• Title/Summary/Keyword: 네트워크 오용

Search Result 87, Processing Time 0.02 seconds

Implementation of an Intrusion Detection and Prevention System with Multi-level Structures (다단계 구조를 가진 침입 탐지 및 방어 시스템의 구현)

  • Min Ukki;Chang Hyeyoung;Choi Jongcheon;Cho Seongje
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.136-138
    • /
    • 2005
  • 본 논문에서는 네트워크 포트 기반의 오용침입 탐지 기능 및 센서 객체 기반의 이상침입 탐지 기능을 갖춘 리눅스 서버 시스템을 제안한다. 제안한 시스템은 먼저 정상적인 포트 번호들 및 알려진 공격에 사용되고 있는 포트 번호들을 커널에서 동적으로 관리하면서, 포트 할당 시마다 감사로그를 기록하며 공격에 사용되는 포트인 경우에는 접속을 불허하여 침입을 방어한다. 알려지지 않은 이상침입 탐지를 위해서는 주요 디렉토리마다 센서 파일을, 주요 파일마다 센서 데이터를 설정하여 센서 객체가 접근될 때마다 감사로그를 기록하면서, 이들 센서 객체에 대해 불법적인 접근이 발생하면 해당 접근을 불허한다. 본 시스템은 네트워크 기반의 침입 탐지 및 호스트 기반의 침입 탐지 등 다단계로 구축되며 특정 침입들을 미리 예방할 수도 있다.

  • PDF

A Study on Detecting the Modification of Messages Using the Cumulative Hashed Value in the AMI Network (AMI 네트워크에서 누적 해쉬를 이용한 메시지 변조 탐지 방안)

  • Han, Sun-Hee;Park, Min-Woo;Jung, Sung-Min;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.714-717
    • /
    • 2011
  • 스마트그리드(Smart Grid)는 기존의 단방향 전력망인 자동화 검침 장치(Automated Meter Reading, AMR)에서 발전하여 양방향으로 실시간 정보를 교환하는 '지능형 전력망'이다. 스마트그리드 환경에서는 수요 반응(Demand Response) 서비스를 이용하여 전력 사용을 효과적으로 분산 할 수 있다. 하지만 보안에 대한 대비가 충분하지 않을 시에는 데이터의 삽입, 변조에 의해 시스템이 오용될 수 있다. 본 논문에서는 스마트 미터의 검침 값이 네트워크를 통해 전력정보처리시스템(Meter Data Management System, MDMS)까지 전달되는 과정에서 데이터 변조의 발생여부를 탐지할 수 있는 방법을 제안한다. 본 논문의 탐지 방법을 통해 신뢰성 있는 수요 반응 서비스를 제공할 수 있으며, 이는 효율적인 전력 사용을 유도할 것으로 기대된다.

Implementation of LMPR on TinyOS for Wireless Sensor Network (전송 부하를 분산하는 무선 센서 네트워크 구축을 위한 TinyOS 기반 LMPR 구현)

  • Oh, Yong-Taek;Kim, Pung-Hyeok;Jeong, Kug-Sang;Choi, Deok-Jai
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.12
    • /
    • pp.136-146
    • /
    • 2006
  • In Wireless Sensor Network(WSN) a sensor node transfers sensing data to the base-node through multi-hop because of the limited transmission range. Also because of the limited energy of the sensor node, the sensor nodes are required to consume their energy evenly to prolong the lifetime of the network. LMPR is a routing protocol for WSN, LMPR configures the network autonomously based on level which is the depth from the base-node, and distributes the transmission and computation load of the network to each sensor node. This paper implements LMPR on TinyOS and experiments on the performance of LMPR in WSN. As the result, the average of the received rate of LMPR is 91.39% and LMPR distributes the load of the transmission and computation about 4.6 times compare to the shortest cost routing protocol. We expect LMPR evenly distributes the transmission and computation load of the network to each node, and the lifetime of the network will be longer than it used to be.

  • PDF

Design and Implementation of IDS and Management Modules based on Network (네트워크 기반의 침입 탐지 시스템 관리 모듈 설계 및 구현)

  • 양동수;윤덕현;황현숙;정동호;김창수
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.680-683
    • /
    • 2001
  • As the rapid information communication technique, internet users have been continuously increasing every year, but on the other hand many damages have occurred on the internet because of dysfunction for computer system intrusion. To reduce damages, network and system security mechanism is variously developed by researcher, IDS(Intrusion Detection System) is commercialized to security technique. In this paper we describe for intrusion detection based on network, we design and implement IDS to detect illegal intrusion using misuse detection model. Implemented IDS can detect various intrusion types. When IDS detected illegal intrusion, we implemented for administrator to be possible management and control through mechanisms of alert message transmission, mail transmission, mail at the remote.

  • PDF

A Study of Security Issues of Cognitive Radio Network (인지 무선통신 네트워크의 보안 문제 연구)

  • Moon, Sangook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.662-665
    • /
    • 2011
  • The cognitive radio (CR) network has been studied in the form of open source by vast number of communities, and the potential expectation is very high since the CR is based on reprogrammable platform. However, this characteristics of open-source software take high risk as well. As the peer-to-peer software has been abused, so high is the chance that the CR network can be abused public wide. Consequently, the benefit from the study of next-generation wireless network can be at risk because of the negative impact of violation of communication law or abusing the CR. In this contribution, we analyze the issues and the problems of the CR and discuss an efficient measure against security attacks.

  • PDF

Classification of Service Types using Website Fingerprinting in Anonymous Encrypted Communication Networks (익명 암호통신 네트워크에서의 웹사이트 핑거프린팅을 활용한 서비스 유형 분류)

  • Koo, Dongyoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.4
    • /
    • pp.127-132
    • /
    • 2022
  • An anonymous encrypted communication networks that make it difficult to identify the trace of a user's access by passing through several virtual computers and/or networks, such as Tor, provides user and data privacy in the process of Internet communications. However, when it comes to abuse for inappropriate purposes, such as sharing of illegal contents, arms trade, etc. through such anonymous encrypted communication networks, it is difficult to detect and take appropriate countermeasures. In this paper, by extending the website fingerprinting technique that can identify access to a specific site even in anonymous encrypted communication, a method for specifying and classifying service types of websites for not only well-known sites but also unknown sites is proposed. This approach can be used to identify hidden sites that can be used for malicious purposes.

A License Audit Model for Secure DRM System in Home Network Environment (홈네트워크 환경에서의 안전한 DRM 시스템을 위한 라이센스 감사 모델)

  • Jang, Ui-Jin;Jung, Byung-Ok;Yeo, Sang-Soo;Shin, Yong-Tae
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.3
    • /
    • pp.438-447
    • /
    • 2009
  • Digital home devices aims at providing the multimedia service which is not limited at time and space in home network environment. However, it is incapable of the fair use of consumers who legally buys contents, and causes damage to the contents providers owing to the indiscriminate distribution and use of illegal contents. DRM system appeared to solve this problem cannot protect the license stored on digital home devices and manage license by redistribution. This paper proposes a license audit model which makes an inspection of illegal access, modification and redistribution and reports alert logs to server.

  • PDF

A Study on Network Redesign for Supply Chain Expansion (공급 사슬 확장을 위한 네트워크 재설계에 관한 연구)

  • Song, Byung Duk;Oh, Yonghui
    • The Journal of Society for e-Business Studies
    • /
    • v.17 no.4
    • /
    • pp.141-153
    • /
    • 2012
  • According to the environment change of market, supply chain network needs to be redesigned for efficient provision of product within the budget constraint. Also, it is desired that the customer satisfaction such as on time delivery should be considered as an important element at redesigning of supply chain network in addition to the cost reduction. In this paper redesign of supply chain network for its expansion is treated as a problem situation and a related mathematical model is suggested. Moreover, the numerical examples about the total weighted distance of the redesigned supply chain network are presented with various budget constraints by using genetic algorithm to help the managerial decision.

Implementation of abnormal behavior detection Algorithm and Optimizing the performance of Algorithm (비정상행위 탐지 알고리즘 구현 및 성능 최적화 방안)

  • Shin, Dae-Cheol;Kim, Hong-Yoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.11
    • /
    • pp.4553-4562
    • /
    • 2010
  • With developing networks, information security is going to be important and therefore lots of intrusion detection system has been developed. Intrusion detection system has abilities to detect abnormal behavior and unknown intrusions also it can detect intrusions by using patterns studied from various penetration methods. Various algorithms are studying now such as the statistical method for detecting abnormal behavior, extracting abnormal behavior, and developing patterns that can be expected. Etc. This study using clustering of data mining and association rule analyzes detecting areas based on two models and helps design detection system which detecting abnormal behavior, unknown attack, misuse attack in a large network.

Network Anomaly Detection based on Association among Packets (패킷간 연관 관계를 이용한 네트워크 비정상행위 탐지)

  • 오상현;이원석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.5
    • /
    • pp.63-73
    • /
    • 2002
  • Recently, intrusions into a computer have been increased rapidly and also various intrusion methods have been developed. As a result. many researches have been performed to detect the activities of intruders effectively In this paper, a new association mining algorithm for anomaly network intrusion detection is proposed. For this purpose, the proposed algorithm is composed of two different phases: intra-packet association and inter-packet association. The performance of the proposed anomaly detection system is evaluated based on several experiment according to various system parameters in order to identify their practical ranges for maximizing its detection rate. As a result, an anomaly can be detected effectively.