• Title/Summary/Keyword: Web Attack

Search Result 214, Processing Time 0.027 seconds

An Analysis of Network Traffic on DDoS Attacks against Web Servers (웹 서버에 대한 DDoS공격의 네트워크 트래픽 분석)

  • Lee, Cheo-Iho;Choi, Kyung-Hee;Jung, Gi-Hyun;Noh, Sang-Guk
    • The KIPS Transactions:PartC
    • /
    • v.10C no.3
    • /
    • pp.253-264
    • /
    • 2003
  • This paper presents the analytic model of Distributed Denial-of-Service (DDoS) attacks in two settings: the normal Web server without any attack and the Web server with DDoS attacks. In these settings, we measure TCP flag rate, which is expressed in terms of the ratio of the number of TCP flags, i.e., SYN, ACK, RST, etc., packets over the total number of TCP packets, and Protocol rate, which is defined by the ratio of the number of TCP (UDP or ICMP) packets over the total number of W packets. The experimental results show a distinctive and predictive pattern of DDoS attacks. We wish our approach can be used to detect and prevent DDoS attacks.

Threat Diagnosis and Security Verification of Services Using Server-Side Browsers (서버 측 브라우저를 활용한 서비스들의 보안 위협 진단 및 안전성 검증)

  • Min-sang Lee;Hyoung-kee Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.693-706
    • /
    • 2024
  • The browser is utilized to render web pages in programs that perform tasks such as data extraction, format conversion, and development testing on web pages. Online services that utilize browsers can cause security issues if browser information is exposed or used in an unsafe manner. This paper presents security requirements for the safe use of browsers and explains the security threats that arise if these requirements are not met. Through evaluation, the security verification of commercial web applications is conducted, and the vulnerabilities that allow browsers to be exploited as attack tools are analyzed.

Research on countermeasures against malicious file upload attacks (악성 파일 업로드 공격 대응방안 연구)

  • Kim, Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.2
    • /
    • pp.53-59
    • /
    • 2020
  • Malicious file upload attacks mean that the attacker to upload or transfer files of dangerous types that can be automatically processed within the web server's environment. Uploaded file content can include exploits, malware and malicious scripts. An attacker can user malicious content to manipulate the application behavior. As a method of detecting a malicious file upload attack, it is generally used to find a file type by detecting a file extension or a signature of the file. However, this type of file type detection has the disadvantage that it can not detect files that are not encoded with a specific program, such as PHP files. Therefore, in this paper, research was conducted on how to detect and block any program by using essential commands or variable names used in the corresponding program when writing a specific program. The performance evaluation results show that it detected specific files effectively using the suggested method.

Selection and Ranking of Common Attack Patterns for Developing Secure Web Applications (안전한 웹 애플리케이션 개발을 위한 공통 공격패턴의 선별 및 순위화)

  • Moon, Jae-Chan;Kim, Dae-Gyeong;Cho, Seong-Je
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06b
    • /
    • pp.226-228
    • /
    • 2012
  • 최근 HTML5, AJAX(Asynchronous JavaScript XML) 등으로 구현된 웹 애플리케이션이 널리 이용됨에 따라 웹 애플리케이션에 존재하는 취약점을 악용하는 공격 사례가 증가하고 있다. 웹 애플리케이션의 안전한 개발과 유지보수를 위해, 설계/구현 단계에서의 취약점 완화를 통한 예방, 그리고 운영 단계에서의 공격 탐지 및 대응이 필요하다. 더불어, 위험한 취약점들 및 공격 패턴들을 분석하고 우선순위를 부여하여, 웹 애플리케이션 개발 단계 및 운영 단계에서 심각한 취약점과 공격들을 우선 고려해야 한다. 본 논문에서는 OWASP Top 10과 CWE(Common Weakness Enumeration)를 연동시켜 CAPEC(Common Attack Pattern Enumeration and Classification)에서 웹 관련 주요 공격 패턴을 선별하고 순위화하였다. CWE는 취약점 예방에 도움을 주며, 순위화된 공격 패턴은 웹 애플리케이션에서 주요 공격들을 효율적으로 방어할 수 있게 하여 준다.

Smart Airport and Next Generation Security Screening Technology (스마트공항과 차세대 보안검색 기술)

  • Hong, J.W.;Oh, J.H.;Lee, H.K.
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.2
    • /
    • pp.73-82
    • /
    • 2019
  • Airport is shifted airport 1.0 to airport 4.0 called smart airport and services paradigm is changed into direction to point the customer targeted benefits. Smart airports make use of integrated Internet of Things components to provide added-value services. By integrating smart components, airports are being exposed to a larger attack surface and new attack vectors. Self-services such as web or mobile check-in, self check-in/tagging/back drop/boarding, etc. should be strengthened to make airport processes smarter, and technologies such as automatic immigration, smart security search, and automatic AI-based baggage search should be applied. In this paper, we describe the necessity and importance of smart airports and next generation security screening technology. Further, we describe a walk through-type smart security screening system.

A Study on Online Fraud and Abusing Detection Technology Using Web-Based Device Fingerprinting (웹 기반 디바이스 핑거프린팅을 이용한 온라인사기 및 어뷰징 탐지기술에 관한 연구)

  • Jang, Seok-eun;Park, Soon-tai;Lee, Sang-joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1179-1195
    • /
    • 2018
  • Recently, a variety of attacks on web services have been occurring through a multiple access environment such as PC, tablet, and smartphone. These attacks are causing various subsequent damages such as online fraud transactions, takeovers and theft of accounts, fraudulent logins, and information leakage through web service vulnerabilities. Creating a new fake account for Fraud attacks, hijacking accounts, and bypassing IP while using other usernames or email addresses is a relatively easy attack method, but it is not easy to detect and block these attacks. In this paper, we have studied a method to detect online fraud transaction and obsession by identifying and managing devices accessing web service using web-based device fingerprinting. In particular, it has been proposed to identify devices and to manage them by scoring process. In order to secure the validity of the proposed scheme, we analyzed the application cases and proved that they can effectively defend against various attacks because they actively cope with online fraud and obtain visibility of user accounts.

A study of Web page monitoring system to prevent file modification attack (WMS(Webpage Monitoring System)을 이용한 웹 페이지 변조 감시 시스템에 관한 연구)

  • Lee, Sang-Kyu;Yoo, Chuck
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10d
    • /
    • pp.104-107
    • /
    • 2007
  • 현대 사회의 정보전달 매체는 대부분 웹을 통해 이뤄진다. 특히 기업의 경우에는 자신들의 홈페이지를 통해 회사소개, 제품소개 등의 정보를 전달하고 있다. 홈페이지는 단순 정보전달의 기능분만 아니라 기업의 이미지를 대표하는 심볼로 사용되어진다. 이러한 웹 페이지는 보안솔루션을 이용하여 외부로부터 위 변조를 예방하고 있으나 한계를 가진다. 이 논문에서는 보안솔루션을 우회 또는 내부사용자로부터 위 변조된 웹 페이지를 모니터링 하여 피해를 최소화하는 방안을 제시한다.

  • PDF

Analyses of Detection and Protection for Phishing on Web page (웹페이지의 피싱 차단 탐지 기술에 대한 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.607-610
    • /
    • 2008
  • Phishing is a form of online identity theft that aims to steal sensitive information such as online banking passwords and credit card information from users. Phishing scams have been receiving extensive press coverage because such attacks have been escalating in number and sophistication. According to a study by Gartner, Many Internet users have identified the receipt of e-mail linked to phishing scams and about 2 million of them are estimated to have been tricked into giving away sensitive information. This paper presents a novel browser extension, AntiPhish, that aims to protect users against spoofed web site-based phishing attack.

  • PDF

Web Scan Attack Detection based on File List (File List를 이용한 Web Scan 공격탐지)

  • Kim, Jin-Mook;Back, Yung-Ho;Ryou, Hwang-Bin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.845-851
    • /
    • 2005
  • 웹 서비스는 매우 가깝고 편리한 인터넷 서비스중의 하나이다. 이러한 웹 서비스의 이용이 증가함으로써 웹을 이용한 공격과 취약점 분석으로 위한 위험성이 급격하게 증가하고 있다. 이는 웹 서비스가 가지고 있는 공개성 때문이다. 이에 본 논문에는 웹 공격과정에서 필요한 정보를 얻거나 어플리케이션의 취약점을 찾는 웹 스캔공격을 탐지하기 위한 방법으로 웹 서버의 파일 리스트를 이용하는 방법을 제안하고자 한다. 시스템의 설계와 구현을 위해 사용한 감사 데이터는 Snort에서 일차적으로 탐지된 것을 제외한 웹 서버의 접근로그를 사용한다. 생성된 감사 데이터와 파일 리스트를 비교하여 사용자 요청의 존재여부로 공격을 탐지하도록 설계하였다. 이와 같은 방법은 제안시스템의 실험을 통하여 웹 스캔 공격의 탐지에 효과가 있는 것으로 밝혀졌다.

  • PDF

A Design of Client BBS System for Secure HVA

  • Park, Jae-Kyung;Kim, Young-Ja
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.9
    • /
    • pp.73-80
    • /
    • 2018
  • In this paper, we propose a new type of client server environment to improve the architecture vulnerable to hacking in an existing client server environment. On the server side, move the existing Web server to the client side and This is a way for clients to communicate only the data they need and suggests a structure that completely blocks the web attack itself to the server. This can completely prevent a server from being hacked, spreading malicious code and hacking data on a server. It also presents a new paradigm that will not affect servers even if malware is infected with client PCs. This paper validates the proposed environment through BBS (Big Bad Stick) hardware in the form of USB on the client side. This study proof that secure services are provided through encryption communication with server-side security equipment, indicating that this study is a system with new security.