• Title/Summary/Keyword: Security vulnerability

Search Result 1,104, Processing Time 0.024 seconds

Hijacking Attack using Wireless Network Security Vulnerability in Drone and Its Countermeasure (드론의 무선 네트워크 보안 취약점을 이용한 탈취 및 대응)

  • Son, Juhwan;Sim, Jaebum;Lee, Jae-Gu;Cheong, Il-Ahn
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.327-330
    • /
    • 2017
  • In recent years, Drone(lightweight unmanned aerial vehicle) is used for broadcast shooting, disaster scene, leisure, observation and military purposes. However, as the use of drones increases the threat of hacking is also rising. Especially when a flying drone is seized, a dangerous situation can occur which is abused regardless of the driver's intention. Already in Iran and China, there is a case of hacking and stealing the drones of other countries under reconnaissance. In this paper, we analyze the security vulnerabilities of Wi-Fi and Bluetooth communication in wireless network which are used in drones for stealing the commercial drones. The results provide a countermeasure to safeguard the drones against attempts by the unauthorized attacker to take out the drones.

  • PDF

Risk Factor Evaluation of Musculoskeletal Symptoms for Guards

  • Lee, Kyung-Sun;Lee, In-Seok;Kim, Hyun-Joo;Jung-Choi, KyungHee;Bahk, Jin-Wook;Jung, Myung-Chul
    • Journal of the Ergonomics Society of Korea
    • /
    • v.30 no.3
    • /
    • pp.419-426
    • /
    • 2011
  • Objective: The objective of this study was to evaluate a work of guards, using an ergonomic method(work analysis and posture analysis). Background: Most studies about guards were conducted in the field of medical, problems of shift, and the physical problems of old workers and social problems. But, guards consist of vulnerability group so it needs an ergonomic research in musculoskeletal disorders. Method: A head of an ergonomic estimation was work analysis(determination of combined task, work tool, work time and frequency of combined task) and posture analysis(upper body and lower body) of workers based on the video. Results: The result showed that combined task of guards was classification of patrolling, security, cleaning and waiting. The security indicated the highest ratio in the work time of combined tasks. The results of posture analysis for guards indicated high value in neutral. But, lower arm indicated high value in bending(left: 59%, right: 50%). Conclusion: The results of ergonomic methods indicated that guards' physical work load was not high during work, but comfortable work environment would be required for old guards. Application: If an ergonomic rule can be integrated into existing work environments, the risk of occupational injuries and stress will be reduced.

Security Vulnerability and Countermeasure on 5G Networks: Survey (5G 네트워크의 보안 취약점 및 대응 방안: 서베이)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.17 no.12
    • /
    • pp.197-202
    • /
    • 2019
  • In line with the era of the 4th Industrial Revolution, 5G technology has become common technology, and 5G technology is evaluated as a technology that minimizes the speed and response speed compared to 4G using technologies such as network slicing and ultra-multiple access. 5G NR stands for 5G mobile communication standard, and network slicing cuts the network into parallel connections to optimize the network. In addition, the risk of hacking is increasing as data is processed in the base station unit. In addition, since the number of accessible devices per unit area increases exponentially, there is a possibility of base station attack after hacking a large number of devices in the unit area. To solve this problem, this study proposes the introduction of quantum cryptography and 5G security standardization.

Biometric Template Security for Personal Information Protection (개인정보 보호를 위한 바이오인식 템플릿 보안)

  • Shin, Yong-Nyuo;Lee, Yong-Jun;Chun, Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.4
    • /
    • pp.437-444
    • /
    • 2008
  • This paper deals with the biometric template protection in the biometric system which has been widely used for personal authentication. First, we consider the structure of the biometric system and the function of its sub-systems and define the biometric template and identification(ID) information. And then, we describe the biometric template attack points of a biometric system and attack examples and provide their countermeasures. From this, we classify the vulnerability which can be protected by encryption and hashing techniques. For more detail investigation of these at real operating situations, we analyze them and suggest several protection methods for the typical application scheme of biometric systems such as local model, download model, attached model, and center model. Finally, we also handle the privacy problem which is most controversy issue related to the biometric systems and suggest some guidances of safeguarding procedures on establishing privacy sympathy biometric systems.

Sanitization of Open-Source Based Deduplicated Filesystem (오픈 소스 중복 제거 파일시스템에서의 완전 삭제)

  • Cho, Hyeonwoong;Kim, SeulGi;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1141-1149
    • /
    • 2016
  • Deduplicated filesystem can reduce usage of storage. However, it be able to recover deleted block. We studied sanitization of deduplicated filesystem, LessFS which is based on FUSE(Filesystem in USErspace). First, we show a vulnerability recover deleted data in the deduplicated filesystem. We implement sanitization of deduplicated filesystem considering the part of fingerprint DB with data blocks. It takes 60~70 times compared to without sanitization. Which means access time to fingerprint DB and overhead derived from increase of number of chunk have a critical impact on sanitization time. But in case of more than 65,536 Byte of chunksize, it is faster than normal filesystem without deduplication.

A Study of Real Time Security Cooperation System Regarding Hacker's Attack (해커의 공격에 대한 실시간 보안공조시스템 연구)

  • Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.285-288
    • /
    • 2010
  • Chinese hackers hack the e-commerce site by bypass South Korea IP to connect to the third country, finance damaging a violation incident that fake account. 7.7.DDoS attack was the case of a hacker attack that paralyzed the country's main site. In this paper, the analysis is about vulnerabilities that breaches by hackers and DDoS attacks. Hacker's attacks and attacks on the sign of correlation analysis is share the risk rating for in real time, Red, Orange, Yellow, Green. Create a blacklist of hackers and real-time attack will be studied security and air conditioning systems that attacks and defend. By studying generate forensic data and confirmed in court as evidence of accountability through IP traceback and detection about packet after Incident, contribute to the national incident response and development of forensic techniques.

  • PDF

Detection Mechanism against Code Re-use Attack in Stack region (스택 영역에서의 코드 재사용 공격 탐지 메커니즘)

  • Kim, Ju-Hyuk;Oh, Soo-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.5
    • /
    • pp.3121-3131
    • /
    • 2014
  • Vulnerabilities related to memory have been known as major threats to the security of a computer system. Actually, the number of attacks using memory vulnerability has been increased. Accordingly, various memory protection mechanisms have been studied and implemented on operating system while new attack techniques bypassing the protection systems have been developed. Especially, buffer overflow attacks have been developed as Return-Oriented Programing(ROP) and Jump-Oriented Programming(JOP) called Code Re-used attack to bypass the memory protection mechanism. Thus, in this paper, I analyzed code re-use attack techniques emerged recently among attacks related to memory, as well as analyzed various detection mechanisms proposed previously. Based on the results of the analyses, a mechanism that could detect various code re-use attacks on a binary level was proposed. In addition, it was verified through experiments that the proposed mechanism could detect code re-use attacks effectively.

A Study on the Convergence of Monitoring and Control System with Geographic Information System (지리정보시스템과 관제시스템의 융합에 관한 연구)

  • Seo, Tae-Woong;Kim, Chang-Soo;Lee, Jae-Sung;Lee, Cheol-Won
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.5
    • /
    • pp.703-709
    • /
    • 2011
  • State-based infrastructure on IT-based network are prone to numerous cyber attack including subsequent hacking and internet infringement. These acts of terrorism are increasing because of the expanding IT convergence technology. Recently, the trend on cyber security monitoring and control researches focus on combining the general idea of security monitoring and control along with IT field and other control systems. This convergence trend has been increasing in both the use and importance. This research analyzes the state-based infrastructure monitoring and control system, its vulnerability as well as its improvement by incorporating the cyber convergence systems to existing systems. The subject of this research is for extensive use of CCTV systems which is expanded for 'CCTV Monitoring and Control Field' as well as 'Traffic Monitoring and Control Field' operated by 'Intelligent Traffic Information System' and Disaster Management Area which is studied in various fields. Eventually, the objective of the paper is to solve these issues, to apply related systems and to suggest improvement on the convergence system.

A Study on Group Key Generation and Exchange using Hash Collision in M2M Communication Environment (M2M 통신 환경에서 해시 충돌을 이용한 그룹키 생성 및 교환 기법 연구)

  • Song, Jun-Ho;Kim, Sung-Soo;Jun, Moon-Seog
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.9-17
    • /
    • 2019
  • As the IoT environment becomes more popular, the safety of the M2M environment, which establishes the communication environment between objects and objects without human intervention, becomes important. Due to the nature of the wireless communication environment, there is a possibility of exposure to security threats in various aspects such as data exposure, falsification, tampering, deletion and privacy, and secure communication security technology is considered as an important requirement. In this paper, we propose a new method for group key generation and exchange using trap hash collision hash in existing 'M2M communication environment' using hash collision, And a mechanism for confirming the authentication of the device and the gateway after the group key is generated. The proposed method has attack resistance such as spoofing attack, meson attack, and retransmission attack in the group communication section by using the specificity of the collision message and collision hash, and is a technique for proving safety against vulnerability of hash collision.

A Layered Protection System for a Cloud Storage of Defense M&S Resources (국방 재사용 자원의 클라우드 저장소를 위한 계층형 보호 시스템)

  • Park, Chanjong;Han, Seungchul;Lee, Kangsun
    • Journal of the Korea Society for Simulation
    • /
    • v.24 no.3
    • /
    • pp.77-87
    • /
    • 2015
  • Defense M&S (Modeling & Simulation) is utilized as a realistic method to analyze MOE (Measure of Effectiveness) of weapon systems by modeling weapons and their operational environment on the computer, and simulating them under various war scenarios. As weapon systems become complex in their structure and dynamics, model engineering are experiencing difficulties to construct simulation models on a computer. A model repository helps model developers to save model development time and cost by systematically storing predefined and already validated models. However, most repositories for Defense M&Shave not been successful partly due to limited accessability, vulnerability to security threats, and low level of dependability. In this paper, we propose W-Cloud (Weapon Cloud), a cloud model repository for reusing predefined weapon models. Clients can access W-Cloud on any platforms and various devices, yet security and confidentiality concerns are guaranteed by employing multi-tier information protection mechanism.