech University Wind Engineering Research Field Laboratory to simultaneously collect approaching wind data, conical vortex images, and roof corner suction pressure data. One-second conditional sampling technique has been applied in the data analysis, which makes it possible to separately evaluate the influencing effects of the horizontal wind angle of attack, ${\theta}$, and the vertical wind angle of attack, ${\varphi}$. Results show a clear cause-and-effect relationship between the incident wind, conical vortices, and the induced roof-corner high-suction pressures. The horizontal wind angle of attack, ${\theta}$, is shown to be the most significant factor in influencing the overall vortex structure and the suction pressures beneath. It is further revealed that the vertical wind angle of attack, ${\varphi}$, plays a critical role in generating the instantaneous peak suction pressures near the roof corner.

A Study of Buffer Overflow Prevention Technique for Secure System (안전한 시스템을 위한 Buffer Overflow 대응기법분석에 관한 연구)

  • 조진호;황현욱;박종백
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10a
    • /
    • pp.608-610
    • /
    • 2000
  • Buffer Overflow는 가장 핵심적인 해킹기법중의 하나이다. 현재 해킹피해의 대부분을 차지하며 local attack뿐 아니라 remote attack까지 가능하므로 이를 이해함은 보안을 이해하는 차원에서 매우 중요하다. 본 논문에서는 Buffer Overflow의 원리와 최근 발생한 시스템의 해킹 형태를 살펴보고, 이를 방지할 수 있는 기법들을 분석하여 Buffer Overflow에 대응할 수 있는 모습을 그려보고자 한다.

  • PDF

A New Key Protection Technique of AES Core against Scan-based Side Channel Attack (스캔 기반 사이드 채널 공격에 대한 새로운 AES 코아 키 보호 기술)

  • Song, Jae-Hoon;Jung, Tae-Jin;Park, Sung-Ju
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.1
    • /
    • pp.33-39
    • /
    • 2009
  • This paper presents a new secure scan design technique to protect secret key from scan-based side channel attack for an Advanced Encryption Standard(AES) core embedded on an System-on-a-Chip(SoC). Our proposed secure scan design technique can be applied to crypto IF core which is optimized for applications without the IP core modification. The IEEE1149.1 standard is kept, and low area and power consumption overheads and high fault coverage can be achieved compared to the existing methods.

A Study regarding IP Traceback designs and security audit data generation. (IP 역추적 설계 및 보안감사 자료생성에 관한 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • KSCI Review
    • /
    • v.15 no.1
    • /
    • pp.53-64
    • /
    • 2007
  • Avoid at damage systems in order to avoid own IP address exposure, and an invader does not attack directly a system in recent hacking accidents at these papers, and use Stepping stone and carry out a roundabout attack. Use network audit Policy and use a CIS, AIAA technique and algorithm, the Sleep Watermark Tracking technique that used Thumbprints Algorithm, Timing based Algorithm, TCP Sequence number at network bases, and Presented a traceback system at TCP bases at log bases, and be at these papers Use the existing algorithm that is not one module in a system one harm for responding to invasion technology develop day by day in order to supplement the disadvantage where is physical logical complexity of configuration of present Internet network is large, and to have a fast technology development speed, and presentation will do an effective traceback system.

  • PDF

A Study of the Back-tracking Techniques against Hacker's Mobile Station on WiBro (WiBro에서 공격 이동단말에 대한 역추적기법 연구)

  • Park, Dea-Woo;Lim, Seung-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.3
    • /
    • pp.185-194
    • /
    • 2007
  • WiBro has become intentionally standardize as IEEE 802.16e. This WiBro service has been started by a portable internet at home as well as abroad. In this paper, an offender hacker do not direct attack on system on system that It marched an attack directly in damage system because a place oneself in mobile station of portable internet WiBro and avoid to attack hacker's system. At this time, a mobile make use of network inspection policy for back-tracking based on log data. Used network log audit, and presented TCP/IP bases at log bases as used algorithm, the SWT technique that used Thumbprint Algorithm. Timing based Algorithm, TCP Sequence number. Study of this paper applies algorithm to have been progressed more that have a speed to be fast so that is physical logical complexity of configuration of present Internet network supplements a large disadvantage, and confirm an effective back-tracking system. result of research of this paper contribute to realize a back-tracking technique in ubiquitous in WiBro internet network.

  • PDF

Analysis on Consensus Algorithms of Blockchain and Attacks (블록체인 합의 알고리즘과 공격 분석)

  • Kim, Sam-Taek
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.9
    • /
    • pp.83-88
    • /
    • 2018
  • The blockchain is the technique which is used in decentralized system instead of centralized system. Its characteristics are anonymous and transparency. However, there are still some traditional attacks. In this paper, we introduced some of the famous consensus algorithm with blockchain: Bitcoin, Algorand, and IOTA. Also, this paper talked about how each consensus algorithm tried to solve those traditional attacks such as double spending attack or sybil attack. Furthermore, if the consensus algorithm does not consider those attacks yet, then the author would introduce additional methods to solve those attacks. Furthermore, this paper proposed the new scenario that can make classical attacks be happened.