• 제목/요약/키워드: application security threats

검색결과 162건 처리시간 0.023초

Research on Security Threats Emerging from Blockchain-based Services

  • Yoo, Soonduck
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제13권4호
    • /
    • pp.1-10
    • /
    • 2021
  • The purpose of the study is to contribute to the positive development of blockchain technology by providing data to examine security vulnerabilities and threats to blockchain-based services and review countermeasures. The findings of this study are as follows. Threats to the security of blockchain-based services can be classified into application security threats, smart contract security threats, and network (P2P) security threats. First, application security threats include wallet theft (e-wallet stealing), double spending (double payment attack), and cryptojacking (mining malware infection). Second, smart contract security threats are divided into reentrancy attacks, replay attacks, and balance increasing attacks. Third, network (P2P) security threats are divided into the 51% control attack, Sybil attack, balance attack, eclipse attack (spread false information attack), selfish mining (selfish mining monopoly), block withholding attack, DDoS attack (distributed service denial attack) and DNS/BGP hijacks. Through this study, it is possible to discuss the future plans of the blockchain technology-based ecosystem through understanding the functional characteristics of transparency or some privacy that can be obtained within the blockchain. It also supports effective coping with various security threats.

A Study on the Mobile Application Security Threats and Vulnerability Analysis Cases

  • Kim, Hee Wan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제12권4호
    • /
    • pp.180-187
    • /
    • 2020
  • Security threats are increasing with interest due to the mass spread of smart devices, and vulnerabilities in developed applications are being exposed while mobile malicious codes are spreading. The government and companies provide various applications for the public, and for reliability and security of applications, security checks are required during application development. In this paper, among the security threats that can occur in the mobile service environment, we set up the vulnerability analysis items to respond to security threats when developing Android-based applications. Based on the set analysis items, vulnerability analysis was performed by examining three applications of public institutions and private companies currently operating as mobile applications. As a result of application security checks used by three public institutions and companies, authority management and open module stability management were well managed. However, it was confirmed that many security vulnerabilities were found in input value verification, outside transmit data management, and data management. It is believed that it will contribute to improving the safety of mobile applications through the case of vulnerability analysis for Android application security.

물리보안 관제시스템의 보안위협 사례를 통한 취약점 분석 및 대응방안 연구 (Problem Analysis and Countermeasures Research through Security Threat Cases of Physical Security Control Systems)

  • 고윤성;박광혁;김창수
    • 한국멀티미디어학회논문지
    • /
    • 제19권1호
    • /
    • pp.51-59
    • /
    • 2016
  • Physical security protecting people from physical threats, such as a person or vehicle, has received a great attention. However, it has many risks of hacking and other security threats because it is highly dependent on automated management systems. In addition, a representative system of physical security, a CCTV control system has a high risk of hacking, such as video interceptions or video modulation. So physical security needs urgent security measures in accordance with these threats. In this paper, we examine the case of security threats that have occurred in the past, prevent those from threatening the physical security, and analyze the security problem with the threats. Then we study the countermeasures to prevent these security threats based on the problems found in each case. Finally we study for the method to apply these countermeasures.

Security of Web Applications: Threats, Vulnerabilities, and Protection Methods

  • Mohammed, Asma;Alkhathami, Jamilah;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • 제21권8호
    • /
    • pp.167-176
    • /
    • 2021
  • This is the world of computer science and innovations. In this modern era, every day new apps, webs and software are being introduced. As well as new apps and software are being introduced, similarly threats and vulnerable security matters are also increasing. Web apps are software that can be used by customers for numerous useful tasks, and because of the developer experience of good programming standards, web applications that can be used by an attacker also have multiple sides. Web applications Security is expected to protect the content of critical web and to ensure secure data transmission. Application safety must therefore be enforced across all infrastructure, including the web application itself, that supports the web applications. Many organizations currently have a type of web application protection scheme or attempt to build/develop, but the bulk of these schemes are incapable of generating value consistently and effectively, and therefore do not improve developers' attitude in building/designing stable Web applications. This article aims to analyze the attacks on the website and address security scanners of web applications to help us resolve web application security challenges.

Mitigating Threats and Security Metrics in Cloud Computing

  • Kar, Jayaprakash;Mishra, Manoj Ranjan
    • Journal of Information Processing Systems
    • /
    • 제12권2호
    • /
    • pp.226-233
    • /
    • 2016
  • Cloud computing is a distributed computing model that has lot of drawbacks and faces difficulties. Many new innovative and emerging techniques take advantage of its features. In this paper, we explore the security threats to and Risk Assessments for cloud computing, attack mitigation frameworks, and the risk-based dynamic access control for cloud computing. Common security threats to cloud computing have been explored and these threats are addressed through acceptable measures via governance and effective risk management using a tailored Security Risk Approach. Most existing Threat and Risk Assessment (TRA) schemes for cloud services use a converse thinking approach to develop theoretical solutions for minimizing the risk of security breaches at a minimal cost. In our study, we propose an improved Attack-Defense Tree mechanism designated as iADTree, for solving the TRA problem in cloud computing environments.

안드로이드 앱 악성행위 탐지를 위한 분석 기법 연구 (Android Application Analysis Method for Malicious Activity Detection)

  • 심원태;김종명;류재철;노봉남
    • 정보보호학회논문지
    • /
    • 제21권1호
    • /
    • pp.213-219
    • /
    • 2011
  • 스마트폰 시장이 급속하게 성장함에 따라 보안위협도 동시에 증가하고 있다. 가장 큰 스마트폰 보안위협 중 하나는 스마트폰 마켓에 안전성이 검증되지 않은 어플리케이션이 유통되고 있다는 점이다. 안드로이드 마켓의 경우 어플리케이션 검증을 수행하지 않아 악성 어플리케이션이 유통되고 있는 상황이다. 이와 같이 마켓을 통해 유포되는 악성 어플리케이션에 대응하기 위해서는 안드로이드 어플리케이선의 악성 행위 여부를 탐지할수 있는 기술이 필요하다. 본 논문에서는 안드로이드 어플리케이션의 악성행위를 탐지할 수 있는 분석 방법을 제안하고 구현내용을 소개하고자 한다.

Web Vulnerability Scanner를 이용한 취약성 분석 (Vulnerability Analysis using the Web Vulnerability Scanner)

  • 장희선
    • 융합보안논문지
    • /
    • 제12권4호
    • /
    • pp.71-76
    • /
    • 2012
  • Mashups, web 3.0, 자바스크립트 및 AJAX 등의 이용이 증가하면서 웹애플리케이션 서비스 제공시 웹취약점들에 대한 새로운 보안 위협이 증대되고 있으며, 이에 대한 사전 진단과 함께 대비가 요구된다. 본 논문에서는 웹취약성에 대한 보안 위협과 요구사항을 제시하고, Web Vulnerability Scanner(WVS) 자동화 도구를 이용하여 국내에서 서비스되고 있는 웹사이트를 대상으로 웹취약성을 분석한다. Cross Site Scripting(XSS)와 SQL Injection 등 대표적인 웹취약성에 대한 분석 결과, 약 22.5%에 해당하는 웹사이트가 보안에 취약한 것으로 나타났으며, 취약성 경고 수는 0부터 31,171 alerts로 분포되고, 평균 411 alerts, 편차는 2,563 alerts로서 보안 관리에 취약한 웹사이트의 경우, 경고 수가 높은 값을 나타내고 있어 세부적인 웹취약성에 대한 사전 대비가 필요함을 알 수 있다.

모바일 어플리케이션 개발에서의 보안성 향상을 위한 보안 점검항목 개선에 관한 연구 (A Study on the Security Checklist Improvements to improve the Security in the Mobile Applications Development)

  • 신준엽;김동수;한기준;김희완
    • 디지털융복합연구
    • /
    • 제12권8호
    • /
    • pp.113-127
    • /
    • 2014
  • 모바일 기기의 사용은 개인 및 기업에게 다양한 편의를 제공해 주고 있다. 반면에 모바일 서비스를 위한 환경 구축으로 IT인프라에 존재하는 보안 위협과 새로운 모바일에 대한 보안 위협이 동시에 존재하고 있다. 모바일 환경에 대한 보안 위협을 최소화하기 위해 MDM(Mobile Device Management) 등의 관리 서비스와 모바일 백신 등의 서비스가 큰 관심을 받고 있다. 이러한 솔루션은 모바일 어플리케이션 자체 취약성의 위협으로부터 모바일 서비스를 위해 개발된 어플리케이션을 보호해 주지 못하는 것이 현실이다. 이로 인해 본 논문에서는 모바일 서비스 환경에서 발생할 수 있는 보안 사고를 예방하기 위해 어플리케이션 보안성 검토 항목을 기반으로 모바일 어플리케이션 보안 점검항목을 제시하였다. 이를 통하여 모바일 어플리케이션 개발에 대한 보안성을 향상시키고자 한다. 제시한 점검항목의 실효성 검증을 위하여 실제 안드로이드 기반 어플리케이션을 수집 및 분석하고 어플리케이션에 대한 전수검사를 실시하였고, 점검항목에 대해 전문가의 설문 조사를 통해 적합성을 검증하였다.

안전한 P2P 정보보호 서비스를 위한 키 분배 프로토콜에 관한 연구 (A Study on the Key Distribution Protocol for Secure P2P information Security Service)

  • 이준석
    • 산업융합연구
    • /
    • 제6권1호
    • /
    • pp.57-72
    • /
    • 2008
  • In this study, general outline of P2P(peer to peer) application was analyzed dealing with security attacks and threats on the P2P environment. Information security service was studied to provide secure P2P service under the information threats. This study proposes two methods to provide secure information security service. One is a method to use personal firewall software on the peer. The other is a method to use key distribution protocol for confidentiality and integrity.

  • PDF