• Title/Summary/Keyword: 공격탐지 기술

Search Result 526, Processing Time 0.025 seconds

Production and Characterization of a Recombinant Antibody Neutralizing Botulinum Neurotoxin A (보툴리눔 신경독소 A를 중화하는 재조합 항체의 제조와 특성 분석)

  • Park, Hong-Gyu;Choi, Mieyoung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.1
    • /
    • pp.295-301
    • /
    • 2017
  • Botulinum neurotoxin (BoNT/A) is a neurotoxin that selectively attacks the peripheral cholinergic nerve endings. It is produced by Gram -positive, endospore-forming strict anaerobic bacteria, Clostridium botulinum. Since BoNT/A could be a biothreat agent, as well as a contaminator of food and water supplies, the development of sensitive assays for toxin detection and potent antitoxin for the treatment of intoxication is necessary. In this study, for the purpose of producing monoclonal antibodies (mAbs) that are capable of neutralizing Botulinum neurotoxin type A (BoNT/A), scFv (single-chain variable domain fragment) libraries from the rabbit antisera against BoNT/A was fused to a human IgG. The resulting recombinant scFvIgG antibody protein was expressed in stable cell lines and was purified using a protein A affinity chromatography. The efficacy of scFvIgG mAb was confirmed by ELISA and was evaluated for the neutralization of BoNT/A in vivo. Such an in vivo toxin neutralization assay was performed using mice. Although scFvIgG antibody proteins (10 ug) failed to fully protect the mice challenged with BoNT/A (100,000 $LD_{50}$), it significantly prolonged the survival time. These results suggest that scFvIgG mAb may be capable of neutralizing BoNT/A single-chain variable domain fragment.

An Adaptive Authentication Protocol for Ambient Assisted Living Systems (전천 후 생활보조 시스템을 위한 적응형 인증 프로토콜)

  • Yi, Myung-Kyu;Choi, Hyunchul;Whangbo, Taeg-Keun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.4
    • /
    • pp.19-26
    • /
    • 2018
  • In recent years, the substantial increase in the population's average age leads to an exceeded number of older persons comparing with the number of any other age group. As a result, both industry and academia are focused on the development of several solutions aimed to guarantee a healthy and safe lifestyle to the elderly. Ambient Assisted Living (AAL) approach is the way to guarantee better life conditions for the aged and for monitoring their health conditions by the development of innovative technologies and services. AAL technologies can also provide more safety for the elderly, offering emergency response mechanisms, fall detection solutions, and video surveillance systems. Unfortunately, due to the sensitive nature of AAL data, AAL systems should satisfy security requirements such as integrity, confidentiality, availability, anonymity, and others. In this paper, we propose an adaptive authentication protocol for the AAL systems. The proposed authentication protocol not only supports several important security requirements needed by the AAL systems, but can also withstand various types of attacks. In addition, the security analysis results show that the proposed authentication protocol is more efficient and secure than the existing authentication protocols.

A study on vulnerability analysis and incident response methodology based on the penetration test of the power plant's main control systems (발전소 주제어시스템 모의해킹을 통한 취약점 분석 및 침해사고 대응기법 연구)

  • Ko, Ho-Jun;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.295-310
    • /
    • 2014
  • DCS (Distributed Control System), the main control system of power plants, is an automated system for enhancing operational efficiency by monitoring, tuning and real-time operation. DCS is becoming more intelligent and open systems as Information technology are evolving. In addition, there are a large amount of investment to enable proactive facility management, maintenance and risk management through the predictive diagnostics. However, new upcoming weaponized malware, such as Stuxnet designed for disrupting industrial control system(ICS), become new threat to the main control system of the power plant. Even though these systems are not connected with any other outside network. The main control systems used in the power plant usually have been used for more than 10 years. Also, this system requires the extremely high availability (rapid recovery and low failure frequency). Therefore, installing updates including security patches is not easy. Even more, in some cases, installing security updates can break the warranty by the vendor's policy. If DCS is exposed a potential vulnerability, serious concerns are to be expected. In this paper, we conduct the penetration test by using NESSUS, a general-purpose vulnerability scanner under the simulated environment configured with the Ovation version 1.5. From this result, we suggest a log analysis method to detect the security infringement and react the incident effectively.

A Study on Cyber Security Management Awareness of Vessel Traffic Service Personnel Using IPA (IPA분석을 활용한 해상교통관제 인원의 사이버 보안 관리 인식 연구)

  • Sangwon Park;Min-Ji Jeong;Yunja Yoo;Kyoung-Kuk Yoon
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.7
    • /
    • pp.1140-1147
    • /
    • 2022
  • With the development of digital technology, the marine environment is expected to change rapidly. In the case of autonomous vessels, technology is being developed in many countries, and the international community has begun to discuss ways to operate it. Changes in ships cause changes in the marine traffic environment and urge changes to aids to navigation. This study aims to analyze the cyber security management awareness of VTS personnel to improve the cyber security system for aids to navigation. To this end, the current status of cyber security management was reviewed with a focus on VTS, and a survey was conducted on VTS personnel. The survey analysis used the IPA methodology, and as a result of the analysis, a clear difference was observed in the perception of cybersecurity between those with experience in security and those without experience. In addition, technical measures related to cyber-attack detection and blocking should be implemented with the highest priority. The results of this study can be used as basic data for improving the cyber security management system for aids to navigation.

Nuclear Terrorism and Global Initiative to Combat Nuclear Terrorism(GICNT): Threats, Responses and Implications for Korea (핵테러리즘과 세계핵테러방지구상(GICNT): 위협, 대응 및 한국에 대한 함의)

  • Yoon, Tae-Young
    • Korean Security Journal
    • /
    • no.26
    • /
    • pp.29-58
    • /
    • 2011
  • Since 11 September 2001, warnings of risk in the nexus of terrorism and nuclear weapons and materials which poses one of the gravest threats to the international community have continued. The purpose of this study is to analyze the aim, principles, characteristics, activities, impediments to progress and developmental recommendation of the Global Initiative to Combat Nuclear Terrorism(GICNT). In addition, it suggests implications of the GICNT for the ROK policy. International community will need a comprehensive strategy with four key elements to accomplish the GICNT: (1) securing and reducing nuclear stockpiles around the world, (2) countering terrorist nuclear plots, (3) preventing and deterring state transfers of nuclear weapons or materials to terrorists, (4) interdicting nuclear smuggling. Moreover, other steps should be taken to build the needed sense of urgency, including: (1) analysis and assessment through joint threat briefing for real nuclear threat possibility, (2) nuclear terrorism exercises, (3) fast-paced nuclear security reviews, (4) realistic testing of nuclear security performance to defeat insider or outsider threats, (5) preparing shared database of threats and incidents. As for the ROK, main concerns are transfer of North Korea's nuclear weapons, materials and technology to international terror groups and attacks on nuclear facilities and uses of nuclear devices. As the 5th nuclear country, the ROK has strengthened systems of physical protection and nuclear counterterrorism based on the international conventions. In order to comprehensive and effective prevention of nuclear terrorism, the ROK has to strengthen nuclear detection instruments and mobile radiation monitoring system in airports, ports, road networks, and national critical infrastructures. Furthermore, it has to draw up effective crisis management manual and prepare nuclear counterterrorism exercises and operational postures. The fundamental key to the prevention, detection and response to nuclear terrorism which leads to catastrophic impacts is to establish not only domestic law, institution and systems, but also strengthen international cooperation.

  • PDF

International Law on Drone's Military use - Focuse on Proportionality and Discrimination Principles - (드론의 군사적 활용에 따른 국제법적 쟁점 - 차별의 원칙과 비례성 원칙을 중심으로-)

  • Cho, Hong-Je;Kang, Ho-Jeung
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.35 no.1
    • /
    • pp.127-152
    • /
    • 2020
  • Despite growing international cooperation for maintenance of international peace and security, wars continue to occur due to conflicted state interests. Continuing conflicts has advanced development of various weapon systems such as global integrated intelligence, surveillance and reconnaissance. However, with a big increase in the number of civilian casualties caused by the weapon systems development, the international community has also advanced diplomatic efforts to minimize deaths of civilian and military personnel. Therefore, it is essential to observe the principle of discrimination between combatants and non-combatants when operating unmanned aerial vehicles (UAVs), better known as drones. Drones have become more capable of distinguishing combatants from non-combatants due to its high-tech prowess. In the operation of drones, any parties involved in combat or the war are responsible for mounting civilian casualties. In addition, it should comply with the principle of proportionality that calls for a balance between results of such action and expected military advantage anticipated from the attack. The rule of proportionality prohibits use of military force which may be expected to cause excessive civilian harm. Drones have been able to track and monitor targets for hours and select the accurate locations of the targets. The aim is to reduce civilian losses and damage to a minimum. Drones meet the standards of Article 51.4 of the Additional Protocol.