• Title/Summary/Keyword: 공개출처정보

Search Result 16, Processing Time 0.021 seconds

A Study on Building a Cyber Attack Database using Open Source Intelligence (OSINT) (공개출처정보를 활용한 사이버공격 데이터베이스 구축방안 연구)

  • Shin, Kyuyong;Yoo, Jincheol;Han, Changhee;Kim, Kyoung Min;Kang, Sungrok;Moon, Minam;Lee, Jongkwan
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.113-121
    • /
    • 2019
  • With the development of the Internet and Information Communication Technology, there has been an increase in the amount of Open Source Intelligence(OSINT). OSINT can be highly effective, if well refined and utilized. Recently, it has been assumed that almost 95% of all information comes from public sources and the utilization of open sources has sharply increased. The ISVG and START programs, for example, collect information about open sources related to terrorism or crime, effectively used to detect terrorists and prevent crime. The open source information related to the cyber attacks is, however, quite different from that in terrorism (or crime) in that it is difficult to clearly identify the attacker, the purpose of attack, and the range of damage. In addition, the data itself of cyber attacks is relatively unstructured. So, a totally new approach is required to establish and utilize an OSINT database for cyber attacks, which is proposed in this paper.

Cyber Threats Prediction model based on Artificial Neural Networks using Quantification of Open Source Intelligence (OSINT) (공개출처정보의 정량화를 이용한 인공신경망 기반 사이버위협 예측 모델)

  • Lee, Jongkwan;Moon, Minam;Shin, Kyuyong;Kang, Sungrok
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.115-123
    • /
    • 2020
  • Cyber Attack have evolved more and more in recent years. One of the best countermeasure to counter this advanced and sophisticated cyber threat is to predict cyber attacks in advance. It requires a lot of information and effort to predict cyber threats. If we use Open Source Intelligence(OSINT), the core of recent information acquisition, we can predict cyber threats more accurately. In order to predict cyber threats using OSINT, it is necessary to establish a Database(DB) for cyber attacks from OSINT and to select factors that can evaluate cyber threats from the established DB. We are based on previous researches that built a cyber attack DB using data mining and analyzed the importance of core factors among accumulated DG factors by AHP technique. In this research, we present a method for quantifying cyber threats and propose a cyber threats prediction model based on artificial neural networks.

Intelligence in the Internet Era: Understanding OSINT and Case Analysis (인터넷 시대의 정보활동: OSINT의 이해와 적용사례분석)

  • Lee, Wan-Hee;Yun, Min-Woo;Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.34
    • /
    • pp.259-278
    • /
    • 2013
  • With advances of information technology (IT) and the Internet, it became much easier to search and collect information through many different types of web search engine. Such information only restricted to the intelligence services became available to the public, and the increased open source changed the intelligence collection activities of governments. Open Source Intelligence (OSINT) was introduced to organize and analyze the large volumes of information. OSINT is actively used after the 9/11 terrorist attack, and the United States government invest a huge amount of budget to conduct research and develope technology about OSINT. Although many Western countries recognize the importance of OSINT and deal with open source as priority, South Korea has not fully understand the important role of OSINT. Therefore, this study introduces the fundamental principles of OSINT and provides practical examples of OSINT usage. OSINT is an effective source to prevent terrorist attacks as well as a variety of crimes. Extensive discussion and suggestions for future usages are provided.

  • PDF

A Study on Priority Analysis of Evaluation Factors for Cyber Threats using Open Source Intelligence (OSINT) (공개출처정보를 활용한 사이버위협 평가요소의 중요도 분석 연구)

  • Kang, Sungrok;Moon, Minam;Shin, Kyuyong;Lee, Jongkwan
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.49-57
    • /
    • 2020
  • It is no exaggeration to say that we live with cyber threats every day. Nevertheless, it is difficult for us to obtain objective information about cyber threats and attacks because it is difficult to clearly identify the attacker, the purpose of attack, and the range of damage, and rely on information from a single source. In the preceding research of this study, we proposed the new approach for establishing Database (DB) for cyber attacks using Open Source Intelligence(OSINT). In this research, we present the evaluation factors for cyber threats among cyber attack DB and analyze the priority of those factors in oder to quantify cyber threats. We select the purpose of attack, attack category, target, ease of attack, attack persistence, frequency of OSINT DB, and factors of the lower layer for each factor as the evaluation factors for cyber threats. After selection, the priority of each factor is analyzed using the Analytic Hierarchy Process(AHP).

A System for National Intelligence Activity Based on All Kinds of OSINT(Open Source INTelligence) on the Internet (인터넷의 다원적 공개출처정보(OSINT)에 기반을 둔 국가정보활동 체계)

  • 조병철
    • Convergence Security Journal
    • /
    • v.3 no.2
    • /
    • pp.41-55
    • /
    • 2003
  • Today the traditional national intelligence activities which are mainly based on classified informations are confronted with several problems. These are excessive collection cost, morality of intelligence activity, objectivity of intelligence, intelligence dead zone and timeliness of intelligence etc. On the other hand, circumstances of national intelligence activity are rapidly changed. Those are rapid growth of internet, transformation of classified information into open one and rapid growth of intelligence capabilities of private sector. To cope these problems and circumstances, we reevaluated OSINT(Open Source INTelligence) which is collected from all kinds of open source informations on the internet. First, we classified OSINT into four categories corresponding to the traditional classified collection methods i.e., IMINT, SIGINT, HUMINT and MASINT. And we evaluate the value of OSINT in comparison with classified collection methods. Finally a system for national intelligence activity based on all kinds of open source intelligence on the internet is proposed, described and compared with the system of traditional national intelligence activity.

  • PDF

Design of Web based Simulation Provenance Data Sharing Service (웹 기반 시뮬레이션 이력출처 데이터 공유 서비스 설계)

  • Jung, Youngjin;Nam, Dukyun;Yu, Jinseung;Lee, JongSuk Ruth;Cho, Kumwon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.5
    • /
    • pp.1128-1134
    • /
    • 2014
  • Web based simulation service is actively utilized to computably analyze various kinds of phenomena in real world according to progress of computing technology and spread of Network. However it is hard to share data and information among users on the services, because most of web based simulation services do not share and open simulation processing information and results. In this paper, we design a simulation provenance data sharing service on EDISON_CFD (EDucation-research Integration Simulation On the Net for Computational Fluid Dynamics) to share the calculated simulation performance information. To store and share the simulation processing information, we define the simulation processing step as "Problem ${\rightarrow}$ Plan, Design ${\rightarrow}$ Mesh ${\rightarrow}$ Simulation performance ${\rightarrow}$ Result ${\rightarrow}$ Report." Users can understand a problem solving method through a computer simulation by searching the simulation performance information with Search/Share API of the store. Besides, this opened simulation information can reduce the waste of calculation resource to process same simulation jobs.

Certificate-based SSO Protocol Complying with Web Standard (웹 표준을 준수하는 인증서기반 통합 인증 프로토콜)

  • Yun, Jong Pil;Kim, Jonghyun;Lee, Kwangsu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1466-1477
    • /
    • 2016
  • Public key infrastructure(PKI), principle technology of the certificate, is a security technology providing functions such as identification, non-repudiation, and anti-forgery of electronic documents on the Internet. Our government and financial organizations use PKI authentication using ActiveX to prevent security accident on the Internet service. However, like ActiveX, plug-in technology is vulnerable to security and inconvenience since it is only serviceable to certain browser. Therefore, the research on HTML5 authentication system has been conducted actively. Recently, domestic bank introduced PKI authentication complying with web standard for the first time. However, it still has inconvenience to register a certification on each website because of same origin policy of web storage. This paper proposes the certificate based SSO protocol that complying with web standard to provide user authentication using certificate on several sites by going around same origin policy and its security proof.

Design and Verification of Applied Information Processing Protocol in the Message Security System (정보처리를 응용한 메시지 보안 시스템의 설계 및 검증)

  • Shin, Seung-Jung;Kim, Suk-Woo;Ryu, Dae-Hyun;Kwon, Chang-Heui;Kim, Young-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05b
    • /
    • pp.879-882
    • /
    • 2003
  • 인터넷환경에서 전자상거래는 여러 가지 상황관계를 상호간에 메시지를 통해서 이루어진다. 그러므로 이에 대한 가장 중요한 요소는 메시지 인증이며, 이는 거래당사자들이 수신된 메시지의 신뢰성을 확인하는 과정이다. 메시지의 진정성은 위조불가, 부인분가, 변경불가, 출처인증으로 구성되어 있고, 공개키 암호화를 통해 수행 할 수 있다. X.400 메시지처리 시스템과 공개키 암호화에 기반을 두고 있는 PGP가 메시지 교환에 널리 사용되고 있다. 본 연구에서는 공개키 암호화와 X.400 프로토콜 그리고 PGP상에 존재하는 메시지 인증 문제를 해결하기 위하여 NMAP로 명명된 공개정보 기반 암호화 시스템을 제안하고 이를 설계 구현하였다. 구현된 메시지 인증 프로토콜의 검증을 위해 퍼지적분을 사용하였다. 제안된 시스템은 전자상거래의 활성화와 비대화형 인증 서비스 제공에 사용될 수 있을 것이다.

  • PDF

Design and Verification of Applied Public Information Based Authentication Protocol in the Message Security System (공개정보를 이용한 메시지 보안 시스템의 인증 프로토콜 설계 및 검증)

  • 김영수;신승중;최흥식
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.8 no.1
    • /
    • pp.43-54
    • /
    • 2003
  • E-Commerce, characterized by the exchange of message, occurs between individuals, organizations, or both. A critical promotion factor of e-Commerce is message authentication, the procedure that allows communicating parties to verify the received messages are authentic. It consists of message unforgery, message non-repudiation, message unalteration, and origin authentication. It is possible to perform message authentication by the use of public key encryption. PGP(Pretty Good Privacy) based on X.400 MHS(Message Handling System) and PKC(Public Key Cryptosystem) makes extensive use of message exchange. In this paper we propose, design and implement NMAP(New Message Authentication Protocol), an applied public information based encryption system to solve the message authentication problem inherent in public key encryption such as X.400 protocol and PGP protocol and were to cope with the verification of NMAP using fuzzy integral. This system is expected to be use in the promotion of the e-Commerce and can perform a non-interactive authentication service.

  • PDF

A Study on Restitution Activities of Germany's Libraries to Overcome the Past: Jewish Book Collection (과거사 극복을 위한 독일도서관의 도서반환 활동에 관한 연구 - 유대인 장서를 중심으로 -)

  • Ro, Moon-Ja
    • Journal of Korean Library and Information Science Society
    • /
    • v.41 no.2
    • /
    • pp.273-295
    • /
    • 2010
  • Germany has started restitution process for most of collections from its occupied countries after World War II which was strongly led by the United Nations. However, this process did not include many of the plundered Jewish collections. In 1989, restitution for the Jewish's properties confiscated by the Nazis became important international issue with success in Jewish material claims against Germany in the U.S and Europe countries after German unification. German libraries has still possessed collections sequestered by the Nazis from 1933 to 1945. With Washington conference on holocaust-era assets in 1998, libraries began to sympathize with restoration of their Jewish confiscated collections. In present, by identifying the provenance of those collections at primary level, German librarians focus on various restitution activities for those collections in order to introspect and overcome their past. Specifically, the libraries publish the practical guidebook of studies on the provenance identification and open the database for the pillaged collections to the public. Few libraries start to restore the collections, but the numbers of the restituted collections are still insignificant.

  • PDF