• Title/Summary/Keyword: virus attack

Search Result 98, Processing Time 0.032 seconds

A Study on the Effect of Format String on Secure Programming in C Language (C언어에서 포맷 스트링이 프로그램 보안에 미치는 영향)

  • Lee, Hyung-Bong;Cha, Hong-Jun;Choi, Hyung-Jin
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.693-702
    • /
    • 2001
  • One of the major characteristics of C language is that it allows us to use pointer type variables to access any area of virtual address space. So, we can read/write/execute from/to virtual memory area not controlled delicately by operating system. We can access such memory area by using format string and it can be a vulnerability of C language from the point of secure programming. In this paper, we analyze in detail the process of security attack based on format string and then exploit a new virus style attack which is stepwise and durable with some actual scenarios to warn the severity of it, and grope for some preliminary responding actions.

  • PDF

A Study on Cloud Network and Security System Analysis for Enhanced Security of Legislative Authority (입법기관의 보안강화를 위한 Cloud 네트워크 분석 및 보안 시스템 연구)

  • Nam, Won-Hee;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.6
    • /
    • pp.1320-1326
    • /
    • 2011
  • National institutions on the importance of information security is being recognized, information security laws are being discussed in Congress 3.4 DDoS incident and Nonghyup hacking, etc. However, National Assembly Secretariat when the results of the Information Security Consulting has been assessed very low 61.2 points, evaluation of hardware and software in secure areas were vulnerable. This paper, the legislative support agencies National Assembly and National Assembly Secretariat on the network and computer systems, and managerial, technical and physical security elements are analyzed for the status. And network should have the legislative support agencies and system for the physical network separation, DDoS attack response, Virus attack response, hacking attacks response, and Cyber Emergency Response Team/Coordination Center for Cyber infringing design and research through the confidentiality, integrity, availability, access control, authentication and security analysis is based on the evaluation criteria. Through this study, the legislative support agencies to strengthen the security of data and security laws enacted to provide the basis for.

A Study of the Intelligent Connection of Intrusion prevention System against Hacker Attack (해커의 공격에 대한 지능적 연계 침입방지시스템의 연구)

  • Park Dea-Woo;Lim Seung-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.2 s.40
    • /
    • pp.351-360
    • /
    • 2006
  • Proposed security system attacks it, and detect it, and a filter generation, a business to be prompt of interception filtering dates at attack information public information. inner IPS to attack detour setting and a traffic band security, different connection security system, and be attack packet interceptions and service and port interception setting. Exchange new security rule and packet filtering for switch type implementation through dynamic reset memory by real time, and deal with a packet. The attack detection about DDoS, SQL Stammer, Bug bear, Opeserv worm etc. of the 2.5 Gbs which was an attack of a hacker consisted in network performance experiment by real time. Packet by attacks of a hacker was cut off, and ensured the normal inside and external network resources besides the packets which were normal by the results of active renewal.

  • PDF

Overview of Pandemic Influenza (신종 인플루엔자 대유행 개관)

  • Kim, Woo-Joo
    • Journal of Preventive Medicine and Public Health
    • /
    • v.38 no.4
    • /
    • pp.373-378
    • /
    • 2005
  • Influenza virus has a unique characteristics of annual epidemics of acute respiratory disease with attack rate of 10%-30% of the population. It is also the classical emerging infectious disease causing global pandemics when new antigenic shift occur. This antigenic shift is the key to its ability to evoke periodic pandemics, and it has caused at least 3 pandemics in 20th century. I reviewed these 3 pandemics in their natural courses and the epidemiology of the recent emerging influenza A viruses, especially the H5 and H7 subtypes. I descr ibed the epidemics of these vi ruses in human population and why we should be prepared to these viruses.

Relationship Between Plant Viral Encoded Suppressor to Post-transcriptional Gene Silencing and Elicitor to R Gene-specific Host Resistance

  • Park, Chang-Won;Feng Qu;Tao Ren;T. Jack Morris
    • The Plant Pathology Journal
    • /
    • v.20 no.1
    • /
    • pp.22-29
    • /
    • 2004
  • Many important horticultural and field crops are susceptible to virus infections or may possess a degree of resistance to some viruses, but become infected by others. Plant viruses enter cells through the presence of wounds, and replicate intracellularly small genomes that encode genes required for replication, cell-to-cell movement and encapsidation. There are numerous evidences from specific virus-host interactions to require the involvement of host factors and steps during viral replication cycle. However, viruses should deal with host defense responses either by general or specific mechanisms, targeting viral components or genome itself. On the other hand, the host plants have also adapted to defend themselves against viral attack by operating different lines of resistance responses. The defense-related interactions provide new insights into the complex molecular strategies for hosts for defense and counter-defense employed by viruses.

Implementation of a security system using the MITM attack technique in reverse (MITM 공격기법을 역이용한 보안시스템 구현)

  • Rim, Young-woo;Kwon, Jung-jang
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.01a
    • /
    • pp.79-80
    • /
    • 2021
  • 본 논문은 MITM 공격기법을 역이용한 네트워크 보안 기술 및 구현 방안을 제시한다. MITM(Man In The Middle) 공격은 통신 경로 중간에 개입하여 양 단간의 통신 내용을 가로채거나 행위 제어를 수행하는 전통적인 해킹 방법으로 그 공격 기법을 역이용하여 네트워크 공격을 방어하는 보안기술 및 시스템 구현에 대해 기술한다. Linux 시스템을 이용하여 ARP Poisoning을 통해 양단간 통신 트래픽에 개입하며, Netfilter 및 Suricata를 이용하여 Network IDS/IPS 및 Firewall을 구현하였고, Contents 필터링 및 Anti-Virus 구현이 가능하며, 여러 기능을 확장하여 UTM(Unified Threats Management) 시스템을 구현하였다.

  • PDF

A Study on the Worm.Virus Attack Technique of Cyber Warfare (사이버 정보전 웜.바이러스 공격 기술 연구)

  • 김환국;서동일;이상호
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.776-779
    • /
    • 2004
  • With the rapid progress of information technique, it is getting more difficult to protect information systems from cyber terrorism, because of bugs and vulnerabilities of software and the properties of cyberspace such as anonymity. furthermore cyber terror techniques are highly developed and complicated and their use for a malicious intent and a military purpose are increasing recently. Therefore a study of warfare attack technology on the cyber space is necessary for establishing trusted society and further national security. Specially, worms/viruses are becoming a more common occurrence on the cyber space. Also, The worm caused a great deal of damage to the large number of networks around the world in a very short period of time. Therefore, we will describe worms/viruses in the warfare attack technique in this paper.

  • PDF

Tracking Application Behaviors Using User Interactions on Android Smartphones (안드로이드 스마트폰에서 사용자 상호작용을 이용한 앱 행위 추적 기법)

  • Ahn, Woo Hyun;Joun, Young Nam
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.61-71
    • /
    • 2014
  • In recent years, malwares in Android smartphones are becoming increased explosively. Since a great deal of appsare deployed day after day, detecting the malwares requires commercial anti-virus companies to spend much time and resources. Such a situation causes malwares to be detected after they have become already spread. We propose a scheme called TAU that dynamically tracks application behaviors to specify apps with potential security risks. TAU keeps track of how a user's interactions to smartphones incurs the app installation, the route of app spread, and the behavior of app execution. This tracking specifies apps that have the possibility of attacking the smartphones using the drive-by download and update attack schemes. Moreover, the tracked behaviors are used to decide whether apps are repackaged or not. Therefore, TAU allows anti-virus companies to detect malwares efficiently and rapidly by guiding to preferentially analyze apps with potential security risks.

Epidemiologic Investigation into the Outbreak of Acute Hemorrhagic Conjunctivitis in Gyeongju-City, South Korea, in 2002 (2002년 경주시에서 유행한 급성출혈성결막염에 관한 역학조사)

  • Kim, Hong-Hwan;Min, Young-Sun;Lim, Hyun-Sul
    • Journal of Preventive Medicine and Public Health
    • /
    • v.37 no.4
    • /
    • pp.312-320
    • /
    • 2004
  • Objectives : An outbreak of acute hemorrhagic conjunctivitis (AHC) caused by coxsackie A24 (CA24) virus occurred in South Korea in 2002. CA24 was isolated for the first time from patients with AHC. Therefore, this study was conducted to understand the transmission routes and prevent another AHC outbreaks. Methods : The authors conducted a questionnaire survey among 1,730 students from 2 middle schools and 1 technical high school in Gyeongju city. For statistical analysis the chi-square test was used, and chi-square for trend method showing a level of significance less than p<0.05 was proven to be significant. Variables which were proven to be significant in univariate analysis were analysed by multiple logistic regression. Results : The attack rate was 57.1%. The student groups with rubbing one s own eyes, computer usage, and sharing cellular phone had a significantly higher AHC attack rate (p<0.05). According to the multiple logistic regression, the odds ratios for male, high school, computer use, sharing cellular phone, and rubbing one s own eyes were significant (p<0.05). Conclusion : The most significant feature of this outbreak was that many students rubbed their own eyes following contact with AHC patients in a deliberate attempt to avoid going to school. Other transmission methods were computer usage and sharing cellular phone. In the future, health and school authorities must plan new strategies for the prevention of AHC.

An Attack of Defeating Keyboard Encryption Module using Javascript Manipulation in Korean Internet Banking (자바스크립트 변조를 이용한 국내 인터넷 뱅킹 키보드 암호화 모듈 우회 공격)

  • Lee, Sung-hoon;Kim, Seung-hyun;Jeong, Eui-yeob;Choi, Dae-seon;Jin, Seung-hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.941-950
    • /
    • 2015
  • Internet banking is widely used in our life with the development of the internet. At the same time, phishing attacks to internet banking have been increased by using malicious object to make unfair profit. People using internet banking service in Korea is required to install security modules such as anti-virus and keyboard protection. However phishing attack technique has been progressed and the advanced technique such as memory hacking defeats the security module of internet banking service. In this paper, we describe internet banking security modules provided by Korean internet banks and analyze how keyboard encryption module works. And we propose an attack to manipulate account transfer information using javascript. Although keyboard protection module provides two functions that protect leakage and manipulation of account transfer information submitted by users against the malicious program of hackers. Our proposed technique can manipulate the account transfer information and result html pages.