• Title/Summary/Keyword: Security Techniques

Search Result 1,571, Processing Time 0.029 seconds

Effective Detecting Method of Nmap Idle Scan

  • Hwang, Jungsik;Kim, Minsoo
    • Journal of Advanced Information Technology and Convergence
    • /
    • v.9 no.1
    • /
    • pp.1-10
    • /
    • 2019
  • In recent years, information collection of attacks through stealth port scanning technology has become more sophisticated. The most commonly used Nmap port scanner supports a variety of stealth scanning technologies along with the existing scanning techniques. Nmap also supports Idle scan that is different from conventional stealth scans. This is a more sophisticated stealth scan technique by applying the SYN scan and ACK scan techniques. In previous studies, the detection of Idle scanning was on zombie system, but was not on victim system. In this paper, we propose an effective detection method of Idle scan on victim system. The Idle scanning is composed of two stages; they are probing the zombie and victim system and scanning the victim system. We analyzed the characteristics of the two stages. The characteristics, we captured, are that SYN and RST packets are different from normal packet. We applied them to detection method, then Idle scanning is detected effectively.

A Study on Keylogger Information Sniffing by Using Hooking Techniques (Hooking기술을 이용한 Keylogger 정보 Sniffing연구)

  • Park, In-woo;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.119-122
    • /
    • 2012
  • Keylogger by using Hooking techniques will lead and the keyboard when inputting, private data it uses Sniffing techniques and it meat the fact that it is seized. This program the classified document where the password or the counterpart of specific program draw up or even E-mail contents or great disaster original contents confirmation it is possible it is a technique which is simple but at the slightest slip fatal one is in the use person. It considered the security book about hereupon and it studied and it made it was made to advance and with subject of character dissertation.

  • PDF

Multi-target Tracking Filters and Data Association: A Survey (다중표적 추적필터와 자료연관 기법동향)

  • Song, Taek Lyul
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.20 no.3
    • /
    • pp.313-322
    • /
    • 2014
  • This paper is to survey and put in perspective the working methods of multi-target tracking in clutter. This paper includes theories and practices for data association and related filter structures and is motivated by increasing interest in the area of target tracking, security, surveillance, and multi-sensor data fusion. It is hoped that it will be useful in view of taking into consideration a full understanding of existing techniques before using them in practice.

MULTIPARTY KEY AGREEMENT PROTOCOL BASED ON SYMMETRIC TECHNIQUES

  • Lee, Hyang-Sook;Lee, Young-Ran;Lee, Ju-Hee
    • Communications of the Korean Mathematical Society
    • /
    • v.18 no.1
    • /
    • pp.169-179
    • /
    • 2003
  • In this paper, we propose multiparty key agreement protocols by generalizing the Blom's scheme based on 2 variable polynomials. Especially we develop three party and four party key agreement schemes with security. The advantage of the new schemes is to have small demands on storage space.

A NEW ATTACK ON THE KMOV CRYPTOSYSTEM

  • Nitaj, Abderrahmane
    • Bulletin of the Korean Mathematical Society
    • /
    • v.51 no.5
    • /
    • pp.1347-1356
    • /
    • 2014
  • In this paper, we analyze the security of the KMOV public key cryptosystem. KMOV is based on elliptic curves over the ring $\mathbb{Z}_n$ where n = pq is the product of two large unknown primes of equal bit-size. We consider KMOV with a public key (n, e) where the exponent e satisfies an equation ex-(p+1)(q+1)y = z, with unknown parameters x, y, z. Using Diophantine approximations and lattice reduction techniques, we show that KMOV is insecure when x, y, z are suitably small.

Industry's Response to the Green Movement

  • Little, Barry F.P.
    • Analytical Science and Technology
    • /
    • v.8 no.4
    • /
    • pp.1075-1078
    • /
    • 1995
  • This paper describes how industry has responded to the environmental challenge. Benefits include compliance with environmental legislation; genuine reductions to environmental impact; sustainable improvements to profitability in the face of increased competitive pressure. National and international Standards for environmental management offer security and direction for a company wishing to improve environmental performance and coupled with a waste minimisation strategy many financial and environmental benefits can be achieved. Introduction of new technical skills, techniques and worker understanding to aid motivation is an essential component of such a strategy. Monitoring and targeting has a key role to play in the establishment of improved environmental performance.

  • PDF

A Design of Remote and Wireless Control System using Bluetooth

  • Park Joon-Hoon;Kim Yong-Kwan
    • Journal of information and communication convergence engineering
    • /
    • v.4 no.1
    • /
    • pp.13-17
    • /
    • 2006
  • In this paper a design and implementation method of remote control system for automobile is presented. For this, we used the Bluetooth technology for remote and wireless communications and microcontroller for system control. By using these techniques, we can design and implement automobile remote control system to improve data error rate, security and application.

Risk Management Qualitatively on Railway Signal System

  • Zhang, Ya-Dong;Guo, Jin
    • International Journal of Railway
    • /
    • v.2 no.3
    • /
    • pp.113-117
    • /
    • 2009
  • Risk management is an important part of system assurance and it is widely used in safety-related system. Railway signal system is one kind of safety-related system and its most important goal is to guarantee the safety of railway system. The method based on risk management can find and solve the security issues of railway signal system more effectively. This paper introduces the basic conception of risk management, studies the whole process of risk management and related tools and techniques and discusses some key points qualitatively combining with the particularity of railway signal system.

  • PDF

Deep Packet Inspection for Intrusion Detection Systems: A Survey

  • AbuHmed, Tamer;Mohaisen, Abedelaziz;Nyang, Dae-Hun
    • Information and Communications Magazine
    • /
    • v.24 no.11
    • /
    • pp.25-36
    • /
    • 2007
  • Deep packet inspection is widely recognized as a powerful way which is used for intrusion detection systems for inspecting, deterring and deflecting malicious attacks over the network. Fundamentally, almost intrusion detection systems have the ability to search through packets and identify contents that match with known attach. In this paper we survey the deep packet inspection implementations techniques, research challenges and algorithm. Finally, we provide a comparison between the different applied system.

Device Mutual Authentication and Key Management Techniques in a Smart Home Environment (스마트 홈 환경에서 디바이스 상호 인증 및 키 관리 기법)

  • Min, So-Yeon;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.10
    • /
    • pp.661-667
    • /
    • 2018
  • Recently, the smart home market is growing due to the development of wireless communication technology and sensor devices, and various devices are being utilized. Such an IoT environment collects various vast amount of device information for intelligent services, receives services based on user information, controls various devices, and provides communication between different types of devices. However, with this growth, various security threats are occurring in the smart home environment. In fact, Proofpoint and HP warned about the cases of damage in a smart home environment and the severity of security vulnerabilities, and cases of infringement in various environments were announced. Therefore, in this paper, we have studied secure mutual authentication method between smart nodes used in smart home to solve security problems that may occur in smart home environment. In the case of the proposed thesis, security evaluations are performed using random numbers and frequently updated session keys and secret keys for well-known vulnerabilities that can occur in IoT environments and sensor devices such as sniffing, spoofing, device mutual authentication, And safety. In addition, it is confirmed that it is superior in security and key management through comparison with existing smart home security protocol.