• Title/Summary/Keyword: Trojan horse

Search Result 17, Processing Time 0.022 seconds

Threats and countermeasures of malware (악성코드의 위협과 대응책)

  • Lim, Dong Yul
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.1
    • /
    • pp.13-18
    • /
    • 2015
  • The malware, as hackers generic name of executable code that is created for malicious purposes, depending on the presence or absence of a self-replicating ability infected subjects, and are classified as viruses, worms, such as the Trojan horse. Mainly Web page search and P2P use, such as when you use a shareware, has become penetration is more likely to occur in such a situation. If you receive a malware attack, whether the e-mail is sent it is automatically, or will suffer damage such as reduced system performance, personal information leaks. While introducing the current malware, let us examine the measures and describes the contents related to the malicious code.

  • PDF

Design and Implementation of Safety Verification System for Application Software (응용 소프트웨어 안전성 검증 시스템 설계 및 구현)

  • Soh, Woo-Young
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.191-197
    • /
    • 2008
  • A safe computer environment is necessarily required for computer users, because of a damage is widely increased by a malicious software such as the warm, virus and trojan horse. A general vaccine program can detect after the malicious software intruded. This kinds of the vaccine program show good result against a malicious code which is well known, however, there is no function in the vaccine or not enough ability to detect an application software which a malicious code included. So, this paper proposes an application verification system to decide existence and nonexistence of a malicious code in the application software. The proposed application verification system with a mechanism that grasps the flow type of malicious code, can make a reduction of a damage for computer users before the application software executed.

  • PDF

악성 코드 동향과 그 미래 전망

  • Chang, Young-Jun;Cha, Min-Seok;Jung, Jin-Sung;Cho, Si-Haeng
    • Review of KIISC
    • /
    • v.18 no.3
    • /
    • pp.1-16
    • /
    • 2008
  • 2008년으로 컴퓨터 바이러스가 제작된 지 이미 20년이라는 세월을 넘기게 되었다. 이 긴 시간 속에서 컴퓨터 바이러스는 파일 감염을 목적으로 하는 바이러스(virus)로부터 네트워크를 통한 급속한 화산을 시도하는 웜(Worm) 그리고 데이터 유출과 파괴를 목적으로 하는 트로이목마(Trojan Horse)로 발달해왔다. 최근에는 컴퓨터 사용자의 정보를 무단으로 유출하기 위한 스파이웨어(Spyware)에 이르기까지 다양한 형태로 변화를 이룩해 왔다. 이러한 다양한 형태로의 변화가 진행되는 동안에도 컴퓨터 과학의 발달에 따른 새로운 기술들을 흡수하여 더욱더 정교하고 파괴적인 기능들로 발전을 이루게 되었다. 다양한 형태와 기술적 인 발전을 거듭한 악성 코드(Malicious Code)는 컴퓨터 운영 체제, 네트워크의 발달로 이룩된 컴퓨터 과학사와 함께 하였다고 볼 수 있다. 악성 코드의 발전은 해가 갈수록 수치적인 면에서는 증가 추세를 이루고 있으며 기술적인 면에서도 더욱더 위험성을 더해 가고 있으며 그 제작 목적 또한 전통적인 기술력 과시에서 금전적인 이익을 취하기 위한 도구로 전락하고 있다. 이렇게 제작 목적의 변질로 인해 악성 코드는 인터넷 공간에서 사이버 범죄를 발생시키는 원인 중 하나로 변모하게 되었다. 본 논문에서는 이러한 발전적인 형태를 띠고 있는 악성 코드에 대해서 최근 동향을 바탕으로 어떠한 악성코드와 스파이웨어의 형태가 발견되고 있는지 그리고 최근 발견되고 있는 악성코드에서 사용되는 소프트웨어 취약점들을 살펴보고자 한다. 그리고 이러한 악성코드의 형태에 따라 향후 발생할 수 있는 새로운 악성 코드의 위협 형태도 다루어 보고자 한다.

Management Method to Secure Private Key of PKI using One Time Password (OTP를 이용한 PKI 기반의 개인키 파일의 안전한 관리 방안)

  • Kim, Seon-Joo;Joe, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.12
    • /
    • pp.565-573
    • /
    • 2014
  • We have various e-commerce like on-line banking, stock trading, shopping using a PC or SmartPhone. In e-commerce, two parties use the certificate for identification and non-repudiation but, the attack on the certificate user steadily has been increasing since 2005. The most of hacking is stealing the public certificate and private key files. After hacking, the stolen public certificate and private key file is used on e-commerce to fraud. Generally, the private key file is encrypted and saved only with the user's password, and an encrypted private key file can be used after decrypted with user password. If a password is exposed to hackers, hacker decrypt the encrypted private key file, and uses it. For this reason, the hacker attacks user equipment in a various way like installing Trojan's horse to take over the user's certificate and private key file. In this paper, I propose the management method to secure private key of PKI using One Time Password certification technique. As a result, even if the encrypted private key file is exposed outside, the user's private key is kept safely.

A Dynamic Update Engine of IPS for a DoS Attack Prevention of VoIP (VoIP의 DoS공격 차단을 위한 IPS의 동적 업데이트엔진)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.235-244
    • /
    • 2006
  • This paper attacked the unknown DoS which mixed a DoS attack, Worm and the Trojan horse which used IP Source Address Spoofing and Smurf through the SYN Flooding way that UDP, ICMP, Echo, TCP Syn packet operated. the applications that used TCP/UDP in VoIP service networks. Define necessity of a Dynamic Update Engine for a prevention, and measure Miss traffic at RT statistics of inbound and outbound parts in case of designs of an engine at IPS regarding an Self-learning module and a statistical attack spread. and design a logic engine module. Three engines judge attack grades (Attack Suspicious, Normal), and keep the most suitable filtering engine state through AND or OR algorithms at Footprint Lookup modules. A Real-Time Dynamic Engine and Filter updated protected VoIP service from DoS attacks, and strengthened Ubiquitous Security anger, and were turned out to be.

  • PDF

A Dynamic Update Engine of IPS for a DoS Attack Prevention of VoIP (VoIP의 DoS공격 차단을 위한 IPS의 동적 업데이트엔진)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.165-174
    • /
    • 2006
  • This paper attacked the unknown DoS which mixed a DoS attack, Worm and the Trojan horse which used IP Source Address Spoofing and Smurf through the SYN Flooding way that UDP, ICMP, Echo, TCP Syn packet operated, the applications that used TCP/UDP in VoIP service networks. Define necessity of a Dynamic Update Engine for a prevention, and measure Miss traffic at RT statistics of inbound and outbound parts in case of designs of an engine at IPS regarding an Self-learning module and a statistical attack spread, and design a logic engine module. Three engines judge attack grades (Attack, Suspicious, Normal), and keep the most suitable filtering engine state through AND or OR algorithms at Footprint Lookup modules. A Real-Time Dynamic Engine and Filter updated protected VoIP service from DoS attacks, and strengthened Ubiquitous Security anger, and were turned out to be.

  • PDF

A Study on Leakage of Critical Information via the Power Analysis of Power Lines (전원선의 전력분석을 이용한 주요정보 유출 가능성에 관한 연구)

  • Han, Kyong-Ho;Lee, Seong-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.63 no.11
    • /
    • pp.1571-1574
    • /
    • 2014
  • In this paper, we propose a unidirectional transmission of critical information obtained by keyboard hacking or kernel and keyboard driver hacking even though the computer is not connected to the external network. We show the hacking can be attempted in the proposed method to show the way preventing such attempts in advance. Firewalls and other various methods are used to prevent the hacking from the external network but the hacking is also attempted in various ways to detour the firewall. One of the most effective way preventing from the hacking attack is physically disconnect the internal intranet systems from the external internet and most of the government systems, military systems and big corporate systems are using this way as on one of the protection method. In this paper, we show the feasibility of transmission of security codes, etc via the short message to the external network on the assumption that a hacking program such as Trojan Horse is installed on the computer systems separated from the external network. Previous studies showed that the letters on the monitor can be hijacked by electromagnetic analysis on the computer to obtain the information even though the system is not connected ti the network. Other studies showed that the security code hint can obtained by analyzing the power consumption distribution of CPU. In this paper, the power consumption distribution of externally accessible power line is analyzed to obtain the information and the information can be transmitted to the external network. Software controlling the CPU and GPU usage is designed to control the power supply of computer. The sensors such as the Rogowski coils can be used on the external power line to collect the data of power consumption change rates. To transmit the user password by short message, due to the capacitive components and the obstacle from other power supply, A very slow protocol are used.