• Title/Summary/Keyword: 네트워크 고립

Search Result 56, Processing Time 0.023 seconds

DDoS Attack Response Framework using Mobile Code (DDoS 공격 대응 프레임워크 설계 및 구현)

  • Lee, Young-seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.3 no.3
    • /
    • pp.31-38
    • /
    • 2010
  • It has become more difficult to correspond an cyber attack quickly as patterns of attack become various and complex. However, current security mechanisms just have passive defense functionalities. In this paper, we propose new network security architecture to respond various cyber attacks rapidly and to chase and isolate the attackers through cooperation between security zones. The proposed architecture makes it possible to deal effectively with cyber attacks such as IP spoofing or DDoS(Distributed Denial of Service), by using active packet technology including a mobile code on active network. Also, it is designed to have more active correspondent than that of existing mechanisms. We implemented these mechanisms in Linux routers and experimented on a testbed to verify realization possibility of attacker response framework using mobile code. The experimentation results are analyzed.

  • PDF

Attacker Response Framework using Mobile Code (이동 코드를 이용한 공격자 대응 프레임워크)

  • Bang Hyo-Chan;Him Jin-Oh;Na Jung-Chan;Jang Joong-Su;Lee Young-Suk
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.959-970
    • /
    • 2004
  • It has become more difficult to correspond an cyber attack quickly as patterns of attack become various and complex. However, current so curity mechanisms just have passive defense functionalities. In this paper, we propose new network suity architecture to respond various cyber attacks rapidly and to chase and isolate the attackers through cooperation between security zones. The proposed architecture makes it possible to deal effectively with cyber attacks such as IP spoofing or DDoS(Distributed Denial of Service), by using active packet technology including a mobile code on active network. Also, it is designed to have more active correspondent than that of existing mechanisms. We im-plemented these mechanisms in Linux routers and experimented on a testbed to verify realization possibility of attacker response framework using mobile code. The experimentation results are analyzed.

Method of Detecting and Isolating an Attacker Node that Falsified AODV Routing Information in Ad-hoc Sensor Network (애드혹 센서 네트워크에서 AODV 라우팅 정보변조 공격노드 탐지 및 추출기법)

  • Lee, Jae-Hyun;Kim, Jin-Hee;Kwon, Kyung-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.12
    • /
    • pp.2293-2300
    • /
    • 2008
  • In ad-hoc sensor network, AODV routing information is disclosed to other nodes because AODV protocol doesn't have any security mechanisms. The problem of AODV is that an attacker can falsify the routing information in RREQ packet. If an attacker broadcasts the falsified packet, other nodes will update routing table based on the falsified one so that the path passing through the attacker itself can be considered as a shortest path. In this paper, we design the routing-information-spoofing attack such as falsifying source sequence number and hop count fields in RREQ packet. And we suggest an efficient scheme for detecting the attackers and isolating those nodes from the network without extra security modules. The proposed scheme doesn't employ cryptographic algorithm and authentication to reduce network overhead. We used NS-2 simulation to evaluate the network performance. And we analyzed the simulation results on three cases such as an existing normal AODV, AODV under the attack and proposed AODV. Simulation results using NS2 show that the AODV using proposed scheme can protect the routing-information-spoofing attack and the total n umber of received packets for destination node is almost same as the existing norm at AODV.

IP Traceback System using iTrace Message (iTrace 메시지를 이용한 IP 역추적 시스템)

  • Cho, Han-Jin;Chae, Cheol-Joo;Lee, June-Hwan;Lee, Jae-Kwang
    • Journal of the Korea Computer Industry Society
    • /
    • v.10 no.1
    • /
    • pp.13-20
    • /
    • 2009
  • The rapid growth of the Internet has caused the hacking and virus. There are several vulnerabilities in current firewall and Intrusion Detection Systems of the Network Computing resources. Automatic real time station chase techniques can track the internet invader and reduce the probability of hacking Due to the recent trends the station chase technique has become inevitable. In this paper, we design and implement Active Security system using ICMP Traceback message. In this design no need to modify the router structure and we can deploy this technique in larger network. Our Implementation shows that ICMP Traceback system is safe to deploy and protect data in Internet from hackers and others.

  • PDF

City Networks of Korea: An Internet Hyperlinks Interpretation (인터넷 하이퍼링크로 본 도시 네트워크)

  • 허우긍
    • Journal of the Korean Geographical Society
    • /
    • v.38 no.4
    • /
    • pp.518-534
    • /
    • 2003
  • A number of previous studies have maintained that information technologies, due to their ability to overcome distance, can nurturing an innovative class of polycentric urban configurations, i.e., network cities. The present study intends to clarify whether any network relationship has recently been emerged among Korean cities by the advancement of information technology. The analyses focused on the geography of Korean national domains (.kr domains), and the hyperlink associations among three major types of domains, namely commercial, academic, and organizational domains. The study findings altogether indicate that the advancement of global economy and information era appears to be enhancing, rather than reducing the status of primate city. Seoul dominates the entire nation, forming an enclave in the production and consumption of information. Only the domains of educational institutes show network-like relations among local centers to a certain extent. The paper concludes with a discussion on the implications of the findings for future research and ‘spatial’ policy measures.

Building Disaster Communication Network to Protect Foreign Knowledge Workers from Disasters (외국인 지식노동자 보호를 위한 재난통신 네트워크 구축에 관한 개념적 연구)

  • Oh, Nam-Kyung
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.2
    • /
    • pp.107-115
    • /
    • 2022
  • This study discusses how to protect foreign knowledge workers from disasters conceptually. While their prestigious social and economic status, the knowledge workers can become vulnerable to disasters due to their nomadic lifestyle and voluntary isolation from communities where they reside temporarily. This study introduced and discussed strengths and weaknesses of various types of disaster communication networks and found the Small World Network (SWN) and the use of structural holes would be an appropriate strategy for the protection of knowledge workers. The use of mediators for disaster communication would be a strategic intervention from public and private organizations since that addresses voluntary isolation issue without restructuring existing disaster communication network.

The Internet Mapping Framework for Security Management (인터넷에서의 보안관리를 위한 네트워크 맵핑 프레임워크)

  • 최대식;강형우;남건우
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10c
    • /
    • pp.481-483
    • /
    • 2002
  • 인터넷의 발달과 이로 인한 보안의 중요성이 점점 강조되고 있다. 이에 IDIP나 CITRA[3] 같은 여러 가지 보안 도구와 시스템의 통합을 통한 전역적인 보안 관리 체계가 대두되고 있는 실정이다. 그러나 이들 대부분이 자신들의 관리영역에 한정하여 이미 결정된 맵을 사용함으로 실제 인터넷에 적용하기에는 많은 어려움이 있다. 인터넷을 통한 전역적이고 실질적인 보안 관리를 하기 위해서는 알려지지 않은(unknown) 망인 인터넷에 대한 정확한 맵핑이 이루어져야 하며, 이를 이용하여 공격자의 공격 경로와 지리학적 위치판단, DoS 대응을 위한 망의 고립 또는 차단 등의 응용에 이용될 수 있다. 이에 본 논문에서는 맵핑을 위한 여러 가지 휴리스틱한 기법을 소개하고 이를 이용하여 인터넷 맵핑을 위한 프레임워크를 제안한다. 제안된 프레임워크는 지존 방법들의 여러 가지 장점을 결합하여 보다 세밀하고 정확한 맵핑에 효과적이다.

  • PDF

A Keyword analysis on the 'user' related research papers : In Library and Information Science (이용자 관련 연구논문에 대한 주제어 분석)

  • Park, Seonmi;Oh, Kyung-mook
    • Proceedings of the Korean Society for Information Management Conference
    • /
    • 2013.08a
    • /
    • pp.43-46
    • /
    • 2013
  • 본 연구에서는 국내 문헌정보학 분야의 연구 논문 중 이용자 관련 연구 논문 125편을 대상으로 논문에 부여된 주제어간의 연결 관계를 분석 하였다. 사전 작업을 통하여 정리된 226개의 주제어에 대한 연결 관계를 네트워크 분석을 통하여 분석하고 시각화 하였다. 그래프를 통하여 주제어간 연결 강도를 확인하였고, 다른 주제어와 연결성이 높은 상위 20개의 주제어를 제시하였다. 주제어간 근접성이 높은 주제어를 군집화한 결과 14개의 군집으로 정리되었다. 다른 주제어와 연결이 없이 고립된 군집이 8개, 연결된 군집이 6개였다.

  • PDF

해양선박 대상 사이버 복원력 연구 동향

  • Areum Ko;HeeWon Choi;Seungho Jeon;Jung Taek Seo
    • Review of KIISC
    • /
    • v.33 no.6
    • /
    • pp.55-63
    • /
    • 2023
  • 현대 해양선박은 PLC 등 기존의 OT 시스템과 선박자동식별시스템 등 IT 시스템의 접목으로 스마트선박, 자율운항선박으로 진화되고 있다. 하지만 이러한 기술 통합은 공격이 가능한 접점이 늘어나며, 이는 사이버보안 위협을 증가시키고 있다. 선박은 대부분 항만으로부터 고립된 환경에서 운영되기 때문에 사이버공격이 발생 시 외부의 기술 지원이나 긴급대응이 어려워진다. 이러한 배경으로 해양선박을 대상으로 하는 사이버 복원력은 해양선박 환경에서 중요한 개념으로 자리잡고 있다. 본 논문은 해양선박 환경 표준 통신 네트워크인 SAN을 분석하고, 사이버 복원력을 소개한 후, NIST의 사이버 복원력 모델을 기반으로 해양선박 대상 사이버 복원력 연구를 분석한다.

Regional Sociocultural Linkages in the Province of Young-nam : A Social Network Analysis (영남권 사회문화적 연계의 지역구조 -사회네트워크분석을 중심으로 -)

  • Yim, Seokhoi;Song, Minjeong
    • Journal of the Korean association of regional geographers
    • /
    • v.21 no.1
    • /
    • pp.62-78
    • /
    • 2015
  • This paper aims to consider regional linkages in the Province of Young-nam mainly through a social network analysis of sociocultural activities such as leisure, friendly relations and visiting relatives. Passenger O-D data as of 2012 provided by National Transportation DB Center are analyzed using the NetMiner 4.0. The analytical results show that the sociocultural relationship between Daegu-Kyoungbuk and Busan-Ulsan-Kyioungnam is not so close. In particular, some north regions of Kyoungbuk are relatively isolated in the Province of Young-nam. This implicates that regions in the Province of Young-nam are not closely united at least in terms of sociocultural linkages although they are in the homogeneous natural environment of the basin of the Nakdong-river and share a same historical background for a long time. Consequentially this work suggests the Province of Young-nam may not be an united single region on the contrary to a notion of it so far.

  • PDF