• Title/Summary/Keyword: sniffer

Search Result 26, Processing Time 0.042 seconds

Human Memorable Password based Efficient and Secure Identification

  • Park Jong-Min
    • Journal of information and communication convergence engineering
    • /
    • v.3 no.4
    • /
    • pp.213-216
    • /
    • 2005
  • Almost all network systems provide an authentication mechanism based on user ID and password. In such system, it is easy to obtain the user password using a sniffer program with illegal eavesdropping. The one-time password and challenge-response method are useful authentication schemes that protect the user passwords against eavesdropping. In client/server environments, the one-time password scheme using time is especially useful because it solves the synchronization problem. It is the stability that is based on Square Root Problem, and we would like to suggest PBI(password Based Identification), enhancing the stability, for all of the well-known attacks by now including Off-line dictionary attack, password file compromise, Server and so on. The PBI is also excellent in the aspect of the performance.

Implementation of User Authentication using Java-based One-Time Transformation Password Mechanism (자바 기반의 일회성 변형 암호 기법을 이용한 사용자 인증 구현)

  • Lee, Seung-Heon;Lee, Byung-Wook
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.10b
    • /
    • pp.1461-1464
    • /
    • 2000
  • 사용자 인증과정에서 나오는 패킷 정보 유출은 보안상 큰 문제가 되고있다. 따라서, 사용자 인중과정에 대한 보안 강화 대책이 요구된다. 본 논문에서는 변형 암호 인증 방식을 응용하여 사용자 인증 방식을 강화한다. sniffer와 같은 패킷 단위의 공격이 있을 경우 암호키를 모르면 해독이 불가능하다. 로그인을 위한 페이지에서 파악한 IP와 입력받을 때 파악한 IP가 같아야만 인증을 허용함으로써 로그인 화면이 아닌 다른 경로에 의한 접근을 원천적으로 막는다. 암호화에 사용되는 키를 항상 새로 생성함으로써 키 유출에 관한 문제를 해결한다. 마지막으로 안전성이 해슁 알고리즘의 의존도를 낮추어 안전성을 강화한다.

  • PDF

Design and Implementation of IR-UWB Packet Analyzer Based on IEEE 802.14.5a (IEEE 802.15.4a IR-UWB 패킷 분석기 설계 및 구현)

  • Lim, Sol;Lee, Kye Joo;Kim, So Yeon;Hwang, Intae;Kim, Dae Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.12
    • /
    • pp.2857-2863
    • /
    • 2014
  • IR-UWB has been developed as a standard of indoor ranging technology, because it has robust and good transmission characteristics in indoor environments and it can be operated with low power. In this paper, a IR-UWB packet analyzer is designed and implemented based on IEEE 802.15.4a, which is useful in developing IR-UWB real time location system with resolution of a few ten centimeters. A sniffer device of the packet analyzer monitors IR-UWB wireless networks, captures MAC packet frames, and transmits packet frames to the packet analyzing computer. The packet analyzing program in a computer analyzes received MAC packet frames and displays parsed packet information for developing engineers. Developed packet analyzer is used to analyze IEEE 802.15.4a MAC protocol, and also it can be used in other IEEE 802 series MAC protocol by modifying some functions.

A Performance Monitoring System for Heterogeneous SOAP Nodes (이기종 SOAP 노드의 실시간 성능 모니터링 시스템)

  • Lee Woo-Joong;Kim Jungsun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.6
    • /
    • pp.484-498
    • /
    • 2004
  • In this paper. we propose a novel performance monitoring scheme for heterogeneous SOAP nodes. The scheme is basically based on two-level (kernel-level and user-level) packet filtering of TCP flows. By TCP flow, we mean a sequence of raw packet streams on a TCP transaction. In this scheme, we detect and extract SOAP operations embedded in SOAP messages from TCP flows. Therefore, it becomes possible to monitor heterogeneous SOAP nodes deployed on diverse SOAP-based middlewares such as .Net and Apache AXIS. We present two implementation mechanisms for the proposed scheme. The first mechanism tries to identify SOAP operations by analyzing all fragmented SOAP messages on TCP flows. However, a naive policy would incur untolerable overhead since it needs to copy all packets from kernel to user space. The second mechanism overcomes this problem by selectively copying packets from kernel to user space. For selective copying, we use a kernel-level packet filtering method that makes use of some representative TCP flags.(e.g. SIN, FIN and PSH). In this mechanism, we can detect SOAP operations only from the last fragment of SOAP messages in most cases. Finally, we implement a SOAP monitoring system using a component ca]led SOAP Sniffer that realizes our proposed scheme, and show experimental results. We strongly believe that our system will play a vital role as a tool for various services such as transaction monitoring and load balancing among heterogeneous SOAP nodes.

Establishment of a secure networking between Secure OSs

  • Lim, Jae-Deok;Yu, Joon-Suk;Kim, Jeong-Nyeo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2097-2100
    • /
    • 2003
  • Many studies have been done on secure operating system using secure kernel that has various access control policies for system security. Secure kernel can protect user or system data from unauthorized and/or illegal accesses by applying various access control policies like DAC(Discretionary Access Control), MAC(Mandatory Access Control), RBAC(Role Based Access Control), and so on. But, even if secure operating system is running under various access control policies, network traffic among these secure operating systems can be captured and exposed easily by network monitoring tools like packet sniffer if there is no protection policy for network traffic among secure operating systems. For this reason, protection for data within network traffic is as important as protection for data within local system. In this paper, we propose a secure operating system trusted channel, SOSTC, as a prototype of a simple secure network protocol that can protect network traffic among secure operating systems and can transfer security information of the subject. It is significant that SOSTC can be used to extend a security range of secure operating system to the network environment.

  • PDF

Economic Justification of the Internet Access Management (인터넷 차단 시스템의 경제성 분석에 대한 연구)

  • Kim, Sang-Kyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.6 s.38
    • /
    • pp.269-278
    • /
    • 2005
  • To justify the economic impacts of the internet access management is a purpose of this paper. Previous researches on economic justification were reviewed and the internet access management system. sniffer, and firewall were implemented to monitor real-time sessions and to record blocked attempts. This paper suggests the impact factors and measurement methods to justify the economic values of the internet access management system. Finally, this paper Proves that the overall impacts of the internet access management system have a Positive value because filtering mechanisms cause users to lose a small number of URLs including useful information and to diminish refreshment but save users from various risk points and enhance labor productivity.

  • PDF

A Design and Implementation of A Rule-based Security Evaluation System for W Security Engine (IP Security 엔진을 위한 규칙기반 보안평가 시스템의 설계 및 구현)

  • Gwon, Hyeok-Chan;Hyeon, Jeong-Sik;Kim, Sang-Chun;Na, Jae-Hun;Son, Seung-Won
    • The KIPS Transactions:PartC
    • /
    • v.9C no.3
    • /
    • pp.367-374
    • /
    • 2002
  • IPsec offers not odd Internet security service such as Internet secure communication and authentication but also the safe key exchange and anti-replay attack mechanism. Recently IPsec is implemented on the various operating systems. But there is no existing tool that checks the servers, which provide IPsec services, work properly and provide their network security services well. In this paper, we design and implement the rule based security evaluation system for IPsec engine. This system operated on Windows and UNX platform. We developed the system using Java and C language.

The Implementation of Sniffing Detector and Management Tool in Local LAN (로컬 LAN환경에서의 스니핑(Sniffing) 탐지 및 관리도구 구현)

  • 김기욱;김창수;정신일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.696-699
    • /
    • 2001
  • In these days, there are explosive growths of Internet users. But the damages of hacking are on the increase lately too. Currently, many researches for detection of hacking are studying, and there are many Hacking detection tools. In this thesis, We designed and implemented Sniffing detection and Management Tool, Which ran search an invasion by sniffing in Local LAN environment. The Implementation of Sniffing Detector and Management Tool are composed of two modules. In other words, They are Sniffing Detector Tool and Sniffing Management Tool. The Sniffing Detector Tool discovers implementation of the Sniffing from optional host to Sniffing Detector host. And The Sniffing Management Tool displays information of Sniffer on Web_Browser.

  • PDF

Role and Subject of Private Security to Counter-Terrorism (테러방지를 위한 민간경비의 역할과 과제)

  • Kwon, Jeonghoon
    • Journal of the Society of Disaster Information
    • /
    • v.7 no.2
    • /
    • pp.130-139
    • /
    • 2011
  • This paper examined closely on the application of the private securities to the measures for countering terrorism. It is related to the fact that the role of human information comes into the picture nowadays. On closer examination of the application of the private securities to the national facilities, transportation, and multi-use facilities, it was found that having consistent commissioned education through the private-public cooperation and enacting legislation for allowing armed guard to board ships, making private security guards to use sniffer dogs, placing private security guards in each subway station is required, and the active publicity campaign of the government concerned needs to take place for directing and setting up the system for supervising managers of the authorities and changing the way they think of countering terrorism.

Design of Packet Analyzer Using SharpPcap (SharpPcap 기반의 대화형 패킷 분석기의 설계)

  • Yoo, Jaeheon;Choi, Seongryong;Kim, Minchul;Kim, Jinmo;Hwang, Soyoung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.177-180
    • /
    • 2015
  • As network technology advances hacking techniques are also evolving. This paper proposes design of a packet analyzer to monitor and analyze data packets in networks. The proposed packet analyzer offers functions such as packet sniffing, filtering and statistics. We implemented a prototype packet analyzer in C# .NET development environment using SharPcap.

  • PDF