• Title/Summary/Keyword: 사이버 공격 기술

Search Result 443, Processing Time 0.024 seconds

CAN 네트워크에서의 악의적인 ECU 식별 기술 연구 동향

  • Seyoung Lee;Wonsuk Choi;Dong Hoon Lee
    • Review of KIISC
    • /
    • v.33 no.4
    • /
    • pp.47-55
    • /
    • 2023
  • 자동차 산업에서 전자제어장치 (Electronic Controller Unit, ECU)를 활용한 혁신으로 운전자들은 안전하고 편리한 운전경험을 누리고 있다. 그러나 이와 동시에, 차량 내부 ECU 간의 통신을 지원하는 CAN (Controller Area Network)을 대상으로 한 악의적인 침입과 사이버 공격의 위협 역시 증가하고 있다. 이러한 문제에 대응하기 위해 많은 연구가 진행 중이며, 특히 자동차 침입 탐지 시스템 (Intrusion Detection System, IDS)의 발전이 주목받고 있다. 그러나 대부분의 IDS는 주로 공격을 탐지하는 데 집중되어 있으며, 실제 악의적인 메시지를 전송한 ECU를 정확히 식별하는 데에는 한계점이 있다. 악의적인 ECU를 식별하는 기술은 공격 ECU를 격리시키거나 펌웨어 업데이트 등의 보안 패치를 적용하는데 필수적인 기술이다. 본 고에서는 현재까지 제안된 CAN에서의 악의적인 ECU를 식별하기 위한 기술들에 대해 살펴보고, 비교 분석 및 한계점에 대해 분석하고자 한다.

Study on Attack Source Traceback Model of IPv6 (IPv6의 공격 근원지 역추적 모델 연구)

  • 이철수;임인빈;최재호
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.301-303
    • /
    • 2004
  • 인터넷의 급성장으로 해킹이나 Dos 공격, 웜, 바이러스 등의 사이버 범죄가 크게 증가하고 지능화되어 최근 역추적에 대한 관심이 날로 증가하고 있다. 보안 도구로 침입탐지시스템(IDS) 이나 침입방지시스템 (IPS) 등이 있으나 해킹이나 DoS 공격을 방어하는데 현실적으로 한계가 있다. 따라서 능동적인 해킹 방어를 위한 기본적인 기술로 해커의 실제 위치를 추적하는 역추적 시스템 기술이 필요하다. 특히 IPv4에서의 역추적 시스템에 대한 연구는 활발하게 이루어지고 있지만 IPv6에 대한 연구는 아직 미흡하다. 본 논문에서는 IPv4의 주소 고갈로 인해 앞으로 이를 대신할 IPv6에 대한 공격 근원지 역추적 시스템 개발이 시급하다고 보고. 해킹을 시도하는 해커의 실제 위치를 실시간으로 추적할 수 있도록 IPv6 헤더 패킷의 트래픽 클래스(Traffic Class)와 플로우 라벨(Flow Label)을 이용하여 IPv6에서의 실시간 네트워크 침입자 역추적 시스템 모델을 제안하고자 한다.

  • PDF

Development of Hardware In the Loop System for Cyber Security Training in Nuclear Power Plants (원자력발전소 사이버보안 훈련을 위한 HIL(Hardware In the Loop) System 개발)

  • Song, Jae-gu;Lee, Jung-woon;Lee, Cheol-kwon;Lee, Chan-young;Shin, Jin-soo;Hwang, In-koo;Choi, Jong-gyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.867-875
    • /
    • 2019
  • Security awareness and training are becoming more important as cyber security incidents tend to increase in industrial control systems, including nuclear power plants. For effective cyber security awareness and training for the personnel who manage and operate the target facility, a TEST-BED is required that can analyze the impact of cyber attacks from the sensor level to the operation status of the nuclear power plant. In this paper, we have developed an HIL system for nuclear power plant cyber security training. It includes nuclear power plant status simulations and specific system status simulation together with physical devices. This research result will be used for the specialized cyber security training program for Korean nuclear facilities.

A Study on Amplification DRDoS Attacks and Defenses (DRDoS 증폭 공격 기법과 방어 기술 연구)

  • Choi, Hyunsang;Park, Hyundo;Lee, Heejo
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.5
    • /
    • pp.429-437
    • /
    • 2015
  • DDoS attacks have been used for paralyzing popular Internet services. Especially, amplification attacks have grown dramatically in recent years. Defending against amplification attacks is challenging since the attacks usually generate extremely hugh amount of traffic and attack traffic is coming from legitimate servers, which is hard to differentiate from normal traffic. Moreover, some of protocols used by amplification attacks are widely adopted in IoT devices so that the number of servers susceptible to amplification attacks will continue to increase. This paper studies on the analysis of amplification attack mechanisms in detail and proposes defense methodologies for scenarios where attackers, abused servers or victims are in a monitoring network.

스마트 그리드에서의 프라이버시 보호

  • Park, Nam-Je;Ahn, Gil-Joon
    • Review of KIISC
    • /
    • v.20 no.3
    • /
    • pp.62-78
    • /
    • 2010
  • 최근 그린 IT에 대한 관심이 고조되면서 저탄소 녹색성장의 완성을 위해 지능형 전력망으로 불리는 스마트 그리드(Smart Grid) 기술을 도입하여 빠른 환경 변화에 한발 앞서가고 있다. 스마트 그리드를 통해 전력망이 진화하고 있지만 사이버 공격과 비고의적인 위험노출에 대한 우려도 일각에서 제기되고 있는 상황이다. 전력망이 갈수록 복잡해지고 서로 연결됨에 따라 유틸리티 공급업체의 사이버 보안 위협을 위한 노력이 점차로 중요하게 될 것이다. 이에 본 연구에서는 스마트 그리드의 개인정보보호 필요성과 침해 유형들을 살펴보고, 스마트 그리드에서의 프라이버시 보호에 대한 고려사항과 보호 제공방안을 고찰하도록 한다.

An Experimental Environment for Simulation of Stealthy Deception Attack in CPS Using PLCitM (PLC in the Middle) (중간자 PLC를 이용한 CPS 은닉형 공격 실험환경 구축 방안)

  • Chang, Yeop;Lee, Woomyo;shin, Hyeok-Ki;Kim, Sinkyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.123-133
    • /
    • 2018
  • Cyber-Physical System (CPS) is a system in which a physical system and a cyber system are strongly integrated. In order to operate the target physical system stably, the CPS constantly monitors the physical system through the sensor and performs control using the actuator according to the current state. If a malicious attacker performs a forgery attack on the measured values of the sensors in order to conceal their attacks, the cyber system operated based on the collected data can not recognize the current operation status of the physical system. This causes the delay of the response of the automation system and the operator, and then more damage will occur. To protect the CPS from increasingly sophisticated and targeted attacks, countermeasures must be developed that can detect stealthy deception attacks. However, in the CPS environment composed of various heterogeneous devices, the process of analyzing and demonstrating the vulnerability to actual field devices requires a lot of time. Therefore, in this study, we propose a method of constructing the experiment environment of the PLCitM (PLC in the middle) which can verify the performance of the techniques to detect the CPS stealthy deception attack and present the experimental results.

Performance Analysis of SDR Communication System Based on MTD Technology (MTD 기법이 적용된 SDR 통신 시스템의 성능 분석)

  • Ki, Jang-Geun;Lee, Kyu-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.2
    • /
    • pp.51-56
    • /
    • 2017
  • With the rapid increase in the number of mobile terminals, demand for wireless technologies has sharply increased these days. While wireless communication provides advantages such as ease of deployment, mobility of terminals, continuity of session, and almost comparable transmission bandwidth to the wired communication, it has vulnerability to malicious radio attacks such as eavesdropping, denial of service, session hijacking, and jamming. Among a variety of methods of preventing wireless attacks, the MTD(Moving Target Defense) is the technique for improving the security capability of the defense system by constantly changing the ability of the system to be attacked. In this paper, in order to develop a resilient software defined radio communication testbed system, we present a novel MTD approach to change dynamically and randomly the radio parameters such as modulation scheme, operating frequency, packet size. The probability of successful attack on the developed MTD-based SDR communication system has been analysed in a mathematical way and verified through simulation.

A Study on the Model for Determining the Deceptive Status of Attackers using Markov Chain (Markov Chain을 이용한 기만환경 칩입 공격자의 기만 여부 예측 모델에 대한 연구)

  • Sunmo Yoo;Sungmo Wi;Jonghwa Han;Yonghyoun Kim;Jungsik Cho
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.37-45
    • /
    • 2023
  • Cyber deception technology plays a crucial role in monitoring attacker activities and detecting new types of attacks. However, along with the advancements in deception technology, the development of Anti-honeypot technology has allowed attackers who recognize the deceptive environment to either cease their activities or exploit the environment in reverse. Currently, deception technology is unable to identify or respond to such situations. In this study, we propose a predictive model using Markov chain analysis to determine the identification of attackers who infiltrate deceptive environments. The proposed model for deception status determination is the first attempt of its kind and is expected to overcome the limitations of existing deception-based attacker analysis, which does not consider attackers who identify the deceptive environment. The classification model proposed in this study demonstrated a high accuracy rate of 97.5% in identifying and categorizing attackers operating in deceptive environments. By predicting the identification of an attacker's deceptive environment, it is anticipated that this model can provide refined data for numerous studies analyzing deceptive environment intrusions.

A Study on Preprocessing Method in Deep Learning for ICS Cyber Attack Detection (ICS 사이버 공격 탐지를 위한 딥러닝 전처리 방법 연구)

  • Seonghwan Park;Minseok Kim;Eunseo Baek;Junghoon Park
    • Smart Media Journal
    • /
    • v.12 no.11
    • /
    • pp.36-47
    • /
    • 2023
  • Industrial Control System(ICS), which controls facilities at major industrial sites, is increasingly connected to other systems through networks. With this integration and the development of intelligent attacks that can lead to a single external intrusion as a whole system paralysis, the risk and impact of security on industrial control systems are increasing. As a result, research on how to protect and detect cyber attacks is actively underway, and deep learning models in the form of unsupervised learning have achieved a lot, and many abnormal detection technologies based on deep learning are being introduced. In this study, we emphasize the application of preprocessing methodologies to enhance the anomaly detection performance of deep learning models on time series data. The results demonstrate the effectiveness of a Wavelet Transform (WT)-based noise reduction methodology as a preprocessing technique for deep learning-based anomaly detection. Particularly, by incorporating sensor characteristics through clustering, the differential application of the Dual-Tree Complex Wavelet Transform proves to be the most effective approach in improving the detection performance of cyber attacks.

Home Network Security Requirements and Response for Ubiquitous Environment (유비쿼터스 환경에 적합한 홈네트워크 보안요구사항 및 대응 방안)

  • Ryu Woo-Kwon;Lee Hee-Jo
    • Annual Conference of KIPS
    • /
    • 2006.05a
    • /
    • pp.947-950
    • /
    • 2006
  • 최근 들어 언제 어디서나 컴퓨팅이 가능한 유비쿼터스 컴퓨팅(Ubiquitous Computing) 사회가 되면서 개인의 컴퓨팅 환경 의존도가 증가되었고, 따라서 사이버공격으로 인한 개인생활의 위협도 증가할 수밖에 없게 되었다. 더욱이 향후에는 원격진료와 같이 개인의 생명과 직결된 유비쿼터스 서비스가 활성화될 것이므로 사이버공격으로 인해 재산뿐 아니라 생명까지 위험에 처하는 경우가 늘어나게 될 것이다. 이로 인해 유비쿼터스 환경에 적합한 홈네트워크 보안(Home Network Secutity)의 중요성이 부각되게 되었다. 본 논문에서는 안전한 U-홈네트워크(Ubiquitous-Home Network) 구축에 필요한 기술들을 유 무선 기준으로 구분하고, U-홈네트워크 환경에서 발생할 수 있는 다양한 침해유형을 분석하여, 이를 막아낼 수 있는 대응방안을 수립하고, 안전한 U-홈네트워크 구축을 위해 필요한 기존의 보안요구사항들을 살펴본 후에 U-홈네트워크에 적합한 추가적 보안사항을 제안하고자 한다.

  • PDF