• Title/Summary/Keyword: 공격 메일

Search Result 58, Processing Time 0.024 seconds

Implementation of Secured SMTP Gateway (SMTP 보안 게이트웨이의 구현)

  • Min, Zee-Young;Kim, Hyun-Koo;Chang, Beom-Hwan;Chung, Tae-Myung
    • Annual Conference of KIPS
    • /
    • 2002.11b
    • /
    • pp.937-940
    • /
    • 2002
  • 인터넷의 확산과 더불어 전자 우편의 사용이 크게 늘면서 스팸메일의 심각성이 대두되고 있다. 현재 스팸메일을 막기 위한 여러 가지 기법이 제안되고 있으나, 대부분의 방법이 메일 서버내의 정책에 따른 메일 필터링으로, 스팸메일로 인해 네트워크 자원이 소실되는 문제는 여전히 해결되지 않고 있다. 또한 여러 메일 서버가 같은 내용의 메일로 반복적으로 공격을 당하게 된다. 본 논문에서는 게이트웨이 수준에서의 메일감시를 통하여 불필요한 스팸메일로부터 네트워크 자원을 보호하고, 내부 메일 서버 전체를 보호 할 수 있는 시스템에 대해 논의 해보고자 한다. 커널 레벨에서의 패킷 감시로 속도가 빠르고, 또한 가상의 커넥션을 맺어 게이트웨이에서 메일을 완전히 받은 후 검사하므로 더욱더 다양한 정책으로 SMTP를 감시할 수 있으며, 이 시스템은 IP 기반의 다른 프로토콜이나 타 서비스로의 응용 또한 기대할 수 있다.

  • PDF

Design and Implementation of the Extended Intrusion Detection System for Mail Contents Probing (메일 컨텐츠 탐지를 위한 침입 탐지 시스템의 확장에 관한 설계 및 구현)

  • Han, Young-Ju;Kim, Hee-Seung;Chung, Tai-Myoung
    • Annual Conference of KIPS
    • /
    • 2003.11c
    • /
    • pp.1889-1892
    • /
    • 2003
  • 인터넷이 발전함에 따라 기업의 업무, 커뮤니케이션 등이 온라인으로 전환되고 있으며, 정보전달의 통로로써 전자 메일의 사용이 나날이 늘고 있다. 이에 따라 전자 메일을 통한 바이러스, 스팸 광고 등 메일의 컨텐츠를 이용한 공격에 의한 피해가 심각한 수준에 이르고 있다. 현재 방지 대책으로는 백신이나 스팸 메일 차단기 등을 통해 방지 기능을 제공하고는 있으나 이는 사용자의 의지에 의존적이며, 개개 시스템에 한정되는 한계가 있다. 따라서 사용자의 의지와 무관하게 네트워크 차원에서 내부 네트워크를 보호하기 위한 방지 대책이 필요하며 이에 본 논문에서는 기존의 침입 탐지 시스템을 확장하여 메일 컨텐츠를 탐지할 수 있는 확장된 침입탐지 시스템을 제안한다.

  • PDF

The Study on Secure Mail Platform and Mutual Authentication Using Mail Proxy (메일 프락시를 통한 사용자 상호인증 방법과 안전한 메일 플랫폼에 대한 연구)

  • Ahn, Hyo-Beom;Lee, Su-Yeon
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.201-208
    • /
    • 2016
  • The purpose of Email system is used to transmit important information between companies in today. But Email system has vulnerabilities such that changing email address of sender by attacker. So it is important to authenticate mail server and user using mail server. This paper proposed mail proxy located between mail servers that evaluate authority and authenticate sender and receiver. The proposed email platform has some functions to compose trusted domain and to authenticate mail servers in the domain. Also, if sender and recipient are valid users in mail system, each exchanges a key for confidentiality and the sender sends an e-mail encrypted with exchanged key to recipient. In this paper, we propose a key exchange scheme in proposed platform and verify this protocol using Casper which is the formal analysis tool. In the future research, we will study the overall platform of the domain configuration for the security of mail.

An Implementation and Evaluation of FQDN Check System to Filter Junk Mail (정크메일 차단을 위한 FQDN 확인 시스템의 구현 및 평가)

  • Kim Sung-Chan;Lee Sang-Hun;Jun Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.361-368
    • /
    • 2005
  • Internet mail has become a common communication method around the world because of tremendous Internet service usage increment. In other respect, Most Internet users' mail addresses are exposed to spammer, and the damage of Junk mail is growing bigger and bigger. These days, Junk mail delivery problem is becoming more serious, because this is used for an attack or propagation scheme of malicious code. It's a most dangerous dominant cause for computer system accident. This paper shows the Junk mail filtering model and implementation which is based on FQDN (Fully Qualified Domain Name) check and evaluates it for proposing advanced scheme against Junk mail.

A System for Blocking Spam Mail Propagation by E-mail Viruses (전자메일 바이러스에 의한 스팸 메일 전파 차단 시스템)

  • Nham, Gang-Wonny;Kim, Joon-Mo;Woo, Jin-Woon;Cho, Seong-Je
    • Annual Conference of KIPS
    • /
    • 2003.05c
    • /
    • pp.1981-1984
    • /
    • 2003
  • 최근에 유포되고 있는 악의적인 소프트웨어로 Melissa와 Love letter와 같은 전자우편 바이러스가 있는데, 이들은 단순히 전자우편을 열기 만해도 메일 주소록에 등록된 모든 사용자에게 자신을 유포함으로써 막대한 피해를 유발시킨다 본 논문에서는 메일 주소 변형모듈 및 복원모듈을 전자우편 송신부에 추가 도입함으로써 전자우편 바이러스에 의한 바이러스 전파를 차단하는 시스템을 제안한다. 변형모듈은 송신자 행위에 의해서만 수행되어 수신자의 메일 주소를 변형하며, 복원모듈은 송신부의 서버 단에서 전자우편 전송 시마다 수행되어 역변형 과정을 거쳐 메일 주소를 복구한다. 변형모듈은 전자우편 바이러스에 의해서는 실행되지 않도록 구현되며, 전자우편 수신부에서는 추가로 하는 작업이 전혀 없다. 제안한 시스템에서는 새로운 전자우편 바이러스 공격에 대응하기 위해서, 다형성(polymorphism) 기법도 적용한다.

  • PDF

A Study on the Change of Capability and Behavior against Phishing Attack by Continuous Practical Simulation Training (지속적 실전형 모의훈련을 통한 피싱공격 대응역량 및 행동변화에 관한 연구)

  • Yoon, Duck-sang;Lee, Kyung-ho;Lim, Jong-in
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.267-279
    • /
    • 2017
  • This study emulated unscheduled phishing e-mails over a long period of time by imitating the manner in which external hackers attacked a group of employees in a company. We then measured and analyzed the recipient's ability to identify and respond to phishing e-mails as training progressed. In addition, we analyzed the changes in participants' response behavior when changing the external control condition between the training. As a result of the analysis, it was confirmed that the training duration had a positive (+) relationship with the employees' ability to identify phishing e-mails and the infection rate, and more employees read emails and infected with phishing attacks using social issues and seasonal events. It was also confirmed that reinforcement of internal control policy on infected persons affects positively (+) on the phishing attack response behavior of employees. Based on these results, we would like to suggest the right training method for each organization to enhance the ability of employees to cope with phishing attacks.

Feature-selection algorithm based on genetic algorithms using unstructured data for attack mail identification (공격 메일 식별을 위한 비정형 데이터를 사용한 유전자 알고리즘 기반의 특징선택 알고리즘)

  • Hong, Sung-Sam;Kim, Dong-Wook;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.20 no.1
    • /
    • pp.1-10
    • /
    • 2019
  • Since big-data text mining extracts many features and data, clustering and classification can result in high computational complexity and low reliability of the analysis results. In particular, a term document matrix obtained through text mining represents term-document features, but produces a sparse matrix. We designed an advanced genetic algorithm (GA) to extract features in text mining for detection model. Term frequency inverse document frequency (TF-IDF) is used to reflect the document-term relationships in feature extraction. Through a repetitive process, a predetermined number of features are selected. And, we used the sparsity score to improve the performance of detection model. If a spam mail data set has the high sparsity, detection model have low performance and is difficult to search the optimization detection model. In addition, we find a low sparsity model that have also high TF-IDF score by using s(F) where the numerator in fitness function. We also verified its performance by applying the proposed algorithm to text classification. As a result, we have found that our algorithm shows higher performance (speed and accuracy) in attack mail classification.

A Study on the Phishing Attack Protection using RUL Spoofing (URL 스푸핑을 이용한 피싱 공격의 방어에 관한 연구)

  • Min Dong-og;Shon Tae-shik;Moon Jong-sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.5
    • /
    • pp.35-45
    • /
    • 2005
  • There has recently been an increase of phishing attacks, attacks which lure users into revealing their personal information to an attacker who in turn exploits this information for economic gain. The conventional methods of fooling the user with similarly modified mail or address are constantly evolving and have diversified to include the forgery of mail or domain addresses. Recently the injury incurred by these attacks has greatly increased as attackers exploit the weaknesses found on a few web browsers and used these to conduct phishing attacks based on URL spoofing. Furthermore we are now witnessing the entrance of highly advanced phishing techniques that no longer simply rely on vulnerabilities, but employ ordinary script, HTML, DNS sniffing, and the list goes on. In this paper we first discuss means of investigating and preventing the advanced URL spoofing techniques used in phishing attacks, and then propose a scheme for fundamentally restricting them altogether.

Distributed Secure Mail System For Roaming User (이동 사용자를 위한 분산 보안 메일 시스템)

  • Yang, Jong-Phil;Sur, Chul;Lee, Kyung-Hyune
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.825-834
    • /
    • 2003
  • In this paper, we propose a new certified e-mail system which reduces user's computational overhead and distributes confidentiality of TTP(Trusted Third Partty). Based on the traditional cryptographic schemes and server-supported signiture for fairness and confidentiality of message, we intend to minimize to computation overhead of mobile device on public key algorithm. Therefore, our proposal becomes to be suitable for mail user sho uses mobile devices such as cellular phone and PDA. Moreover, the proposed system is fault-tolerant, secure against mobile adversary and conspiracy attack, since it is based on the threshold cryptography on server-side.

Implementation of Encrypted Mail Program using SMTP and POP3 (SMTP와 POP3를 활용한 암호화 메일 프로그램 구현)

  • Kong, Keon-Woong;Won, Yonggwan
    • Journal of Digital Contents Society
    • /
    • v.18 no.7
    • /
    • pp.1403-1409
    • /
    • 2017
  • As the Internet evolves, security becomes more important. Especially, e-mail has become one of the most important services that companies and ordinary users use on the Internet. However, security vulnerabilities such as sniffing attacks, IDs, and password spoofs are causing many problems. This paper introduces an example of implementation of encrypted mailing program with which the secured mail is encrypted by symmetric key methode and the encrypted message can not be read without proper decryption. In order to use the current mailing systems, we keep the rules related to SMTP and POP3, and only the encrypted message is stored in the mail server system and the message can be decrypted only at the terminals of the senders and the receivers with the key which is shared in advanced by independent route between them. This implementation scheme can provide an efficiency that it does not request any change of current mailing system, which can be an additional security protection.