• Title/Summary/Keyword: ATP attack

Search Result 5, Processing Time 0.017 seconds

Design and Implementation of ATP(Advanced Persistent Threat) Attack Tool Using HTTP Get Flooding Technology (HTTP Get Flooding 기술을 이용한 APT(지능적 지속 위협)공격 도구의 설계와 구현)

  • Cheon, Woo-Bong;Park, Won-Hyung;Chung, Tai-Myoung
    • The Journal of Korean Association of Computer Education
    • /
    • v.14 no.6
    • /
    • pp.65-73
    • /
    • 2011
  • As we can see from the recent cyber attack, APT(Advanced Persistent Threat) is trend of hacking attack in the World. Thus, HTTP Get Flooding attack is considered to be one of the most successful attacks in cyber attack method. In this paper, designs and implements new technique for the cyber attack using HTTP get flooding technology. also, I need a defence about DDoS attack through APT Tools.

  • PDF

Attack Evolution of 'DNSpionage' and Countermeasures on Survey ('DNS피오나지' 공격의 진화에 따른 대응방안)

  • Hong, Sunghyuck
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.9
    • /
    • pp.52-57
    • /
    • 2019
  • DNS stands for 'Domain Name System' and uses IP addresses to identify devices connected to the network on the network. IP is a protocol that registers and manages aliases such as IPs because it is difficult for general users to remember. In recent years, the abuse of such DNS is increasing abroad, and behind the scenes, called 'DNS pionage,' are developing and evolving new rules and malware. DNSpionage attack is abusing DNS system such as Increasing hacking success rate, leading to fake sites, changing or forged data. As a result it is increasing the damage cases. As the global DNS system is expanding to the extent that it is out of control. Therefore, in this research, the countermeasures of DNSpionage attack is proposed to contribute to build a secure and efficient DNS system.

A Survey on system-based provenance graph and analysis trends (시스템 기반 프로비넌스 그래프와 분석 기술 동향)

  • Park Chanil
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.87-99
    • /
    • 2022
  • Cyber attacks have become more difficult to detect and track as sophisticated and advanced APT attacks increase. System providence graphs provide analysts of cyber security with techniques to determine the origin of attacks. Various system provenance graph techniques have been studied to reveal the origin of penetration against cyber attacks. In this study, we investigated various system provenance graph techniques and described about data collection and analysis techniques. In addition, based on the results of our survey, we presented some future research directions.

Hacking and Countermeasure on Smart TV (스마트 TV 해킹 위협 및 대응방안 분석)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.313-317
    • /
    • 2014
  • Smart-phone, PC or tablet platforms, such as smart terminals spread to the masses trying to capitalize. Smart TV also is increasing. In Korea, market size of TV is growing fast with growth of risk of hacking. In this paper, several kinds of Smart TV hacking cases are presented with the possibility of attacks against the vulnerability analysis and countermeasures. Most of the Linux operating system is open. Thus, it is vulnerable for latest hacking techniques. Most are based on the Linux OS to enhance security mount Sand-Box. However, bypass procedure using the technique, or APT attacks can avoid San-Box technique. New hacking techniques and a variety of ways will occur in the future. Therefore, this paper will develop Smart TV, and it analysis of a security threat and establishes better prepared in the future because new hacking attacks are expected to prepare more.

Upregulation of Dendritic Arborization by N-acetyl-D-Glucosamine Kinase Is Not Dependent on Its Kinase Activity

  • Lee, HyunSook;Dutta, Samikshan;Moon, Il Soo
    • Molecules and Cells
    • /
    • v.37 no.4
    • /
    • pp.322-329
    • /
    • 2014
  • N-acetylglucosamine kinase (GlcNAc kinase or NAGK; EC 2.7.1.59) is highly expressed and plays a critical role in the development of dendrites in brain neurons. In this study, the authors conducted structure-function analysis to verify the previously proposed 3D model structure of GlcNAc/ATP-bound NAGK. Three point NAGK mutants with different substrate binding capacities and reaction velocities were produced. Wild-type (WT) NAGK showed strong substrate preference for GlcNAc. Conversion of Cys143, which does not make direct hydrogen bonds with GlcNAc, to Ser (i.e., C143S) had the least affect on the enzymatic activity of NAGK. Conversion of Asn36, which plays a role in domain closure by making a hydrogen bond with GlcNAc, to Ala (i.e., N36A) mildly reduced NAGK enzyme activity. Conversion of Asp107, which makes hydrogen bonds with GlcNAc and would act as a proton acceptor during nucleophilic attack on the ${\gamma}$-phosphate of ATP, to Ala (i.e., D107A), caused a total loss in enzyme activity. The overexpression of EGFP-tagged WT or any of the mutant NAGKs in rat hippocampal neurons (DIV 5-9) increased dendritic architectural complexity. Finally, the overexpression of the small, but not of the large, domain of NAGK resulted in dendrite degeneration. Our data show the effect of structure on the functional aspects of NAGK, and in particular, that the small domain of NAGK, and not its NAGK kinase activity, plays a critical role in the upregulation of dendritogenesis.