• 제목/요약/키워드: Information Vulnerable Layer

검색결과 43건 처리시간 0.024초

Development of technology to improve information accessibility of information vulnerable class using crawling & clipping

  • Jeong, Seong-Bae;Kim, Kyung-Shin
    • 한국컴퓨터정보학회논문지
    • /
    • 제23권2호
    • /
    • pp.99-107
    • /
    • 2018
  • This study started from the public interest purpose to help accessibility for the information acquisition of the vulnerable groups due to visual difficulties such as the elderly and the visually impaired. In this study, the server resources are minimized and implemented in most of the user smart phones. In addition, we implement a method to gather necessary information by collecting only pattern information by utilizing crawl & clipping without having to visit the site of the information of the various sites having the data necessary for the user, and to have it in the server. Especially, we applied the TTS(Text-To-Speech) service composed of smart phone apps and tried to develop a unified customized information collection service based on voice-based information collection method.

Vulnerable Path Attack and its Detection

  • She, Chuyu;Wen, Wushao;Ye, Quanqi;Zheng, Kesong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권4호
    • /
    • pp.2149-2170
    • /
    • 2017
  • Application-layer Distributed Denial-of-Service (DDoS) attack is one of the leading security problems in the Internet. In recent years, the attack strategies of application-layer DDoS have rapidly developed. This paper introduces a new attack strategy named Path Vulnerabilities-Based (PVB) attack. In this attack strategy, an attacker first analyzes the contents of web pages and subsequently measures the actual response time of each webpage to build a web-resource-weighted-directed graph. The attacker uses a Top M Longest Path algorithm to find M DDoS vulnerable paths that consume considerable resources when sequentially accessing the pages following any of those paths. A detection mechanism for such attack is also proposed and discussed. A finite-state machine is used to model the dynamical processes for the state of the user's session and monitor the PVB attacks. Numerical results based on real-traffic simulations reveal the efficiency of the attack strategy and the detection mechanism.

Improving Performance of YOLO Network Using Multi-layer Overlapped Windows for Detecting Correct Position of Small Dense Objects

  • Yu, Jae-Hyoung;Han, Youngjoon;Hahn, Hernsoo
    • 한국컴퓨터정보학회논문지
    • /
    • 제24권3호
    • /
    • pp.19-27
    • /
    • 2019
  • This paper proposes a new method using multi-layer overlapped windows to improve the performance of YOLO network which is vulnerable to detect small dense objects. In particular, the proposed method uses the YOLO Network based on the multi-layer overlapped windows to track small dense vehicles that approach from long distances. The method improves the detection performance for location and size of small vehicles. It allows crossing area of two multi-layer overlapped windows to track moving vehicles from a long distance to a short distance. And the YOLO network is optimized so that GPU computation time due to multi-layer overlapped windows should be reduced. The superiority of the proposed algorithm has been proved through various experiments using captured images from road surveillance cameras.

채널 부호화를 통한 물리계층 무선 네트워크 보안 기술 (Physical Layer Wireless Network Security Through Channel Coding)

  • 아싸두자만;공형윤;김건석;김내수
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2007년도 춘계학술발표대회
    • /
    • pp.989-992
    • /
    • 2007
  • In this paper we introduce a new paradigm of physical layer security for wireless network. Existing security protocols like internet's transport layer security protocol has some security flaws that skilled hackers could exploit. Motivated from this point we introduce a new security protocol that works in physical layer which is much less vulnerable to hackers than any other higher layers. In our proposal, we incorporate the proposed security protocol within channel coding as channel coding is an essential part of wireless communication. We utilize the flexibility to choose a generator matrix (or generator polynomial) of a particular code that selects the code words as a core of our protocol. Each pair of wireless node will select a unique generator using their security key before they started to communicate with each other.

  • PDF

블록 암호 SM4에 대한 부채널 공격 및 마스킹 기반 대응기법 분석 (Side Channel Attack on Block Cipher SM4 and Analysis of Masking-Based Countermeasure)

  • 배대현;남승현;하재철
    • 정보보호학회논문지
    • /
    • 제30권1호
    • /
    • pp.39-49
    • /
    • 2020
  • 본 논문에서는 중국 표준 블록 암호 알고리즘인 SM4가 부채널 공격에 취약함을 보이고 그에 대한 대응책을 제안하고자 한다. 먼저, SM4는 차분 전력 분석(DPA)과 상관 전력 분석(CPA)에 기반한 공격에 의해 쉽게 비밀 키가 노출됨을 확인하였다. 논문에서는 공격 취약 요소를 분석하고 데이터 마스킹에 기반한 전력 분석 공격 대응 기법을 설계하였다. 제안한 SM4에 대한 1차 마스킹 기법은 딥 러닝 기반의 다층 퍼셉트론(MLP) 모델을 이용한 공격 프로파일링(profiling) 기반 공격에는 여전히 취약하지만, 차분 전력 분석이나 상관 전력 분석과 같은 비프로파일링(non-profiling) 공격에는 충분히 대응할 수 있음을 확인하였다.

영상의 내재 구조를 이용한 2-계층 워터마킹 기법 (A two-layer watermarking method using inherent image structure)

  • 고윤호;김성대;최재각
    • 대한전자공학회논문지SP
    • /
    • 제41권3호
    • /
    • pp.59-72
    • /
    • 2004
  • 본 논문에서는 워터마크를 훼손할 수 있는 다양한 공격을 크게 파형 공격과 동기 공격으로 구분하고 두 부류의 공격에 대해 특화된 방어를 수행하기 위한 2-계층 워터마킹 기법을 제안한다. 제안된 방법은 동기 공격에 대한 방어를 위한 동기층(synchronization layer)과 일반적인 파형 공격에 대한 표시층(marking layer)의 2-계층으로 구성된다. 동기층에서는 다양한 공격에 대해서도 일정하게 선택되는 목표 영역을 선정하고, 표시층에서는 해당 영역에 대역-확산에 기반을 둔 방식으로 워터마크를 삽입한다. 이러한 2-계층 워터마킹 기법을 사용함으로써 기존의 원본 영상을 사용하지 않는 워터마킹 기법이 가지는 이동, 회전과 같은 기하학적인 공격에 보이는 문제점을 해결할 수 있게 된다.

A Novel Duty Cycle Based Cross Layer Model for Energy Efficient Routing in IWSN Based IoT Application

  • Singh, Ghanshyam;Joshi, Pallavi;Raghuvanshi, Ajay Singh
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권6호
    • /
    • pp.1849-1876
    • /
    • 2022
  • Wireless Sensor Network (WSN) is considered as an integral part of the Internet of Things (IoT) for collecting real-time data from the site having many applications in industry 4.0 and smart cities. The task of nodes is to sense the environment and send the relevant information over the internet. Though this task seems very straightforward but it is vulnerable to certain issues like energy consumption, delay, throughput, etc. To efficiently address these issues, this work develops a cross-layer model for the optimization between MAC and the Network layer of the OSI model for WSN. A high value of duty cycle for nodes is selected to control the delay and further enhances data transmission reliability. A node measurement prediction system based on the Kalman filter has been introduced, which uses the constraint based on covariance value to decide the scheduling scheme of the nodes. The concept of duty cycle for node scheduling is employed with a greedy data forwarding scheme. The proposed Duty Cycle-based Greedy Routing (DCGR) scheme aims to minimize the hop count, thereby mitigating the energy consumption rate. The proposed algorithm is tested using a real-world wastewater treatment dataset. The proposed method marks an 87.5% increase in the energy efficiency and reduction in the network latency by 61% when validated with other similar pre-existing schemes.

위성 통신망 보안 기술 당면 과제 및 향후 발전 방향 분석 (Present and Future Technologies of Satellite Communication Network Security)

  • 최지환;주창희
    • 한국위성정보통신학회논문지
    • /
    • 제12권3호
    • /
    • pp.50-53
    • /
    • 2017
  • 위성 통신은 무선 채널을 통한 광역 브로드캐스팅 특성으로 인하여 보안에 취약한 약점을 가지고 있음에도 불구하고, 위성 통신을 위한 보안 기법으로는 지상 통신에서 사용해 오던 상위 계층에서의 암호화를 제외하고 많은 방법이 알려져 있지 않다. 특히 물리계층에서의 재밍, 스푸핑 신호 공격 빈도가 증가함에 따라 이에 대한 대응 기술 개발이 중요하다고 할 수 있다. 본 논문에서는 위성통신망 보안 문제에 대해서 상위 계층과 물리 계층에서의 대응책에 대해 각각 정리하고, 사물인터넷 등의 지상망 적용을 위해 정보이론 관점에서 개발되고 있는 물리 계층 보안 기법의 최근 연구 결과에 대해 알아본다. 교차 계층 접근 방식을 포함하여, 위성 통신보안을 향상시킬 수 있는 향후 연구 방향을 제시한다.

A Study on Intrusion Detection of ARP Poisoning Attack on Wireless LAN

  • Ham Young Hwan;Lee Sok Joon;Chung Byung Ho;Chung Kyoll;Chung Jin Wook
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2004년도 학술대회지
    • /
    • pp.540-543
    • /
    • 2004
  • Address Resolution Protocol (ARP) cache poisoning is a MAC layer attack that can only be carried out when an attacker is connected to the same local network as the target machines. ARP is not a new problem, but wireless network introduces a new attack point and more vulnerable to the attack. The attack on wireless network cannot be detected by current detection tool installed on wired network. In order to detect the ARP poisoning attack, there must be a ARP poisoning detection tool for wireless LAN environment. This paper proposes linux-based ARP poisoning detection system equipped with wireless LAN card and Host AP device driver

  • PDF

IPv6 Neighbor Discovery 보안 위협과 대응 (IPv6 Neighbor Discovery security treats and opposition)

  • 박수덕;이용식;이병호
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2006년도 하계종합학술대회
    • /
    • pp.771-772
    • /
    • 2006
  • IPv6 nodes use the Neighbor Discovery Protocol (NDP) to discover other nodes on the link, to determine their link-layer addresses to find routers, and to maintain reachability information about the paths to active neighbors. If not secured, NDP is vulnerable to various attacks. This document specifies security mechanisms for NDP. Unlike those in the original NDP specifications, these mechanisms do not use IPsec.

  • PDF