• Title/Summary/Keyword: 침해 사고 분석

Search Result 248, Processing Time 0.024 seconds

Digital Forensic Indicators of Compromise Format(DFIOC) and Its Application (디지털 포렌식 기반의 침해 지표 포맷 개발 및 활용 방안)

  • Lee, Min Wook;Yoon, Jong Seong;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.4
    • /
    • pp.95-102
    • /
    • 2016
  • Computer security incident such as confidential information leak and data destruction are constantly growing and it becomes threat to information in digital devices. To respond against the incident, digital forensic techniques are also developing to help digital incident investigation. With the development of digital forensic technology, a variety of forensic artifact has been developed to trace the behavior of users. Also, a diversity of forensic tool has been developed to extract information from forensic artifact. However, there is a issue that information from forensic tools has its own forms. To solve this problem, it needs to process data when it is output from forensic tools. Then it needs to compare and analyze processed data to identify how data is related each other and interpret the implications. To reach this, it calls for effective method to store and output data in the course of data processing. This paper aims to propose DFIOC (Digital Forensic Indicators Of Compromise) that is capable of transcribing a variety of forensic artifact information effectively during incident analysis and response. DFIOC, which is XML based format, provides "Evidence" to represent various forensic artifacts in the incident investigation. Furthermore, It provides "Forensic Analysis" to report forensic analysis result and also gives "Indicator" to investigate the trace of incidence quickly. By logging data into one sheet in DFIOC format for forensic analysis process, it is capable of avoiding unnecessary data processing. Lastly, since collected information is recorded in a normalized format, data input and output becomes much easier as well as it will be convenient to use for identification of collected information and analysis of data relationship.

Countermeasure by Cyber Infringement Accident Present Condition Analysis of Public and Private Section (공공 및 민간부문의 사이버침해사고 현황분석에 따른 대응방안)

  • Cho, Ho-Dae;Shin, Dong-Il
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.1
    • /
    • pp.331-338
    • /
    • 2009
  • We live was operates the life which is the Internet and became infra is very important. In order minimizes like this disfunction from will be applied the new order must take a position in cyber space. The cyber infringement most the information society brings about is serious concern middle one. The biggest thing is anonymous characteristic with cause of cyber crime. Also well cannot know becomes the cause where commits a crime that about cyber crime. Cyber crime the guilty conscience is thin. And the criminal who commits a cyber crime sense of insecurity is few. This paper which sees cyber infringement accident dividing came in public section, and analyzed presented a present condition and a confrontation plan.

Relationship between Information Security Activities of Enterprise and Its Infringement : Mainly on the Effects of Information Security Awareness (기업의 정보보호 활동과 정보침해 사고 간의 관계: 정보보호 인식의 매개효과를 중심으로)

  • Moon, Kunwoong;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.897-912
    • /
    • 2017
  • This paper focuses on how the protection of information security incident is effective in via Information security awareness when conducting information security activities of enterprises. Research models have theorized that the information security activity and the information security awareness will reduce the incidence of information security. The general characteristics of analysis targets have been carried out in the frequency analysis, and the reliability of the measuring tool has been utilized to calculate the coefficient of Cronbach's information protection. Evidence has been demonstrated regarding the relationship between information security activities and information security awareness and information security incidents.

A Study of Eavesdropping and Vulnerability Attack of Administrative Agency VoIP Services (행정기관 VoIP 서비스에 대한 취약점 공격과 도청 연구)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.447-450
    • /
    • 2011
  • 행정기관 VoIP 서비스는 현재 PSTN망과 인터넷망을 활용하여 기존 전화망보다 저렴한 가격에 음성통화를 할 수 있게 해주는 서비스로 확대되고 있다. 하지만 공공의 보안이 유지 되어야 할 행정기관 VoIP의 경우 보안취약성에 대한 문제들이 발생하고, 해커의 공격을 받을 가능성이 높다. 본 논문은 행정기관에서 유 무선 인터넷을 이용하여 VoIP 서비스 이용 시 발생할 수 있는 침해사고 유형을 분석하고 도청 공격을 실시하여 취약점을 분석한다. 행정기관용 Smart Phone으로 VoIP 취약점을 분석을 위하여 OmniPeek와 AirPcap 장비가 설치되어 있는 실험실 환경에서 도청 공격을 실시한 다. 도청 공격에 따르는 Packet을 분석하고, IP을 확인하여 공격에 의한 침해사고로 도청이 이루어짐을 시험으로 증명한다. 본 논문의 연구는 행정기관뿐 아니라 일반사용자의 Smart Phone과 VoIP 서비스 보안성 강화에 기초자료로 제공 될 것이다.

  • PDF

Pentesting-Based Proactive Cloud Infringement Incident Response Framework (모의해킹 기반 사전 예방적 클라우드 침해 사고 대응 프레임워크)

  • Hyeon No;Ji-won Ock;Seong-min Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.487-498
    • /
    • 2023
  • Security incidents using vulnerabilities in cloud services occur, but it is difficult to collect and analyze traces of incidents in cloud environments with complex and diverse service models. As a result, the importance of cloud forensics research has emerged, and infringement response scenarios must be designed from the perspective of cloud service users (CSUs) and cloud service providers (CSPs) based on representative security threat cases in the public cloud service model. This simulated hacking-based proactive cloud infringement response framework can be used to respond to the cloud service critical resource attack process from the viewpoint of vulnerability detection before cyberattacks occur on the cloud, and can also be expected for data acquisition. Therefore, in this paper, we propose a framework for preventive cloud infringement based on simulated hacking by analyzing and utilizing Cloudfox, a cloud penetration test tool.

A Study on Hacking E-Mail Detection using Indicators of Compromise (침해지표를 활용한 해킹 이메일 탐지에 관한 연구)

  • Lee, Hoo-Ki
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.21-28
    • /
    • 2020
  • In recent years, hacking and malware techniques have evolved and become sophisticated and complex, and numerous cyber-attacks are constantly occurring in various fields. Among them, the most widely used route for compromise incidents such as information leakage and system destruction was found to be E-Mails. In particular, it is still difficult to detect and identify E-Mail APT attacks that employ zero-day vulnerabilities and social engineering hacking techniques by detecting signatures and conducting dynamic analysis only. Thus, there has been an increased demand for indicators of compromise (IOC) to identify the causes of malicious activities and quickly respond to similar compromise incidents by sharing the information. In this study, we propose a method of extracting various forensic artifacts required for detecting and investigating Hacking E-Mails, which account for large portion of damages in security incidents. To achieve this, we employed a digital forensic indicator method that was previously utilized to collect information of client-side incidents.

Relative Analysis of Attack IP Address between Heterogeneous Intrusion Monitoring Systems (이기종 침해사고 모니터링 시스템에서 탐지한 공격 IP 연관성 분석)

  • Lee, Jae-Kook;Ahn, Jong-Hoon;Im, Chae-Tae
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06c
    • /
    • pp.215-217
    • /
    • 2012
  • 인터넷 사용이 보편화 되면서, 이를 악용하는 공격도 지속되고 있다. 이와 같이 네트워크를 통해 전파되는 다양한 공격으로부터 시스템을 보호하기위하여 DDoS 공격 대응 시스템과 스캐닝 공격 탐지 시스템, 스팸형 악성코드 탐지 시스템 등 다양한 보안 시스템들이 사용되고 있다. 본 논문에서는 다양한 인터넷 침해사고에 대응하기 위한 이기종 보안 시스템에서 탐지한 공격 로그를 분석하여 각 시스템별 공격 IP의 공격 지속시간을 확인하고, 서로 다른 침해사고 모니터링 시스템에서 탐지된 공격 IP의 연관 관계를 분석한다.

A Study on the Real-time Cyber Attack Intrusion Detection Method (실시간 사이버 공격 침해사고 탐지방법에 관한 연구)

  • Choi, Jae-Hyun;Lee, Hoo-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.7
    • /
    • pp.55-62
    • /
    • 2018
  • Recently, as the threat of cyber crime increases, the importance of security control to cope with cyber attacks on the information systems in the first place such as real-time detection is increasing. In the name of security control center, cyber terror response center and infringement response center, institutional control personnel are making efforts to prevent cyber attacks. Especially, we are detecting infringement accident by using network security equipment or utilizing control system, but it's not enough to prevent infringement accident by just controlling based on device-driven simple patterns. Therefore, the security control system is continuously being upgraded, and the development and research on the detection method are being actively carried out by the prevention activity against the threat of infringement. In this paper, we have defined the method of detecting infringement of major component module in order to improve the problem of existing infringement detection method. Through the performance tests for each module, we propose measures for effective security control and study effective infringement threat detection method by upgrading the control system using Security Information Event Management (SIEM).

연중캠페인-2007년 개인정보 침해 상담 및 신고가 늘어났다

  • Korea Information Security Agency
    • 정보보호뉴스
    • /
    • s.126
    • /
    • pp.6-7
    • /
    • 2008
  • 최근 1~2년 동안 개인정보보호라는 말을 무척 많이 들으셨을 겁니다. 그만큼 개인정보가 사회적 관심사로 떠올랐으며 이는 곧 개인정보유출과 관련된 사건사고가 그만큼 많았다는 의미이기도 합니다. 이런 가운데 얼마 전 개인정보 침해예방 및 피해구제를 위한 제도 발굴 및 개선을 목적으로 KISA 내 설립된 개인정보침해신고센터(전화 국번없이 1336, www.1336.or.kr)가 지난 2007년 한 해 동안 접수된 상담 및 신고민원 통계 및 동향 분석자료를 내놓았습니다. 국내 개인정보보호 사건사고의 요약본이라고 볼 수 있는 이번 자료에는 어떤 특징이 있는지 살펴보죠.

  • PDF

A Study on Network Forensics Information in Automated Computer Emergency Response System (자동화된 침해사고대응시스템에서의 네트웍 포렌식 정보에 대한 정의)

  • 박종성;최운호;문종섭;손태식
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.4
    • /
    • pp.149-162
    • /
    • 2004
  • Until now the study of computer forensics has been focused only system forensics which carried on keeping, processing and collecting the remained evidence on computer. Recently the trend of forensic study is proceeding about the network forensics which analyze the collected information in entire networks instead of analyzing the evidence on a victim computer. In particular network forensics is more important in Automated Computer Emergency Response System because the system deals with the intrusion evidence of entire networks. In this paper we defined the information of network forensics that have to be collected in Automated Computer Emergency Response System and verified the defined information by comparing with the collected information in experimental environments.