• Title/Summary/Keyword: Malicious attacks

검색결과 447건 처리시간 0.029초

Sequential fusion to defend against sensing data falsification attack for cognitive Internet of Things

  • Wu, Jun;Wang, Cong;Yu, Yue;Song, Tiecheng;Hu, Jing
    • ETRI Journal
    • /
    • 제42권6호
    • /
    • pp.976-986
    • /
    • 2020
  • Internet of Things (IoT) is considered the future network to support wireless communications. To realize an IoT network, sufficient spectrum should be allocated for the rapidly increasing IoT devices. Through cognitive radio, unlicensed IoT devices exploit cooperative spectrum sensing (CSS) to opportunistically access a licensed spectrum without causing harmful interference to licensed primary users (PUs), thereby effectively improving the spectrum utilization. However, an open access cognitive IoT allows abnormal IoT devices to undermine the CSS process. Herein, we first establish a hard-combining attack model according to the malicious behavior of falsifying sensing data. Subsequently, we propose a weighted sequential hypothesis test (WSHT) to increase the PU detection accuracy and decrease the sampling number, which comprises the data transmission status-trust evaluation mechanism, sensing data availability, and sequential hypothesis test. Finally, simulation results show that when various attacks are encountered, the requirements of the WSHT are less than those of the conventional WSHT for a better detection performance.

3G망을 사용하는 인가되지 않은 AP 탐지 방법 (A Method for Detecting Unauthorized Access Point over 3G Network)

  • 김이룩;조재익;손태식;문종섭
    • 정보보호학회논문지
    • /
    • 제22권2호
    • /
    • pp.259-266
    • /
    • 2012
  • 악의적인 용도로 사용되는 Rogue AP는 인가되지 않은 AP를 설치하여 패킷 스니핑, Man-In-The-Middle Attack과 같은 다양한 공격에 이용되고 있다. 또한 기업 내에서는 3G망을 통한 자료유출을 목적으로 사용되기도 하며, 의도적이지 않더라도 인가되지 않은 AP는 보안사고의 발생 요인이 된다. 본 논문에서는 RTT(Round Trip Time) 값을 통해서 3G망을 사용하는 인가되지 않은 AP를 탐지하는 방법을 제안한다. 실험을 통해서 제안된 방법이 일반적인 방법으로 설치된 AP와 3G망을 사용해서 설치된 AP를 성공적으로 분류가 가능함을 보였다.

시퀀스 유사도 기반 무인 비행체 이상 탐지 시스템 (Sequence Based Anomaly Detection System for Unmanned Aerial Vehicle)

  • 서강욱;김휘강
    • 정보보호학회논문지
    • /
    • 제32권1호
    • /
    • pp.39-48
    • /
    • 2022
  • 본 논문에서는 무인 비행체 내부 네트워크의 이상 징후를 탐지하는 시퀀스 기반 이상 탐지 시스템을 제안한다. 제안하는 이상 탐지 시스템은 무인 비행체가 지상 통제 시스템에 주기적으로 전송하는 상태 메시지 시퀀스들 간의 유사도를 측정하여 이상 징후를 탐지한다. 본 연구에서는 무인 비행체 내부 네트워크에서 수행 가능한 악의적인 메시지 주입 공격 세 가지를 정의하고, 해당 공격 기법들을 Pixhawk4 쿼드콥터에서 시뮬레이션하였다. 결과적으로, 제안하는 이상 탐지 시스템은 96% 이상의 정확도로 비정상 시퀀스를 탐지할 수 있었다.

Generate Optimal Number of Features in Mobile Malware Classification using Venn Diagram Intersection

  • Ismail, Najiahtul Syafiqah;Yusof, Robiah Binti;MA, Faiza
    • International Journal of Computer Science & Network Security
    • /
    • 제22권7호
    • /
    • pp.389-396
    • /
    • 2022
  • Smartphones are growing more susceptible as technology develops because they contain sensitive data that offers a severe security risk if it falls into the wrong hands. The Android OS includes permissions as a crucial component for safeguarding user privacy and confidentiality. On the other hand, mobile malware continues to struggle with permission misuse. Although permission-based detection is frequently utilized, the significant false alarm rates brought on by the permission-based issue are thought to make it inadequate. The present detection method has a high incidence of false alarms, which reduces its ability to identify permission-based attacks. By using permission features with intent, this research attempted to improve permission-based detection. However, it creates an excessive number of features and increases the likelihood of false alarms. In order to generate the optimal number of features created and boost the quality of features chosen, this research developed an intersection feature approach. Performance was assessed using metrics including accuracy, TPR, TNR, and FPR. The most important characteristics were chosen using the Correlation Feature Selection, and the malicious program was categorized using SVM and naive Bayes. The Intersection Feature Technique, according to the findings, reduces characteristics from 486 to 17, has a 97 percent accuracy rate, and produces 0.1 percent false alarms.

R2NET: Storage and Analysis of Attack Behavior Patterns

  • M.R., Amal;P., Venkadesh
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권2호
    • /
    • pp.295-311
    • /
    • 2023
  • Cloud computing has evolved significantly, intending to provide users with fast, dependable, and low-cost services. With its development, malicious users have become increasingly capable of attacking both its internal and external security. To ensure the security of cloud services, encryption, authorization, firewalls, and intrusion detection systems have been employed. However, these single monitoring agents, are complex, time-consuming, and they do not detect ransomware and zero-day vulnerabilities on their own. An innovative Record and Replay-based hybrid Honeynet (R2NET) system has been developed to address this issue. Combining honeynet with Record and Replay (RR) technology, the system allows fine-grained analysis by delaying time-consuming analysis to the replay step. In addition, a machine learning algorithm is utilized to cluster the logs of attackers and store them in a database. So, the accessing time for analyzing the attack may be reduced which in turn increases the efficiency of the proposed framework. The R2NET framework is compared with existing methods such as EEHH net, HoneyDoc, Honeynet system, and AHDS. The proposed system achieves 7.60%, 9.78%%, 18.47%, and 31.52% more accuracy than EEHH net, HoneyDoc, Honeynet system, and AHDS methods.

INT 기반 네트워크 이상 상태 탐지 기술 연구 (In-band Network Telemetry based Network Anomaly Detection Scheme)

  • 임지윤;남석현;유재형;홍원기
    • KNOM Review
    • /
    • 제22권3호
    • /
    • pp.13-19
    • /
    • 2019
  • 네트워크 이상 상태 탐지는 네트워크 상의 플로우에 대한 정보를 수집하여 네트워크에서 발생하는 악의적인 공격을 실시간으로 탐지하는 기술이다. 실시간으로 패킷 단위의 세부적인 네트워크 정보를 제공하는 INT (In-band Network Telemetry) 기술을 이용하면 네트워크 홉 단위 지연 (hop latency)과 큐 점유율 (queue occupancy) 등 기존 네트워크에서 제공하지 않는, 보다 세부적인 정보를 실시간으로 수집 가능하여 네트워크 이상 상태 탐지에 활용할 수 있다. 본 논문에서는 INT를 이용하여 추출한 네트워크 상태 정보를 머신 러닝의 입력특징으로 사용하여 더 높은 성능을 가진 이상 상태 탐지 시스템을 구현하는 방법을 제안하고 이를 실험을 통해 검증한다.

큐싱(Qshing) 공격 탐지를 위한 시스템 구현 (System implementation for Qshing attack detection)

  • 신현창;이주형;김종민
    • 융합보안논문지
    • /
    • 제23권1호
    • /
    • pp.55-61
    • /
    • 2023
  • QR Code는 사각형 모양의 흑백 격자무늬에 데이터를 넣은 매트릭스 형식의 2차원 코드로 최근 다양한 분야에서 활용되고 있다. 특히, COVID-19 확산방지를 위해 누구나 간편하게 사용할 수 있는 QR Code를 활용하여 이동경로를 파악함으로써, 사용량이 급증하게 되었다. 이렇게 QR Code의 사용이 보편화됨에 따라 이를 악용한 큐싱(Qshing) 공격에 대한 피해가 증가하고 있다. 따라서 본 논문에서는 큐싱(Qshing) 공격 탐지 시스템을 구현하여 QR Code 스캔 시 유해 사이트로의 이동 및 악성코드 설치를 탐지하여 개인정보유출을 미연에 방지할 수 있는 기술을 제안하였다.

The Importance of Ethical Hacking Tools and Techniques in Software Development Life Cycle

  • Syed Zain ul Hassan;Saleem Zubair Ahmad
    • International Journal of Computer Science & Network Security
    • /
    • 제23권6호
    • /
    • pp.169-175
    • /
    • 2023
  • Ethical hackers are using different tools and techniques to encounter malicious cyber-attacks generated by bad hackers. During the software development process, development teams typically bypass or ignore the security parameters of the software. Whereas, with the advent of online web-based software, security is an essential part of the software development process for implementing secure software. Security features cannot be added as additional at the end of the software deployment process, but they need to be paid attention throughout the SDLC. In that view, this paper presents a new, Ethical Hacking - Software Development Life Cycle (EH-SDLC) introducing ethical hacking processes and phases to be followed during the SDLC. Adopting these techniques in SDLC ensures that consumers find the end-product safe, secure and stable. Having a team of penetration testers as part of the SDLC process will help you avoid incurring unnecessary costs that come up after the data breach. This research work aims to discuss different operating systems and tools in order to facilitate the secure execution of the penetration tests during SDLC. Thus, it helps to improve the confidentiality, integrity, and availability of the software products.

Mitigation of Phishing URL Attack in IoT using H-ANN with H-FFGWO Algorithm

  • Gopal S. B;Poongodi C
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권7호
    • /
    • pp.1916-1934
    • /
    • 2023
  • The phishing attack is a malicious emerging threat on the internet where the hackers try to access the user credentials such as login information or Internet banking details through pirated websites. Using that information, they get into the original website and try to modify or steal the information. The problem with traditional defense systems like firewalls is that they can only stop certain types of attacks because they rely on a fixed set of principles to do so. As a result, the model needs a client-side defense mechanism that can learn potential attack vectors to detect and prevent not only the known but also unknown types of assault. Feature selection plays a key role in machine learning by selecting only the required features by eliminating the irrelevant ones from the real-time dataset. The proposed model uses Hyperparameter Optimized Artificial Neural Networks (H-ANN) combined with a Hybrid Firefly and Grey Wolf Optimization algorithm (H-FFGWO) to detect and block phishing websites in Internet of Things(IoT) Applications. In this paper, the H-FFGWO is used for the feature selection from phishing datasets ISCX-URL, Open Phish, UCI machine-learning repository, Mendeley website dataset and Phish tank. The results showed that the proposed model had an accuracy of 98.07%, a recall of 98.04%, a precision of 98.43%, and an F1-Score of 98.24%.

An Uncertain Graph Method Based on Node Random Response to Preserve Link Privacy of Social Networks

  • Jun Yan;Jiawang Chen;Yihui Zhou;Zhenqiang Wu;Laifeng Lu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제18권1호
    • /
    • pp.147-169
    • /
    • 2024
  • In pace with the development of network technology at lightning speed, social networks have been extensively applied in our lives. However, as social networks retain a large number of users' sensitive information, the openness of this information makes social networks vulnerable to attacks by malicious attackers. To preserve the link privacy of individuals in social networks, an uncertain graph method based on node random response is devised, which satisfies differential privacy while maintaining expected data utility. In this method, to achieve privacy preserving, the random response is applied on nodes to achieve edge modification on an original graph and node differential privacy is introduced to inject uncertainty on the edges. Simultaneously, to keep data utility, a divide and conquer strategy is adopted to decompose the original graph into many sub-graphs and each sub-graph is dealt with separately. In particular, only some larger sub-graphs selected by the exponent mechanism are modified, which further reduces the perturbation to the original graph. The presented method is proven to satisfy differential privacy. The performances of experiments demonstrate that this uncertain graph method can effectively provide a strict privacy guarantee and maintain data utility.