• 제목/요약/키워드: network attack

검색결과 1,259건 처리시간 0.027초

유비쿼터스 환경에서의 홈네트워크 시스템 침해 위협 및 대응 방안 (Response and Threat of Home Network System in Ubiquitous Environment)

  • 오대균;정진영
    • 융합보안논문지
    • /
    • 제5권4호
    • /
    • pp.27-32
    • /
    • 2005
  • 최근 초고속 인터넷의 확산과 댁내 가전기기들의 지능화에 따라, 홈 네트워크(Home Network)에 대한 사회적인 관심이 높아지고 있다. 언제 어디서나 컴퓨팅이 가능한 유비쿼터스 컴퓨팅 사회에서는 개인의 컴퓨터환경 의존도가 증가함에 따라 사이버공격으로 인한 개인생활의 위협도 증가할 수 밖에 없다. 홈네트워크는 유비쿼터스 컴퓨팅 환경으로 가는 시작점이라고 할 수 있으므로 인터넷을 통한 사이버공격의 증가는 눈앞에 현실로 다가오고 있는 홈네트워크의 활성화를 방해하는 장해물로 대두될 것이 틀림없으므로 이에 대한 대응책 마련이 시급하다고 할 수 있다. 이와 같은 다양한 환경에서는 현재보다도 복잡한 위협이 존재할 것이다. 따라서 본 논문에서는 현재의 홈네트워크 시스템 환경을 분석하고 이에 따른 보안 위협과 향후 다가올 유비쿼터스 환경의 침해 유형에 대해서 살펴보고자 한다.

  • PDF

Design of Hybrid Network Probe Intrusion Detector using FCM

  • Kim, Chang-Su;Lee, Se-Yul
    • Journal of information and communication convergence engineering
    • /
    • 제7권1호
    • /
    • pp.7-12
    • /
    • 2009
  • The advanced computer network and Internet technology enables connectivity of computers through an open network environment. Despite the growing numbers of security threats to networks, most intrusion detection identifies security attacks mainly by detecting misuse using a set of rules based on past hacking patterns. This pattern matching has a high rate of false positives and can not detect new hacking patterns, making it vulnerable to previously unidentified attack patterns and variations in attack and increasing false negatives. Intrusion detection and prevention technologies are thus required. We proposed a network based hybrid Probe Intrusion Detection model using Fuzzy cognitive maps (PIDuF) that detects intrusion by DoS (DDoS and PDoS) attack detection using packet analysis. A DoS attack typically appears as a probe and SYN flooding attack. SYN flooding using FCM model captures and analyzes packet information to detect SYN flooding attacks. Using the result of decision module analysis, which used FCM, the decision module measures the degree of danger of the DoS and trains the response module to deal with attacks. For the performance evaluation, the "IDS Evaluation Data Set" created by MIT was used. From the simulation we obtained the max-average true positive rate of 97.064% and the max-average false negative rate of 2.936%. The true positive error rate of the PIDuF is similar to that of Bernhard's true positive error rate.

MANET에서 플러딩 공격 탐지 및 대응 기법에 관한 연구 (A Study on Flooding Attack Detection and Response Technique in MANET)

  • 양환석;유승재
    • 융합보안논문지
    • /
    • 제13권4호
    • /
    • pp.41-46
    • /
    • 2013
  • MANET에서 효율적인 데이터 전송을 위해서는 기존의 유선 네트워크에서 사용하는 라우팅 프로토콜을 그대로 사용할 수 없다. 왜냐하면 이동 노드로만 구성되어 있어 네트워크 토폴로지가 동적으로 변화하기 때문이다. 따라서 각 이동 노드들이 라우터 기능을 수행해야만 한다. 이러한 특성 때문에 MANET에는 DoS와 같은 다양한 라우팅 공격이 존재하고 있다. 본 논문에서는 자원을 소모시켜 네트워크를 마비시키는 플러딩 공격 탐지 성능을 향상시키기 위한 협력기반 탐지 기법을 제안하였다. 전체 네트워크의 트래픽 양과 노드의 수를 고려하여 기준값을 적응적으로 계산함에 따라 정확한 공격 탐지가 이루어지도록 하였다. 그리고 모든 이동 노드가 협력적 탐지를 수행하기 위하여 NHT라는 테이블을 이용하였으며, 트래픽의 중앙 감시를 위하여 클러스터 구조를 적용하였다.

Black Hole along with Other Attacks in MANETs: A Survey

  • Tseng, Fan-Hsun;Chiang, Hua-Pei;Chao, Han-Chieh
    • Journal of Information Processing Systems
    • /
    • 제14권1호
    • /
    • pp.56-78
    • /
    • 2018
  • Security issue in mobile ad hoc network (MANET) is a promising research. In 2011, we had accomplished a survey of black hole attacks in MANETs. However network technology is changing with each passing day, a vast number of novel schemes and papers have been proposed and published in recent years. In this paper, we survey the literature on malicious attacks in MANETs published during past 5 years, especially the black hole attack. Black hole attacks are classified into non-cooperative and collaborative black hole attacks. Except black hole attacks, other attacks in MANET are also studied, e.g., wormhole and flooding attacks. In addition, we conceive the open issues and future trends of black hole detection and prevention in MANETs based on the survey results of this paper. We summarize these detection schemes with three systematic comparison tables of non-cooperative black hole, collaborative black hole and other attacks, respectively, for a comprehensive survey of attacks in MANETs.

TCP 프로토콜을 사용하는 서비스거부공격 탐지를 위한 침입시도 방지 모델 (A Probe Prevention Model for Detection of Denial of Service Attack on TCP Protocol)

  • 이세열;김용수
    • 한국지능시스템학회논문지
    • /
    • 제13권4호
    • /
    • pp.491-498
    • /
    • 2003
  • The advanced computer network technology enables connectivity of computers through an open network environment. There has been growing numbers of security threat to the networks. Therefore, it requires intrusion detection and prevention technologies. In this paper, we propose a network based intrusion detection model using FCM(Fuzzy Cognitive Maps) that can detect intrusion by the DoS attack detection method adopting the packet analyses. A DoS attack appears in the form of the Probe and Syn Flooding attack which is a typical example. The SPuF(Syn flooding Preventer using Fussy cognitive maps) model captures and analyzes the packet informations to detect Syn flooding attack. Using the result of analysis of decision module, which utilized FCM, the decision module measures the degree of danger of the DoS and trains the response module to deal with attacks. For the performance comparison, the "KDD′99 Competition Data Set" made by MIT Lincoln Labs was used. The result of simulating the "KDD′99 Competition Data Set" in the SPuF model shows that the probe detection rates were over 97 percentages.

TTL 기반 패킷 마킹 방식을 적용한 IP 패킷 역추적 기법 (Advanced n based Packet Marking Mechanism for IP Traceback)

  • 이형우
    • 인터넷정보학회논문지
    • /
    • 제6권1호
    • /
    • pp.13-25
    • /
    • 2005
  • 해킹 공격자는 공격 근원지 IP 주소를 스푸핑하여 대량의 트래픽을 발생시켜 DDoS 공격을 수행하게 된다. 이에 대한 대응 기술로 제시된 IP 역추적 기술은 DDoS 공격의 근원지를 판별하고 공격 패킷이 네트워크상에서 전달된 경로를 재구성하는 기법이다. 기존의 PPM 기반 역추적 기법인 경우 패킷 내에 라우터 정보 또는 라우터 에지 경로 정보를 마킹하는 방식을 사용하였지만 효율적인 경로 역추적 기능을 제공하지 못하기 때문에 DDoS 공격에 능동적으로 대응하지 못하고 있다. 이에 본 연구에서는 DDoS 공격 패킷에 대해 TTL 기반의 개선된 패킷 마킹 기법을 제시하여 스푸핑된 IP 패킷의 근원지 정보를 재구성한 수 있음을 보였으며, 실험 결과 네트워크 부하를 줄이면서도 역추적 성능을 향상시킬 수 있었다.

  • PDF

TCP/IP 공격에 대한 보안 방법 연구 (A Study of Security Method against Attack in TCP/IP)

  • 박대우;서정만
    • 한국컴퓨터정보학회논문지
    • /
    • 제10권5호
    • /
    • pp.217-226
    • /
    • 2005
  • 오늘날 사이버세상에서 네트워크의 성능은 정당한 내용의 요청에 대한 증가에 의해서 뿐만 아니라 악의적인 활동의 증가에 의해서도 영향을 받고 있다. 이 논문에서 네트워크 성능에 영향을 주는 악의적인 해커의 TCP/IP를 이용한 DoS 공격 및 DDoS 공격, SYN Flooding을 이용한 공격, IP Spoofing 공격 등을 연구한다. 이 공격들에 대비하여 방어하는 네트워크 레벨과 게이트웨이 레벨 및 응용계층 레벨에서의 패킷 필터링 방법을 제안한다. 또한 웹 서버에서의 캐시 서버, 미러 서버와 CDN을 사용하여 콘텐츠를 분배하는 방법에 대해 제안한다. 이러한 제안들은 공격자의 공격에 대응하는 방법으로 유용하게 사용되어질 것이다.

  • PDF

BLE 네트워크에서 무결성 침해 중간자 공격에 대한 대응기법 (Countermeasure against MITM attack Integrity Violation in a BLE Network)

  • 한혜경;이병문
    • 한국멀티미디어학회논문지
    • /
    • 제25권2호
    • /
    • pp.221-236
    • /
    • 2022
  • BLE protocol prevents MITM attacks with user interaction through some input/output devices such as keyboard or display. Therefore, If it use a device which has no input/output facility, it can be vulnerable to MITM attack. If messages to be sent to a control device is forged by MITM attack, the device can be abnormally operated by malicious attack from attacker. Therefore, we describes a scenario which has the vulnerabilities of the BLE network in this paper and propose countermeasure method against MITM attacks integrity violations. Its mechanism provides data confidentiality and integrity with MD5 and security key distribution of Diffie Helman's method. In order to verify the effectiveness of the countermeasure method proposed in this paper, we have conducted the experiments. ​As experiments, the message was sent 200 times and all of them successfully detected whether there was MITM attack or not. In addition, it took at most about 4.2ms delay time with proposed countermeasure method between devices even attacking was going on. It is expected that more secure data transmission can be achieved between IoT devices on a BLE network through the method proposed.

AVOIDITALS: Enhanced Cyber-attack Taxonomy in Securing Information Technology Infrastructure

  • Syafrizal, Melwin;Selamat, Siti Rahayu;Zakaria, Nurul Azma
    • International Journal of Computer Science & Network Security
    • /
    • 제21권8호
    • /
    • pp.1-12
    • /
    • 2021
  • An operation of an organization is currently using a digital environment which opens to potential cyber-attacks. These phenomena become worst as the cyberattack landscape is changing rapidly. The impact of cyber-attacks varies depending on the scope of the organization and the value of assets that need to be protected. It is difficult to assess the damage to an organization from cyberattacks due to a lack of understanding of tools, metrics, and knowledge on the type of attacks and their impacts. Hence, this paper aims to identify domains and sub-domains of cyber-attack taxonomy to facilitate the understanding of cyber-attacks. Four phases are carried in this research: identify existing cyber-attack taxonomy, determine and classify domains and sub-domains of cyber-attack, and construct the enhanced cyber-attack taxonomy. The existing cyber-attack taxonomies are analyzed, domains and sub-domains are selected based on the focus and objectives of the research, and the proposed taxonomy named AVOIDITALS Cyber-attack Taxonomy is constructed. AVOIDITALS consists of 8 domains, 105 sub-domains, 142 sub-sub-domains, and 90 other sub-sub-domains that act as a guideline to assist administrators in determining cyber-attacks through cyber-attacks pattern identification that commonly occurred on digital infrastructure and provide the best prevention method to minimize impact. This research can be further developed in line with the emergence of new types and categories of current cyberattacks and the future.

A Blockchain-enabled Multi-domain DDoS Collaborative Defense Mechanism

  • Huifen Feng;Ying Liu;Xincheng Yan;Na Zhou;Zhihong Jiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권3호
    • /
    • pp.916-937
    • /
    • 2023
  • Most of the existing Distributed Denial-of-Service mitigation schemes in Software-Defined Networking are only implemented in the network domain managed by a single controller. In fact, the zombies for attackers to launch large-scale DDoS attacks are actually not in the same network domain. Therefore, abnormal traffic of DDoS attack will affect multiple paths and network domains. A single defense method is difficult to deal with large-scale DDoS attacks. The cooperative defense of multiple domains becomes an important means to effectively solve cross-domain DDoS attacks. We propose an efficient multi-domain DDoS cooperative defense mechanism by integrating blockchain and SDN architecture. It includes attack traceability, inter-domain information sharing and attack mitigation. In order to reduce the length of the marking path and shorten the traceability time, we propose an AS-level packet traceability method called ASPM. We propose an information sharing method across multiple domains based on blockchain and smart contract. It effectively solves the impact of DDoS illegal traffic on multiple domains. According to the traceability results, we designed a DDoS attack mitigation method by replacing the ACL list with the IP address black/gray list. The experimental results show that our ASPM traceability method requires less data packets, high traceability precision and low overhead. And blockchain-based inter-domain sharing scheme has low cost, high scalability and high security. Attack mitigation measures can prevent illegal data flow in a timely and efficient manner.