• Title/Summary/Keyword: amplification attack

Search Result 15, Processing Time 0.021 seconds

Design and Implementation of Blockchain Network Based on Domain Name System (블록체인 네트워크 기반의 도메인 네임 시스템 설계 및 구현)

  • Heo, Jae-Wook;Kim, Jeong-Ho;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.5
    • /
    • pp.36-46
    • /
    • 2019
  • The number of hosts connected to the Internet has increased dramatically, introducing the Domain Name System(DNS) in 1984. DNS is now an important key point for all users of the Internet by allowing them to use a convenient character address without memorizing a series of numbers of complex IP address. However, relative to the importance of DNS, there still exist many problems such as the authorization allocation issue, the disputes over public registration, security vulnerability such as DNS cache poisoning, DNS spoofing, man-in-the-middle attack, DNS amplification attack, and the need for many domain names in the age of hyper-connected networks. In this paper, to effectively improve these problems of existing DNS, we proposed a method of implementing DNS using distributed ledger technology, blockchain, and implemented using a Ethereum-based platform. In addition, the qualitative analysis performance comparative evaluation of the existing domain name registration and domain name server was conducted, and conducted security assessments on the proposed system to improve security problem of existing DNS. In conclusion, it was shown that DNS services could be provided high security and high efficiently using blockchain.

A pioneer scheme in the detection and defense of DrDoS attack involving spoofed flooding packets

  • Kavisankar, L.;Chellappan, C.;Sivasankar, P.;Karthi, Ashwin;Srinivas, Avireddy
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.5
    • /
    • pp.1726-1743
    • /
    • 2014
  • DDoS (Distributed Denial of Service) has been a continuous threat to the cyber world with the growth in cyber technology. This technical evolution has given rise to a number of ultra-sophisticated ways for the attackers to perform their DDoS attack. In general, the attackers who generate the denial of service, use the vulnerabilities of the TCP. Some of the vulnerabilities like SYN (synchronization) flooding, and IP spoofing are used by the attacker to create these Distributed Reflected Denial of Service (DrDoS) attacks. An attacker, with the assistance of IP spoofing creates a number of attack packets, which reflects the flooded packets to an attacker's intended victim system, known as the primary target. The proposed scheme, Efficient Spoofed Flooding Defense (ESFD) provides two level checks which, consist of probing and non-repudiation, before allocating a service to the clients. The probing is used to determine the availability of the requested client. Non-repudiation is taken care of by the timestamp enabled in the packet, which is our major contribution. The real time experimental results showed the efficiency of our proposed ESFD scheme, by increasing the performance of the CPU up to 40%, the memory up to 52% and the network bandwidth up to 67%. This proves the fact that the proposed ESFD scheme is fast and efficient, negating the impact on the network, victim and primary target.

Split Password-Based Authenticated Key Exchange (분할된 패스워드 기반 인증된 키교환 프로토콜)

  • 류종호;염흥열
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.23-36
    • /
    • 2004
  • This paper presents a password based authentication and key exchange protocol which can be used for both authenticating users and exchanging session keys for a subsequent secure communication over an untrusted network. Our idea is to increase a randomness of the password verification data, i.e., we split the password, and then amplify the split passwords in the high entropy-structured password verification data. And in order to prevent the verifier-compromised attack, we construct our system such that the password verification data is encrypted with the verifier's key and the private key of verifier used to encrypt it is stored in a secure place like a smart cards. Also we propose the distributed password authentication scheme utilizing many authentication servers in order to prevent the server-compromised attack occurred when only one server is used. Furthermore, the security analysis on the proposed protocol has been presented as a conclusion.

Resonant Characteristics in Rectangular Harbor with Narrow Entrance (2.Effects of Entrance Energy Loss) (개구부가 좁은 직사각형 항만의 공진 특성 (2.항입구 에너지 손실의 영향))

  • 정원무;박우선;서경덕;채장원
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.11 no.4
    • /
    • pp.216-230
    • /
    • 1999
  • A Galerkin finite element model for the analysis of harbor oscillation has been developed based on the extended mild-slope equation. Infinite elements are used to accomodate the radiation condition at infinity and joint elements to treat the matching conditions at the harbor entrance which include the energy loss due to flow separation. The numerical tests for rectangular harbors with fully or partially open entrances show that the energy loss at the harbor entrance considerably reduces the the amplification ratios at the innermost parts of the harbors and that the amplification ratios decrease considerably with increasing incident wave heights and jet lengths at the harbor entrance. Application of the model to the Gamcheon harbor show that when the incident wave amplitude is small the amplification ratios rather increase when the entrance energy loss is included than when ignored because of the shift of the resonance periods. Even though the entrance energy loss was insignificant for the measured long-period incident waves, it would be of great importance if the incident waves were large as in the attack of tsunamis. The resonance period of the Helmholtz mode at the Gamcheon Harbor was calculated to be 31 minutes, which agrees well with the measured one between 27 and 33.3 minutes. The measured resonance periods between 9.4 and 12.1 minutes and 5.2 and 6.2 minutes were also calculated by the numerical model as 10.4 minutes and 6.6 or 5.6 minutes, indicating good performance of the model. On the other hand, it was shown that a variety of oscillation modes exists in the Gamcheon Harbor and lateral resonances of considerable amplification ratios also exist at the periods of 3.6 and 1.6 minutes as in the Young-II Bay.

  • PDF

Hash-based SSDP for IoT Device Security (IoT 기기 보안을 위한 해시 기반의 SSDP)

  • Kim, Hyo-Jong;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.5
    • /
    • pp.9-16
    • /
    • 2021
  • Due to the prolonged infectious disease of COVID-19 worldwide, there are various security threats due to network attacks on Internet of Things devices that are vulnerable to telecommuting. Initially, users of Internet of Things devices were exploited for vulnerabilities in Remote Desktop Protocol, spear phishing and APT attacks. Since then, the technology of network attacks has gradually evolved, exploiting the simple service discovery protocol of Internet of Things devices, and DRDoS attacks have continued to increase. Existing SSDPs are accessible to unauthorized devices on the network, resulting in problems with information disclosure and amplification attacks on SSDP servers. To compensate for the problem with the authentication procedure of existing SSDPs, we propose a hash-based SSDP that encrypts server-specific information with hash and adds authentication fields to both Notify and M-Search message packets to determine whether an authorized IoT device is present.