• Title/Summary/Keyword: 우회정보

Search Result 441, Processing Time 0.031 seconds

Design of the Safe Web Browser Mitigating Clickjacking Attacks Based on Mini-Page (미니페이지 기반 클릭재킹 방지 브라우저의 설계)

  • Min, Jae-Won;Jung, Sung-Min;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.1072-1075
    • /
    • 2012
  • 인터넷 사용이 증가하고 기존의 오프라인 서비스들이 온라인으로 플랫폼을 이동하면서 개인정보나 결제정보 등을 탈취하기 위한 악성 사이트들이 등장하기 시작했다. 공격자들은 피싱 사이트를 만들어 사용자들의 정보 입력을 유도하고 이를 이용해 경제적 이익을 취득한다. 클릭재킹은 마우스 클릭을 하이재킹하여 사용자의 권한으로 특정 행동을 유도하는 공격 방법으로서, 온라인 계정을 삭제하거나 보인 기능 설정을 해제하는 등 여러 가지 문제점을 발생시킬 수 있다. 여러 가지 클릭재킹 방어 메커니즘이 제안되었으나 우회가 가능하여 잠재적인 문제점을 안고 있다. 따라서 본 논문에서는 현재 제안된 클릭재킹 방어기술들과 우회 기술들을 살펴보고 안전한 웹 브라우징 환경을 제공하는 브라우저를 제안한다.

A study on the threat hunting model for threat detection of circumvent connection remote attack (우회 원격공격의 위협탐지를 위한 위협 헌팅 모델 연구)

  • Kim, Inhwan;Ryu, Hochan;Jo, Kyeongmin;Jeon, Byungkook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.4
    • /
    • pp.15-23
    • /
    • 2021
  • In most hacking attacks, hackers intrudes inside for a long period of time and attempts to communicate with the outside using a circumvent connection to achieve purpose. research in response to advanced and intelligent cyber threats has been mainly conducted with signature-based detection and blocking methods, but recently it has been extended to threat hunting methods. attacks from organized hacking groups are advanced persistent attacks over a long period of time, and bypass remote attacks account for the majority. however, even in the intrusion detection system using intelligent recognition technology, it only shows detection performance of the existing intrusion status. therefore, countermeasures against targeted bypass rwjqthrwkemote attacks still have limitations with existing detection methods and threat hunting methods. in this paper, to overcome theses limitations, we propose a model that can detect the targeted circumvent connection remote attack threat of an organized hacking group. this model designed a threat hunting process model that applied the method of verifying the origin IP of the remote circumvent connection, and verified the effectiveness by implementing the proposed method in actual defense information system environment.

The IOA-Based Intelligent Information Protection System for Response of Advanced Persistent Threats (IOA 기반의 지능형지속위협 대응 위한 지능형 정보보호시스템)

  • Ryu, Chang-su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2067-2072
    • /
    • 2016
  • Recently, due to the development of attack techniques that can circumvent existing information protection systems, continuous threats in a form unrecognized by the user have threatened information assets. Therefore, it is necessary to support the prompt responses to anticipated attempts of APT attacks, bypass access attacks, and encryption packet attacks, which the existing systems have difficulty defending against through a single response, and to continuously monitor information protection systems with a defense strategy based on Indicators of Attack (IOA). In this paper, I suggest a centralized intelligent information protection system to support the intelligent response to a violation by discerning important assets through prevention control in a performance impact assessment about information properties in order to block the attack routes of APT; establishing information control policies through weakness/risk analyses in order to remove the risks in advance; establishing detection control by restricting interior/exterior bypass networks to server access and monitoring encrypted communications; and lastly, performing related corrective control through backup/restoration.

A Study on Providing Real-Time Route Guidance Information by Variable Massage Signs with Driver Behavior (운전자 행태를 고려한 VMS의 실시간 경로안내 정보제공에 관한 연구)

  • Lee, Chang-U;Jeong, Jin-Hyeok
    • Journal of Korean Society of Transportation
    • /
    • v.24 no.7 s.93
    • /
    • pp.65-79
    • /
    • 2006
  • The ATIS(Advance Traveler Information System), as one part of ITS, is a system aiming to disperse traffic volume on transportation networks by providing traffic information to transportation users on pre-trip and en-route trips. One of tools in ATIS is usage of VMS(Variable Message Signs). It provides to the drivers with direct information about state of processing direction. which is considered as the most effective method in ATIS. The purposes of providing VMS information are classified two categories. One is to provide simple information to drivers for their convenience. The other is to manage traffic demand to improve transportation network performance. However, for more effective and reliable VMS information, several strategies should be taken into account. The main VMS management strategy is "Traffic Diversion Strategy for minimum delay" when traffic congestion or incident are occurred. For effective operation. firstly. reasonable diversion traffic volume is determined by network traffic condition Secondly, it is necessary to make providing information strategy which reflects driver response behavior for controling diversion traffic volume. This paper focuses on the providing real-time route guidance information by VMS when congestion is occurred by the incidents. This sturdy estimates time-dependent system optimal diversion rate that inflects travel time and queue lengths using traffic flow simulation model on base Cellular Automata. In addition, route choice behavior models are developed using binary logit model for traffic information variable by traffic system controller. Finally, this study provides time-dependent VMS massage contents and degree of providing information in order to optimize the traffic flow.

안드로이드 모바일 악성앱 동적분석 회피기술 동향

  • Kim, Mijoo;Shin, Young Sang;Lee, Tae Jin;Youm, Heung Youl
    • Review of KIISC
    • /
    • v.25 no.6
    • /
    • pp.5-12
    • /
    • 2015
  • 스마트폰 사용이 대중화됨에 따라 스마트폰 사용인구 증가와 함께 우리의 일상생활과 밀접한 관계를 가지며 영향력을 넓혀가고 있는 가운데, 악성앱을 이용해 개인정보 유출, 불법 과금 유발, 스팸 발송 등 스마트폰 사용자에 피해를 입히며 사회적인 문제를 유발하는 보안 위협의 출현 또한 지속적으로 증가하고 있다. 이러한 문제를 해결하기 위해 전 세계 보안업체, 연구소, 학계 등에서는 스마트폰 악성앱을 탐지하고 대응하기 위한 기술을 연구개발하고, 앱 마켓에서는 악성앱을 탐지하기 위한 분석 시스템을 도입하는 등 다양한 활동이 진행되고 있다. 하지만 악성앱 또한 기존의 탐지 및 대응 기술을 우회하는 등 생존율을 높이기 위한 방향으로 점차 지능화 정교화되는 양상을 보이고 있다. 최근 이러한 특징은 앱 마켓 등에서 도입하고 있는 대량의 앱에 대한 자동화된 런타임 분석을 수행하는 동적분석 시스템/서비스를 대상으로 많이 발생되고 있는데, 동적분석의 환경적, 시간적 제약 등을 이용하여 분석기술을 회피하는 기법을 주로 사용하고 있다. 이와 관련하여 본 논문에서는 기존의 동적분석 기술을 우회하는 악성앱 분석회피 행위 유형을 분류하고, 이와 관련된 연구 동향에 대한 정보를 제공하고자 한다.

An Attack of Defeating Keyboard Encryption Module using Javascript Manipulation in Korean Internet Banking (자바스크립트 변조를 이용한 국내 인터넷 뱅킹 키보드 암호화 모듈 우회 공격)

  • Lee, Sung-hoon;Kim, Seung-hyun;Jeong, Eui-yeob;Choi, Dae-seon;Jin, Seung-hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.941-950
    • /
    • 2015
  • Internet banking is widely used in our life with the development of the internet. At the same time, phishing attacks to internet banking have been increased by using malicious object to make unfair profit. People using internet banking service in Korea is required to install security modules such as anti-virus and keyboard protection. However phishing attack technique has been progressed and the advanced technique such as memory hacking defeats the security module of internet banking service. In this paper, we describe internet banking security modules provided by Korean internet banks and analyze how keyboard encryption module works. And we propose an attack to manipulate account transfer information using javascript. Although keyboard protection module provides two functions that protect leakage and manipulation of account transfer information submitted by users against the malicious program of hackers. Our proposed technique can manipulate the account transfer information and result html pages.

Indirection based Multilevel Security Model and Application of Rehabilitation Psychology Analysis System (재활심리분석시스템의 다중 우회기반 접근통제 모델 및 응용)

  • Kim, Young-Soo;Jo, Sun-Goo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.10
    • /
    • pp.2301-2308
    • /
    • 2013
  • These days, Rehabilitation psychology analysis system is being used by world wide web in everyday's life. And on the other hand, we are facing spam messages' problems. To block these spam message, we are using filtering or pricing systems. But these solutions are raising other problems such as impediment in reception or availability caused by false positive or payment resistance. To solve these problems, we propose an Indirect Model on Message Control System(IMMCS) which controls an unsolicited message and prevents an useful message from discarding. We design and implement the IMMCS to enhance the usefulness and the availability. Being tested the IMMCS to verify the usability and the efficiency, it gave us a very successful result.

A Risk Factor Detour Multi-Path Routing Scheme Based on DEFCON in Multimedia Sensor Networks (멀티미디어 센서 네트워크 환경에서 준비태세기반 위험요소 우회 다중 경로 라우팅 기법)

  • Hwang, Dong-Gyo;Son, In-Gook;Park, Jun-Ho;Seong, Dong-Ook;Yoo, Jae-Soo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06d
    • /
    • pp.199-201
    • /
    • 2012
  • 무선 멀티미디어 센서 네트워크를 활용하기 위한 응용에서는 대용량 멀티미디어 데이터 저장 및 처리 기술, 데이터 전송 기술 등과 같은 다양한 기반 기술들이 요구된다. 특히, 응용을 실제 환경에 적용하기 위해서는 대용량 데이터에 대한 데이터 보안 기술은 필수적이다. 본 논문은 여러 해킹 기술 중 하나인 스니핑 공격으로부터 원천적인 방어를 위해, 데이터 전송 경로를 위험 요소로부터 물리적으로 회피시키기 위한 다중 경로 라우팅 기법을 제안한다. 제안하는 기법은 위험 요소의 감지 반경과 움직임을 토대로 위험 요소의 인근에 위치한 센서 노드에 준비태세 단계를 설정한다. 이를 기반으로 데이터의 우선 순위를 설정하여 데이터 라우팅 과정에서 준비태세 단계와 데이터의 우선 순위를 고려하여 우선순위에 맞는 안전한 경로를 통해 위험요소 우회 다중 경로 라우팅을 수행한다. 시뮬레이션을 통해 제안하는 기법의 구현 가능성을 제시하였으며, 준비태세를 기반으로 효과적인 위험요소 우회 다중 경로 라우팅을 보였다.

Indirection Model and Application of Electronic Mail Control System Considering High Availability (고가용성을 고려한 전자메일통제시스템의 우회 모델 및 응용)

  • Kim Young Soo;Suh Jung Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.2
    • /
    • pp.348-354
    • /
    • 2005
  • These days, Electronic mail is being used in everyday's life. And on the other hand, we are facing spam mails' problems. Spam mails are widely used by means of marketing in e-Commerce. To block these spam mails, we are using filtering or pricing systems. But these solutions are raising other problems such as impediment in reception or availability caused by false positive or payment resistance. To solve these problems, we propose an Indirect Model on Electronic Mail Control System(IMEMCS) which controls an unsolicited electronic mail and prevents an useful electronic mail from discarding. We design and implement the IMEMCS to enhance the usefulness and the availability. Being tested the IMEMCS to verify the usability and the efficiency, it gave us a very successful result.

A Novel Process Design for Analyzing Malicious Codes That Bypass Analysis Techniques (분석기법을 우회하는 악성코드를 분석하기 위한 프로세스 설계)

  • Lee, Kyung-Roul;Lee, Sun-Young;Yim, Kang-Bin
    • Informatization Policy
    • /
    • v.24 no.4
    • /
    • pp.68-78
    • /
    • 2017
  • Malicious codes are currently becoming more complex and diversified, causing various problems spanning from simple information exposure to financial or psychologically critical damages. Even though many researches have studied using reverse engineering to detect these malicious codes, malicious code developers also utilize bypassing techniques against the code analysis to cause obscurity in code understanding. Furthermore, rootkit techniques are evolving to utilize such bypassing techniques, making it even more difficult to detect infection. Therefore, in this paper, we design the analysis process as a more agile countermeasure to malicious codes that bypass analysis techniques. The proposed analysis process is expected to be able to detect these malicious codes more efficiently.