• 제목/요약/키워드: attacks

검색결과 3,689건 처리시간 0.028초

NS를 이용한 시나리오기반 공격 시뮬레이터 설계 및 구현 (Design and Implementation of Scenario-based Attack Simulator using NS)

  • 최향창;노봉남;이형효
    • 인터넷정보학회논문지
    • /
    • 제7권5호
    • /
    • pp.59-69
    • /
    • 2006
  • 일반적으로 네트워크 공격은 단위 공격이 혼합된 시나리오 형태이다. 시나리오 공격은 광범위한 네트워크 환경에서 이루어지기 때문에 공격 범위가 분명하지 않아 공격과 관련 없어 보이는 불분명한 패킷들까지 분석이 요구된다. 이는 공격에 무관한 패킷들까지 분석에 가담시켜 공격 패턴 탐지를 보다 어렵게 하는 요인이다. 본 논문은 시나리오를 갖는 공격에서 공격에 관련된 패킷 분류를 돕는 공격 시나리오 시뮬레이션 시스템을 설계하고 구현한다. 제안된 시스템은 분석대상 네트워크를 시뮬레이터의 가상환경으로 복제하고, 시나리오에 기반을 둔 공격 행위가 포함된 TCPDUMP패킷을 복제된 가상환경에서 시뮬레이션 할 수 있다. 이 시스템은 보안 관리자들이 공격 시나리오 패턴분석에 유용하게 활용할 수 있을 것이다.

  • PDF

Reverse Proxy Group과 PMS를 이용한 멀티벡터(Multi-Vector) DDoS 공격 방어시스템 구축 방안 (Multi-Vector Defense System using Reverse Proxy Group and PMS(Patch Management System) Construction)

  • 김민수;신상일;김종민;최경호;이대성;이동휘;김귀남
    • 융합보안논문지
    • /
    • 제13권1호
    • /
    • pp.79-86
    • /
    • 2013
  • 본 연구는 최근 들어 DDoS 공격이 단순히 서비스를 방해하는 것에서 벗어나, 다양한 공격 기법을 혼합한 멀티벡터(Multi-Vector) 공격으로 발전하고 있다. 이러한 멀티벡터 공격은 DDoS 공격과 더불어 악성코드를 감염시켜, 내부 정보 유출 및 좀비PC를 만들어 DDoS 공격용에 활용될 경우에는 기존의 DDoS 공격 및 악성코드 감염에 대한 방어 전략으로는 한계점이 있다. 따라서 본 논문에서는 다양한 방법을 이용한 멀티벡터 공격을 효과적으로 방어하기 위한 Reverse Proxy Group과 PMS(Patch Management Server)를 제시하고자 한다.

가변 타원곡선 암호 프로세서의 FPGA 구현 및 전력분석 공격 (FPGA Implementation and Power Analysis Attack of Versatile Elliptic Curve Crypto-processor)

  • 장수혁;이동호
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2004년도 하계종합학술대회 논문집(2)
    • /
    • pp.521-524
    • /
    • 2004
  • For implementation of Cryptographic algorithms, security against implementation attacks such as side-channel attacks as well as the speed and the size of the circuit is important. Power Analysis attacks are powerful techniques of side-channel attacks to exploit secret information of crypto-processors. In this thesis the FPGA implementation of versatile elliptic crypto-processor is described. Explain the analysis of power consumption of ALTERA FPGA(FLEX10KE) that is used in our hand made board. Conclusively this thesis presents clear proof that implementations of Elliptic Curve Crypto-systems are vulnerable to Differential Power Analysis attacks as well as Simple Power Analysis attacks.

  • PDF

암호공격에 안전한 Koblitz 타원곡선 암호시스템의 스칼라 곱셈 알고리즘 (A Scalar Multiplication Algorithm Secure against Side-Channel Attacks for Koblitz Curve Cryptosystems)

  • 장용희;고본직사;고목일의;권용진
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2006년도 하계학술대회
    • /
    • pp.356-360
    • /
    • 2006
  • Recently, many power analysis attacks have been proposed. Since the attacks are powerful, it is very important to implement cryptosystems securely against the attacks. We propose countermeasures against power analysis attacks for elliptic curve cryptosystems based on Koblitz curves (KCs), which are a special class of elliptic curves. That is, we make our countermeasures be secure against SPA, DPA, and new DPA attacks, specially RPA, ZPA, using a random point at each execution of elliptic curve scalar multiplication. And since our countermeasures are designed to use the Frobenius map of KC, those are very fast.

  • PDF

Rekeying Approach against Side Channel Attacks

  • Phuc, Tran Song Dat;Seok, Byoungjin;Lee, Changhoon
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2017년도 춘계학술발표대회
    • /
    • pp.373-375
    • /
    • 2017
  • Side-channel attacks and in particular differential power analysis (DPA) attacks pose a serious threat to cryptographic implementations. One approach to counteract such attacks is cryptographic schemes based on fresh re-keying. In settings of pre-shared secret keys, such schemes render DPA attacks infeasible by deriving session keys and by ensuring that the attacker cannot collect side-channel leakage on the session key during cryptographic operations with different inputs. This paper present a study on rekeying approach against side channel attacks with current secure schemes and their rekeying functions.

Handling Malicious Flooding Attacks through Enhancement of Packet Processing Technique in Mobile Ad Hoc Networks

  • Kim, Hyo-Jin;Chitti, Ramachandra Bhargav;Song, Joo-Seok
    • Journal of Information Processing Systems
    • /
    • 제7권1호
    • /
    • pp.137-150
    • /
    • 2011
  • Mobile ad hoc networks are expected to be widely used in the near future. However, they are susceptible to various security threats because of their inherent characteristics. Malicious flooding attacks are one of the fatal attacks on mobile ad hoc networks. These attacks can severely clog an entire network, as a result of clogging the victim node. If collaborative multiple attacks are conducted, it becomes more difficult to prevent. To defend against these attacks, we propose a novel defense mechanism in mobile ad hoc networks. The proposed scheme enhances the amount of legitimate packet processing at each node. The simulation results show that the proposed scheme also improves the end-to-end packet delivery ratio.

Optimization of Cyber-Attack Detection Using the Deep Learning Network

  • Duong, Lai Van
    • International Journal of Computer Science & Network Security
    • /
    • 제21권7호
    • /
    • pp.159-168
    • /
    • 2021
  • Detecting cyber-attacks using machine learning or deep learning is being studied and applied widely in network intrusion detection systems. We noticed that the application of deep learning algorithms yielded many good results. However, because each deep learning model has different architecture and characteristics with certain advantages and disadvantages, so those deep learning models are only suitable for specific datasets or features. In this paper, in order to optimize the process of detecting cyber-attacks, we propose the idea of building a new deep learning network model based on the association and combination of individual deep learning models. In particular, based on the architecture of 2 deep learning models: Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM), we combine them into a combined deep learning network for detecting cyber-attacks based on network traffic. The experimental results in Section IV.D have demonstrated that our proposal using the CNN-LSTM deep learning model for detecting cyber-attacks based on network traffic is completely correct because the results of this model are much better than some individual deep learning models on all measures.

Quantitative Approach for Calculating DRDoS Risk

  • Young-Ryul Choi;Nam-Kyun Baik
    • Journal of information and communication convergence engineering
    • /
    • 제21권3호
    • /
    • pp.192-197
    • /
    • 2023
  • A Distributed reflection denial of service (DRDoS) is a variant of DDoS attacks that threatens the availability of services to legitimate users. In response to this evolving threat landscape, the cybersecurity industry and service providers have intensified their efforts to develop effective countermeasures. Despite these efforts, attackers continue to innovate, developing new strategies and tools while becoming more sophisticated. Consequently, DRDoS attacks continue to be harmful. Therefore, ongoing research and development is essential to improve defense against DRDoS attacks. To advance our understanding and analysis of DRDoS attacks, this study examines the unique characteristics of DRDoS attacks and quantifies the risks involved. Additionally, it adopts a quantitative rather than traditional qualitative methods to derive and apply risk, particularly the probability of loss that can be caused by DRDoS attacks.

Addressing Emerging Threats: An Analysis of AI Adversarial Attacks and Security Implications

  • HoonJae Lee;ByungGook Lee
    • International journal of advanced smart convergence
    • /
    • 제13권2호
    • /
    • pp.69-79
    • /
    • 2024
  • AI technology is a central focus of the 4th Industrial Revolution. However, compared to some existing non-artificial intelligence technologies, new AI adversarial attacks have become possible in learning data management, input data management, and other areas. These attacks, which exploit weaknesses in AI encryption technology, are not only emerging as social issues but are also expected to have a significant negative impact on existing IT and convergence industries. This paper examines various cases of AI adversarial attacks developed recently, categorizes them into five groups, and provides a foundational document for developing security guidelines to verify their safety. The findings of this study confirm AI adversarial attacks that can be applied to various types of cryptographic modules (such as hardware cryptographic modules, software cryptographic modules, firmware cryptographic modules, hybrid software cryptographic modules, hybrid firmware cryptographic modules, etc.) incorporating AI technology. The aim is to offer a foundational document for the development of standardized protocols, believed to play a crucial role in rejuvenating the information security industry in the future.

음악을 하는 세 청년에게서 관찰된 공황발작의 의미 (The Meaning of Panic Attacks in Three Young People who Play Music)

  • 이기경
    • 심성연구
    • /
    • 제37권1호
    • /
    • pp.1-30
    • /
    • 2022
  • 이 글은 음악을 하는 20대 초반 청년들에게 발생한 공황발작의 의미를 분석 심리학적으로 이해해보고자 하는 시도이다. 공황발작은 주로 20대에 발생한다고 알려진 불안신경증의 일종으로 다양한 자율신경계 증상에 동반되는 극심한 공포와 두려움이 특징이다. 공황발작과 감정기복, 자살사고나 자해행동이 동반된 세 사례에서 공황발작이 나타났던 상황을 살펴보고, 각 사례에서 공황발작의 심리적 의미를 살펴보았다. 첫 번째 사례의 공황발작은 무의식적인 상태로 남아 있고자 하는 이에게 의식성을 가지고 생각하거나 사고하게끔 한다. 두 번째 사례에서 미래를 향한 삶으로의 전진을 망설이며 갈등하는 이에게 내면의 문을 열어 자신의 깊은 마음과 접촉할 수 있게 하여 갈등을 초월할 가능성을 열어주기도 한다. 세 번째 사례에서는 무의식의 실현되고자 하는 본능과 충동을 공황발작으로 경험하고, 그 충동을 의식적으로 실현해간다. 각각 다른 의미가 있는 것처럼 보이는 그들의 공황발작은 청년기 이전 시기의 의식 수준으로부터 새로워질 것을 촉구하는 무의식의 강력한 접근일 것이다.