• Title/Summary/Keyword: spoofing

Search Result 264, Processing Time 0.025 seconds

Comparison of Proxy Server Mechanisms in Satellite Internet (위성 인터넷망에서의 프록시 서버 기법 비교)

  • 김용신;김영한;전경재;안재영
    • Proceedings of the IEEK Conference
    • /
    • 1999.06a
    • /
    • pp.106-109
    • /
    • 1999
  • 위성 인터넷망에서의 성능 향상을 위한 프록시의 대표적인 기법인 Snoop과 Spoofing에서의 TCP 성능을 모의실험을 통해 비교하고, 전체 메모리 크기에 따른 TCP 전송 특성 변화를 살펴보았다. Spoofing과 Snoop에서 모두 TCP 전송율이 향상됨을 확인할 수 있었고, Spoofing을 적용했을 경우 Snoop보다 높은 전송율을 얻을 수 있었으나 데이터를 저장하기 위한 버퍼 요구량이 매우 커졌다. 메모리 크기는 제한되어 있으므로 효율적인 메모리 분배 방법이 필요함을 고찰할 수 있었다.

  • PDF

A Study of Indirect Attack Method with Interlocked Proxy Server in Foreign Country (해외에서 Proxy Server를 연동한 우회적인 공격기법 연구)

  • Lee, Bo-Man;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.432-435
    • /
    • 2011
  • Hacking 공격자에 대한 수사실무에서는 Proxy Server를 연동한 해외에서의 우회공격에 대한 기법과 기술을 알아야 MAC address 또는 Real IP에 대한 역추적이 가능하다. 즉 Proxy Server를 여러 번 거치면서 자신의 Real IP를 숨기고 ARP Spoofing 기법을 사용하여 MAC address를 속이기 때문이다. 본 논문에서는 해외에서의 해킹 공격자들이 어떻게 공격자의 Real IP를 숨기고, ARP Spoofing 기법을 응용하여 공격을 시도하는 기법과 기술을 연구한다. 또한 Proxy Server를 통한 우회공격에서 ARP Spoofing 공격을 보안하는 방법을 연구한다. 본 논문 연구가 해외로 부터의 Hacking과 방어를 위한 기술 발전에 기여 할 것 이다.

  • PDF

Ranging Performance for Spoofer Localization using Receiver Clock Offset

  • Lee, Byung-Hyun;Seo, Seong-Hun;Jee, Gyu-In;Yeom, Dong-Jin
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.5 no.3
    • /
    • pp.137-144
    • /
    • 2016
  • In this paper, the performance of ranging measurement, which is generated using two receiver clock offsets in one receiver, was analyzed. A spoofer transmits a counterfeited spoofing signal which is similar to the GPS signal with hostile purposes, so the same tracking technique can be applied to the spoofing signal. The multi-correlator can generate two receiver clock offsets in one receiver. The difference between these two clock offsets consists of the path length from the spoofer to the receiver and the delay of spoofer system. Thus, in this paper, the ranging measurement was evaluated by the spoofer localization performance based on the time-of-arrival (TOA) technique. The results of simulation and real-world experiments show that the position and the system clock offset of the spoofer could be estimated successfully.

Improving TCP performance over wired-wireless networks (유무선 통합망에서 TCP 성능 향상)

  • 김윤주;이미정;안재영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.04a
    • /
    • pp.319-321
    • /
    • 2001
  • 무선망을 이용한 데이터 통신 서비스에 대한 수요가 빠르게 늘고, 인터넷(Internet)의 팽창과 일반화에 따라 무선데이터망에서 TCP/IP 통신 응용을 효율적으로 지원하는 것이 중요한 문제로 대두되고 있다. 그러나 무선망은 유선망과 달리 높은 오류율이 나타난다. 그러므로 상대적으로 데이터의 오류율과 손실률이 낮은 유선망을 기반으로 설계된 기존의 TCP 기법들은 무선망에서 적절하게 작동하지 못한다. 이를 해결하기 위해서 Snoop과 Spoofing 등의 방법들이 제안되어 왔는데 Snoop의 경우 유선 링크의 대역폭을 낭비할 수 있는 가능성이 있고 Spoofing 등의 방법들이 제안되어 왔는데 Snoop의 경우 유선 링크의 대역폭을 낭비할 수 있는 가능성이 있고 Spoofing의 경우 기지국의 버퍼 요구량이 크다는 문제가 있다. 이에 본 논문에서는 기지국에서 Snoop과 Spoofing을 동시에 기용하여 무선 링크에서의 패킷 전송 성공 여부에 따라 이 두 가지 모듈을 선택적으로 사용함으로써 기지국의 버퍼 요구 정도를 줄이면서 TCP 성능을 향상시킬 수 있는 방법을 제안하였다.

An Internet Stopper Using ARP Spoofing with Automatic Node Identification (자동 노드 인식 기능을 갖는 ARP 스푸핑을 이용한 인터넷 차단기)

  • Jung, In-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.6
    • /
    • pp.93-106
    • /
    • 2011
  • In this paper we describe an efficient and easy to use internet stopper, which is called AINS (Automatic Internet Stopper), which uses ARP spoofing scheme. Instead of forwarding packets to router for the case of hacking, in ARP spoofing, the AINS ignores all the packets so that internet stopping operates. The AINS program needs to be installed only in manager computer that does not require additional agent program. In addition to setting manually the stopping computer list, it is able to indentify network nodes automatically by analyzing broadcasting packets. The experimental results show that less than 4 secs for spoofing interval is enough for blocking internet usage regardless the number of computers and therefore network overhead is negligible. The AINS can indentify and control network nodes not only on same subnet but also on different subnet only if they are connected onto same ethernet switch physically. It is being used for an efficient tool for controling internet usage of university computer laboratory and also for an efficient network management.

A Modeling of Forensics for Mobile IP Spoofing Prevention (모바일 IP 스푸핑 방지를 위한 포렌식 설계)

  • Park, Sun-Hee;Yang, Dong-Il;Jin, Kwang-Youn;Choi, Hyung-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.2
    • /
    • pp.307-317
    • /
    • 2012
  • Rapid development of the IT technology and mobile communications has increasingly improved many kinds of digital devices arise, as well as the mobile technology. However, the attacks (virus, hacking and Ip spoofing etc) have also increasingly grown dogged on any region including the society security. As the visual data is prone to copy, delete and move etc, it is necessary that attesting to the integrity of forensics evidence is crucial, as well as data transmission security. This paper presents a framework model using digital forensics method and the results of its performance evaluation for mobile security. The results show that the integrity of the visual data can be obtain with high security and make a proposal refer to prevention of Mobile IP Spoofing attack using our hashing data.

Be study technical information protection in ubiqutious home networks (유비쿼터스 홈 네트워크에서의 정보보호 기술 연구)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • KSCI Review
    • /
    • v.15 no.1
    • /
    • pp.65-75
    • /
    • 2007
  • Analyzed about a matter and requirements to intimidate security of ubiquitous and home network threatening various security for personal information protection in ubiquitous home networks at these papers, and studied. Got authentication procedures and verification procedures acid user approach to be reasonable through designs to the home security gateway which strengthened a security function in the outsides, and strengthened protection of a home network. Also, execute a DoS, DDoS, IP Spoofing attack protective at home network security gateways proved, and security regarding an external denial of service attack was performed, and confirmed. Strengthen appliances and security regarding a user, and confirm a defense regarding an external attack like DoS, DDoS, IP Spoofing, and present a home network security model of this paper to the plans that can strengthen personal information protection in ubiquitous home networks in ubiquitous home networks through experiment.

  • PDF

Spatial spectrum approach for pilot spoofing attack detection in MIMO systems

  • Ning, Lina;Li, Bin;Wang, Xiang;Liu, Xiaoming;Zhao, Chenglin
    • ETRI Journal
    • /
    • v.43 no.5
    • /
    • pp.941-949
    • /
    • 2021
  • In this study, a spatial spectrum method is proposed to cope with the pilot spoofing attack (PSA) problem by exploiting the of uplink-downlink channel reciprocity in time-division-duplex multiple-input multiple-output systems. First, the spoofing attack in the uplink stage is detected by a threshold derived from the predefined false alarm based on the estimated spatial spectrum. When the PSA occurs, the transmitter (That is Alice) can detect either one or two spatial spectrum peaks. Then, the legitimate user (That is Bob) and Eve are recognized in the downlink stage via the channel reciprocity property based on the difference between the spatial spectra if PSA occurs. This way, the presence of Eve and the direction of arrival of Eve and Bob can be identified at the transmitter end. Because noise is suppressed by a spatial spectrum, the detection performance is reliable even for low signal-noise ratios and a short training length. Consequently, Bob can use beamforming to transmit secure information during the data transmission stage. Theoretical analysis and numerical simulations are performed to evaluate the performance of the proposed scheme compared with conventional methods.

A Study ou Iuternet Traffic Coutrol: Blockiug of harmful information based on IP spoofing (인터넷 트래픽 제어에 관한 연구: IP 주소 위조 기법을 사용한 유해 정보 차단 시스템)

  • Paek Seon-uck
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.5 no.5
    • /
    • pp.447-453
    • /
    • 2004
  • In this paper, we propose a new system to block harmful Internet information based on IP spoofing. The proposed system is located on a organization's internal network and monitors all outgoing traffic and lets all this traffic go outside. Once the proposed system detects a host's access to a harmful site, it sends the host a pseudo RST packet that pretends to be the response from the harmful site, and prevents the connection between the host and the harmful site. The proposed software system is installed on only a server, and need not be installed on user hosts at all. Thus we can maintain and upgrade the blocking system easily. The performance evaluation of the proposed system shows that it effectively blocks the access to the harmful sites. Since the proposed system is based on IP spoofing, it can be used badly as a hacking tool. Finally we propose some methods to eliminate this possibility.

  • PDF