• Title/Summary/Keyword: 위협목록

Search Result 29, Processing Time 0.028 seconds

The Threat List Acquisition Method in an Engagement Area using the Support Vector Machines (SVM을 이용한 교전영역 내 위협목록 획득방법)

  • Koh, Hyeseung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.19 no.2
    • /
    • pp.236-243
    • /
    • 2016
  • This paper presents a threat list acquisition method in an engagement area using the support vector machines (SVM). The proposed method consists of track creation, track estimation, track feature extraction, and threat list classification. To classify the threat track robustly, dynamic track estimation and pattern recognition algorithms are used. Dynamic tracks are estimated accurately by approximating a track movement using position, velocity and time. After track estimation, track features are extracted from the track information, and used to classify threat list. Experimental results showed that the threat list acquisition method in the engagement area achieved about 95 % accuracy rate for whole test tracks when using the SVM classifier. In case of improving the real-time process through further studies, it can be expected to apply the fire control systems.

Reconsideration of Rare and Endangered Plant Species in Korea Based on the IUCN Red List Categories (IUCN 적색목록 기준에 의한 환경부 멸종위기 야생식물종에 대한 평가)

  • Chang, Chin-Sung;Lee, Heung-Soo;Park, Tae-Yoon;Kim, Hui
    • The Korean Journal of Ecology
    • /
    • v.28 no.5
    • /
    • pp.305-320
    • /
    • 2005
  • Recently 64 species in Korea have been ranked as rare and endangered taxa by the Ministry of Environment using two categories, I and II. The original threat categories produced by the Ministry of Environment were developed to provide a standard for specifying animals and plants in danger of extinction and has been influential sources of information used in species conservation in Korea. However, the criteria by Ministry of Environment were applied to the whole taxa only by regional boundaries, especially in South Korea, rather than international context, and it also lacked an explicit framework that was necessary to ensure repeatability among taxa because of the absence of quantitative criteria to measure the likelihood of extinction. The World Conservation Union (IUCN) has developed quantitative criteria for assessing the conservation status of species. The threatened species categories, the 2000 IUCN Red List, proposed by SSC (Species Survival Commission) of IUCN have become widely recognized internationally. Details of threatened Korean plants, identified by applying the IUCN threat categories and definitions, were listed and analyzed. The number of species identified as threatened was only 34 out of 64 taxa (48.4%), while the rest of taxa were rejected from the original lists. Many of the species (51.6%, 33 taxa) excluded from the original list proposed by Ministry of Environment do not qualify as Critically Endangered, Endangered or Vulnerable because these taxa were widely distributed either in Japan or in China/far eastern Russia and there is no evidence of substantial decline in these countries. An evaluation of taxa in Korea has been carried out only based on subjective views and qualitative data, rather than quantitative scientific data, such as rates of decline, distribution range size, population size, and risk of extinction. Therefore, the national lists undermine the credibility of threatened species lists and invite misuse, which have been raised by other cases, qualitative estimate of risk, political influence, uneven taxonomic or geographical coverage. The increasing emphasis on international responsibilities means that global scale is becoming more significant. The current listings by Environment of Ministry of Korea should be challenged, and the government should seek to facilitate the resolution of disagreements. Especially the list should be flexible enough to handle uncertainty and also incorporates detailed, quantitative data. It is suggested that the highest priorities for the Red List should be given to endemic species in Korea first. After setting up the list of endemic species to Korea, quantitative data on population size and structure, distributional range, rated of decline, and habitat fragmentation should be collected as one of long term projects for the Red list categories. Transparency and accountability are the most important key factors. Also, species assessors are named and data sources referenced are required for the future objective evaluations on Korean plant taxa.

A Study on Potential Security Threats that Occurred Possibly by Permission Requests in Android Environment (안드로이드 환경에서 권한 요구를 통해 발생 가능한 잠재적 보안위협에 관한 연구)

  • Park, In-Kyu;Choi, Seul-Ki;Kwak, Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.258-261
    • /
    • 2017
  • 안드로이드 애플리케이션 개발 시 특정 기능을 수행하기 위해 필수적으로 AndroidManifest.xml 파일에 권한을 등록한다. 등록된 권한은 애플리케이션 설치 시 사용자에게 동의를 요구하며 애플리케이션을 설치하기 위해 해당 애플리케이션이 요구하는 사용 권한 모두를 동의해야 한다. 애플리케이션이 요구하는 권한에 동의하지 않을 경우 애플리케이션 설치가 취소되며, 권한 요구에 대한 동의 없이 애플리케이션을 설치할 수 없다. 이러한 이유로 대부분의 사용자는 애플리케이션이 본래의 기능과 맞지 않는 필요 범위 이상으로 요구하는 권한까지도 상세하게 살펴보지 않고 동의하여 본래의 기능과 관계없는 권한을 통해 개인정보 유출, 비정상적인 과금 유발 등 다양한 보안위협이 발생한다. 본 논문에서는 안드로이드 애플리케이션의 APK 파일을 통해 애플리케이션이 요구하는 권한과 실제 애플리케이션이 기능 제공을 위해 사용하는 API 목록을 확인하여 애플리케이션이 필요 범위 이상으로 요구하는 권한을 분석한다. 또한, 애플리케이션 업데이트 시 API 추가로 인해 발생할 수 있는 보안위협을 분석한다. 이를 통해 필요 범위 이상으로 요구하는 권한으로 발생할 수 있는 보안위협에 대해 사전에 인지하여 이를 방지할 수 있도록 한다.

A Study on the Analysis of Validity and Importance of Event Log for the Detection of Insider Threats to Control System (제어시스템의 내부자 위협 탐지를 위한 Event Log 타당성 및 중요도 분석에 관한 연구)

  • Kim, Jongmin;Kim, DongMin;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.77-85
    • /
    • 2018
  • With the convergence of communications network between control system and public network, such threats like information leakage/falsification could be fully shown in control system through diverse routes. Due to the recent diversification of security issues and violation cases of new attack techniques, the security system based on the information database that simply blocks and identifies, is not good enough to cope with the new types of threat. The current control system operates its security system focusing on the outside threats to the inside, and it is insufficient to detect the security threats by insiders with the authority of security access. Thus, this study conducted the importance analysis based on the main event log list of "Spotting the Adversary with Windows Event Log Monitoring" announced by NSA. In the results, the matter of importance of event log for the detection of insider threats to control system was understood, and the results of this study could be contributing to researches in this area.

  • PDF

International Case Study and Strategy Proposal for IUCN Red List of Ecosystem(RLE) Assessment in South Korea (국내 IUCN Red List of Ecosystem(생태계 적색목록) 평가를 위한 국제 사례 연구와 전략 제시)

  • Sang-Hak Han;Sung-Ryong Kang
    • Journal of Wetlands Research
    • /
    • v.25 no.4
    • /
    • pp.408-416
    • /
    • 2023
  • The IUCN Red List of Ecosystems serves as a global standard for assessing and identifying ecosystems at high risk of biodiversity loss, providing scientific evidence necessary for effective ecosystem management and conservation policy formulation. The IUCN Red List of Ecosystems has been designated as a key indicator (A.1) for Goal A of the Kunming-Montreal Global Biodiversity Framework. The assessment of the Red List of Ecosystems discerns signs of ecosystem collapse through specific criteria: reduction in distribution (Criterion A), restricted distribution (Criterion B), environmental degradation (Criterion C), changes in biological interaction (Criterion D), and quantitative estimation of the risk of ecosystem collapse (Criterion E). Since 2014, the IUCN Red List of Ecosystems has been evaluated in over 110 countries, with more than 80% of the assessments conducted in terrestrial and inland water ecosystems, among which tropical and subtropical forests are distributed ecosystems under threat. The assessment criteria are concentrated on spatial signs (Criteria A and B), accounting for 68.8%. There are three main considerations for applying the Red List of Ecosystems assessment domestically: First, it is necessary to compile applicable terrestrial ecosystem types within the country. Second, it must be determined whether the spatial sign assessment among the Red List of Ecosystems categories can be applied to the various small-scale ecosystems found domestically. Lastly, the collection of usable time series data (50 years) for assessment must be considered. Based on these considerations, applying the IUCN Red List of Ecosystems assessment domestically would enable an accurate understanding of the current state of the country's unique ecosystem types, contributing to global efforts in ecosystem conservation and restoration.

A Study on Tracking Method for Command and Control Framework Tools (명령 제어 프레임워크 (Command and Control Framework) 도구 추적 방안에 대한 연구)

  • Hyeok-Ju Gwon;Jin Kwak
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.721-736
    • /
    • 2023
  • The Command and Control Framework was developed for penetration testing and education purposes, but threat actors such as cybercrime groups are abusing it. From a cyber threat hunting perspective, identifying Command and Control Framework servers as well as proactive responding such as blocking the server can contribute to risk management. Therefore, this paper proposes a methodology for tracking the Command and Control Framework in advance. The methodology consists of four steps: collecting a list of Command and Control Framework-related server, emulating staged delivery, extracting botnet configurations, and collecting certificates that feature is going to be extracted. Additionally, experiments are conducted by applying the proposed methodology to Cobalt Strike, a commercial Command and Control Framework. Collected beacons and certificate from the experiments are shared to establish a cyber threat response basis that could be caused from the Command and Control Framework.

Geological Factor Analysis for Evaluating the Long-term Safety Performance of Natural Barriers in Deep Geological Repository System of High-level Radioactive Waste (지질학적 심지층 처분지 내 천연방벽의 고준위 방사성 폐기물 장기 처분 안전성 평가를 위한 지질학적 인자 분석)

  • Hyeongmok Lee;Jiho Jeong;Jaesung Park;Subi Lee;Suwan So;Jina Jeong
    • Economic and Environmental Geology
    • /
    • v.56 no.5
    • /
    • pp.533-545
    • /
    • 2023
  • In this study, an investigation was conducted on the features, events, and processes (FEP) that could impact the long-term safety of the natural barriers constituting high-level radioactive waste geological repositories. The FEP list was developed utilizing the IFEP list 3.0 provided by the Nuclear Energy Agency (NEA) as foundational data, supplemented by geological investigations and research findings from leading countries in this field. A total of 49 FEPs related to the performance of the natural barrier were identified. For each FEP, detailed definitions, classifications, impacts on long-term safety, significance in domestic conditions, and feasibility of quantification were provided. Moreover, based on the compiled FEP list, three scenarios that could affect the long-term safety of the disposal facility were developed. Geological factors affecting the performance of the natural barrier in each scenario were selected and their relationships were visualized. The constructed FEP list and the visualization of interrelated factors in various scenarios are anticipated to provide essential information for selecting and organizing factors that must be considered in the development of mathematical models for quantitatively evaluating the long-term safety of deep geological repositories. In addition, these findings could be effectively utilized in establishing criteria related to the key performance of natural barriers for the confirmation of repository sites.

A Study of an Anomalous Event Detection using White-List on Control Networks (제어망에서 화이트 리스트 기법을 이용한 이상 징후 탐지에 관한 연구)

  • Lee, DongHwi;Choi, KyongHo
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.77-84
    • /
    • 2012
  • The control network has been operated in a closed. But it changes to open to external for business convenience and cooperation with several organizations. As the way of connecting with user extends, the risk of control network gets high. Thus, in this paper, proposed the technique of an anomalous event detection using white-list for control network security and minimizing the cyber threats. The proposed method can be collected and cataloged of only normal data from traffic of internal network, control network and field devices. Through way to check the this situation, we can separate normal and abnormal behavior.

Distribution Status and Threatened Assessment of Endangered Species, Pungitius sinensis (Pisces: Gasterosteidae) in Korea (멸종위기어류 가시고기 Pungitius sinensis (Pisces: Gasterosteidae)의 분포현황 및 멸종위협 등급 평가)

  • Ko, Myeong-Hun
    • Korean Journal of Ichthyology
    • /
    • v.28 no.3
    • /
    • pp.186-191
    • /
    • 2016
  • Distribution status and threatened assessment of endangered species, Pungitius sinensis (Pisces: Gasterosteidae), were investigated from March to October 2015 in Gangwon-do and Gyeongsangbuk-do etc., Korea. During the study period, a total of 854 individual P. sinensis were collected from 21 of 71 sampling stations using skimming nets. P. sinensis appeared in 23 streams during the past 30 years. However, it was only collected in 12 streams. Therefore, its habitats and populations were drastically reduced. The preferred habitat of P. sinensis was pool of the lower stream with lots of aquatic plants. Given these evidences of small occupying areas ($84km^2$) and drastic reduction in its habitats and populations, P. sinensis is considered as an endangered (EN) [B2ab(ii,iii,iv,v)] species based on IUCN Red List categories and criteria.

Distribution Aspect and Extinction Threat Evaluation of the Endangered Species, Cottus hangiongensis (Pisces: Cottidae) in Korea (멸종위기어류 한둑중개 Cottus hangiongensis(Pisces: Cottidae)의 분포양상 및 멸종위협 평가)

  • Ko, Myeong-Hun;Han, Mee-Sook;Kwan, Sun-Man
    • Korean Journal of Ichthyology
    • /
    • v.30 no.3
    • /
    • pp.155-160
    • /
    • 2018
  • The distribution aspect and extinction threat evaluation of the endangered species, Cottus hangiongensis were investigated from 2011 to 2017 in Korea for this study. The distribution reports of C. hangiongensis were divided into 1954~1985, 1981~2003, 2004~2012, and 2011~2017. The number of habited streams decreased gradually to 30, 24, 10, and 19 streams, respectively. In this study (2011~2017), C. hangiongensis was newly found in two streams (Ayajincheon and Chuksancheon), but 15 streams that appeared in the past are not in this study. The main habitat of C. hangiongensis was the downstream riffle of clean water with fast velocity and cobble-boulder bottoms. Given this evidence as noted for more than a 30% reduction in population after 2003, due to construction wear, river work and the qualitative decline of the habitat, C. hangiongensis is now considered to be Vulnerable (VU A2ac) based on the IUCN Red List categories and criteria.