• Title/Summary/Keyword: 공격 메일

Search Result 58, Processing Time 0.031 seconds

Spear-phishing Mail Filtering Security Analysis : Focusing on Corporate Mail Hosting Services (스피어피싱 메일 필터링 보안 기능 분석 : 기업메일 호스팅 서비스 중심으로)

  • Shin, Dongcheon;Yum, Dayun
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.61-69
    • /
    • 2020
  • Since spear-phishing mail attacks focus on a particular target persistently to collect and take advantage of information, it can incur severe damage to the target as a part of the intelligent and new attacks such as APT attacks and social engineering attacks. The usual spam filtering services can have limits in countering spear-phishing mail attacks because of different targets, goals, and methods. In this paper, we analyze mail security services of several enterprises hosted by midium and small-sized enterprises with relatively security vulnerabilities in order to see whether their services can effectively respond spear-phishing mail attacks. According to the analysis result, we can say that most of mail security hosting services lack in responding spear-phishing mail attacks by providing functions for mainly managing mails including spam mail. The analysis result can be used as basic data to extract the effective and systematic countermeasure.

A Profiling Case Study to Phishing Mail Attack Group (피싱 메일 공격조직에 대한 프로파일링 사례 연구)

  • Lee, Jae-il;Lee, Yong-joon;Kwon, Hyuk-jin
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.91-97
    • /
    • 2020
  • Recently, phishing attacks targeting those involved in defense, security and unification have been on the rise. In particular, hacking attack organization Kimsuky has been engaged in activities to collect important information from public organizations through phishing attacks since 2013. In this paper, profiling analysis of phishing mail attack organization was performed. Through this process, we estimated the purpose of the attack group and suggested countermeasures.

Realtime mail monitoring system (실시간 메일 모니터링 시스템)

  • 조미옥;최경희;정기현
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.04a
    • /
    • pp.811-813
    • /
    • 2001
  • 메일의 프로토콜 및 메일 서버의 개발이 메일이 송수신 되는 네트워크 환경의 변화와 다양한 기능의 지원을 중점으로 이뤄지고 있어서, 보안 요소는 아직 개발이 미약한 상태이다. 안전한 메일 환경 및 시스템을 구축하기 위해서는 메일을 통한 개인 정보 및 기밀 사항의 유출을 막고, 메일을 통한 공격 및 메일 바이러스 등의 검사가 이뤄져야 한다. 본 논문에서는 메일 서버의 부담을 줄이기 위해서, 메일 서버 독립적으로 구현되는 실시간 메일을 모니터링 시스템에 대해서 논의하고자 한다.

  • PDF

An Efficient Method for Blocking E-mai1 Virus (효율적인 E-메일 바이러스 차단 기법)

  • 장혜영;남강운;최종천;조성제;우진운
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.790-792
    • /
    • 2003
  • 최근 널리 유포되고 있는 악의적인 프로그램으로 E-메일 바이러스가 있는데, 이들은 바이러스가 포함된 E-메일이나 첨부파일을 열기 만 해도 메일 주소록에 등록된 모든 사용자에게 자신을 전파하여 막대한 피해를 유발시킨다. 본 논문에서는 메일주소 변환 및 복원 방식을 이용하여 E-메일 바이러스의 전파를 차단시켜주는 방법을 제안한다. 또한 다형성의 기법을 사용하여 새로운 E-메일 바이러스 공격에도 대응하였다. 이 방법들은 E-메일 바이러스에 의해서는 작동되지 않도록 설계되었으며, E-메일 서버쪽이나 수신자 측에서는 추가로 하는 작업이 전혀 없다.

  • PDF

Malicious Cross Site Script Filtering Using ACL (접근 제어를 이용한 교차 사이트 스크립트 필터링)

  • 김형주;예홍진;조은선
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.799-801
    • /
    • 2002
  • 최근 웹 메일은 사용과 관리의 편리함 등으로 그 사용이 점점 더 늘어나고 있다. 그러나 웹 메일은 본래 보안 기능을 중시해서 만들지 않았다는 보안 취약점으로 인해 탈법적인 해킹이나 토정 같은 악의적인 공격의 대상이 되고 있다. 특히 e-메일과 HTML, 스크립트 언어들을 함께 사용할 수 있게 된 이후로 스크립트를 이용만 인터넷 범죄가 증가하고 있다. 본 논문은 스크립트 공격 중 상호 교차된 사이트 스크립트 공격에 대해서 기술하고 이 공격의 실행을 성공적으로 막을 수 있는 대응 방안을 제시한다.

  • PDF

A Classification Model for Attack Mail Detection based on the Authorship Analysis (작성자 분석 기반의 공격 메일 탐지를 위한 분류 모델)

  • Hong, Sung-Sam;Shin, Gun-Yoon;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.18 no.6
    • /
    • pp.35-46
    • /
    • 2017
  • Recently, attackers using malicious code in cyber security have been increased by attaching malicious code to a mail and inducing the user to execute it. Especially, it is dangerous because it is easy to execute by attaching a document type file. The author analysis is a research area that is being studied in NLP (Neutral Language Process) and text mining, and it studies methods of analyzing authors by analyzing text sentences, texts, and documents in a specific language. In case of attack mail, it is created by the attacker. Therefore, by analyzing the contents of the mail and the attached document file and identifying the corresponding author, it is possible to discover more distinctive features from the normal mail and improve the detection accuracy. In this pager, we proposed IADA2(Intelligent Attack mail Detection based on Authorship Analysis) model for attack mail detection. The feature vector that can classify and detect attack mail from the features used in the existing machine learning based spam detection model and the features used in the author analysis of the document and the IADA2 detection model. We have improved the detection models of attack mails by simply detecting term features and extracted features that reflect the sequence characteristics of words by applying n-grams. Result of experiment show that the proposed method improves performance according to feature combinations, feature selection techniques, and appropriate models.

A Study of Prevention Model the Spread of Phishing Attack for Protection the Medical Information (의료정보 보호를 위한 피싱공격 확산방지모델 연구)

  • Choi, Kyong-Ho;Chung, Kyung-Yong;Shin, Dong-Kun
    • Journal of Digital Convergence
    • /
    • v.11 no.3
    • /
    • pp.273-277
    • /
    • 2013
  • Phishing attacks have been implemented in smarter, more advanced ways with the passage of time. Hackers use intelligent phishing attacks to take over computers and to penetrate internal networks in major organizations. So, in this paper, a model for a prevention of phishing attack spread is conceptual designed in order to protect internal users and sensitive or important information from sophisticated phishing attacks. Internal users simultaneously utilize both external web and organizational mail services. And hackers can take the both side equally as a vector. Thus, packets in each service must be monitored and stored to recognize threatening elements from both sides. The model designed in this paper extends the mail server based security structure used in conventional studies for the protection of Internet mail services accessed by intranet users. This model can build a list of phishing sites as the system checks e-mails compared to that of the method that directly intercepts accesses to phishing sites using a proxy server, so it represents no standby time for request and response processes.

Protecting E-mail Server with Class-Based Rate Limiting Technique (클래스 기반의 대역 제한 기법을 통한 이메일 서버의 보호)

  • Yim, Kang-Bin;Lee, Chang-Hee;Kim, Jong-Su;Choi, Kyung-Hee;Jung, Gi-Hyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.6 s.324
    • /
    • pp.17-24
    • /
    • 2004
  • This paper proposes an efficient technique to protect e-mail server from DDoS attack using the CBQ (Class Based Queuing) algorithm The proposed method classifies incoming trafic to an e-mail server into three classes: 'more important mail traffic', 'less important traffic' and 'unknown traffic' and assigns bandwidths differently to the traffics. By differentiating the bandwidths of classes, normal mail traffic may flow even under DDoS attack in the proposed technique. The proposed technique is implemented on an embedded system which hires a switching processor with the WFHBD(Weighted Fair Hashed Bandwidth Distribution) engine that has been known as an efficient algorithm to distribute a given bandwidth to multiple sources, and it is verified that it can be an efficient way to protect e-mail server from DDoS attack.

Design of the Mail Protocol with Perfect Forward Security (전방향 안전성이 보장되는 메일 프로토콜 설계)

  • Shin, Seung-Soo;Han, Kun-Hee
    • Journal of the Korea Convergence Society
    • /
    • v.2 no.2
    • /
    • pp.13-19
    • /
    • 2011
  • When the existing mail system is attacked by the third party, its content is exposed fully. To solve this problem, designed is the mail encryption system which can send and receive mail safely by the sessionkey. The mail receiver opens encrypted mail with the session key. In the traditional mail system, the server administrator can view mail content. However, in the proposed protocol, the server can only save mail as encryption/decryption is applied. Also, the ARIA encryption algorithm is used in encryption/decryption for better safety, and fast XOR operations are used to reduce the amount of operations.

Hacking Mail Profiling by Applying Case Based Reasoning (사례기반추론기법을 적용한 해킹메일 프로파일링)

  • Park, Hyong-Su;Kim, Huy-Kang;Kim, Eun-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.107-122
    • /
    • 2015
  • Many defensive mechanisms have been evolved as new attack methods are developed. However, APT attacks using e-mail are still hard to detect and prevent. Recently, many organizations in the government sector or private sector have been hacked by malicious e-mail based APT attacks. In this paper, first, we built hacking e-mail database based on the real e-mail data which were used in attacks on the Korean government organizations in recent years. Then, we extracted features from the hacking e-mails for profiling them. We design a case vector that can describe the specific characteristics of hacking e-mails well. Finally, based on case based reasoning, we made an algorithm for retrieving the most similar case from the hacking e-mail database when a new hacking e-mail is found. As a result, hacking e-mails have common characteristics in several features such as geo-location information, and these features can be used for classifying benign e-mails and malicious e-mails. Furthermore, this proposed case based reasoning algorithm can be useful for making a decision to analyze suspicious e-mails.