• 제목/요약/키워드: hackers

검색결과 174건 처리시간 0.026초

Design of Network-based Real-time Connection Traceback System with Connection Redirection Technology

  • Choi, Yang-Sec;Kim, Hwan-Guk;Seo, Dong-Il;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.2101-2105
    • /
    • 2003
  • Recently the number of Internet users has very sharply increased, and the number of intrusions has also increased very much. Consequently, security products are being developed and adapted to prevent systems and networks from being hacked and intruded. Even if security products are adapted, however, hackers can still attack a system and get a special authorization because the security products cannot prevent a system and network from every instance of hacking and intrusion. Therefore, the researchers have focused on an active hacking prevention method, and they have tried to develop a traceback system that can find the real location of an attacker. At present, however, because of the characteristics of Internet - diversity, anonymity - the real-time traceback is very difficult. To over-come this problem the Network-based Real-Time Connection Traceback System (NRCTS) was proposed. But there is a security problem that the victim system can be hacked during the traceback. So, in this paper, we propose modified NRCTS with connection redirection technique. We call this traceback system as Connection Redirected Network-based Real-Time Connection Traceback System (CR-NRCTS).

  • PDF

무자각 지속인증 기술 동향 (Trends in Implicit Continuous Authentication Technology)

  • 김승현;김수형;진승헌
    • 전자통신동향분석
    • /
    • 제33권1호
    • /
    • pp.57-67
    • /
    • 2018
  • Modern users are intensifying their use of online services every day. In addition, hackers are attempting to execute advanced attacks to steal personal information protected using existing authentication technologies. However, existing authentication methods require an explicit authentication procedure for the user, and do not conduct identity verification in the middle of the authentication session. In this paper, we introduce an implicit continuous authentication technology to overcome the limitations of existing authentication technology. Implicit continuous authentication is a technique for continuously authenticating users without explicit intervention by utilizing their behavioral and environmental information. This can improve the level of security by verifying the user's identity during the authentication session without the burden of an explicit authentication procedure. In addition, we briefly introduce the definition, key features, applicable algorithms, and recent research trends for various authentication technologies that can be used as an implicit continuous authentication technology.

System Insecurity - Firewalls

  • Ryu, Youngtae
    • 한국정보시스템학회:학술대회논문집
    • /
    • 한국정보시스템학회 2000년도 춘계학술대회
    • /
    • pp.171-175
    • /
    • 2000
  • The firewall is normally an intermediate system between the secure internal networks and the less secure external networks. It is intended to keep corporate systems safe from intruders, hackers, and accidental entry into the corporate system. The primary types of firewalls are screening routers, proxy servers, and stateful inspectors. Encryption is another form of firewall protection which is being incorporated along with other firewall methods. Before choosing a firewall architecture, a company must have the right mind set about the threat. The future will see more integration of firewall technologies and the increased use of standards in the industry. It must also determine what are the possible consequences of a breach in security and then develop a system to counter the threat. Additionally, new firewall technologies will address the potential dangers associated with the use of Java applets and Active X-controls on the Internet.

  • PDF

Affective Computing Among Individuals in Deep Learning

  • Kim, Seong-Kyu (Steve)
    • Journal of Multimedia Information System
    • /
    • 제7권2호
    • /
    • pp.115-124
    • /
    • 2020
  • This paper is a study of deep learning among artificial intelligence technology which has been developing many technologies recently. Especially, I am talking about emotional computing that has been mentioned a lot recently during deep learning. Emotional computing, in other words, is a passive concept that is dominated by people who scientifically analyze human sensibilities and reflect them in product development or system design, and a more active concept that studies how devices and systems understand humans and communicate with people in different modes. This emotional signal extraction, sensitivity, and psychology recognition technology is defined as a technology to process, analyze, and recognize psycho-sensitivity based on micro-small, hyper-sensor technology, and sensitive signals and information that can be sensed by the active movement of the autonomic nervous system caused by human emotional changes in everyday life. Chapter 1 talks about overview and Chapter 2 shows related research. Chapter 3 shows the problems and models of real emotional computing and Chapter 4 shows this paper as a conclusion.

New Secret Sharing Scheme for Privacy Data Management

  • 송유진;이동혁
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2006년도 하계학술대회
    • /
    • pp.765-773
    • /
    • 2006
  • In ubiquitous environment, private enterprise or public institution's privacy data are sometimes exposed to hackers because of the lack of the sense of information security. We apply secret sharing scheme to solve the privacy problems. But, the existing secret sharing scheme are not suitable for the management of large a quantity of data because that required operation of large capacity. In this paper, We propose new secret sharing scheme for privacy data management. Our scheme makes high-speed operation possible, and it also allows for set weight for each secret pieces depending on weight of participants. The scheme proposed in this paper makes it efficient to collect and manage secure privacy data in ubiquitous environment.

  • PDF

Hierarchical Clustering을 이용한 네트워크 패킷의 분류 (Classification of network packets using hierarchical clustering)

  • 여인성;;황성운
    • 사물인터넷융복합논문지
    • /
    • 제3권1호
    • /
    • pp.9-11
    • /
    • 2017
  • 최근에 인터넷과 모바일 장치가 널리 보급되면서 해커들이 네트워크를 이용해 공격하는 횟수 또한 증가하고 있다. 네트워크를 연결할 때 패킷을 주고받으며 통신을 하게 되는데, 여기에는 다양한 정보가 포함되어 있다. 이 패킷들의 정보를 Hierarchical Clustering 분석을 사용해 분석하고 정상적인 패킷과 비정상적인 패킷을 분류하여 공격자들의 공격을 탐지하였다. 이 분석 방법을 통해 새로운 패킷을 분석하여 공격을 탐지하는 것이 가능할 것이다.

Secure Authentication with Mobile Device for Ubiquitous RFID Healthcare System in Wireless Sensor Networks

  • Kim, Jung-Tae
    • Journal of information and communication convergence engineering
    • /
    • 제9권5호
    • /
    • pp.562-566
    • /
    • 2011
  • As telecommunication technologies in telemedicine services are developed, the expeditious development of wireless and mobile networks has stimulated wide applications of mobile electronic healthcare systems. However, security is an essential system requirement since many patients have privacy concerns when it comes to releasing their personal information over the open wireless channels. Due to the invisible feature of mobile signals, hackers have easier access to hospital networks than wired network systems. This may result in several security incidents unless security protocols are well prepared. In this paper, we analyzed authentication and authorization procedures for healthcare system architecture to apply secure M-health systems in the hospital environment. From the analyses, we estimate optimal requirements as a countermeasure to its vulnerabilities.

전자정부의 내부통제를 위한 정보시스템 도입에 있어서 제도적 개선방안에 관한 연구 : 바름 e 시스템을 중심으로 (Study on Improvement for Information System Installation for e-Government's Internal Control through Legal Review : Focused on Barum e-System)

  • 이동한;이욱
    • 한국IT서비스학회지
    • /
    • 제12권3호
    • /
    • pp.179-193
    • /
    • 2013
  • E-Government refers to government to use ICT (information and communications technology) to work more effectively, share information and deliver better services to the public. With ICT, e-Government has increased transparency of governments. However even there has been much trial for transparency, corruption has been growing with the form of e-corruption. While external threats such as hackers and viruses can have serious consequences, currently most crime involving emerging technology is carried out by insiders i.e. employees in the e-government. Among the many tools being developed to fight e-corruption, there has been much focus lately on internal control system. So, South Korea developed and test-operated "Barum e-system" for internal control last year. This research establishes legal basis, information system link and privacy policy for settlement of this information system through legal review.

라우터기반 바이러스 감염파일에 대한 블록킹 시스템 설계 (The design of the blocking system against file infected with virus on router)

  • 정종근;이윤배
    • 한국정보통신학회논문지
    • /
    • 제5권7호
    • /
    • pp.1232-1237
    • /
    • 2001
  • 인터넷 기술은 사용자의 수만큼이나 빠르게 발전하고 있다. 그러나, 이 기술이 사용자들에게 항상 좋은 면만을 보여주지는 않는다. 해커나 어린이조차도 컴퓨터 바이러스를 만들어 네트웍상에 배포한다. 그래서 바이러스의 위협은 점점 심각해져가고 있다. 본 논문에서는 이전에 개발되었던 바이러스 블록킹 시스템을 분석한 후 라우터 상에서 바이러스에 감염된 파일을 차단하는 시스템을 개선하여 설계하였다. 다른 시스템과 비교하여, 라우터와 블록킹 시스템간의 전송시간을 단축하여 통신의 복잡성에서도 더 효율적이다.

  • PDF

사이버테러의 현황과 대책에 관한 연구 (Countermeasures against Cyber terror in Korea)

  • 안창훈
    • 시큐리티연구
    • /
    • 제5호
    • /
    • pp.211-241
    • /
    • 2002
  • Koreans are the most avid Internet surfers in the world according to Nielson/NetRatings(Reuters, August 2001) and most Internet connections are made through high-speed connections like Digital Subscriber Lines (DSLs). The result of such internet fervor is a nation that is fertile in both hackers and software companies(over 200 in the field of network security alone). However, by-product of Internet activity is cyber crime and the need to protect innocent users from the dangers of cyber criminals and cyber-terrorists be they are individuals or organized groups. Hence the Cyber Terror Response Team (CTRT) was organized in late 2000 with the mandate to fulfill that role. In these contexts, this study analyzes the actual conditions of cyber terror and suggests the countermeasures against cyber terror in Korea.

  • PDF