• Title/Summary/Keyword: 위협의 평가

Search Result 705, Processing Time 0.024 seconds

Stateful Virtual Proxy Server for Attack Detection based on SIP Protocol State Monitoring Mechanism (SIP 프로토콜 상태정보 기반 공격 탐지 기능을 제공하는 가상 프록시 서버 설계 및 구현)

  • Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.37-48
    • /
    • 2008
  • VoIP service is a transmission of voice data using SIP protocol on IP based network, The SIP protocol has many advantages such as providing IP based voice communication and multimedia service with cheap communication cost and so on. Therefore the SIP protocol spread out very quickly. But, SIP protocol exposes new forms of vulnerabilities on malicious attacks such as Message Flooding attack and protocol parsing attack. And it also suffers threats from many existing vulnerabilities like on IP based protocol. In this paper, we propose a new Virtual Proxy Server system in front of the existed Proxy Server for anomaly detection of SIP attack and stateful management of SIP session with enhanced security. Based on stateful virtual proxy server, out solution shows promising SIP Message Flooding attack verification and detection performance with minimized latency on SIP packet transmission.

  • PDF

공공지역 흡연구역 담배자판기, 전면철거 있을 수 없다

  • 한국자동판매기공업협회
    • Vending industry
    • /
    • v.2 no.4 s.5
    • /
    • pp.81-85
    • /
    • 2002
  • 담배자판기 규제완화에 대한 산업계의 강력한 의지에도 불구하고 최근 개정을 추진 중인 국민건강증진법 시행령 및 시행규칙 공고(안)에 있어서는 공공지역 흡연구역에 대해 담배자판기를 전면 철거하는 내용이 포함이 되어 있어 산업계에 큰 충격을 주고 있다 이같은 관련입법은 그동안 담배자판기에 성인인증 장치를 부착하는 자율대책으로 규제완화를 적극 주창해 온 산업계 입장과는 전면 대치되는 방향이기에 그 충격이 더욱 클 수밖에 없다. 만약 이 공고안대로 입법통과가 된다면 기존 공공장소 흡연구역에 설치가 된 자판기들마저 전면 철거가 이루어져야 함은 물론 향후 담배자판기 설치로케이션도 극히 제약을 받게 되는 치명적 상황을 맞게 된다. 이같은 사태의 위급성 앞에 협회에서는 ${\ulcorner}$담배자판기 관련 국민건강증진법 시행령 및 시행규칙 개정안${\lrcorner}$에 대해 산업계의 입장을 종합한 소견서를 보건복지부 건강증진과에 제출하고 강력대응을 진행하고 있다. 협회는 이 건의안을 통해 공공장소 흡연구역에 대한 자판기 설치 금지 및 철거 검토 안은 시대적인 조류를 역행함은 물론, 성인인식 담배자판기의 청소년 보호 등 긍정적인 설치효과 측면을 전혀 인정치 않는 초강력 규제로서는 도저히 이 개정안을 수용할 수 없는 산업계 입장을 밝혔다. 아울러 공고안 같은 강력 규제보다는 성인인식 담배자판기가 오히려 합법적인 설치환경을 확보하여 사회적으로 떳떳하고 자신 있게 그 존재가치를 평가받을 수 있게 관련법을 개정해 주길 요청했다. 공고안의 개정통과가 산업계와 협회의 바램과 같이 저지될 수 있을 지는 앞으로 지켜봐야 할 일이다 하지만 분명한 점은 명분과 당위성과 부족한 규제만능주의적인 입법을 산업계가 그대로 수용하고만은 있을 수 없다는 점이다. 따라서 현시점에서 중요한 점은 산업계가 일치단결해 현 관련 공고안에 대한 반대 목소리를 높이는 일이다. 현재의 존립을 위협받는 담배자판기는 발상의 전환과 마인드 변화에 따라서는 얼마든지 합법적인 설치환경을 확보할 수 있기에 산업계의 결속력 있는 대응은 그만큼 중요성을 갖는다. 이번 사안은 결코 포기 할 수 없는 산업계의 권리라는 점은 명심해야 한다. 이러한 취지 하에 금번 정책초점에서는 보건복지부 관련 부처에 제출한 ${\ulcorner}$담배자판기 관련 국민건강증진법 시행령 및 시행규칙 개정안${\lrcorner}$에 대한 업계 소견서 및 건의안 내용을 정리 게재 했다.

  • PDF

A Study on Web Service Security Testing Methodology for Performance Evaluation (웹 서비스 보안 성능 평가 테스트 방법론 연구)

  • Lee, Dong-Hwi;Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.31-37
    • /
    • 2010
  • The risks and threats in IT security systems to protect, prevent damage and Risk should be minimized. Context of information security products such as information processing, storage, delivery, and in the process of information system security standards, That is the basic confidentiality, availability, integrity and secondary clarity, potential evidence, detection, warning and defense capabilities, to ensure sufficient and should be. Web services are the most important elements in the security, the web nature of port 80 for the service to keep the door open as a structure, Web applications, web sources and servers, networks, and to hold all the elements are fundamental weaknesses. Accordingly, these elements through a set of Web application development errors and set-up errors and vulnerabilities in Web applications using their own home pages and web servers to prevent hacking and to improve the efficiency of Web services is proposed methodology performs security BMT.

An Intrusion Detection System based on the Artificial Neural Network for Real Time Detection (실시간 탐지를 위한 인공신경망 기반의 네트워크 침입탐지 시스템)

  • Kim, Tae Hee;Kang, Seung Ho
    • Convergence Security Journal
    • /
    • v.17 no.1
    • /
    • pp.31-38
    • /
    • 2017
  • As the cyber-attacks through the networks advance, it is difficult for the intrusion detection system based on the simple rules to detect the novel type of attacks such as Advanced Persistent Threat(APT) attack. At present, many types of research have been focused on the application of machine learning techniques to the intrusion detection system in order to detect previously unknown attacks. In the case of using the machine learning techniques, the performance of the intrusion detection system largely depends on the feature set which is used as an input to the system. Generally, more features increase the accuracy of the intrusion detection system whereas they cause a problem when fast responses are required owing to their large elapsed time. In this paper, we present a network intrusion detection system based on artificial neural network, which adopts a multi-objective genetic algorithm to satisfy the both requirements: accuracy, and fast response. The comparison between the proposing approach and previously proposed other approaches is conducted against NSL_KDD data set for the evaluation of the performance of the proposing approach.

Design and Implementation of Mechanism for Effectively Exchanging Cybersecurity Information between Independent Security Management Domains (독립적인 보안관리 도메인간 효과적인 사이버보안정보 교환 방법의 설계 및 구현)

  • An, Gae-Il;Seo, Dae-Hee;Lim, Sun-Hee;Kim, Jong-Hyun;Seo, Dong-Il;Cho, Hyun-Sook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1489-1497
    • /
    • 2011
  • As a way for defending against cyber security threats, there has been a research on cybersecurity information exchange between security management domains in order to raise security performance of the whole network. One of the hottest issues in exchanging cybersecurity information between security management domains is that the requirements of those domains on information sharing are different with each other because each is autonomous domain. This paper proposes a mechanism for effective cybersecurity Information exchange between independent security management domains, which can satisfy their requirements on information sharing through sharing policy and sharing policy control protocol, proposed in this paper. In this paper we have developed an integrated security control system that supports the proposed mechanism. Through the system the performance of the proposed mechanism is measured and evaluated.

A Study on the Working Effect of UAV Hitting Mine Artillery (갱도 포병 타격 시 무인항공기 운용 효과에 관한 연구)

  • Jeong, Young-Ho;Shin, Ki-Tae;Chang, Tai-Woo;Park, Jin-Woo
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.4
    • /
    • pp.175-182
    • /
    • 2008
  • The enemy will attempt to destroy our troop's core facilities using various fire supports at the beginning of war. Among these fire supports, artillery is given the most deal of weight and mine artillery is a great threat to our troops because it has a superior predominance on the ability of survival. Our troops are planning to introduce UAV (Unmanned Aerial Vehicle) to overcome these difficulties. A study about hitting mine artillery has been developed inside the military field only. However, these studies had been mostly qualitative analyses, thus having limitations in the aspects of non objectiveness and simplicity. We propose a new method to evaluate about working effect of UAV hitting mine artillery. We studied on hitting mine artillery in a quantitative way using CA (Cellular Automata) simulation.

  • PDF

The framework to develop main criteria for a DDoS correspondence (DDoS 대응 지표 프레임워크 개발)

  • Lee, Yeon-Ho;Kim, Beom-Jae;Lee, Nam-Yong;Kim, Jong-Bae
    • Journal of Digital Contents Society
    • /
    • v.11 no.1
    • /
    • pp.79-89
    • /
    • 2010
  • The government and companies build a DDoS correspondence system hastily to protect assets from cyber threats. It has become more and more intelligent and advanced such as DDoS attack. However, when outbreaks of the social incidents such as 7.7 DDoS attack(2009.7.7) or cases of the direct damage occurred, information security systems(ISS) only become the issue in the short term. As usual, sustained investment about ISS is a negative recognition. Since the characteristic of ISS is hard to recognize the effectiveness of them before incidents occurs. Also, results of incidents occurred classify attack and detection. Detailed and objective measurement criterion to measure effectiveness and efficiency of ISS is not existed. Recently, it is progress that evaluation and certification about for the information security management system(ISMS). Since these works propose only a general guideline, it is difficult to utilize as a result of ISMS improvement for organization. Therefore, this paper proposes a framework to develop main criteria by a correspondence strategy and process. It is able to detailed and objective measurements.

Simulation of the Debris Flow Using FLO-2D According to Curve-shape Changes in Bed Slopes (FLO-2D를 활용한 경사지 형상에 따른 토석류 흐름양상에 대한 수치모의)

  • Jung, Hyo Jun;Yoo, Hyung Ju;Lee, Seung Oh
    • Journal of Korean Society of Disaster and Security
    • /
    • v.13 no.3
    • /
    • pp.45-58
    • /
    • 2020
  • Due to a high portion of mountainous terrains in Korea, debris flow and its disasters have been increased. In addition, recently localized flash-floods caused by climate change should add frequencies and potential risks. Grasping and understanding the behaviors of debris flow would allow us to prevent the consequent disasters caused by its occurrence. In this study, we developed a number of cases by changing the bottom slopes and their curvatures and investigated their effects on potential damage caused by the debris flow using FLO-2D. As simulating each bed slopes we analyzed for velocity, depth, impact, reach distance, and reach shape. As a result the lower the average slope, the greater the influence of its curvature and the numerical results were analyzed with showed a well-marked difference in impact stress and flow velocity. The result from this study could be referred for protecting from the debris flows when design countermeasure structures in mountainous regions.

Study on Moisture Variation in Light Frame Wall with Different Wall Assemblies (I) - Evaluation of Improvement with Laboratory Test - (벽체구성에 따른 목조벽체 내 수분변화에 대한 연구(I) - 실내 실험을 통한 개선 가능성 평가 -)

  • Kim, Se-Jong;Lee, Jun-Jae
    • Journal of the Korean Wood Science and Technology
    • /
    • v.37 no.4
    • /
    • pp.320-329
    • /
    • 2009
  • The purpose of this study was reducing the moisture accumulation in a wall, which can threaten the structural safety of light-frame wall and make residential environment poor. For the purpose, the laboratory test was carried out with different wall assemblies. Vapor retarder and air gap for ventilation were added to the typical wall. The improved performance of the proposed walls was examined through the test with distinct difference of temperature and relative humidity between outdoor and indoor air conditions. Increased dampproofing performance of additional vapor retarder was effective on reduction of moisture transmission from inside the house into the wall. However, unexpected high relative humidity was shown in the wall with two additional vapor retarder because of excessive dampproofing performance or inadequate location of vapor retarder. And, the open air gap induced the moisture transfer from inside the wall into outdoor air by ventilation. If the alternative to the induction of moisture transmission from inside the house into the wall with open air gap can be found, moisture reduction effect of that will be increased obviously.

Estimation of Soil Erosion and Sediment Outflow in the Mountainous River Catchment (산지하천 유역의 토양침식량과 유사유출량 평가)

  • Kim, DongPhil;Kim, JooHun
    • Journal of Wetlands Research
    • /
    • v.16 no.2
    • /
    • pp.221-233
    • /
    • 2014
  • Soil erosion, transportation, and sedimentation by water flow often occur in a stream. This excessive occurrence threatens the safety of hydraulic structures, and aggravates natural disasters like flood. To prevent soil disaster according to the soil erosion, it is necessary to predict accurate sediment outflow primarily. Besides, it is very important to choose appropriate models by basin characteristics, to estimate accurate quantity of related factors, and to acquire available hydrological data. Therefore, the purpose of this study is to estimate soil erosion amount and sediment amount according to rainfall-runoff by using rainfall, discharge, and sediment in the Seolmacheon experimental catchment. And, it proposed sediment delivery ratio of the Seolmacheon catchment by result of studying sediment delivery ratio. Hereafter, this study will estimate sediment delivery ratio by basin characteristics, and formulate the method of estimating soil erosion and sediment outflow in various conditions by applying the results in other catchments.