• Title/Summary/Keyword: 우회모델

Search Result 107, Processing Time 0.025 seconds

애니메이션의 유사도 분석을 통한 온라인 액션게임의 봇 탐지

  • Jang, Changwan;Hwang, Junsik;Yoo, Taekyung
    • Review of KIISC
    • /
    • v.27 no.4
    • /
    • pp.36-42
    • /
    • 2017
  • 온라인 게임 내의 가상재화인 게임 머니 취득을 목적으로 한 게임 봇의 사용이 게임 서비스에 심각한 문제를 야기하고 있다. 때문에 게임 회사에서도 보안 솔루션을 도입하는 등 여러 가지 대응을 시도하고 있으며 그에 대한 사례로 실제 라이브 서비스에서 게임 봇 탐지에 사용하였던 애니메이션 유사도 분석 프레임워크를 제안한다. 사람과 게임 봇 간에는 애니메이션 패턴 차이가 존재하기에 이를 분석하면 게임 봇을 탐지할 수 있다. 제안하는 프레임워크는 도메인 전문가가 설정한 룰셋에 의존하지 않고 애니메이션 패턴 데이터를 기반으로 생성한 모델을 활용하기에 작업장에서 우회하기가 어려우며, 분석 모델 업데이트만으로 대응이 가능하다는 점에서 게임 운영상 장점이 많다. 이러한 장점들로 향후 애니메이션 패턴 유사도 분석 기법이 게임 봇 탐지에 다양하게 활용될 수 있을 것으로 기대된다.

보안 에이전트 기반의 악성프로세스 검출 시스템 모델

  • Choe, Seong-Muk;Jo, Hui-Hun;Kim, Jong-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.706-707
    • /
    • 2015
  • 최근 인터넷 사용이 급증함에 따라 통신망을 통한 악성코드의 감염 경로가 다양해지고 있다. 특히, 봇(Bot)에 의한 공격은 주로 C&C(command-and-control)서버에서 이루어지는데, C&C서버가 IP 형태로 운영되므로 IP를 차단하는 방식을 통해 보안을 유지할 수밖에 없었다. 그러나 공격자들 역시 이러한 서버 차단을 회피하기 위해 우회적인 방법으로 접속을 시도하는 등 차츰 지능화되고 있다. 이러한 악성코드는 사용자의 시스템에 침입하면, 실행이 되는 동안 일반적인 검출방법으로는 검출해 내기가 쉽지 않다. 따라서 본 논문에서는 악성코드 감염에 의한 피해 확산을 방지하기 위해 보안에 이전트 기반의 악성프로세스 검출시스템 모델을 제시하고자 한다.

  • PDF

Cost based Hierarchical Fault Tolerence Model for Security System (보안시스템을 위한 비용 기반 계층적 결함허용모텔)

  • Jung, Yu-Seok;Park, Nul;Hong, Man-Pyo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10c
    • /
    • pp.460-462
    • /
    • 2002
  • 시스템 침입은 정보통신기술의 비약적인 발전에 따른 정보화의 역기능으로, 이론 해결하기 위한 다양한 방법들이 제안되어 왔다. 그러나 최근 침입 패러다임의 변화로 인해 기존 방법으로 해결하지 못하는 공격이 발생했으며, 그중 보안 시스템 우회나 보안 시스템 자체에 대한 공격은 기존 보안 도구를 무력화시킬 수도 있다. 본 논문에서는 이를 해결하기 위한 방법으로 고전적인 결함허용 기법을 응용한 결함허용 기능을 정의하고 이를 이용한 계층적 시스템 모델을 제안한다. 또한, 보안 시스템의 특성에 맞는 결함 허용 기능 선택을 위한 기준으로 비용 기반 선택 모델을 제안한다.

  • PDF

Numerical Simulation of Nearshore Morphological Changes near Groins (突堤 周邊의 海岸地形 變化 豫測模型)

  • 김태림;김창식;박광순;심재설;오병철
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.10 no.4
    • /
    • pp.187-196
    • /
    • 1998
  • Morphological changes around the groin system in the beach are examined using a numerical model. The model consists of two parts : the hydrodynamic model which calculates the transformation of waves and currents, and the sediment transport model which determines sediment transport rates and bottom topographic changes. The numerical model is applied to single-groin and three-groin systems on a typical plane beach. The changes to the beach system due to waves and currents during 150-day simulation near the groins are calculated using sediment transport rate patterns in the domain. The sand by-passing rate patterns around groins are also evaluated.

  • PDF

A study on Stage-Based Flow Graph Model for Expressing Cyber Attack Train Scenarios (사이버 공격 훈련 시나리오 표현을 위한 Stage 기반 플로우 그래프 모델 연구)

  • Kim, Moon-Sun;Lee, Man-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.1021-1030
    • /
    • 2021
  • This paper proposes S-CAFG(Stage-based Cyber Attack Flow Graph), a model for effectively describing training scenarios that simulate modern complex cyber attacks. On top of existing graph and tree models, we add a stage node to model more complex scenarios. In order to evaluate the proposed model, we create a complicated scenario and compare how the previous models and S-CAFG express the scenario. As a result, we confirm that S-CAFG can effectively describe various attack scenarios such as simultaneous attacks, additional attacks, and bypass path selection.

Development of the Simulation Tool for The Modeling and Traffic Control of a AGV System (AGV 시스템의 모델링 및 교통제어를 위한 Simulation Tool 개발)

  • Hong, Hyun-Ju;Ro, Young-Shick;Kang, Hee-Jun;Suh, Young-Soo;Kim, Tai-Hoo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.4
    • /
    • pp.499-505
    • /
    • 2004
  • In this paper, we studied about AGVs modeling and material handling automation simulation using a virtual AGV. The proposed virtual AGV model that operates independently each other is based on a real AGV. Continuous straight-line and workstation model using vector drawing method that could easily, rapidly work system modeling are suggested. Centralized traffic control, which could collision avoidance in intersection and should not stop AGV as possible, and algorithm for detour routing which performs when another AGV is working in pre-routed path are proposed. The traffic control and the algorithm have been proved efficience by simulation.

Design of Security Service Model in Dynamic Cloud Environment (동적 클라우드 환경에 적합한 보안 서비스 모델 설계)

  • Jeong, Yoon-Su
    • Journal of Convergence Society for SMB
    • /
    • v.2 no.2
    • /
    • pp.35-41
    • /
    • 2012
  • The rapid development of cloud computing and mobile internet service changes to an mobile cloud service environment that can serve and pay computing source that users want anywhere and anytime. But when user misses mobile device, the respond to any threat like user's personal information exposal is insufficient. This paper proposes cloud service access control model to provide secure service for mobile cloud users to other level users. The proposed role-based model performs access authority when performs user certification to adapt various access security policy. Also, the proposed model uses user's attribute information and processes before user certification therefore it lowers communication overhead and service delay. As a result, packet certification delay time is increased 3.7% and throughput of certification server is increased 10.5%.

  • PDF

A Gap-acceptance Model Considering Driver's Propensity at Uncontrolled Intersection (운전자 특성 등을 고려한 무통제교차로의 간격수락 모델)

  • Jang, Jeong-Ah;Lee, Jung-Woo;Choi, Kee-Choo
    • Journal of Korean Society of Transportation
    • /
    • v.26 no.6
    • /
    • pp.71-80
    • /
    • 2008
  • Typically uncontrolled intersections are characterized by the absence of signal, stop and yield sign, and by very light traffic volume. In this study, a gap acceptance model for such uncontrolled intersections has been modeled. The motivation is to identify the behavior of drivers so that the traffic flow phenomena can be easily understood. For this, actual traffic survey was accomplished at intersections in Suwon and the data have been fed into modeling process. The logit model was used and the results showed that total delay experienced by drivers, turning right movement, age, sex, and the existence of passenger affected gap acceptance. For example, male drivers, with experiencing longer delay and having passenger(s) with them, accepted shorter gaps. These identified characteristics regarding gap acceptance could be used for facility design and/or safety oriented traffic information dissemination near uncontrolled intersections.

Practical Model to Estimate Road User Cost for Bridge Maintenance Strategy (교량 유지관리 전략 수립을 위한 실용적 도로이용자비용 추정 모델)

  • Park, Kyung-Hoon;Sun, Jong-Wan;Lee, Sang-Yoon;Lee, Jong-Soon;Cho, Hyo-Nam
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.11 no.6
    • /
    • pp.131-142
    • /
    • 2007
  • The road user cost in indirect costs as well as direct costs such as the inspection/ diagnosis cost and the repair/reinforcement cost should be considered as one of the important items in the life-cycle cost-effective design and maintenance of the bridges. To estimate the road user cost, this paper formulates the road user cost as a sum of the user delay cost and the vehicle operating cost considering the detour effect. A numerical traffic simulation and a regression analysis are performed to develop a regression model due to a time delay. The proposed regression model is applied to the generation of the maintenance strategy based on the life-cycle cost and performance, and its effectiveness and applicability is investigated. The road user cost has a great influence on establishing the maintenance strategy, and the proposed regression model could be successfully utilized to estimate the road user cost of a bridge.

Cyber attack group classification based on MITRE ATT&CK model (MITRE ATT&CK 모델을 이용한 사이버 공격 그룹 분류)

  • Choi, Chang-hee;Shin, Chan-ho;Shin, Sung-uk
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.1-13
    • /
    • 2022
  • As the information and communication environment develops, the environment of military facilities is also development remarkably. In proportion to this, cyber threats are also increasing, and in particular, APT attacks, which are difficult to prevent with existing signature-based cyber defense systems, are frequently targeting military and national infrastructure. It is important to identify attack groups for appropriate response, but it is very difficult to identify them due to the nature of cyber attacks conducted in secret using methods such as anti-forensics. In the past, after an attack was detected, a security expert had to perform high-level analysis for a long time based on the large amount of evidence collected to get a clue about the attack group. To solve this problem, in this paper, we proposed an automation technique that can classify an attack group within a short time after detection. In case of APT attacks, compared to general cyber attacks, the number of attacks is small, there is not much known data, and it is designed to bypass signature-based cyber defense techniques. As an attack model, we used MITRE ATT&CK® which modeled many parts of cyber attacks. We design an impact score considering the versatility of the attack techniques and proposed a group similarity score based on this. Experimental results show that the proposed method classified the attack group with a 72.62% probability based on Top-5 accuracy.