• Title/Summary/Keyword: Network attack

Search Result 1,250, Processing Time 0.029 seconds

Real-Time Detection on FLUSH+RELOAD Attack Using Performance Counter Monitor (Performance Counter Monitor를 이용한 FLUSH+RELOAD 공격 실시간 탐지 기법)

  • Cho, Jonghyeon;Kim, Taehyun;Shin, Youngjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.6
    • /
    • pp.151-158
    • /
    • 2019
  • FLUSH+RELOAD attack exposes the most serious security threat among cache side channel attacks due to its high resolution and low noise. This attack is exploited by a variety of malicious programs that attempt to leak sensitive information. In order to prevent such information leakage, it is necessary to detect FLUSH+RELOAD attack in real time. In this paper, we propose a novel run-time detection technique for FLUSH+RELOAD attack by utilizing PCM (Performance Counter Monitor) of processors. For this, we conducted four kinds of experiments to observe the variation of each counter value of PCM during the execution of the attack. As a result, we found that it is possible to detect the attack by exploiting three kinds of important factors. Then, we constructed a detection algorithm based on the experimental results. Our algorithm utilizes machine learning techniques including a logistic regression and ANN(Artificial Neural Network) to learn from different execution environments. Evaluation shows that the algorithm successfully detects all kinds of attacks with relatively low false rate.

Security Threat Identification and Prevention among Secondary Users in Cognitive Radio Networks

  • Reshma, CR.;Arun, kumar B.R
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.168-174
    • /
    • 2021
  • The Cognitive radio (CR) is evolving technology for managing the spectrum bandwidth in wireless network. The security plays a vital role in wireless network where the secondary users are trying to access the primary user's bandwidth. During the allocation the any malicious user either he pretends to be primary user or secondary user to access the vital information's such as credentials, hacking the key, network jam, user overlapping etc. This research paper discusses on various types of attack and to prevent the attack in cognitive radio network. In this research, secondary users are identified by the primary user to access the primary network by the secondary users. The secondary users are given authorization to access the primary network. If any secondary user fails to provide the authorization, then that user will be treated as the malicious user. In this paper two approaches are suggested one by applying elliptic curve cryptography and the other method by using priority-based service access.

Unified Modeling Language based Analysis of Security Attacks in Wireless Sensor Networks: A Survey

  • Hong, Sung-Hyuck;Lim, Sun-Ho;Song, Jae-Ki
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.4
    • /
    • pp.805-821
    • /
    • 2011
  • Wireless Sensor Networks (WSNs) are rapidly emerging because of their potential applications available in military and civilian environments. Due to unattended and hostile deployment environments, shared wireless links, and inherent resource constraints, providing high level security services is challenging in WSNs. In this paper, we revisit various security attack models and analyze them by using a well-known standard notation, Unified Modeling Language (UML). We provide a set of UML collaboration diagram and sequence diagrams of attack models witnessed in different network layers: physical, data/link, network, and transport. The proposed UML-based analysis not only can facilitate understanding of attack strategies, but can also provide a deep insight into designing/developing countermeasures in WSNs.

Derivation of Critical Functions of the Future Attack Helicopter Using QFD (QFD를 이용한 미래 공격헬기의 핵심기능 도출)

  • Lee, Jae-Won;Kwon, Yong-Soo;Ko, Nam-Kyoung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.16 no.3
    • /
    • pp.348-357
    • /
    • 2013
  • This work describes an approach that contributes to derive from mission to critical functions of the attack helicopter under future battle space environment. An existing mission of the attack helicopter is limited to the only shooter oriented functions. In the future environment, mission and its functions of the helicopter might be much expanded. The functions should be derived by the top down approach based on systems engineering approach. In this point of view, this work describes network based future battle environment. From this environment, the missions of the attack helicopter are identified and optimized functions are derived through sequential procedures like from missions to tasks, tasks to activities, and activities to functions. The selected activities are obtained from the tasks using QFD. The weighting scores of the QFD are calculated by the AHP computational procedure. Finally the critical functions are presented through the similar procedure.

MIB 정보와 패킷 분석을 통한 DDoS 공격의 탐지

  • 김미혜;원승영
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.1
    • /
    • pp.49-55
    • /
    • 2004
  • DDoS is an attack type that interfere with normal service by running out network bandwidth, process throughput, and system resource. It can be recognized intuitively by network slowdown and connection impossibility state, but it is necessary to detect DDoS attack by exact and quantitative analysis. In this paper, the exact and efficient DDoS attack detection system which is able to detect traffic flooding by MIB information, and attack traffic by packet analysis is proposed and realized.

  • PDF

An Online Response System for Anomaly Traffic by Incremental Mining with Genetic Optimization

  • Su, Ming-Yang;Yeh, Sheng-Cheng
    • Journal of Communications and Networks
    • /
    • v.12 no.4
    • /
    • pp.375-381
    • /
    • 2010
  • A flooding attack, such as DoS or Worm, can be easily created or even downloaded from the Internet, thus, it is one of the main threats to servers on the Internet. This paper presents an online real-time network response system, which can determine whether a LAN is suffering from a flooding attack within a very short time unit. The detection engine of the system is based on the incremental mining of fuzzy association rules from network packets, in which membership functions of fuzzy variables are optimized by a genetic algorithm. The incremental mining approach makes the system suitable for detecting, and thus, responding to an attack in real-time. This system is evaluated by 47 flooding attacks, only one of which is missed, with no false positives occurring. The proposed online system belongs to anomaly detection, not misuse detection. Moreover, a mechanism for dynamic firewall updating is embedded in the proposed system for the function of eliminating suspicious connections when necessary.

Mitigating Cache Pollution Attack in Information Centric Mobile Internet

  • Chen, Jia;Yue, Liang;Chen, Jing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5673-5691
    • /
    • 2019
  • Information centric mobile network can significantly improve the data retrieving efficiency by caching contents at mobile edge. However, the cache pollution attack can affect the data obtaining process severely by requiring unpopular contents deliberately. To tackle the problem, we design an algorithm of mitigating cache pollution attacks in information centric mobile network. Particularly, the content popularity distribution statistic is proposed to detect abnormal behavior. Then a probabilistic caching strategy based on abnormal behavior is applied to dynamically maintain the steady-state distribution for content visiting probability and achieve the purpose of defense. The experimental results show that the proposed scheme can achieve higher request hit ratio and smaller latency for false locality content pollution attack than the CacheShield approach and the baseline approach where no mitigation approach is applied.

Study Response Model against ARP Redirect attack on Local Area Network (Local Area Network상의 ARP Redirect attack 대응 모델에 관한 연구)

  • Lee, Sun-Joong;Kim, Jung-Moon;Yeh, Hong-Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05c
    • /
    • pp.2237-2240
    • /
    • 2003
  • 하나의 물리 망 위에 있는 두 시스템은 상대방의 물리 주소를 알고 있어야만 통신을 할 수 있고. 물리 주소는 통신비용 절감을 위해 ARP를 사용하는 HOST의 ARP cache에 Internet-to-Ethernet Mapping형태로 저장한다. 이러한 ARP cache 구조는 Modification의 많은 취약성을 가진다. 그 중 취약성을 이용한 공격 중 하나인 ARP Redirect Attack은 물리 망 위의 Target Host 패킷이 공격자의 시스템을 통해 게이트웨이까지 가도록 한다. 본 논문은 게이트웨이 및 일반 HOST 시스템으로 구성된 Local Area Network 기반 구조를 내부 공격자 시스템으로부터 다른 내부 시스템의 사용자 정보를 안전하게 게이트웨이까지 보내기 위한 대응 모델을 제안하고자 한다.

  • PDF

DOS Attack on the Availability of Cloud Network and its Avoidance Mechanism

  • Zaidi, Syed Muhammad Asad;Baig, Waleed Akram;Redwan, Hassan;Kim, Ki-Hyung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.760-762
    • /
    • 2011
  • Data centers are usually under provisioned. This is not a problem in corporate data networks, but it can be a problem in cloud data networks. If an application is being served by that cloud infrastructure, the application owner must know the infrastructure limitations and should take some special measures to ensure QoS/availability of that application and to prevent against possible threats. In this paper we have discussed a new form of DoS that could take place in a cloud data network using the vulnerability caused by under provisioned network. We have also proposed a solution for this DoS attack, by which not only this attack will be detected, but can also be avoided in a very short time.

A Study on the Impact of Applying Network Address Mutation Technology within the Network Protection System (네트워크 보호체계에서 네트워크 주소변이 기술 적용에 대한 영향성 연구)

  • Suwon Lee;Seyoung Hwang;SeukGue Hong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.939-946
    • /
    • 2023
  • In the hyper-connected network, which network equipment is diverse and network structure is complex, the attack surface has also increased. In this environment, MTD(Moving Target Defense) technology is being researched as a method to fundamentally defend against cyber attacks by actively changing the attack surface. network-based MTD technologies are being widely studied. However, in order for network address mutation technology to be applied within the existing fixed IP-based system, research is needed to determine what impact it will have. In this paper, we studied the impact of applying network address mutation technology to the existing network protection system. As a result of the study, factors to be considered when firewall, NAC, IPS, and network address mutation technologies are operated together were derived, and elements that must be managed in network address mutation technology for interoperability with the network analysis system were suggested.