• Title/Summary/Keyword: stealthy attack

Search Result 4, Processing Time 0.016 seconds

Intelligent Internal Stealthy Attack and its Countermeasure for Multicast Routing Protocol in MANET

  • Arthur, Menaka Pushpa;Kannan, Kathiravan
    • ETRI Journal
    • /
    • v.37 no.6
    • /
    • pp.1108-1119
    • /
    • 2015
  • Multicast communication of mobile ad hoc networks is vulnerable to internal attacks due to its routing structure and high scalability of its participants. Though existing intrusion detection systems (IDSs) act smartly to defend against attack strategies, adversaries also accordingly update their attacking plans intelligently so as to intervene in successful defending schemes. In our work, we present a novel indirect internal stealthy attack on a tree-based multicast routing protocol. Such an indirect stealthy attack intelligently makes neighbor nodes drop their routing-layer unicast control packets instead of processing or forwarding them. The adversary targets the collision avoidance mechanism of the Medium Access Control (MAC) protocol to indirectly affect the routing layer process. Simulation results show the success of this attacking strategy over the existing "stealthy attack in wireless ad hoc networks: detection and countermeasure (SADEC)" detection system. We design a cross-layer automata-based stealthy attack on multicast routing protocols (SAMRP) attacker detection system to identify and isolate the proposed attacker. NS-2 simulation and analytical results show the efficient performance, against an indirect internal stealthy attack, of SAMRP over the existing SADEC and BLM attacker detection systems.

침입 탐지 시스템 평가를 위한 Experimental Frame의 디자인

  • 김형종;조대호
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2000.11a
    • /
    • pp.113-117
    • /
    • 2000
  • 침입 탐지 시스템은 네트워크나 호스트에 대한 오용, 남용, 또는 허가되지 않은 접근을 탐지하는 기능을 갖는 시스템이다. 최근 침입들은 그 종류가 매우 다양화되고, 탐지하기가 매우 어려운 형태로 나타나고 있다. 이러한 침입으로 대표적인 것이 분산 공격과 스텔시 공격(Stealthy Attack)이 있다. 분산 공격은 침입자가 공간적으로 분산되어 이를 탐지하기 어렵게 하는 공격을 말하며, 스텔시 공격은 시간적으로 분산되어 이를 탐지하기 어려운 경우를 말한다. 침입 탐지 시스템의 모델링 및 시뮬레이션을 위해서는 침입 탐지 시스템 모델에 필요한 침입을 제공하고, 침입에 대한 탐지 능력을 평가하기 위한 experimental frame을 디자인 해야한다. 본 연구에서는 분산 공격과 스텔시 공격 기능을 갖는 침입 생성 모델링 방법을 소개하며, 침입 생성을 위해 요구되는 침입 정보 베이스의 역할 및 저장 정보를 소개한다. 또한, 침입에 대한 탐지 능력 평가를 위한 Transducer 모델의 디자인을 소개한다.

  • PDF

An Experimental Environment for Simulation of Stealthy Deception Attack in CPS Using PLCitM (PLC in the Middle) (중간자 PLC를 이용한 CPS 은닉형 공격 실험환경 구축 방안)

  • Chang, Yeop;Lee, Woomyo;shin, Hyeok-Ki;Kim, Sinkyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.123-133
    • /
    • 2018
  • Cyber-Physical System (CPS) is a system in which a physical system and a cyber system are strongly integrated. In order to operate the target physical system stably, the CPS constantly monitors the physical system through the sensor and performs control using the actuator according to the current state. If a malicious attacker performs a forgery attack on the measured values of the sensors in order to conceal their attacks, the cyber system operated based on the collected data can not recognize the current operation status of the physical system. This causes the delay of the response of the automation system and the operator, and then more damage will occur. To protect the CPS from increasingly sophisticated and targeted attacks, countermeasures must be developed that can detect stealthy deception attacks. However, in the CPS environment composed of various heterogeneous devices, the process of analyzing and demonstrating the vulnerability to actual field devices requires a lot of time. Therefore, in this study, we propose a method of constructing the experiment environment of the PLCitM (PLC in the middle) which can verify the performance of the techniques to detect the CPS stealthy deception attack and present the experimental results.

A Study on the Threat of Biological Terrorism in modern society (현대사회의 환경변화에 따른 Bio-Terror의 위협요인 연구)

  • Kang, young-sook;Kim, Tae-hwan
    • Journal of the Society of Disaster Information
    • /
    • v.1 no.1
    • /
    • pp.3-26
    • /
    • 2005
  • In recent years, there is growing concern about the potential use of biological agents in war or acts of terrorism accompanied an increased realization that rapid preparedness and response are needed to prevent or treat the human damage that can be caused by these agents. The threat is indeed serious, and the potential for devastating numbers of casualties is high. The use of agents as weapons, even on a small scale, has the potential for huge social and economic disruption and massive diversion of regional and national resources to combat the threat, to treat primary disease, and to clean up environmental contamination. Biological weapons are one of weapons of mass destruction (or mass casualty weapons, to be precise. since they do not damage non-living entities) that are based on bacteria, viruses, rickettsia, fungi or toxins produced by these organisms. Biological weapons are known to be easy and cheap to produce and can be used to selectively target humans, animals, or plants. Theses agents can cause large numbers of casualties with minimal logistical requirements (in wide area). The spread of disease cannot be controlled until there is awareness of the signs of infection followed by identification of agents; and if the organism is easily spread from person to person, as in the case of smallpox, the number of casualties could run into the tens of thousands. Biological weapons could be used covertly, there can be a lot of different deployment scenarios. A lot of different agents could be used in biological weapons. And, there are a lot of different techniques to manufacture biological weapons. Terrorist acts that make use of Biological Agents differ in a number of ways from those involving chemicals. The distinction between terrorist and military use of Biological Weapon is increasingly problematic. The stealthy qualities of biological weapons further complicate the distinction between terrorism and war. In reality, all biological attacks are likely to require an integrated response involving both military and civilian communities. The basic considerations when public health agencies establish national defence plan against bioterrorism must be 1) arraying various laws and regulations to meet the realistic needs, 2)education for public health personnels and support of concerned academic society, 3)information collection and cooperative project with other countries, 4)Detection and surveillance(Early detection is essential for ensuring a prompt response to biological or chemical attack, including the provision of prophylactic medicines, chemical antidotes, or vaccines) and 5) Response(A comprehensive public health response to a biological or chemical terrorist event involves epidemiologic investigation, medical treatment and prophylaxis for affacted persons, and the initiation of disease prevention or environmental decontamination measures). The purpose of this paper is providing basic material of preparedness and response for biological terrorism in modern society.

  • PDF