• Title/Summary/Keyword: 위협도

Search Result 5,089, Processing Time 0.027 seconds

Oversea IP Ranges Blocking for Security Enhancement of Critical Infrastructures with Cyber Threats Analysis in Electric Industry (전력분야 사이버 위협 분석 및 기반시설 보안 강화를 위한 해외 IP 대역 차단 방안 연구)

  • Han, Choong-Hee;Park, Soon-Tai;Lee, Sang-Joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.401-415
    • /
    • 2019
  • Recently, there has been a lot of studies and efforts to strengthen the stability of critical infrastructures against increasing cyber attacks to critical infrastructures. In this thesis, I defined what cyber threats are, after showing you various definitions about what cyber threats are and what the types are. After studying about significant cyber threats from China, I showed you the realities of cyber threats with the analysis about starting points, types of cyber threats, ratios of attacks and so on. At last, I defined guidelines about unnecessary oversea IP range blocking. Also, I proposed unnecessary oversea IP range blocking methodologies with per information system and per network system. Furthermore, I proposed blocking characteristics per security equipment and security operation improvement and blocking effects and service process to normal oversea users.

Automatic Classification of Radar Signals Using CNN (CNN을 이용한 레이다 신호 자동 분류)

  • Hong, Seok-Jun;Yi, Yearn-Gui;Jo, Jeil;Lee, Sang-Gil;Seo, Bo-Seok
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.30 no.2
    • /
    • pp.132-140
    • /
    • 2019
  • In this paper, we propose a classification method for radar signals depending on the type of threat by applying machine learning to parameter data of radar signals. Currently, the army uses a library of mapping relations between the parameters and the types of threat to recognize threat signals. This approach has certain limitations when classifying signals and recognizing new types of threat or types of threat that do not exist in the current libraries. In this paper, we propose an automatic radar signal classification method depending on the type of threat that uses only parameter data without a library. A convolutional neural network is used as the classifier and machine learning is applied to train the classifier. The proposed method does not use a library, and hence, can classify threat signals that are new or do not exist in the current library.

Consideration of New Convergence Security Threats and Countermeasures in the Zero-Contact Era (비대면 시대의 신 융합보안 위협과 대응 방안에 대한 고찰)

  • Yu, Dong-Hyun;Kim, Yong-Uk;Ha, Young-Jae;Ryu, Yeon-Seung
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.1
    • /
    • pp.1-9
    • /
    • 2021
  • Recently, new types of security crimes have been steadily occurring in Korea due to environmental changes such as the development of IT technology, and responding to these threats has become a key national task for the establishment of a safe society as well as individuals and businesses. Meanwhile, as the Zero-Contact Era has arrived since the COVID-19 Pandemics, a new convergence security threat that combines the characteristics of the Zero-Contact Era with the existing IT development is threatening our society. Research to prevent and correct these new levels of threats is continuously required in this study. Chapter 1 examined the causes of new convergence security threats and Chapter 2 discussed cybersecurity, fake news, remote voting·work and video security threats as five major threats.

Artificial Intelligence based Threat Assessment Study of Uncertain Ground Targets (불확실 지상 표적의 인공지능 기반 위협도 평가 연구)

  • Jin, Seung-Hyeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.305-313
    • /
    • 2021
  • The upcoming warfare will be network-centric warfare with the acquiring and sharing of information on the battlefield through the connection of the entire weapon system. Therefore, the amount of information generated increases, but the technology of evaluating the information is insufficient. Threat assessment is a technology that supports a quick decision, but the information has many uncertainties and is difficult to apply to an advanced battlefield. This paper proposes a threat assessment based on artificial intelligence while removing the target uncertainty. The artificial intelligence system used was a fuzzy inference system and a multi-layer perceptron. The target was classified by inputting the unique characteristics of the target into the fuzzy inference system, and the classified target information was input into the multi-layer perceptron to calculate the appropriate threat value. The validity of the proposed technique was verified with the threat value calculated by inputting the uncertain target to the trained artificial neural network.

The study on a threat countermeasure of mobile cloud services (모바일 클라우드 서비스의 보안위협 대응 방안 연구)

  • Jang, Eun-Young;Kim, Hyung-Jong;Park, Choon-Sik;Kim, Joo-Young;Lee, Jae-Il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.177-186
    • /
    • 2011
  • Mobile services which are applied PC performance and mobile characteristics are increased with spread of the smartphone. Recently, mobile cloud service is getting the spotlight as a solution of mobile service problems that mobile device is lack of memory, computing power and storage and mobile services are subordinate to a particular mobile device platform. However, mobile cloud service has more potential security threats by the threat inheritance of mobile service, wireless network and cloud computing service. Therefore, security threats of mobile cloud service has to be removed in order to deploy secure mobile cloud services and user and manager should be able to respond appropriately in the event of threat. In this paper, We define mobile cloud service threats by threat analysis of mobile device, wireless network and cloud computing and we propose mobile cloud service countermeasures in order to respond mobile cloud service threats and threat scenarios in order to respond and predict to potential mobile cloud service threats.

Transmission Modeling and Verification for the Inverse Estimation of Electronic Warfare Threats (전자전 위협체 역추적을 위한 송수신 모델링 및 검증)

  • Park, So Ryoung;Jeong, Hoe Chang;Kwon, Jae Wan;Noh, Sanguk
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.4
    • /
    • pp.112-123
    • /
    • 2017
  • Research for the inverse estimation of RF threats and the efficient electronic attack based on the parameters of the electronic information has been active in the electronic warfare (EW) situations. In this paper, an EW transmission simulator is constructed from the modeling of radar threats, EW receivers, and propagation environments with the collected electronic information in order to verify the performance of the inverse estimation algorithm in various and practical EW situations. In simulation results, we show that the range tracking error and angle tracking error are produced within ten meters and one degree, respectively. And also, we show that the changing relations between the angle tracking error and the parameters of the monopulse angle tracking radar such as the beamwidth and squint angle in simulation results correspond with those in the theoretical modeling. Accordingly, the constructed EW simulator can be used to observe the modifying characteristics of the electronic information in transmission environments, and then, to evaluate the performance of the inverse estimation system in various EW situations.

North Korean Cyber Warfare Threat and South Korean Action (북한의 사이버전 위협분석과 대응방안 고찰)

  • Kim, Doo-Hyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.2
    • /
    • pp.1-10
    • /
    • 2014
  • In this study, I analyzed the increased threat of cyber warfare and the threat of reality about what is happening around the currently. And to prepare for it, I proposed the fact how main developed countries deal with cyber warfare. Also, I presented North Korea's cyber warfare threat which is equipped with world's top 3 cyber warfare performance and the way how their strategy influence to South Korea's national security. Moreever, I studied the existing North Korea's cyber warfare threat and the way how, how South Korea deal with it and prepare to against expected threat of cyber warfare in future.

Analysis of Threat Information Priorities for Effective Security Monitoring & Control (효과적인 보안관제를 위한 위협정보 우선순위 도출)

  • Kang, DaYeon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.26 no.5
    • /
    • pp.69-77
    • /
    • 2021
  • This study aims to identify security-based threat information for an organization. This is because protecting the threat for IT systems plays an important role for an corporate's intangible assets. Security monitoring systems determine and consequently respond threats by analyzing them in a real time situation, focusing on events and logs generated by security protection programs. The security monitoring task derives priority by dividing threat information into reputation information and analysis information. Reputation information consisted of Hash, URL, IP, and Domain, while, analysis information consisted of E-mail, CMD-Line, CVE, and attack trend information. As a result, the priority of reputation information was relatively high, and it is meaningful to increase accuracy and responsiveness to the threat information.

Cyber Threat Analysis of UAM Communications, Navigation, Surveillance and Information System (UAM 통신, 항법, 감시 및 정보 시스템의 사이버 위협 분석)

  • Kyungwook Kim;Hyoung-keun Yoon
    • Journal of Advanced Navigation Technology
    • /
    • v.28 no.4
    • /
    • pp.442-449
    • /
    • 2024
  • In this paper, we aim to propose a comprehensive framework for cyber threat analysis of urban air mobility (UAM) or advanced air mobility (AAM) communications, navigation, surveillance, and information system infrastructure. By examining potential vulnerabilities and threat vectors, we seek to enhance the security and resilience of UAM infrastructure. We conduct a detailed cyber threat analysis to identify and categorize various types of cyber threats, assess their impact on the CNSi systems, and evaluate the vulnerabilities within these systems that may be exploited by such threats. This analysis will provide valuable insights for stakeholders involved in the deployment and operation of UAM systems, ultimately contributing to the safe and efficient integration of urban air transportation.

Type of Subjective Perception on the Fear Message - Q-methodological analysis on the latest Report of Korean Peninsula Situation - (위협적 메시지에 대한 주관적 인식 유형 - 최근 한반도 정세 관련 보도의 Q방법론적 분석 -)

  • Lee, Soonmo
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.2
    • /
    • pp.223-236
    • /
    • 2013
  • Related to the situation on the Korean Peninsula, by North Korea's threat of war the tension escalates and serious crisis continues. The purpose of this study is to evaluate the subjective perception which the residents of South Korea feel about North Korea's threat of war through a Q methodological analysis framework. In the result of the study, for the North Korea's threat of war the South Korean's recognition type is analyzed into four type such as 'non-reactive', 'fearreactive', 'psychological anxiety' and 'cynical ignorance type'. First, the No. 1 type 'non-reactive' does not empathize with North Korea's threat of war itself, and second type 'fear-reactive' have uneasy feeling like that 'What would happen as things go' and feel a sense of crisis about the North Korea's threat of war. The third type 'psychological anxiety' is type which feels that due to North Korea's threat of war inter-Korean relations is in the crisis. Finally the fourth type 'cynical ignorance' think that North Korea's threat of war is bluffing and also North Korea is like a shepherd boy. The reason to apply Q-methodology in this study is to make it possible to a more in-depth approach to subjective perception and threat of psychological meaning for the threatening message of study participants.