• Title/Summary/Keyword: countermeasure method

Search Result 501, Processing Time 0.028 seconds

Detection And Countermeasure Scheme For Call-Disruption Attacks On SIP-Based Voip Services

  • Ryu, Jea-Tek;Roh, Byeong-Hee;Ryu, Ki-Yeol;Yoon, Myung-Chul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.7
    • /
    • pp.1854-1873
    • /
    • 2012
  • Owing to its simplicity and flexibility, the session initiation protocol (SIP) has been widely adopted as a major session-management protocol for Internet telephony or Voice-over IP (VoIP) services. However, SIP has faced various types of security threats. Call-disruption attacks are some of the most severe threats they face, and can greatly inconvenience consumers. In this paper, we analyze such SIP call-disruption attacks, and propose a method for detecting and counteracting them by extending the SIP INFO method with authentication. Using the proposed method, both the target user and the SIP server can detect the existence of a call-disruption attack on a user and counteract the attack. We demonstrate the effectiveness of the proposed method from the viewpoint of computational complexity by configuring a test-bed with an Asterisk SIP proxy server and an SIP performance (SIPp) emulator.

Effect analysis by time passage after Repair & Reinforcement of Fill Dams (필댐 보수보강후 시간경과에 따른 효과 분석)

  • Kim, Jae-Hong;Oh, Byung-Hyun;Im, En-sang;Hong, Won-Pho
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2008.03a
    • /
    • pp.697-703
    • /
    • 2008
  • Excessive water leakage phenomenon happens through damage of nation core zone of about 17,000 storage of water facilities or collapse of dam is worried, is being damaged or enforce dilapidated fill dam core zone's repair reinforcement. Example that use grouting method of construction considering construction and economic performance etc. recently by repair reinforcement way about defect of dam is increased. Permeation grouting method repair & reinforcement of fill dam countermeasure is preferred in nation. Do that is economical to decide these repair reinforcement effect and grouting effect estimation method that do not give damage to dam is effective. Therefore, observing electricity resistivity Survey change of dam since grouting reinforcement using Electric resistivity Survey inquiry of seismic survey method in this research, Wished to verify grouting effect whether is possible as Electric resistivity Survey, and study whether integrity of dam through repair reinforcement defined.

  • PDF

A Case of the Alternative Method to Improve the Ambient Vibration Blasting Method Applied NATM Tunnel Construction in Urban Areas (도심지 NATM 터널 굴착시 적용된 미진동발파 공법 개선사례)

  • Lee, Jong-Yoon;Hwang, Yeon-Soo;Choi, Hack-Yong;Bae, Hyo-Jin
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2010.03a
    • /
    • pp.535-542
    • /
    • 2010
  • Various difficulties have been increased in the construction of public structure; like the road in the overcrowding urban area, because of civil complaint, cost and period of construction. In oder to overcome these social problems, the tunnel has been planned the road design. Despite the resolution, there are many technical problems when constructed near facilities. The design of new tunnel below the existing service reservoir is applied to the ambient vibration blasting using Plasma. The result of test blasting was exceeded the standard ("2kine"). So it was considered a countermeasure for the vibration reduction applied to change the controlled blasting method, reduce the charge, add the pre middle horizontal hole in the cut blasting site, and so on. The result was satisfied the standard. Accordingly, if the quality of blasting process can be managed well, the application of this alternative method is highly effective one. Also, based on cost analysis between two methods, the alternative method is very competitive.

  • PDF

A Study on the Countermeasure Technology for Fin-Tech Optimized Financial Security (금융 보안에 최적화된 Fin-Tech 대응기술 연구)

  • Kim, Seokhoon;Kwak, Ha-Min
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.4
    • /
    • pp.25-30
    • /
    • 2015
  • Recently, interest in Fin-Tech, a compound word of finance and technology, has been increased. However, Fin-Tech that is a mixture of finance and IT is exposed in terms of security. In this paper, we propose a method to solve the security-related problem that occurs in the financial sector where the Fin-Tech is used. Proposed method found out different problems of services which are provided by companies through a variety of financial sectors and described a method to facilitate the security service. In particular, proposed method presents a service plan to secure safety and to minimize the damage. Also, proposed method set an objective to stabilize financial services based on analyzed result after analyzing the problems of existing FinTech security services.

  • PDF

A Research to Minimizing the Effect of Voltage Disturbances on Sensitive Electrical and Electronic Equipment (민감한 전기전자기기의 전압외란에 대한 영향 최소화 연구)

  • 윤갑구
    • Journal of the Korean Professional Engineers Association
    • /
    • v.19 no.2
    • /
    • pp.10-20
    • /
    • 1986
  • This paper describes a countermeasure of electric utilities and customer equipment in order to minimize an effect of sensitive electrical and electronic equipment on the voltage disturbances. After being studied, some schemes to solve were discovered. Firstly, in the electric utilities, the reduction of frequency and influence of voltage drop's time are not easy to realize because of the standpoint of effect and economy. Secondly, in the customer equipment, there are some equipment to minimize the voltage disturbances, Such as an UPSs, a noise suppressors and a power conditioners. One of them should be established on the computer control and automated systems, the electromagnetic switch of delay-release type should be adopted on the electromagnetic switch, the controlling circuit should be adopted on the variable speed motors which is being considered a countermeasure for a momentary under-voltage drops, the luminaire adhering a instantaneous restrike device should be adopted on the HID lamp. And also, the scheme of extending a setting time of relay on the undervoltage relay and the forming method of sequence which is automatic reclosing at this time of instantaneous suspension of an electric supply have been studied.

  • PDF

Analysis on Vulnerability of Masked SEED Algorithm (마스킹 기법이 적용된 SEED 알고리즘에 대한 취약점 분석)

  • Kim, TaeWon;Chang, Nam Su
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.739-747
    • /
    • 2015
  • Masking technique that is most widely known as countermeasure against power analysis attack prevents leakage for sensitive information during the implementations of cryptography algorithm. it have been studied extensively until now applied on block cipher algorithms. Masking countermeasure have been applied to international standard SEED algorithm. Masked SEED algorithm proposed by Cho et al, not only protects against first order power analysis attacks but also efficient by reducing the execution of Arithmetic to Boolean converting function. In this paper, we analyze the vulnerability of Cho's algorithm against first order power analysis attacks. We targeted additional pre-computation to improve the efficiency in order to recover the random mask value being exploited in first order power analysis attacks. We describe weakness by considering both theoretical and practical aspects and are expecting to apply on every device equipped with cho's algorithm using the proposed attack method.

Android based Mobile Device Rooting Attack Detection and Response Mechanism using Events Extracted from Daemon Processes (안드로이드 기반 모바일 단말 루팅 공격에 대한 이벤트 추출 기반 대응 기법)

  • Lee, Hyung-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.479-490
    • /
    • 2013
  • Recently, the number of attacks by malicious application has significantly increased, targeting Android-platform mobile terminal such as Samsung Galaxy Note and Galaxy Tab 10.1. The malicious application can be distributed to currently used mobile devices through open market masquerading as an normal application. An attacker inserts malicious code into an application, which might threaten privacy by rooting attack. Once the rooting attack is successful, malicious code can collect and steal private data stored in mobile terminal, for example, SMS messages, contacts list, and public key certificate for banking. To protect the private information from the malicious attack, malicious code detection, rooting attack detection and countermeasure method are required. To meet this end, this paper investigates rooting attack mechanism for Android-platform mobile terminal. Based on that, this paper proposes countermeasure system that enables to extract and collect events related to attacks occurring from mobile terminal, which contributes to active protection from malicious attacks.

Detection of Forgery of Mobile App and Study on Countermeasure (모바일 단말기 앱의 위·변조 탐지 및 대응방안 연구)

  • Jung, Hyun Soo;Chae, Gyoo-Soo
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.3
    • /
    • pp.27-31
    • /
    • 2015
  • As the number of smartphone users is increasing with the development of mobile devices, the range of monetary transaction from the individual use is increasing. Therefore, hacking methods are diversified and the information forgery of mobile devices has been a current issue. The forgery via apps in mobile devices is a hacking method that creates an app similar to well-known apps to deceive the users. The forgery attack corresponds to the violation of integrity, one of three elements of security. Due to the forgery, the value and credibility of an app decreases with the risk increased. With the forgery in app, private information and data can be stolen and the financial losses can occur. This paper examined the forgery, and suggested a way to detect it, and sought the countermeasure to the forgery.

  • PDF

Promotion of Regional Trade Agreement and Korea's Anti-dumping Countermeasure (지역무역협정의 확대와 한국의 반덤핑제도 대응전략)

  • Oh, Moon-Kap
    • International Commerce and Information Review
    • /
    • v.15 no.2
    • /
    • pp.233-260
    • /
    • 2013
  • Regional Trade Agreements(RTAs) are a prominent feature of the multilateral trading system and have been an important trade policy tool for WTO Members. RTAs has been steadily increasing over the last ten years and this trend will be further strengthened by the many RTAs being proposed and those currently under negotiation. There has been a recent increase in the Regional Trade Agreement (RTA) making it necessary to determine the most effective method for taking advantage of anti-dumping measures between member countries of the RTA. Due to the complexity of anti-dumping laws and abuse of discretion by each nation, however, the basic goal of the RTA has not come to fruition. The results of this study found that the strengthening of anti-dumping measures in the RTA is desirable. A plan to use competition instead of anti-dumping measures must be implemented. For Korea, it will be necessary to develop the fundamentals for the globalization of competitive rules to keep pace with the continuous expansion of FTA.

  • PDF

Development of Anti-Spoofing Equipment Architecture and Performance Evaluation Test System

  • Jung, Junwoo;Park, Sungyeol;Hyun, Jongchul;Kang, Haengik;Song, Kiwon;Kim, Kapjin;Park, Youngbum
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.7 no.3
    • /
    • pp.127-138
    • /
    • 2018
  • Spoofing attacks including meaconing can provide a bogus position to a victim GPS receiver, and those attacks are notably difficult to detect at the point of view on the receiver. Several countermeasure techniques have been studied to detect, classify, and cancel the spoofing signals. Based on the countermeasure techniques, we have developed an anti-spoofing equipment that detects and mitigates or eliminates the spoofing signal based on raw measurements. Although many anti-spoofing techniques have been studied in the literatures, the evaluation test system is not deeply studied to evaluate the anti-spoofing equipment, which includes detection, mitigation, and elimination of spoofing signals. Each study only has a specific test method to verify its anti-spoofing technique. In this paper, we propose the performance evaluation test system that includes both spoofing signal injection system and its injection scenario with the constraints of stand-alone anti-spoofing techniques. The spoofing signal injection scenario is designed to drive a victim GPS receiver that moves to a designed position, where the mitigation and elimination based anti-spoofing algorithms can be successively evaluated. We evaluate the developed anti-spoofing equipment and a commercial GPS receiver using our proposed performance evaluation test system. Although the commercial one is affected by the test system and moves to the designed position, the anti-spoofing equipment mitigates and eliminates the injected spoofing signals as planned. We evaluate the performance of anti-spoofing equipment on the position error of the circular error probability, while injecting spoofing signals.