• 제목/요약/키워드: Attack tool

검색결과 139건 처리시간 0.028초

IoT 인프라 공격 확산 방지 기술 성능 검증을 위한 악성코드 고속 확산 기법 연구 (A Study on the High-Speed Malware Propagation Method for Verification of Threat Propagation Prevent Technology in IoT Infrastructure)

  • 황송이;김정녀
    • 정보보호학회논문지
    • /
    • 제31권4호
    • /
    • pp.617-635
    • /
    • 2021
  • 네트워크에 연결된 사물인터넷(Internet of Things, IoT) 기기는 보안 솔루션이 적용되지 않아 ICT(Information & Communications Technology) 인프라의 심각한 보안 위협으로 전락했다. 더군다나 IoT 기기의 특성상 자원제약이 많아 기존의 보안 솔루션을 적용하기 어렵다. 그 결과 사물인터넷 기기는 사이버 공격자의 공격 대상이 됐으며, 실제로도 사물인터넷 기기를 대상으로 한 악성코드 공격이 해마다 꾸준히 증가하고 있다. 이에 IoT 인프라를 보호하기 위해 여러 보안 솔루션이 개발되고 있지만, 기능이 검증되지 않은 보안 솔루션을 실제 환경에 적용하기엔 큰 위험이 따른다. 따라서 보안 솔루션의 기능과 성능을 검증할 검증 도구도 필요하다. 보안 솔루션이 다양한 보안 위협에 대응하는 방법도 다양하므로, 각 보안 솔루션의 특징을 기반으로 한 최적의 검증 도구가 필요하다. 본 논문에서는 IoT 인프라에 빠른 속도로 악성코드를 전파하는 악성코드 고속 확산 도구를 제안한다. 또한, IoT 인프라에서 확산하는 공격을 빠르게 탐지하고 차단하는 보안 솔루션의 기능과 성능을 검증하기 위해 개발된 악성코드 고속 확산 도구를 이용한다.

A Testbed for the Security Issues of Limited-resource Internet Appliances

  • Vorapojpisut, S.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2004년도 ICCAS
    • /
    • pp.762-766
    • /
    • 2004
  • This paper introduces a testbed which is suitable for the study of security issues arising in applications involving internet appliances. The testbed implements secure door locks by utilizing the intranet in the building and is composed of two main parts, namely a database server and door locks each of which equipped with a custom-made embedded system. The main objective is to provide a platform for teaching the conflict among real-time specifications, security requirements, and limited-resource constraints. After definitions of threat, vulnerability, and attack are given, we discuss how the testbed can be applied as an education tool for these concepts. Finally, the effects of sequential and multitasking operations are given as a case study.

  • PDF

CFD를 이용한 초음속 유도탄 기저항력 예측 (BASE DRAG PREDICTION OF A SUPERSONIC MISSILE USING CFD)

  • 이복직
    • 한국전산유체공학회지
    • /
    • 제11권3호
    • /
    • pp.59-63
    • /
    • 2006
  • Accurate prediction of a supersonic missile base drag continues to defy even well-rounded CFD codes. In an effort to address the accuracy and predictability of the base drags, the influence of grid system and competitive turbulence models on the base drag is analyzed. Characteristics of some turbulence models is reviewed through incompressible turbulent flow over a flat plate, and performance for the base drag prediction of several turbulence models such as Baldwin-Loman(B-L), Spalart-Allmaras(S-A), k-$\varepsilon$, k-$\omega$ model is assessed. When compressibility correction is injected into the S-A model, prediction accuracy of the base drag is enhanced. The NSWC wind tunnel test data are utilized for comparison of CFD and semi-empirical codes on the accuracy of base drag predictability: they are about equal, but CFD tends to perform better. It is also found that, as angle of attack of a missile with control fins increases, even the best CFD analysis tool we have lacks the accuracy needed for the base drag prediction.

HTTP Header를 이용한 실시간 웹 공격 탐지 시각화 도구의 설계 및 구현 (Real-Time Web Attack Detection Visualization Tool Design and Implementation using HTTP Header Information)

  • 구본현;조규형;조상현;문종섭
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2006년도 하계학술대회
    • /
    • pp.637-640
    • /
    • 2006
  • 본 논문에서는 HTTP 요청, 응답 헤더정보 분석을 통해, 실시간으로 웹 공격을 탐지하는 시각화도구를 제안한다. 공격 탐지기법은 이상, 오용 탐지 기법을 통합한 방식이다. 이상 탐지는 헤더정보의 Refer와 Uri 필드를 이용한 베이지언 분포를 통한 확률 값을 이용하였으며, 오용탐지는 Snort의 공격 시그너쳐의 웹 공격부분을 사용하였다. 공격 탐지 정보의 효율적인 전달을 위해, 시각화를 GUI로 구현하였다. 본 논문에서는 사용자 에이전트의 비정상 행위 감시, 빈도 분석, 공격 에이전트 위치추적을 실시간으로 시각화하여 표현하는 기법을 제안한다.

  • PDF

편두통의 기능적 뇌영상 (Functional Neuroimaging in Migraine)

  • 김지현
    • Annals of Clinical Neurophysiology
    • /
    • 제10권1호
    • /
    • pp.13-24
    • /
    • 2008
  • Functional neuroimaging, especially positron emission tomography (PET) and functional magnetic resonance imaging (MRI), is the main tool that allows the unveiling of the neurovascular events during a migraine attack. In migraine with aura, functional neuroimaging has contributed greatly to the understanding of the fundamental pathophysiology of the visual aura, whereas in migraine without aura, the PET findings of brainstem activation suggest a pivotal role of brainstem in the generation of migraine headache. In addition, voxel-based morphometry (VBM) method has provided an insight into the morphometric changes of the brain, which might be considered as a consequence of repeated migraine attacks. In this article, I will briefly discuss the main neuroimaging findings pertaining to the pathophysiology of migraine.

  • PDF

상부공격 지능자탄의 낙하운동 및 탐색경로 시뮬레이션 (Simulation and Analysis of Top-Attack Smart Submunition Descent Motions and Target Searching Footprint)

  • 김기표;장쾌현;최상경;홍종태
    • 한국군사과학기술학회지
    • /
    • 제11권6호
    • /
    • pp.5-13
    • /
    • 2008
  • A smart submunition drops through the expected trajectory to have a appropriate target searching footprint for the armored ground vehicles. Parachutes can be used as a tool to decelerate and spin the submunition. Usually submunition's descent velocity, spin rate, submunition inclination angle against vertical and dynamic stability affect to its target searching footprint. Therefore it is important to design optimal parachute and load configuration for the overall system performance. In this paper we described the dynamic motion of submunition by the mathematical model of parachute and load. Through the computer simulation we can analyze the submunition footprint affected by parachute and load design.

출구 릴레이 방법론을 이용한 Tor 보안 정책 (A Tor Security Policy using Exit Relay Methodology)

  • 장덕성;박소연;최두영
    • 한국멀티미디어학회논문지
    • /
    • 제20권6호
    • /
    • pp.911-917
    • /
    • 2017
  • Tor proxy tool is studied which is most frequently used for ransomeware to penetrate into sensitive information. It will be researched for the malicious methods to spread virus by using Tor and considered a countermeasure to prevent them. We present exit relay methodology for Tor security policy, simulate it, and get a probability to detect the ransomeware. And we compare it with TSS technology which is able to protect the attack via virtual server on exit relay.

Air-Data Estimation for Air-Breathing Hypersonic Vehicles

  • Kang, Bryan-Heejin
    • Transactions on Control, Automation and Systems Engineering
    • /
    • 제1권1호
    • /
    • pp.75-86
    • /
    • 1999
  • An air-data estimator for generic air-breathing hypersonic vehicles (AHSVs) is developed and demonstrated with an example vehicle configuration. The AHSV air-data estimation strategy emphasized improvement of the angle of attack estimate accuracy to a degree necessitated by the stringent operational requirements of the air-breathing propulsion. the resulting estimation problem involves highly nonlinear diffusion process (propagation); consequently, significant distortion of a posteriori conditional density is suspected. A simulation based statistical analysis tool is developed to characterize the nonlinear diffusion process. The statistical analysis results indicate that the diffusion process preserves the symmetry and unimodality of initial probability density shape state variables, and provide the basis for applicability of an Extended Kalman Filter (EKF). An EKF is designed for the AHSV air-data system and the air data estimation capabilities are demonstrated.

  • PDF

Hybrid Neural Networks for Intrusion Detection System

  • Jirapummin, Chaivat;Kanthamanon, Prasert
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2002년도 ITC-CSCC -2
    • /
    • pp.928-931
    • /
    • 2002
  • Network based intrusion detection system is a computer network security tool. In this paper, we present an intrusion detection system based on Self-Organizing Maps (SOM) and Resilient Propagation Neural Network (RPROP) for visualizing and classifying intrusion and normal patterns. We introduce a cluster matching equation for finding principal associated components in component planes. We apply data from The Third International Knowledge Discovery and Data Mining Tools Competition (KDD cup'99) for training and testing our prototype. From our experimental results with different network data, our scheme archives more than 90 percent detection rate, and less than 5 percent false alarm rate in one SYN flooding and two port scanning attack types.

  • PDF

축구 로봇의 전략 알고리즘 개선 (Improvement of Strategy Algorithm for Soccer Robot)

  • 김재현;이대훈;이성민;최환도;김중완
    • 한국공작기계학회:학술대회논문집
    • /
    • 한국공작기계학회 2001년도 춘계학술대회 논문집(한국공작기계학회)
    • /
    • pp.177-181
    • /
    • 2001
  • This paper presents an strategy algorithm of a soccer robot. We simply classified strategy of soccer robot as attack and defense. We use DC-motor in our Soccer Robot. We use the vision system made by MIRO team of Kaist and Soty team for image processing. Host computer is made by Pentium III. The RF module is used for the communication between each robot and the host computer. Fuzzy logic is applied to the path planning of our robot. We improve strategy algorithm of soccer robot. Here we explain improvement of strategy algorithm and fault of the our soccer robot system.

  • PDF