• Title/Summary/Keyword: 방어메커니즘

Search Result 70, Processing Time 0.026 seconds

A Policy-based Secure Framework for Constructing Secure Networking (안전한 네트워크 구성을 위한 정책기반 보안 프레임워크)

  • 박상길;장종수;손승원;노봉남
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.8C
    • /
    • pp.748-757
    • /
    • 2002
  • Cyber-terror trials are increased in nowadays and these attacks are commonly using security vulnerability and information gathering method by variable services grew by the continuous development of Internet Technology. IDS's application environment is affected by this increasing Cyber Terror. General Network based IDS detects intrusion by signature based Intrusion Detection module about inflowing packet through network devices. Up to now security in network is commonly secure host, an regional issue adopted in special security system but these system is vulnerable intrusion about the attack in globally connected Internet systems. Security mechanism should be produced to expand the security in whole networks. In this paper, we analyzer the DARPA's program and study Infusion Detection related Technology. We design policy security framework for policy enforcing in whole network and look at the modules's function. Enforcement of security policy is acted by Intrusion Detection system on gateway system which is located in network packet's inflow point. Additional security policy is operated on-line. We can design and execute central security policy in managed domain in this method.

Attacker Response Framework using Mobile Code (이동 코드를 이용한 공격자 대응 프레임워크)

  • Bang Hyo-Chan;Him Jin-Oh;Na Jung-Chan;Jang Joong-Su;Lee Young-Suk
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.959-970
    • /
    • 2004
  • It has become more difficult to correspond an cyber attack quickly as patterns of attack become various and complex. However, current so curity mechanisms just have passive defense functionalities. In this paper, we propose new network suity architecture to respond various cyber attacks rapidly and to chase and isolate the attackers through cooperation between security zones. The proposed architecture makes it possible to deal effectively with cyber attacks such as IP spoofing or DDoS(Distributed Denial of Service), by using active packet technology including a mobile code on active network. Also, it is designed to have more active correspondent than that of existing mechanisms. We im-plemented these mechanisms in Linux routers and experimented on a testbed to verify realization possibility of attacker response framework using mobile code. The experimentation results are analyzed.

Anomaly Detection Mechanism against DDoS on BcN (BcN 상에서의 DDoS에 대한 Anomaly Detection 연구)

  • Song, Byung-Hak;Lee, Seung-Yeon;Hong, Choong-Seon;Huh, Eui-Nam;Sohn, Seong-Won
    • Journal of Internet Computing and Services
    • /
    • v.8 no.2
    • /
    • pp.55-65
    • /
    • 2007
  • BcN is a high-quality broadband network for multimedia services integrating telecommunication, broadcasting, and Internet seamlessly at anywhere, anytime, and using any device. BcN is Particularly vulnerable to intrusion because it merges various traditional networks, wired, wireless and data networks. Because of this, one of the most important aspects in BcN is security in terms of reliability. So, in this paper, we suggest the sharing mechanism of security data among various service networks on the BcN. This distributed, hierarchical architecture enables BcN to be robust of attacks and failures, controls data traffic going in and out the backbone core through IP edge routers integrated with IDRS. Our proposed anomaly detection scheme on IDRS for BcN service also improves detection rate compared to the previous conventional approaches.

  • PDF

Security Enhancing of Authentication Protocol for Hash Based RFID Tag (해쉬 기반 RFID 태그를 위한 인증 프로토콜의 보안성 향상)

  • Jeon, Jin-Oh;Kang, Min-Sup
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.23-32
    • /
    • 2010
  • In this paper, we first propose the security enhancing of authentication protocol for Hash based RFID tag, and then a digital Codec for RFID tag is designed based on the proposed authentication protocol. The protocol is based on a three-way challenge response authentication protocol between the tags and a back-end server. In order to realize a secure cryptographic authentication mechanism, we modify three types of the protocol packets which defined in the ISO/IEC 18000-3 standard. Thus active attacks such as the Man-in-the-middle and Replay attacks can be easily protected. In order to verify effectiveness of the proposed protocol, a digital Codec for RFID tag is designed using Verilog HDL, and also synthesized using Synopsys Design Compiler with Hynix $0.25\;{\mu}m$ standard-cell library. Through security analysis and comparison result, we will show that the proposed scheme has better performance in user data confidentiality, tag anonymity, Man-in-the-middle attack prevention, replay attack, forgery resistance and location tracking.

Analysis & defence of detection technology in network Attacker (네트워크 침입자탐지기법 분석과 대응)

  • Yun, Dong Sic
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.155-163
    • /
    • 2013
  • Connection hijacking attack using the vulnerability of the TCP protocol to redirect TCP stream goes through your machine actively (Active Attack). The SKEY such as one-time password protection mechanisms that are provided by a ticket-based authentication system such as Kerberos or redirection, the attacker can bypass.Someone TCP connection if you have access on TCP packet sniffer or packet generator is very vulnerable. Sniffer to defend against attacks such as one-time passwords and token-based authentication and user identification scheme has been used. Active protection, but these methods does not sign or encrypt the data stream from sniffing passwords over insecure networks, they are still vulnerable from attacks. For many people, an active attack is very difficult and so I think the threat is low, but here to help break the illusion successful intrusion on the UNIX host, a very aggressive attack is presented. The tools available on the Internet that attempt to exploit this vulnerability, known as the recent theoretical measures is required. In this paper, we propose analysis techniques on a wireless network intruder detection.

Active Security Management on Active Networks (능동 네트워크 기반의 능동 보안 관리 시스템)

  • 이영석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.4C
    • /
    • pp.559-569
    • /
    • 2004
  • It has become more difficult to correspond an cyber attack quickly as a pattern of attack becomes various and complex. And, current security mechanisms just have passive defense functionalities. In this paper, we propose new network security architecture to respond various cyber attacks rapidly and to chase and isolate the attackers through cooperation between security zones. The proposed architecture make possible to deal effectively with cyber attacks such as IP spoofing or DDoS(Distributed Denial of Service) using active packet technology including a mobile sensor on active network. Active Security Management System based on proposed security architecture consists of active security node and active security server in a security zone, and is designed to have more active correspondent than that of existing mechanisms. We implemented these mechanisms in Linux routers and experimented on a testbed to verify realization possibility of Active Security Management System. The experimentation results are analyzed.

A Building Method of Infrastructure Efficiency under Ad Hoc-based on Network Infrastructure for Medical Information System (Ad Hoc 기반 의료정보시스템의 네트워크 보안 효율성구조 Infrastructure 설계방법)

  • Noh, Si-Choon;Yoo, Seung-Jae
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.91-98
    • /
    • 2011
  • Medical information system based on ad hoc network designed for general information systems and information networks have different security requirements. Malicious code infiltration and security features are performed on same medical information network architecture along the route. Security domain of medical information systems is the ground of penetration and defense performed over the network architecture and it is also the traffic handling areas separated by a concept of differentiated group. Ad hoc-based medical information systems in the network security domain, set some standards about what should be the methodology of this study. In this paper, medical information system network configuration, the determining factor based on the security domain, the structure selection criteria and blocking positionings are presented according to the traffic route configuration. If you apply this methodology designed to increase security, efficiency can be possible. Health information systems in accordance with the security domain areas requires differentiated protection needs of the security mechanism that is proposed by this study.

Development of Fragility Curves for Slope Stability of Levee under Rapid Drawdown (수위급강하에 대한 제방 사면의 취약도 곡선 작성)

  • Cho, Sung-Eun
    • Journal of the Korean Geotechnical Society
    • /
    • v.39 no.10
    • /
    • pp.27-39
    • /
    • 2023
  • To effectively manage flood risk, it is crucial to assess the stability of flood defense structures like levees under extreme flood conditions. This study focuses on the time-dependent probabilistic assessment of embankment slope stability when subjected to rapid water level drops. We integrate seepage analysis results from finite element analysis with slope stability analysis and employ Monte Carlo simulations to investigate the time-dependent behavior of the slope during rapid drawdown. The resulting probability of failure is used to develop fragility curves for the levee slope. Notably, the probability of slope failure remains low up to a specific water level, sharply increasing beyond that threshold. Furthermore, the fragility curves are strongly influenced by the rate of drawdown, which is determined through hydraulic analysis based on flood scenarios. Climate change has a significant impact on the stability of the water-side slope of the embankment due to water level fluctuations.

Correlation between Heavy Metal Levels in Tissues of Feral Pigeons(Columba livia) (비둘기의 체내 조직 중 중금속 농도의 상관관계)

  • 남동하;이두표;구태회
    • The Korean Journal of Ecology
    • /
    • v.25 no.5
    • /
    • pp.335-339
    • /
    • 2002
  • Concentrations of Fe, Zn, Mn, Cd and Pb were determined in the tissues of sixty adult pigeons collected at six colonies in Korea, and examined correlations between elements, and between tissues in feral pigeons. As the results, we found many significant correlations between elements, and between tissues in them, A negative correlation between Cd and Fe concentrations was observed in the kidney, Cd depresses the absorption of Fe from the intestine and, in this way, affects the levels of Fe in particular tissues. This tendency could be expressed in terms of lower hemoglobin and hematocrit values because hematocrit is one of the most sensitive indicators of Cd intoxication. Zn concentrations are strongly associated with higher Cd levels in the kidney and liver. This is thought to be a reflection of the interaction known to occur between these two metals. Zn induction has been shown to antagonize a number of toxic effects of Cd. A positive correlation between Pb and Fe concentrations was detected in the livers at the Busan colony with relatively high Pb and Fe concentrations. Pb has been shown to co-accumulate with Fe in the liver by inhibiting the heme synthesis. Significant correlations, especially in toxic elements, Pb and Cd, were observed for many pairs of tissues. We suggest that these correlations between elements, and between tissues should be considered in biomonitoring for heavy metal pollution.

Stress Responses of Olive Flounder (Paralichthys olivaceus) to Salinity Changes (염분변화에 따른 넙치(Paralichthys olivaceus)의 스트레스 반응)

  • Park, Hyung-Jun;Min, Byung-Hwa
    • Korean Journal of Ichthyology
    • /
    • v.30 no.1
    • /
    • pp.1-8
    • /
    • 2018
  • We tried to determine the optimum salinity for a cultured of olive flounder (Paralichthys olivaceus) by investigating after exposing the fish at different salinity (10, 15, 20 and 25 psu) for 24 and 48 hours compared with control group (fish before transfer to experimental tank). As a control groups, we compared an analyzed with other experimental groups using olive flounder in natural sea water. Hematological parameters including hematocrit (Ht) and hemoglobin (Hb), cortisol and glucose, aspartate aminotransferase (AST) and alanine aminotransferase (ALT), $NH_3$, osmolality, total protein (TP), $Na^+$, $K^+$ and $Cl^-$ mostly exhibited significant changes at 10 and 15 psu groups compared with control groups for 24 and 48 hours exposed. Plasma SOD (superoxide dismutase) and CAT (catalase) activity also increased with experimental groups (10 and 15 psu) compared to the control groups. The expression of HSP70 mRNA was also higher at low-salinity (10 and 15 psu) than at control group. In particular, after 24 hours exposed, it expression to 15 psu groups showed a significant difference compared to the control group. However, after 48 hours exposed, it expression was higher in the 10 psu groups than the control. It is assumed that the changes in the hematological responses and hormone, homeostasis and metabolism were resulted in to protect fish body from stress. Based on these results, we are expected that it will be used as basic data for the culture of olive flounder prepared for low salinity.