• Title/Summary/Keyword: 방어시스템

Search Result 694, Processing Time 0.034 seconds

A Study on Segmentation and Priority of Tactical Considerations (METT+TC) (전술적 고려요소 (METT+TC)의 세분화 및 우선순위 결정에 관한 연구)

  • Han, Seung-Jo;Park, Joon-Hyoung
    • Journal of Digital Convergence
    • /
    • v.14 no.10
    • /
    • pp.173-181
    • /
    • 2016
  • The objective of this study is to subdivide the tactical considerations (METT+TC; Mission, Enemy, Terrain & Weather, Troops available, Time available, Civil considerations) through Delphi method and prioritize those via AHP (Analytic Hierarchy Process). Though it has been taken for granted that the tactical considerations were inevitable for decision making relating to military operations, their segmentation and priority have not been studied sufficiently in military. The data for Delphi method and AHP were based on interview with military experts and questionnaires answered by those. Six tactical considerations were segmented into 34 sub-considerations by Delphi, and Six tactical considerations and 34 sub-ones were prioritized through AHP in attack and defense aspects. If the research results will be embedded into database of automatic command and control system (e.g. ACTIS; Army Tactical Command Information System), effective decision-making process will get easier and faster.

A research on detection techniques of Proxy DLL malware disguised as a Windows library : Focus on the case of Winnti (윈도우즈 라이브러리로 위장한 Proxy DLL 악성코드 탐지기법에 대한 연구 : Winnti 사례를 중심으로)

  • Koo, JunSeok;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1385-1397
    • /
    • 2015
  • The Proxy DLL is a mechanism using a normal characteristics of Windows. Specific malware is executed via this mechanism after intrusion into a system which is targeted. If a intrusion of malware is successful, malware should be executed at least once. For execution, malware is disguised as a Windows Library. The malware of Winnti group is a good case for this. Winnti is a group of Chinese hacking groups identified by research in the fall of 2011 at Kaspersky Lab. Winnti group activities was negatively over the years to target the online video game industry, in this process by making a number of malware infected the online gaming company. In this paper, we perform research on detection techniques of Proxy DLL malware which is disguised as a Windows library through Winnti group case. The experiments that are undertaken to target real malware of Winnti show reliability of detection techniques.

Network based Anomaly Intrusion Detection using Bayesian Network Techniques (네트워크 서비스별 이상 탐지를 위한 베이지안 네트워크 기법의 정상 행위 프로파일링)

  • Cha ByungRae;Park KyoungWoo;Seo JaeHyun
    • Journal of Internet Computing and Services
    • /
    • v.6 no.1
    • /
    • pp.27-38
    • /
    • 2005
  • Recently, the rapidly development of computing environments and the spread of Internet make possible to obtain and use of information easily. Immediately, by opposition function the Hacker's unlawful intrusion and threats rise for network environments as time goes on. Specially, the internet consists of Unix and TCP/IP had many vulnerability. the security techniques of authentication and access controls cannot adequate to solve security problem, thus IDS developed with 2nd defence line. In this paper, intrusion detection method using Bayesian Networks estimated probability values of behavior contexts based on Bayes theory. The contexts of behaviors or events represents Bayesian Networks of graphic types. We profiled concisely normal behaviors using behavior context. And this method be able to detect new intrusions or modificated intrusions. We had simulation using DARPA 2000 Intrusion Data.

  • PDF

A Study of Intrusion Detection Scheme based on Software-Defined Networking in Wireless Sensor Networks (무선 센서 네트워크에서 소프트웨어 정의 네트워킹 기법을 사용한 침입 탐지 기법에 대한 연구)

  • Kang, Yong-Hyeog;Kim, Moon Jeong;Han, Moonseog
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.8
    • /
    • pp.51-57
    • /
    • 2017
  • A wireless sensor network is composed of many resource constrained sensor nodes. These networks are attacked by malicious attacks like DDoS and routing attacks. In this paper, we propose the intrusion detection and prevention system using convergence of software-defined networking and security technology in wireless sensor networks. Our proposed scheme detects various intrusions in a central server by accumulating log messages of OpenFlow switch through SDN controller and prevents the intrusions by configuring OpenFlow switch. In order to validate our proposed scheme, we show it can detect and prevent some malicious attacks in wireless sensor networks.

DDoS Attack Response Framework using Mobile Code (DDoS 공격 대응 프레임워크 설계 및 구현)

  • Lee, Young-seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.3 no.3
    • /
    • pp.31-38
    • /
    • 2010
  • It has become more difficult to correspond an cyber attack quickly as patterns of attack become various and complex. However, current security mechanisms just have passive defense functionalities. In this paper, we propose new network security architecture to respond various cyber attacks rapidly and to chase and isolate the attackers through cooperation between security zones. The proposed architecture makes it possible to deal effectively with cyber attacks such as IP spoofing or DDoS(Distributed Denial of Service), by using active packet technology including a mobile code on active network. Also, it is designed to have more active correspondent than that of existing mechanisms. We implemented these mechanisms in Linux routers and experimented on a testbed to verify realization possibility of attacker response framework using mobile code. The experimentation results are analyzed.

  • PDF

Flexible Decision-Making for Autonomous Agent Through Computation of Urgency in Time-Critical Domains (실시간 환경에서 긴급한 정도의 계산을 통한 자율적인 에이전트의 유연한 의사결정)

  • Noh Sanguk
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.9
    • /
    • pp.1196-1203
    • /
    • 2004
  • Autonomous agents need considerable computational resources to perform rational decision-making. The complexity of decision-making becomes prohibitive when large number of agents are present and when decisions have to be made under time pressure. One of approaches in time-critical domains is to respond to an observed condition with a predefined action. Although such a system may be able to react very quickly to environmental conditions, predefined plans are of less value if a situation changes and re-planning is needed. In this paper we investigate strategies intended to tame the computational burden by using off-line computation in conjunction with on-line reasoning. We use performance profiles computed off-line and the notion of urgency (i.e., the value of time) computed on-line to choose the amount of information to be included during on-line deliberation. This method can adjust to various levels of real-time demands, but incurs some overhead associated with iterative deepening. We test our framework with experiments in a simulated anti-air defense domain. The experiments show that the off-line performance profiles and the on-line computation of urgency are effective in time-critical situations.

Aircraft Path Planning Considering Pop-up Threats Using Framed-Quadtree Wavefront Propagation and Navigation Function (Framed-Quadtree 파면전파 기법과 항법함수 기법을 이용한 항공기 위협회피 궤적 설계)

  • Kim, Pil-Jun;Choi, Jong-Uk;Kim, You-Dan
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.35 no.10
    • /
    • pp.918-926
    • /
    • 2007
  • Military aircrafts usually operate at the area with lots of threats such as radars and surface-to-air missiles. Aircraft also faces with the unexpected or pop-up threats. Under this environment, a safe flight path should be generated to lead a mission successful. In this paper, a new path planning algorithm is proposed to provide less dangerous flight path efficiently. Of many path planning algorithms, a potential method is considered, because it has advantages of computation efficiency and smooth path generation. Trajectory generation under the condition of maximum range is studied so that the aircraft may reach the target area without refueling. The algorithm to cope with an unexpected situation is also proposed by adopting the concept of initial direction vector, additional force, and a new mapping function. The performance of the proposed algorithms is demonstrated for SEAD (Suppression of Enemy Air Defences) mission by numerical simulation.

Cryptanalysis using Fault Injection and Countermeasures on DSA (오류주입을 이용한 DSA 서명 알고리즘 공격 및 대응책)

  • Jung, Chul-Jo;Oh, Doo-Hwan;Choi, Doo-Sik;Kim, Hwan-Koo;Ha, Jae-Cheol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.8
    • /
    • pp.3045-3052
    • /
    • 2010
  • The international standard signature algorithm DSA has been guaranteed its security based on discrete logarithm problem. Recently, the DSA was known to be vulnerable to some fault analysis attacks in which the secret key stored inside of the device can be extracted by occurring some faults when the device performs signature algorithm. After analyzing an existing fault attack presented by Bao et al., this paper proposed a new fault analysis attack by disturbing the random number. Furthermore, we presented a countermeasure to compute DSA signature that has its immunity in the two types of fault attacks. The security and efficiency of the proposed countermeasure were verified by computer simulations.

Identification of Expanding the Usability of the Water Resources in Hwacheon Dam System Due to the Flood Surcharging Effects of Peace Dam (평화의 댐 흥수지체 효과에 따른 화천댐 계통 이수 능력의 증대에 대한 검정)

  • Yu, Ju-Hwan;Park, Chang-Geun;Jo, Hyo-Seop
    • Journal of Korea Water Resources Association
    • /
    • v.34 no.6
    • /
    • pp.617-625
    • /
    • 2001
  • Peace dam constructed against the water attack had stopped in the first step, linked with Hwacheon dam through bypass tunnels and had an effect of flood surcharging in its pocket on Hwacheon dam downstream. To study the utility of Peace dam, the flood control effects of Peace dam and the restricted water level (RWL) in Hwacheon dam were reviewed and identified with operating Hwacheon dam system. Analysing the results the ideas of expanding the usability of the water resources in Hwacheon dam system were suggested. To do that, the criteria and the model of reservoir operation were established frist and the optimization of the operation have done. Based on the results the performance of the optimization was evaluated as an reference coefficient with relative value of the registered data to the optimized. And examining several alternatives for the RWL in Hwacheon reservoir operation made more feasible RWL suggested. And its economic benefit was also reckoned.

  • PDF

A Study on Security Hole Attack According to the Establishment of Policies to Limit Particular IP Area (특정 IP 영역 제한정책 설정에 따른 보안 취약점 공격에 관한 연구)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.6
    • /
    • pp.625-630
    • /
    • 2010
  • With regard to the examples of establishing various sorts of information security, it can be seen that there are gradual, developmental procedures including Firewall and VPN (Virtual Private Network), IDS (Intrusion Detection System), or ESM(Enterprise Security Management). Each of the security solutions and equipments analyzes both defense and attack for information security with the criteria of classifying the problems of security policies by TCP/IP layers or resulted from attack patterns, attack types, or invasion through specialized security technology. The direction of this study is to examine latency time vulnerable to invasion which occurs when L2-stratum or lower grade equipments or policies are applied to the existing network through TCP/IP layer's L3-stratum or higher grade security policies or equipments and analyze security holes which may generate due to the IP preoccupation in the process of establishing policies to limit particular IP area regarding the policies for security equipments to figure out technological problems lying in it.