• Title/Summary/Keyword: 위협 분석

Search Result 2,311, Processing Time 0.029 seconds

이메일 클라우드 보안 서비스(E-mail SecaaS)의 기술적 보안위협 연구 - 위협모델링 기법을 중심으로 -

  • KIM, Hye-Won;Yu, Ho-Jun;Lee, Jae-Woo
    • Review of KIISC
    • /
    • v.27 no.6
    • /
    • pp.57-64
    • /
    • 2017
  • 현재 클라우드 컴퓨팅 시장은 빠른 속도로 광범위해지고 있으며 몇몇 기업에서는 클라우드를 이용한 보안서비스를 제공하기 시작했다. 그 중 이메일 클라우드 보안 서비스는 클라우드 컴퓨팅의 특징을 가지고 안전한 조직의 이메일 사용을 지원하고 있다. 여러 조직의 이메일 데이터가 한 곳으로 집중되는 만큼 서비스 공급자는 보다 안전하고 가용성 높은 서비스를 제공해야만 한다. 이를 위해 본 논문에서는 이메일 클라우드 보안 서비스 기본구조를 기반으로 STRIDE 위협모델링 분석을 통해 잠재적인 기술적 보안약점 및 위협을 살펴보고 공격트리를 구성하여 대응방안을 모색해보고자 한다.

Priority Assessment of Cyber Threat Indicators (사이버 위협 지표 간 중요도 비교 분석 연구)

  • Lee, Ro-woon;Kwon, Hun-yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.951-958
    • /
    • 2021
  • With the growing cyber threat to information assets, it has become important to share threat information quickly. This paper examines the sharing of cyber threat information and presents a method to determine the importance of threat indicators in the information sharing market by calculating weights. The analysis was conducted using AHP techniques, with a pairwise comparison of the four factors(attacker & infected system indicators, role indicators, malicious file indicators, technique & spread indicators) and the details of each factor. Analysis shows that malicious file indicators are the most important among the higher evaluation factors and infected system IP, C&C and Smishing are the most important factors in comparison between detailed items. These findings could be used to measure the preference of consumers and the contribution of information provider for facilitating information sharing.

A Study on the Activation of Sharing Cyber-Threat Information among Businesses (기업의 사이버위협정보 공유 활성화에 관한 연구)

  • Seokeon Choe;Jongsub Lee;Geunsun Tak;Joowon Choi
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.4
    • /
    • pp.143-156
    • /
    • 2023
  • The domestic threat information sharing system to deal with various security threats in the rapidly changing cyber environment needs to be improved. In this study, to solve these problems and promote the activation of threat information sharing, we derive a research model based on the value-based containment model (VAM) for vital factors in information sharing. After conducting a Ricardian 5-point survey on a total of 204 individuals, the statistical results of the first 151 individuals were analyzed using SPSS and AMOS, and the statistical results of the second 204 individuals were analyzed using R-Studio. As a result, perceivability was found to have a significant impact as a core factor in the activation of cyber threat information sharing (β=0.405, p<0.01), and the hindrance factor was analyzed as innovation resistance (β=-0.152, p<0.01). Microscopically, the obtained results can be applied to factor analysis for activating information sharing of cyber threats by companies in the future, and macroscopically, they can contribute to the foundational development of a national cyber threat response system.

Threat Unification using Multi-Sensor Simulator of Battlefield Helicopter and Its Implementation (전장 헬기의 다중센서 시뮬레이터를 통한 위협통합 및 구현)

  • Park, Hun-Woo;Kang, Shin-Bong;Noh, Sang-Uk;Jeong, Un-Seob
    • Journal of Internet Computing and Services
    • /
    • v.10 no.3
    • /
    • pp.35-49
    • /
    • 2009
  • In electronic warfare settings, battlefield helicopters identify various threats based upon threat data, which are acquired using their multi-sensors of aircraft survivability equipment (ASE). To continually function despite of potential threats and successfully execute their missions, the battlefield helicopters have to repeatedly report threats in simulated battlefield situations. Toward this ends, the paper presents threat unification using multi-sensor simulator and its implementation. The simulator consists of (1) threat attributes generator, which models threats against battlefield helicopters and defines their specific attributes, (2) threat data generator, which generates threats, being similar to real ones, using normal, uniform, and exponential distributions, and (3) graphic display for threat analysis and unification, which shows unified threat information, for example, threat angle and its level. We implement a multi-sensor threat simulator that can be repeatedly operable in various simulated battlefield settings. Further, we report experimental results that, in addition to tangibly modeling the threats to battlefield helicopters, test the capabilities of threat unification using our simulator.

  • PDF

The Study of Developing an Index for Evaluating (위험분석모델의 정보시스템 구축방법론 적용에 관한 연구)

  • 박동석;안성진;정진욱
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.67-75
    • /
    • 2002
  • The purpose of this study is to reflect the risk analysis results acquired while building an information system of an organization by applying a risk analysis model capable of analyzing the confronted risk, on the information system build methodology. Risk analysis, a method of utilizing the functional relation between risk, vulnerability and countermeasure of information assets, is used to evaluate the overall information risk level by analyzing the influence range of vulnerability imposed in the information asset of an organization, and the applications of the countermeasures on the frequency and intensity of the corresponding risk.

  • PDF

A Study on Security Analysis and Security Design for IPv6 Transition Mechanisms (IPv6 전환 기술의 보안 위협 분석 및 보안 설계에 대한 연구)

  • Choi, In-Seok;Kim, Young-Han;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.11B
    • /
    • pp.689-697
    • /
    • 2005
  • The IETF has created the v6ops Working Group to assist IPv6 transition and propose technical solutions to achieve it. But it's quite problem which security consideration for a stage of IPv4/IPv6 transition and co-existence. There are new security problem threat that it caused by the characteristics of heterogeneity. In this paper, we describe IPv6 transition mechanisms and analyze security problem for IPv6 transition mechanism. also we propose security consideration and new security mechanism. We analyzed DoS and DRDoS in 6to4 environment and presented a address sanity check as a solution. We also showed an attack of address exhaustion in address allocation server. To solve this problem, we proposed challenge-response mechanism in DSTM.

A Study on Priority Analysis of Evaluation Factors for Cyber Threats using Open Source Intelligence (OSINT) (공개출처정보를 활용한 사이버위협 평가요소의 중요도 분석 연구)

  • Kang, Sungrok;Moon, Minam;Shin, Kyuyong;Lee, Jongkwan
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.49-57
    • /
    • 2020
  • It is no exaggeration to say that we live with cyber threats every day. Nevertheless, it is difficult for us to obtain objective information about cyber threats and attacks because it is difficult to clearly identify the attacker, the purpose of attack, and the range of damage, and rely on information from a single source. In the preceding research of this study, we proposed the new approach for establishing Database (DB) for cyber attacks using Open Source Intelligence(OSINT). In this research, we present the evaluation factors for cyber threats among cyber attack DB and analyze the priority of those factors in oder to quantify cyber threats. We select the purpose of attack, attack category, target, ease of attack, attack persistence, frequency of OSINT DB, and factors of the lower layer for each factor as the evaluation factors for cyber threats. After selection, the priority of each factor is analyzed using the Analytic Hierarchy Process(AHP).

인공신경망 알고리즘을 통한 사물인터넷 위협 탐지 기술 연구

  • Oh, Sungtaek;Go, Woong;Kim, Mijoo;Lee, Jaehyuk;Kim, Hong-Geun;Park, SoonTai
    • Review of KIISC
    • /
    • v.29 no.6
    • /
    • pp.59-66
    • /
    • 2019
  • 사물인터넷 환경은 무수히 많은 이기종의 기기가 연결되는 초연결 네트워크 구성을 갖는 특성이 있다. 본 논문에서는 이러한 특성을 갖는 사물인터넷 환경에 적합한 보안 기술로 네트워크를 통해 침입하는 위협의 효율적인 탐지 기술을 제안한다. 사물인터넷 환경에서의 대표적인 위협 행위를 분석하고 관련하여 공격 데이터를 수집하고 이를 토대로 특성 연구를 진행하였다. 이를 기반으로 인공신경망 기반의 오토인코더 알고리즘을 활용하여 심층학습 탐지 모델을 구축하였다. 본 논문에서 제안하는 탐지 모델은 비지도 학습 방식의 오토인코더를 지도학습 기반의 분류기로 확장하여 사물인터넷 환경에서의 대표적인 위협 유형을 식별할 수 있었다. 본 논문은 1. 서론을 통해 현재 사물인터넷 환경과 보안 기술 연구 동향을 소개하고 2. 관련연구를 통하여 머신러닝 기술과 위협 탐지 기술에 대해 소개한다. 3. 제안기술에서는 본 논문에서 제안하는 인공신경망 알고리즘 기반의 사물인터넷 위협 탐지 기술에 대해 설명하고, 4. 향후연구계획을 통해 추후 활용 방안 및 고도화에 대한 내용을 작성하였다. 마지막으로 5. 결론을 통하여 제안기술의 평가와 소회에 대해 설명하였다.

Security Risk Evaluation Scheme for Effective Threat Management (효과적인 위협관리를 위한 보안 위험도 평가기법)

  • Kang, Pil-Yong
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.380-386
    • /
    • 2009
  • It is most important that identifying security threats(or vulnerabilities) of critical IT assets and checking the propriety of related security countermeasures in advance for enhancing security level. In this paper, we present a new security risk evaluation scheme based on critical assets and threats for this. The presented scheme provides the coverage and propriety of the countermeasures(e.g., intrusion detection rules and vulnerability scan rules, etc.), and the quantitative risk level of identified assets and threats. So, it is expected that the presented scheme will be utilized in threat management process efficiently compared to previous works.

A Study on the Analysis of Internal and External Factors of Software Threat Elements (소프트웨어 위협 요소의 내부적·외부적 요인 분석에 관한 연구)

  • Lee Eun Ser
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.6
    • /
    • pp.278-283
    • /
    • 2024
  • When implementing software, there can be side effects that pose a threat to human life. Therefore, it is necessary to measure the impact of software on safety and create alternatives to mitigate and prevent threats. To conduct a software safety assessment to measure the impact of threat factors, the following components are necessary. This paper aims to classify the threat factors of software into internal and external factors and quantitatively demonstrate the impact of these threat factors.