• 제목/요약/키워드: Network Security System

검색결과 2,712건 처리시간 0.032초

LoGos: Internet-Explorer-Based Malicious Webpage Detection

  • Kim, Sungjin;Kim, Sungkyu;Kim, Dohoon
    • ETRI Journal
    • /
    • 제39권3호
    • /
    • pp.406-416
    • /
    • 2017
  • Malware propagated via the World Wide Web is one of the most dangerous tools in the realm of cyber-attacks. Its methodologies are effective, relatively easy to use, and are developing constantly in an unexpected manner. As a result, rapidly detecting malware propagation websites from a myriad of webpages is a difficult task. In this paper, we present LoGos, an automated high-interaction dynamic analyzer optimized for a browser-based Windows virtual machine environment. LoGos utilizes Internet Explorer injection and API hooks, and scrutinizes malicious behaviors such as new network connections, unused open ports, registry modifications, and file creation. Based on the obtained results, LoGos can determine the maliciousness level. This model forms a very lightweight system. Thus, it is approximately 10 to 18 times faster than systems proposed in previous work. In addition, it provides high detection rates that are equal to those of state-of-the-art tools. LoGos is a closed tool that can detect an extensive array of malicious webpages. We prove the efficiency and effectiveness of the tool by analyzing almost 0.36 M domains and 3.2 M webpages on a daily basis.

Exploiting Correlation Characteristics to Detect Covert digital communication

  • Huang, Shuhua;Liu, Weiwei;Liu, Guangjie;Dai, Yuewei;Tian, Wen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권8호
    • /
    • pp.3550-3566
    • /
    • 2020
  • As a widely used way to exfiltrate information, wireless covert channel (WCC) brings a serious threat to communication security, which enables the wireless communication process to bypass the authorized access control mechanism to disclose information. Unlike the covert channel on the network layer, wireless covert channels on the physical layer (WCC-P) is a new covert communication mode to implement and improve covert wireless communication. Existing WCC-P scheme modulates the secret message bits into the Gaussian noise, which is also called covert digital communication system based on the joint normal distribution (CJND). Finding the existence of this type of covert channel remains a challenging work due to its high undetectability. In this paper, we exploit the square autocorrelation coefficient (SAC) characteristic of the CJND signal to distinguish the covert communication from legitimate communication. We study the sharp increase of the SAC value when the offset is equal to the symbol length, which is caused by embedding secret information. Then, the SAC value of the measured sample is compared with the threshold value to determine whether the measured sample is CJND sample. When the signal-to-noise ratio reaches 20db, the detection accuracy can reach more than 90%.

Biologically Inspired Node Scheduling Control for Wireless Sensor Networks

  • Byun, Heejung;Son, Sugook;Yang, Soomi
    • Journal of Communications and Networks
    • /
    • 제17권5호
    • /
    • pp.506-516
    • /
    • 2015
  • Wireless sensor networks (WSNs) are generally comprised of densely deployed sensor nodes, which results in highly redundant sensor data transmissions and energy waste. Since the sensor nodes depend on batteries for energy, previous studies have focused on designing energy-efficient medium access control (MAC) protocols to extend the network lifetime. However, the energy-efficient protocols induce an extra end-to-end delay, and therefore recent increase in focus on WSNs has led to timely and reliable communication protocols for mission-critical applications. In this paper, we propose an energy efficient and delay guaranteeing node scheduling scheme inspired by biological systems, which have gained considerable attention as a computing and problem solving technique.With the identification of analogies between cellular signaling systems and WSN systems, we formulate a new mathematical model that considers the networking challenges of WSNs. The proposed bio-inspired algorithm determines the state of the sensor node, as required by each application and as determined by the local environmental conditions and the states of the adjacent nodes. A control analysis shows that the proposed bio-inspired scheme guarantees the system stability by controlling the parameters of each node. Simulation results also indicate that the proposed scheme provides significant energy savings, as well as reliable delay guarantees by controlling the states of the sensor nodes.

Bitcoin and Cryptocurrency: Challenges, Opportunities and Future Works

  • FAUZI, Muhammad Ashraf;PAIMAN, Norazha;OTHMAN, Zarina
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제7권8호
    • /
    • pp.695-704
    • /
    • 2020
  • Bitcoin and other prominent cryptocurrencies have gained much attention since the last several years. Globally known as digital coin and virtual currency, this cryptocurrency is gained and traded within the blockchain system. The blockchain technology adopted in using the cryptocurrency has raised the eyebrows within the banking sector, government, stakeholders and individual investors. The rise of the cryptocurrency within this decade since the inception of Bitcoin in 2009 has taken the market by storm. Cryptocurrency is anticipated as the future currency that might replace the current paper currency worldwide. Even though the interest has caught the attention of users, many are not aware of its opportunities, drawbacks and challenges for the future. Researches on cryptocurrencies are still lacking and still at its infancy stage. In providing substantial guide and view to the academic field and users, this paper will discuss the opportunities in the cryptocurrency such as the security of its technology, low transaction cost and high investment return. The originality of this paper is on the discussion within law and regulation, high energy consumption, possibility of crash and bubble, and attacks on network. The future undertakings of cryptocurrency and its application will be systematically reviewed in this paper.

DNP3에 적합한 발신 부인 방지 기법 제안과 그 구현 (Proposal and Implementation on Non-Repudiation of Origin for DNP3)

  • 유기순;송경영;장민호
    • 한국통신학회논문지
    • /
    • 제40권5호
    • /
    • pp.815-825
    • /
    • 2015
  • DNP3는 SCADA 시스템의 대표적인 프로토콜 중 하나이다. IEC 62351에서는 기밀성, 무결성, 가용성, 부인방지 책임추적성을 보안 요구사항으로 들고 있다. 하지만 DNP3 표준인 IEEE Std. 1815에서는 부인방지 책임추적성에 대한 메커니즘을 정의하고 있지 않다. 이에 본 논문에서는 DNP3의 발신자 부인방지 기법을 제안하고, OpenSSL과 스카다시스템 라이브러리를 이용하여 DNP3 발신 부인방지를 구현한다.

Efficient and Secure Routing Protocol forWireless Sensor Networks through SNR Based Dynamic Clustering Mechanisms

  • Ganesh, Subramanian;Amutha, Ramachandran
    • Journal of Communications and Networks
    • /
    • 제15권4호
    • /
    • pp.422-429
    • /
    • 2013
  • Advances in wireless sensor network (WSN) technology have enabled small and low-cost sensors with the capability of sensing various types of physical and environmental conditions, data processing, and wireless communication. In the WSN, the sensor nodes have a limited transmission range and their processing and storage capabilities as well as their energy resources are limited. A triple umpiring system has already been proved for its better performance in WSNs. The clustering technique is effective in prolonging the lifetime of the WSN. In this study, we have modified the ad-hoc on demand distance vector routing by incorporating signal-to-noise ratio (SNR) based dynamic clustering. The proposed scheme, which is an efficient and secure routing protocol for wireless sensor networks through SNR-based dynamic clustering (ESRPSDC) mechanisms, can partition the nodes into clusters and select the cluster head (CH) among the nodes based on the energy, and non CH nodes join with a specific CH based on the SNR values. Error recovery has been implemented during the inter-cluster routing in order to avoid end-to-end error recovery. Security has been achieved by isolating the malicious nodes using sink-based routing pattern analysis. Extensive investigation studies using a global mobile simulator have shown that this hybrid ESRP significantly improves the energy efficiency and packet reception rate as compared with the SNR unaware routing algorithms such as the low energy aware adaptive clustering hierarchy and power efficient gathering in sensor information systems.

계측 시스템의 무선통신을 위한 RF모듈 개발 (A Development on Universal RF based Module for Wireless Network)

  • 박석현;심우혁;서영조;김병진;전희종
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1999년도 하계학술대회 논문집 G
    • /
    • pp.3064-3066
    • /
    • 1999
  • The existing equipment with wire communication can expect the stability of data transmission. However, according to increasing a number of DTE (Data Terminal Equipment), wiring work becomes a heavy burden. Restriction to application about portable DTE and the lack of flexibility are another drawback of wire communication. This paper presents the design and implementation of a RF (Radio Frequency) based wireless communication system. The RF based module is designed to the multi communication between DTEs. The RF based module consists of RF circuit and microprocessor. The main properties of RF circuit are maximum 5Kbps transmission rate, maximum 90m transmission distance and 433MHz frequency band. The microprocessor rearrange the data into AHDLC(Advanced High level Data Link Control) format and then instructs RF circuits to transmit/receive the data. The RF module have a wide application field such as fire/security alarm, remote control/measurement etc..

  • PDF

웹 기반의 자동화된 네트워크 서비스 보안 취약성 분석 및 관리 시스템 (Web-based Automated Network Service Security Vulnerability Analysts & Management System)

  • 임문희;양진석;김현구;장범환;정태명
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2002년도 춘계학술발표논문집 (하)
    • /
    • pp.853-856
    • /
    • 2002
  • 인터넷이라는 거대한 네트워크에 연결되어 있는 시스템의 보안 상태를 주기적으로 점검하여 외부로부터의 공격에 취약한 부분을 보완하여 주는 일은 공격에 대한 방어를 위하여 가장 기본적인 일이다. 그러나 수많은 호스트가 상호 연결된 네트워크 관리 시스템에서 관리자가 각 시스템의 보안상 취약점을 전부 인지하고 이에 대한 보완을 수행하는 것은 상당히 어려운 일이다. 따라서 관리자의 수작업에 의한 취약점 분석 작업보다는 자동화된 관리 도구에 의한 취약점 분석이 효율적이다. 이에 본 논문에서는 네트워크 서비스인 HTTP, SMTP의 취약점을 원격에서 분석하는 시스템을 설계 및 구현하였다. WAVAMS는 에이전트와 독립된 mobile 코드의 이동에 의한 동적 분석 모듈의 추가로 가장 최근의 취약점을 신속하게 분석 할 수 있으며 확장성이 높다. 또한 웹 기반으로 설계되어 관리자가 용이하게 관리할 수 있다.

  • PDF

패스워드 기반의 커버로스 인증 메커니즘 설계 (Design of a Kerberos Authentication Mechanism based on Password)

  • 조경옥;김종우;하태진;한승조
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2004년도 춘계종합학술대회
    • /
    • pp.733-738
    • /
    • 2004
  • 분산 네트워크 환경에서 커버로스 인증 메커니즘은 Local 영역에 있는 사용자가 다른 영역에 존재하는 커버로스 서버의 신뢰성이 있는 전제 조건에서 운용하고 있다. 하지만 커버로스 서버간의 인증 서버의 보안 정보가 누설되면 커버로스에 대한 신뢰성이 보장되지 않는 단점을 가지고 있다. 이러한 문제점을 해결하기 위하여 기존의 커버로스 메커니즘에서 제안한 인증센터와 인증서를 사용하지 않고 분할된 패스워드 사용을 통하여 패스워드 검증자의 랜덤성을 증가시켜 패스워드 추측공격이 어렵도록 하였으며 비밀 분산 기법을 적용한 패스워드 기반 인증 방법을 사용한 인증 메커니즘을 제안한다.

  • PDF

스마트모바일 기반의 u-Health시스템에서 HIGHT를 이용한 보안성 분석 (An Analysis to security on SmartMobile based u-Healthcare system using by HIGHT)

  • 이재필;김영혁;임일권;이재광;이재광
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2012년도 춘계학술발표대회
    • /
    • pp.738-741
    • /
    • 2012
  • 한국정보통신기술협회(TTA)에서 표준 제안한 WBAN(Wireless Body Area Network)은 인체 내부 통신(in-body or implant)과, 인체 외부 통신(on-body)통신으로 구분하고 있다. 생체측정 정보 중 체온, 호흡, 맥박, 운동량, 심박의 부분적인 데이터 수집을 바탕으로 환자의 생체정보 데이터를 수합 후 데이터 프레임구조로 변환하여 스마트모바일 애플리케이션 환경에서 사용자가 모바일기기 화면에 정보를 표시 할 수 있다. 이렇게 표시된 정보들은 환자의 상태를 실시간으로 자신의 스마트모바일을 이용하여 확인할 수 있으며, 이러한 정보를 보호하고 의료기관에 전송하기 위한 방법으로 국제표준암호알고리즘인 HIGHT 알고리즘을 적용하여 생체정보 데이터의 부분 암호화 적용을 설계 하였다. 이를 통해 의료기관의 인증서버에 대한 부하 감소 및 환자의 생체정보의 보안 강화를 제시한다.