• Title/Summary/Keyword: 공격 검출 알고리즘

Search Result 72, Processing Time 0.035 seconds

Detecting Inner Attackers and Colluded nodes in Wireless Sensor Networks Using Hop-depth algorithm (Hop-depth 알고리즘을 이용한 무선 센서 네트워크상에서의 내부공격자 및 공모노드 검출)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.1
    • /
    • pp.113-121
    • /
    • 2007
  • Commonly, in the Sensor Network that composed with multiple nodes uses Ad-hoc protocol to communicate each other. Each sensed data packets are collected by base node and processed by Host PC. But the Ad-hoc protocol is too vulnerable to Sinkhole attack, where the intruder attracts surrounding nodes with unfaithful routing information, and then performs selective forwarding or changes the data passing through it. The Sinkhole attack increases overhead over the network and boosts energy consumption speed to decrease network's life time. Since the other attacks can be easily adopted through sinkhole attack, the countermeasure must be considered carefully. In this paper, we proposed the Hop-depth algorithm that detects intruder in Sinkhole attack and colluded nodes. First, the proposed algorithm makes list of suspected nodes and identifies the real intruder in the suspected node list through the Hop-depth count value. And recalculates colluder's path information to find the real intruder. We evaluated the performance of the proposed algorithm using NS2. We compared and analyzed the success ratio of finding real intruder, false positive ratio, false negative ratio, and energy consumption.

Watermarking Extraction Algorithm Usi Frequency Trans form in Geometric Attack (기하학적 공격에 대한 영상의 주파수 변환 Watermarking 검출 알고리즘 개발)

  • 배준수;장진수;이문호
    • Proceedings of the IEEK Conference
    • /
    • 2001.09a
    • /
    • pp.213-216
    • /
    • 2001
  • 본 논문은 DCT, FFT 및 Wavelet 등과 같은 주파수 영역에 의한 Watermarking 기법에서 정확한 Watermark를 검출하기 위하여 제안한 알고리즘이다. 본 논문에서 사용한 알고리즘은 기존의 왜곡된 영상에서 원 영상의 주파수 변환 값을 제거하여 왜곡된 상태의 영상 값에서 삽입된 Watermark를 검출하는 알고리즘에서 벗어나 왜곡된 값을 완전히 제거한 상태에서 영상의 Watermark를 검출함으로써 보다 완벽한 Watermark를 검출 할 수 있는 향상된 알고리즘을 제안하였다.

  • PDF

The Design of IPv6 Traffic Analysis Tool for Detecting Network Attacks (네트워크 공격을 탐지하기 위한 IPv6 트래픽 분석 도구)

  • Oh, Seung-Hee;Oh, Jin-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.848-851
    • /
    • 2005
  • The BcN is applying from public networks to local networks and each terminal step by step until 2007. By IPv6 network introduction, IP address lack problem can be solved. However, the threats that network attacks of another method can be caused with new problem of network security in IPv6 networks. In this paper, we suggest the traffic analysis tool which analyze IPv6 traffic efficiently to detect/response network attack in IPv6 environment. The implemented IPv6 traffic analysis tool uses IPv6 header to analyze traffic and detect network attacks. Also, we also propose detection algorithm to detect network attacks in IPv6 networks.

  • PDF

코너를 특징점으로 이용한 감시카메라 공격 검출

  • Park, Moo-Kyung
    • Review of KIISC
    • /
    • v.20 no.3
    • /
    • pp.58-61
    • /
    • 2010
  • 최근 영상압축 및 전송기술의 발달과 저장매체의 대용량화 등 IT 기술의 발달로 영상기반의 보안시스템은 누구나 쉽게 사용할 수 있는 보편화된 시스템이 되고 있다. 그리고 프로세서의 발달로 인해 감시카메라에서 취득한 영상을 영상처리를 통해 자동으로 해석하는 지능형 영상감시 시스템은 주목 받고 있다. 하지만 외부로부터 카메라가 공격을 당해 감시불능인 상태가 되면 아무리 뛰어난 지능형 영상감시 시스템이라고 해도 무용지물이 되기 때문에 카메라 무력화를 감시하는 알고리즘은 반드시 필요하다. 카메라 무력화 검지 알고리즘은 사용자로 하여금 시스템을 편리하게 사용할 수 있게 해 주지만 아직 많은 알고리즘들은 조명변화와 같은 일상적인 상황에 잦은 오보를 출력함으로 시스템의 신뢰도를 떨어뜨리고 오히려 사용자에게 불편을 주고 있다. 따라서 본 논문에서는 조명변화에 강건하도록 입력영상의 코너를 특징점으로 이용하여 감시카메라의 공격을 검출하는 방법을 제안한다.

A Secure Asymmetric Watermarking to the Public Key Attack (공개키 공격에 안전한 비대칭 워터마킹)

  • Li, De;Kim, Jong-Weon;Choi, Jong-Uk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.7
    • /
    • pp.173-180
    • /
    • 2008
  • In this paper, we proposed an algorithm for an effective public key and private key generation to implement a secure asymmetric watermarking system against the public key attack. The public key and private key generation is based on the linear transformation using a special matrix and the keys are designed to be able to have high correlation value. We also proposed a counter plan of public key attack. This method uses a multiple public key generation and distribution. As the results, the correlation value between the public key and the private key is high in the watermarked image. After the public key attack. this can detect the correlation by using other public key.

  • PDF

Performance Evaluation of Scaling based Dynamic Time Warping Algorithms for the Detection of Low-rate TCP Attacks (Low-rate TCP 공격 탐지를 위한 스케일링 기반 DTW 알고리즘의 성능 분석)

  • So, Won-Ho;Shim, Sang-Heon;Yoo, Kyoung-Min;Kim, Young-Chon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.3 s.357
    • /
    • pp.33-40
    • /
    • 2007
  • In this paper, low-rate TCP attack as one of shrew attacks is considered and the scaling based dynamic time warping (S-DTW) algorithm is introduced. The low-rate TCP attack can not be detected by the detection method for the previous flooding DoS/DDoS (Denial of Service/Distirbuted Denial of Service) attacks due to its low average traffic rate. It, however, is a periodic short burst that exploits the homogeneity of the minimum retransmission timeout (RTO) of TCP flows and then some pattern matching mechanisms have been proposed to detect it among legitimate input flows. A DTW mechanism as one of detection approaches has proposed to detect attack input stream consisting of many legitimate or attack flows, and shown a depending method as well. This approach, however, has a problem that legitimate input stream may be caught as an attack one. In addition, it is difficult to decide a threshold for separation between the legitimate and the malicious. Thus, the causes of this problem are analyzed through simulation and the scaling by maximum auto-correlation value is executed before computing the DTW. We also discuss the results on applying various scaling approaches and using standard deviation of input streams monitored.

Message Coding Technique for Self-reference Watermarking (자기 참조 워터마킹을 위한 메시지 코딩 기법)

  • 전영균;최창렬;정제창
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2002.11a
    • /
    • pp.159-162
    • /
    • 2002
  • 데이터에 삽입되어 있는 워터마크를 제거하려는 공격기법이 점차 발전되면서 여러 가지 워터마킹 알고리즘이 등장하게 된다. 보통 워터마크를 제거하기 위해서는 워터마크 신호의 동기를 제거하는 동기-제거(De-Syncronization) 공격 방법을 이용한다. 이런 공격에 대처하기 위한 워터마킹 방법으로는 세 가지로 분류할 수 있는데, 공격에 영향을 받지 않는 영역(invariant domain)에 워터마크를 삽입하는 방법, 템플릿(template)을 이용한 방법, 자기 참조(self-reference)를 이용한 기법 등이 있다. 본 논문에서는 공간 영역에서의 자기 참조 워터마킹 방법을 소개하고, 이에 적합한 메시지를 삽입하고 검출하는 방법에 대해 제안한다. 삽입하려는 메시지와 Reed-solomon Code를 이용하여 만든 부가적인 정보를 QOS(Quasi-orthogonal sequences)방법과 DSSS를 이용하여 만든 다음 키 값을 이용하여 뒤섞으면 워터마킹 블록을 자기 참조 워터마킹 방법으로 영상에 삽입하게 된다. 그 결과 일반적 필터링 공격에는 95% 이상 검출됐고, JPEG 압축 파라미터 60에서도 97% 이상 검출되었다.

  • PDF

A Study on Media Security in Ubiquitous Network System (유비쿼터스 네트워크 시스템에서의 미디어 보안에 관한 연구)

  • Ju, Min-Seong;Ahn, Seong-Soo;Woo, Young-Hwan;Kim, Yong-Tae;Kim, Tai-Hoon;Park, Gil-Cheol;Kim, Seok-Soo
    • Convergence Security Journal
    • /
    • v.7 no.1
    • /
    • pp.29-34
    • /
    • 2007
  • Recently, the distribution and using of the digital multimedia contents are easy by developing the internet application program and related technology. However, the digital signal is easily duplicated and the duplicates have the same quality compare with original digital signal. To solve this problem, there is the multimedia fingerprint which is studied for the protection of copyright. Fingerprinting scheme is a technique which supports copyright protection to track redistributers of electronic information using cryptographic techniques. Only regular user can know the inserted fingerprint data in fingerprinting schemes differ from a symmetric/asymmetric scheme and the scheme guarantee an anonymous before re-contributed data. In this paper, we present a new scheme which is the detection of colluded multimedia fingerprint by neural network. This proposed scheme is consists of the anti-collusion code generation and the neural network for the error correction.

  • PDF

Contents-based digital still-image protection using OCL (OCL을 이용한 콘텐츠 기반의 정지영상 보호 기법 연구)

  • Yoo, Hyouck-Min;Shin, Jin-Wook;Park, Dong-Sun;Yoon, Sook
    • Korean Journal of Cognitive Science
    • /
    • v.21 no.1
    • /
    • pp.145-156
    • /
    • 2010
  • This paper presents a new contents-based digital still image protection method which includes a copyright message. Since the existing method using gradient values used a pixel based $3{\times}3$ Sobel operator, it was sensitive to attacks and could not extract exact copyright message. Therefore, in this paper, we present a algorithm which uses block based OCL(Orientation Certainty Level) instead of pixel. The experimental results show that the proposed scheme not only has good image quality, but also is robust to JPEG lossy compression, filtering, sharpening, blurring and noise. Moreover, the proposed algorithm has good performance more than 10% in rotation attacks than the existing method.

  • PDF

Analysis of Performance of Spoofing Detection Algorithm in GPS L1 Signal (GPS L1 기만신호 검출 알고리즘 성능 분석)

  • Kim, Taehee;Kim, Jaehoon;Lee, Sanguk
    • Journal of Satellite, Information and Communications
    • /
    • v.8 no.2
    • /
    • pp.29-35
    • /
    • 2013
  • In this paper, we investigate the type and detection methode of spoofing attack, and then analyze the performance of spoofing detection algorithm in GPS L1 signal through the simulation. Generally spoofer is different from the jammer, because the receiver can be operated and not. In case of spoofing the GPS receiver is hard to recognize the spoofing attack and can be operated normally without stopping because the spoofing signal is the mimic GPS signal. To evaluate the performance of spoofing detection algorithm, both the software based spoofing and GPS signal generator and the software based GPS receiver are implemented. In paper, we can check that spoofing signal can affect to the DLL and PLL tracking loop because code delay and doppler frequency of spoofing. The spoofing detection algorithm has been implemented using the pseudorange, signal strength and navigation solution of GPS receiver and proposed algorithm can effectively detect the spoofing signal.