• Title/Summary/Keyword: Threat Security

Search Result 1,066, Processing Time 0.033 seconds

A Simulation Analysis of Abnormal Traffic-Flooding Attack under the NGSS environment

  • Kim, Hwan-Kuk;Seo, Dong-Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1568-1570
    • /
    • 2005
  • The internet is already a part of life. It is very convenient and people can do almost everything with internet that should be done in real life. Along with the increase of the number of internet user, various network attacks through the internet have been increased as well. Also, Large-scale network attacks are a cause great concern for the computer security communication. These network attack becomes biggest threat could be down utility of network availability. Most of the techniques to detect and analyze abnormal traffic are statistic technique using mathematical modeling. It is difficult accurately to analyze abnormal traffic attack using mathematical modeling, but network simulation technique is possible to analyze and simulate under various network simulation environment with attack scenarios. This paper performs modeling and simulation under virtual network environment including $NGSS^{1}$ system to analyze abnormal traffic-flooding attack.

  • PDF

A study on the vulnerability of the Cloud computing security (클라우드 컴퓨팅 보안의 취약성에 관한 연구)

  • Jeon, Jeong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1239-1246
    • /
    • 2013
  • Recently, The cloud computing technology is emerging as an important issue in the world, and In technology and services, has attracted much attention. However, the positive aspects of cloud computing unlike the includes several vulnerabilities. For this reason, the Hacking techniques according to the evolution of a variety of attacks and damages is expected. Therefore, this paper will be analyzed management models through case studies and experiments to the threats and vulnerabilities of the cloud computing. and In the future, this is expected to be utilized as a basis for the security design and performance improvement.

Analyses of Trend of Threat of Security in Internet of Things (사물 인터넷망에서의 보안 위협 기술 동향 분석)

  • Shin, Yoon-gu;Jung, Sungha;Do, Tahoon;Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.895-896
    • /
    • 2015
  • With the development of sensor, wireless mobile communication, embedded system and cloud computing, the technologies of Internet of Things have been widely used in logistics, Smart devices security, intelligent building and o on. Bridging between wireless sensor networks with traditional communication networks or Internet, IoT gateway plays n important role in IoT applications, which facilitates the integration of wireless sensor networks and mobile communication networks or Internet, and the management and control with wireless sensor networks. The IoT Gateway is a key component in IoT application systems but It has lot of security issues. We analyzed the trends of security and privacy matters.

  • PDF

Trends in Supply-Chain Security Technologies (공급망 보안기술 동향)

  • Kim, Daewon;Kang, Dongwook;Choi, Yongje;Lee, Sangsu;Choi, Byeongcheol
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.4
    • /
    • pp.149-157
    • /
    • 2020
  • Security threats in supply-chains can be targeted at all the users who use products related to these supply-chains as well as at single equipment or individuals. This implies that these security threats can cause nationwide economic and social damages. In particular, it is true that hardware security threat analysis technology in supply-chains has significant technical barriers due to the lack of software knowledge as well as the need to study and understand undisclosed hardware designs. In this paper, we discuss the future direction of studies by introducing basic concepts and attack cases, along with domestic and foreign technology trends related to supply-chain security technology.

Analysis of Security Threat in u-Healthcare Service (u-Healthcare 서비스의 정보보호 위협 분석)

  • Shin, Dong-Hoon;Han, Byoung-Jin;Lee, Hwan-Jin;Jung, Hyun-Chul
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2010.06d
    • /
    • pp.52-55
    • /
    • 2010
  • 유비쿼터스 기술의 발전으로, u-City, u-물류, u-기상관측,u-Healthcare 등 다양한 융합 서비스가 개발되어 실생활에 적용되기를 기다리고 있다. 이들 중, 기존 의료서비스에 유비쿼터스 기술을 접목하여 언제, 어디서나 보건의료서비스를 제공하고자 하는 u-Healthcare 서비스의 경우에는, 바이오정보를 포함한 개인 정보와 의료정보를 다루기 때문에 해킹으로 인한 정보유출 사고발생시 국가적인 혼란과 사회적인 불신을 야기할 수 있다. 본 논문에서는 국내외에서 추진하고 있는 u-healthcare 서비스 현황을 조사하고, 이에 대한 보안위협을 제시하여 u-Healthcare 서비스의 정보보호 대책 수립시 활용할 수 있도록 제시한다.

  • PDF

Attack Path and Intention Recognition System for detecting APT Attack (APT 공격 탐지를 위한 공격 경로 및 의도 인지 시스템)

  • Kim, Namuk;Eom, Jungho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.1
    • /
    • pp.67-78
    • /
    • 2020
  • Typical security solutions such as intrusion detection system are not suitable for detecting advanced persistent attack(APT), because they cannot draw the big picture from trivial events of security solutions. Researches on techniques for detecting multiple stage attacks by analyzing the correlations between security events or alerts are being actively conducted in academic field. However, these studies still use events from existing security system, and there is insufficient research on the structure of the entire security system suitable for advanced persistent attacks. In this paper, we propose an attack path and intention recognition system suitable for multiple stage attacks like advanced persistent attack detection. The proposed system defines the trace format and overall structure of the system that detects APT attacks based on the correlation and behavior analysis, and is designed with a structure of detection system using deep learning and big data technology, etc.

Analysis and Countermeasure of Malicious Code in Small Businesses (중소기업 환경에서 악성코드 유형 분석과 대응 방안)

  • Hong, Jun Suk;Kim, Young hee;Park, Won Hyung;Kook, Kwang Ho
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.55-62
    • /
    • 2015
  • Due to the development of various information systems and PC, usage of Internet has rapidly increaced which lead to malicious codes rapidly spreading throughout the Internet. By the increasing use of the Internet, the threat by malicious codes has become a serious problem. In particular, Small businesses which lack investments in security personnels makes it impossible to verify and measure the servers and PC infected with malicious codes. We have analized malware infection types by using malicious code detection technology of security monitoring service and proposed countermeasures in small businesses.

A Study on Analysis of each Security Threat in Mobile Office based on Cloud Computing (클라우드 컴퓨팅 기반 모바일 오피스에서의 요소별 보안위협 분석 연구)

  • Jung, Jaewook;Jeon, Huiseung;Park, Sunwoo;Won, Dongho
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2012.07a
    • /
    • pp.445-446
    • /
    • 2012
  • 스마트폰 시장의 급격한 성장에 의해 모바일 애플리케이션의 사용이 증가함에 따라, 스마트기기들을 이용하여 기업의 업무에 사용할 수 있는 클라우드 기반의 모바일 오피스 시대가 도래하고 있다. 또한, 신속성이 동반된 효율적인 기업 업무 처리의 장점으로 인해 모바일 클라우드 시장이 매년 확대되고 있는 추세이다. 그러나 클라우드 컴퓨팅 환경은 시간과 공간의 제약 없이 광범위한 분야에 적용 가능하기 때문에 여러 위협들이 존재 할 수 있으며, 그에 따른 적합한 보안기술 연구가 필수적이다. 이에 본 논문에서는 클라우드 컴퓨팅 환경에서의 보안위협과 모바일 오피스 환경에서의 보안위협을 각각 도출하고, 이를 바탕으로 융합된 두 환경에서 존재할 수 있는 보안위협을 각 요소별로 분석한다.

  • PDF

A Research on Gender Analysis of BGP Security (BGP의 보안성에 대한 기존 연구 분석)

  • Sun, Jae-Hoon;Kim, Yong-Ho;Sun, Yong-Bin
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.35-41
    • /
    • 2009
  • Internet routing protocols currently in use in the typical protocol of the existing BGP protocol to strengthen the security of the BGP protocol by comparison with research on emerging issues of the AS-Path, IP Fake, DRDoS BGP protocol must be used when such the information you need, but due to malicious attack, or an incorrect setting can prevent the global Internet network operating in an security to threat information are analyzed.

  • PDF

A Study on Information Management System for Cyber Threat Information Analysis (사이버 위협정보 분석을 위한 연관정보 수집 및 관리체계 연구)

  • Cho, Hyeisun;Lee, Seulgi;Kim, Byungik;Shin, Youngsang;Lee, Taijin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.872-874
    • /
    • 2015
  • 최근 침해사고는 특정 목적을 지닌 공격자들은 자신의 목적을 달성하기 위해 공격을 지속적으로 감행하는 특징을 보인다. 하지만, 기존에 진행된 악성코드 감염 호스트 분석, 네트워크 행위기반 분석 등의 단일 침해사고에 대한 분석은 다른 침해사고와의 관계를 유기적으로 연결하지 못하기 때문에, 타 침해사고와의 연관성 분석, 동일 공격자의 특성 파악을 통한 표적형 공격 및 향후 공격예측을 지원하지 못한다는 단점이 있다. 본 논문에서는 이러한 문제점을 해결하기 위해서, 상용에서 서비스되고 있는 사이버 위협정보 공유 시스템의 정보를 기반으로 이와 연관된 정보의 이력 및 유사관계를 관리하여 침해사고간의 연관성을 파악하는 방법을 제시한다.