• Title/Summary/Keyword: 방어목표

Search Result 120, Processing Time 0.026 seconds

정보 융합체계 현황 분석 (2)

  • Jo, Dong-Rae;Choe, Jeung-Won;Ju, Jae-U
    • Defense and Technology
    • /
    • no.1 s.275
    • /
    • pp.58-67
    • /
    • 2002
  • 미래 전쟁에 대비하기 위하여, 미국은 합동참모본부의 Joint Vision 2020에서 정보에서의 우월성을 기초로 압도적인 기동, 정확한 공격, 집중된 군수지원, 전면적인 방어를 이룩하여 전체적인 우위전력 확보를 도모하며, 정보에서의 우월성 확 보 를 위 해 $C^4ISR$(Command, Control, Communication and Computer, Intelligence, Surveillance, Reconnaissance) 개념에 의한 통합체계의 구축을 목표로 제시하고 있다.

  • PDF

A Proposal Countermeasure to DDoS attacks targered DNS (DNS을 목표한 DDoS공격에 효과적인 대응 방법 제안)

  • Choi, Ji-Woo;Chun, Myung-Jin;Hong, Do-Won;Seo, Chang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.729-735
    • /
    • 2013
  • The recent issue of distributed denial of service attack paralyze major government and financial institution in internet sites. They threatened to the cyber security. There hasn't been easy defense of now using attack. There seems to be increases in damage. In this paper, The recent continue to evolve of distributed denial of service attack. DNS target of distributed denial of service attack give specific examples. but, DNS target of DDoS attacks about defense is insufficient. The DNS Cyber-shelter system was created based on the Cyber-shelter system for DDoS attack in Kisa.. We proposal DNS Cyber-shelter system.

A two-layer watermarking method using inherent image structure (영상의 내재 구조를 이용한 2-계층 워터마킹 기법)

  • 고윤호;김성대;최재각
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.41 no.3
    • /
    • pp.59-72
    • /
    • 2004
  • In this paper, we classify various attacks that may damage the embedded watermark signal into waveform attack and synchronization attack. And for the specialized defense against the two kinds of attacks we propose a new watermarking scheme named as two layer watermarking method. It consists of a synchronization layer to prepare for the geometrical attack such as rotation and shift and a marking layer 0 embed the watermark signal actually. Namely, the synchronization layer only determines the target region where the watermark signal will be embedded or extracted. And the marking layer spreads the watermark signal over the image as the conventional watermarking methods do. Using the layered structure, the proposed method overcomes the problem that the conventional watermarking methods that do not use the original image at the verification side are most vulnerable to geometrical attacks.

A New Approach to DDOS Attack Defense Using the Survivability Concept of Router (라우터의 생존성 개념을 이용한 DDOS 공격 방어의 새로운 접근)

  • 송지영;박상준;김관중;김병기
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.8C
    • /
    • pp.741-747
    • /
    • 2002
  • In this paper, we present a new form of DDOS attack and a mechanism to defend systems from it. Up to now the ultimate target of a DDOS attack is a specific host. But in the near future router attacks are expected to appear. Because these kinds of attacks may involve many hosts in the managed domain of a specific router, they will be still more serious than the current DDOS attacks. Also, we present an algorithm to defend against an attack on a router using survivability of the router. By using a survivability of a router, the router can control a quantity of traffic autonomously without an interruption of services even when a DDOS attack occurs.

A Study on Intercept Probability and Cost based Multi-layer Defense Interceptor Operating Method using Mathematical Model (수리모형을 이용한 요격확률 및 비용 기반의 다층 방어 요격미사일 운용방법 연구)

  • Seo, Minsu;Ma, Jungmok
    • Journal of the Korea Society for Simulation
    • /
    • v.29 no.2
    • /
    • pp.49-61
    • /
    • 2020
  • It is important to operate a limited number of interceptors effectively to counter ballistic missile threats. The existing interceptor operating method determines the number of interceptors according to the level of TBM (Theater Ballistic Missile) engagement effectiveness applied to a defended asset. It can cause either excessive interceptor waste compared to the intercept probability or the intercept probability decrease. Thus, interceptor operating method must be decided considering the number of ballistic missiles, intercept probability and cost. This study proposes a mathematical model to improve the existing interceptor operating method. In addition, the efficiency indicator is proposed for trade-off between intercept probability and cost. As a result of the simulations, the mathematical model-based interceptor operating method can achieve better results than the existing interceptor operating method.

Study On Integrating Internet and Intranet based on IPSec and IMA Technology (IPSec과 IMA를 이용한 인터넷과 내부 망 통합에 관한 연구)

  • Cho, Yong-Gun
    • Convergence Security Journal
    • /
    • v.8 no.2
    • /
    • pp.71-78
    • /
    • 2008
  • This research is on the study of integrating internet and intranet that was built for their own enterprise into one network system that promises a more economic and secure use. Compared to this system, the traditional network conversion device not only has its mechanical limits, but also requires a separate network set up. This raises both interoperability and security problems and results in a higher cost. Therefore, I propose dual defence system based on the inverse multiplexing of ATM Forum and IPSec to improve network ability and deliver enhanced system reliability while reducing cost. Furthermore, I also addressed some of the weaknesses of the Scanning Attacking Method, SNMP and Spooler Port and proposed counter measures that will deal with these weakness at the dual defence system.

  • PDF

Research on Cyber Kill Chain Models for Offensive Cyber Operations (공세적 사이버 작전을 위한 사이버 킬체인 모델 연구)

  • Seong Bae Jo;Wan Ju Kim;Jae Sung Lim
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.71-80
    • /
    • 2023
  • Cyberspace has emerged as the fifth domain of warfare, alongside land, sea, air, and space. It has become a crucial focus for offensive and defensive military operations. Governments worldwide have demonstrated their intent to engage in offensive cyber operations within this domain. This paper proposes an innovative offensive cyber kill chain model that integrates the existing defensive strategy, the cyber kill chain model, with the joint air tasking order (ATO) mission execution cycle and joint target processing procedure. By combining physical and cyber operations within a joint framework, this model aims to enhance national cyber operations capabilities at a strategic level. The integration of these elements seeks to address the evolving challenges in cyberspace and contribute to more effective jointness in conducting cyber operations.

Exploring Science High School Students' Epistemic Goals, Epistemic Considerations and Complexity of Reasoning in Open Inquiry (자유탐구 활동에서 나타난 과학고등학교 학생들의 인식적 목표, 인식적 이해와 추론의 복잡성 탐색)

  • Yun, Hyeonjeong;Kim, Heui-Baik
    • Journal of The Korean Association For Science Education
    • /
    • v.38 no.4
    • /
    • pp.541-553
    • /
    • 2018
  • The purpose of this study is to explore the relationship between epistemic goals, epistemic considerations and complexity of reasoning of science high school students in an open inquiry and to explore the context on how open inquiry compares with the characteristics of an authentic scientific inquiry. Two teams were selected as focus groups and a case study was conducted. The findings are as follows: First, the contexts, such as 'sharing the value for the phenomenon understanding, reflection on the value of the research, task characteristics that require collaboration and consensus, and sufficient communication opportunities,' promote epistemic goals and considerations. On the other hand, contexts such as 'lack of opportunity for critical review of related literature and environmental constraints' lowered epistemic sides. Second, epistemic goals and considerations influenced the reasoning complexity. The goal of 'scientific sense making' led to reasoning that pose testable hypotheses based on students' own questions. The high justification considerations led to purposely focusing attention to the control designs and developing creative experimental know-how. The high audience considerations led to defending their findings through argumentation and suggesting future research. On the other hand, the goal of 'doing the lesson' and the low justification considerations led to reasoning that did not interpret the meaning of the data and did not control the limit of experiment. The low audience considerations led to reasoning that did not actively defend their findings and not suggest future research. The results of this study suggest that guidance should provide communication and critical review opportunities.

Sensory Integration therapy Evaluation and Intervention in Clients With Goldenhar Syndrome : A Case Report (골덴하르 증후군(Goldenhar syndrome)아동에 대한 감각통합치료 평가와 중재: 사례연구)

  • Jung, Hee-Seung
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.11
    • /
    • pp.286-295
    • /
    • 2011
  • This case study was to examine the effect of the sensory integration therapy on the Goldenhar syndrome child with tactile defensiveness, developmental delay and occupational performance difficulties. The child was 7.10 year old boy. For intervention, four evaluations were used and the results are as follows. First, in Canadian Occupational Performance Measure showed occupational performance goal as reading and writing in upright position. Second, in Short sensory profile and sensory history, significant differences between sensory sensitivity and tactile processing. Third, in Developmental Profile-3 showed delay. Fourth, in Bruininks-Oseretsky Test of Motor Proficiency-2 showed below average. After intervention, the results of which showed a positive changes. Therefore, this case study is found that the sensory integration therapy is effective in the Goldenhar syndrome child with tactile defensiveness and developmental delay.

Secure Routing Mechanism to Defend Multiple Attacks in Sensor Networks (무선 센서 네트워크에서 다중 공격 방어를 위한 보안 라우팅 기법)

  • Moon, Soo-Young;Cho, Tae-Ho
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.1
    • /
    • pp.45-56
    • /
    • 2010
  • Sensor Networks are composed of many sensor nodes, which are capable of sensing, computing, and communicating with each other, and one or more sink node(s). Sensor networks collect information of various objects' identification and surrounding environment. Due to the limited resources of sensor nodes, use of wireless channel, and the lack of infrastructure, sensor networks are vulnerable to security threats. Most research of sensor networks have focused on how to detect and counter one type of attack. However, in real sensor networks, it is impractical to predict the attack to occur. Additionally, it is possible for multiple attacks to occur in sensor networks. In this paper, we propose the Secure Routing Mechanism to Defend Multiple Attacks in Sensor Networks. The proposed mechanism improves and combines existing security mechanisms, and achieves higher detection rates for single and multiple attacks.