• Title/Summary/Keyword: 침투공격

Search Result 77, Processing Time 0.028 seconds

Autotaxin의 암세포 이동 촉진 활성은 phosphodiesterase catalytic site에 연결 되어있다

  • ;;;Mary L. Strack
    • Proceedings of the Korean Society of Applied Pharmacology
    • /
    • 1996.11a
    • /
    • pp.27-31
    • /
    • 1996
  • 암환자의 생명을 가장 위협하는 암세포의 전이는 숙주와 암세포의 상호작용을 포함하는 여러단계의 연쇄적인 과정이다. 전이의 발생은 하나의 세포나 집단의 암세포가 첫번째 암발생 부위에서 분리되어 국소적으로 침투하고 순환기계에 들어가 다른곳에 흡착 후 다른 장기의 interstitium과 parcnchyma에 입출(extravasate)하게 되며 2차적 colony로서 자라나 stroma나 basement membrine과 같은 생물학적 울타리를 파괴한다. 전이의 각단계에서 암세포는 면역세포의 공격을 피하여야만 한다. 세포의 이동은 태아의 생성(embryonic events), 성장세포의 재조함(remodeling), 상처 치유(wound healing), 맥관형성 (angiogenesis), 면역 방어 (immune defence)의 경우에 아주 중요한 역활을 한다. 정상적인 경우에 세포의 이동은 잘 통제가 되지만 암세포의 이동은 비정상적으로 통제가 되거나 자체내에서 통제가 된다. 암세포는 숙주에서 생산되는 scatter factors, growth factor, extracellular matrix components, 그리고 암세포에서 발생되는 autocrine utility factors를 포함한 여러가지 인자에 의해 영향을 받는다.

  • PDF

A Study on the Threat of North Korean Small Drones (북한 소형 드론 위협 사례에 대한 연구)

  • Kwang-Jae Lee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.397-403
    • /
    • 2024
  • North Korea's rapidly advancing drone development and operational capabilities have become a significant threat to South Korea's security. The drone incursions by North Korea in 2014, 2017, and 2022 demonstrate the technological advancement and provocative potential of North Korean drones. This study aims to closely analyze the military threats posed by North Korean drones and seek effective countermeasures. The research examines the development level of North Korean drone technology, its military applications, the characteristics and patterns of recent drone incursions, the adequacy and limitations of South Korea's current response systems, and future countermeasures. For this purpose, domestic and international research literature and media reports were reviewed, and specific North Korean drone incursion cases were analyzed. The results indicate that North Korea's small drones possess technological features such as small size, low altitude, low-speed flight, long-duration flight, and reconnaissance equipment. These drones pose threats that can be utilized for reconnaissance, surveillance, surprise attacks, and terrorism. Additionally, South Korea's current response systems reveal limitations such as inadequate detection and identification capabilities, low interception success rates, lack of an integrated response system, and insufficient specialized personnel and equipment. Therefore, this study suggests various technical, policy, and international cooperative countermeasures, including the development of drone detection and identification technologies, the utilization of diverse drone neutralization technologies, the establishment of legal and institutional foundations, the construction of a cooperative framework among relevant agencies, and the strengthening of international cooperation. The study particularly emphasizes the importance of raising awareness of the North Korean drone threat across South Korean society and unifying national efforts to respond to these threats.

A Design of Authority Management Protocol for Secure Storage Access Control in Cloud Environment (클라우드 환경에서 안전한 스토리지 접근 제어를 위한 권한 관리 프로토콜 설계)

  • Min, So-Yeon;Lee, Kwang-Hyong;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.12-20
    • /
    • 2016
  • With the enhancements in existing major industries, cloud computing-based converging services have been created, as well as value-added industries. A variety of converging services are now provided, from personalized services up to industrial services. In Korea, they have become the driving force behind existing industries throughout the whole economy, but mainly in finance, mobile systems, social computing, and home services, based on cloud services. However, not only denial of service (DOS) and distributed DOS (DDOS) attacks have occurred, but also attack techniques targeting core data in storage servers. Even security threats that are hardly detected, such as multiple attacks on a certain target, APT, and backdoor penetration have also occurred. To supplement defenses against these, in this article, a protocol for authority management is designed to provide users with safe storage services. This protocol was studied in cases of integration between a cloud environment and big data-based technology, security threats, and their requirements. Also studied were amalgamation examples and their requirements in technology-based cloud environments and big data. With the protocol suggested, based on this, security was analyzed for attack techniques that occur in the existing cloud environment, as well as big data-based techniques, in order to find improvements in session key development of approximately 55%.

The probable use of UAV(Unmanned Aerial Vehicle) in crime, cybercrime, and terrorism and responses (무인기 개발과 범죄, 사이버 범죄, 테러 활용 가능성과 대응방안)

  • Joh, Hyeon-Jin;Yun, Min-Woo
    • Korean Security Journal
    • /
    • no.46
    • /
    • pp.189-216
    • /
    • 2016
  • In March 2015, the North Korean UAVs (Unmanned Aerial Vehicles) were found and countries around the world have actively developed UAVs. UAVs or Drone have become commercialized and more civilians use UAVs for leisure. The positive possibilities of UAV use expand. However, there could be the negative sides of UAV use. The UAVs could be used for the purpose of various crime, cybercrime, and terrorism. For instance, hacking devices attached drone could be infiltrated into the sensitive networks to steal personal informations and public data. This could be a new dimension of cybercrime. As the number of internet users and cyberspace rapidly expands, problems of crimes could be worsened both quantitatively and qualitatively. By contrast, defensive measures against such threats are limited. Especially, the Korean society is vulnerable despite its well-advanced internet and computer network technology. This article investigates the current UAV types and its developments, discusses various possibilites of UAV-related crime, cybercrime, and terrorism, and proposes responses.

  • PDF

Pentesting-Based Proactive Cloud Infringement Incident Response Framework (모의해킹 기반 사전 예방적 클라우드 침해 사고 대응 프레임워크)

  • Hyeon No;Ji-won Ock;Seong-min Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.487-498
    • /
    • 2023
  • Security incidents using vulnerabilities in cloud services occur, but it is difficult to collect and analyze traces of incidents in cloud environments with complex and diverse service models. As a result, the importance of cloud forensics research has emerged, and infringement response scenarios must be designed from the perspective of cloud service users (CSUs) and cloud service providers (CSPs) based on representative security threat cases in the public cloud service model. This simulated hacking-based proactive cloud infringement response framework can be used to respond to the cloud service critical resource attack process from the viewpoint of vulnerability detection before cyberattacks occur on the cloud, and can also be expected for data acquisition. Therefore, in this paper, we propose a framework for preventive cloud infringement based on simulated hacking by analyzing and utilizing Cloudfox, a cloud penetration test tool.

Analysis of Physical Status on COVID-19: Based on Impacts of Physical Activity (COVID-19에 대한 운동중재효과 분석)

  • Kim, Kwi-Baek;Kwak, Yi Sub
    • Journal of Life Science
    • /
    • v.31 no.6
    • /
    • pp.603-608
    • /
    • 2021
  • The purpose of this perspective research is to discuss the potential role of exercise-interventions in COVID-19, terms of prevention and prognosis in the periods of the COVID-19 vaccine. SARCO-CoV-2. COVID-19 was detected as a new virus causing severe cardiovascular and respiratory complications. It emerged as a global public health emergency and national pandemic. It caused more than 1 million deaths in the first 6 months of the pandemic and resulted in huge social and economic fluctuations internationally. Unprecedented stressful situations, such as COVID-19 blue and COVID-19 red impact on many health problems. In healthy individuals, COVID-19 infection may induced no symptoms (i.e., asymptomatic), whereas others may experience flu-like symptoms, such as ARDS, pneumonia, and death. Poor health status, such as obesity and cardiovascular and respiratory complications, are high risk factors for COVID-19 prevention, occurrence, and prognosis. Several COVID-19 vaccines are currently in human trials. However, the efficacy and safety of COVID-19 vaccines, including potential side effects, such as anaphylaxis (a life-threatening allergic reaction) and rare blood clots, still need to be investigated. On the basis of direct and indirect evidence, it seems that regular and moderate physical exercise can be recommended as a nonpharmacological, efficient, and safe way to cope with COVID-19. Physical inactivity and metabolic abnormalities are directly associated with reduced immune responses, including reduced innate, CMI, and AMI responses. Due to prolonged viral shedding, quarantine in inactive, obese and disease people should likely be longer than physical active people. Multicomponent and systemic exercise should be considered for the obese, disease, and elderly people. More mechanism research is needed in this area.

Threats and countermeasures of malware (악성코드의 위협과 대응책)

  • Lim, Dong Yul
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.1
    • /
    • pp.13-18
    • /
    • 2015
  • The malware, as hackers generic name of executable code that is created for malicious purposes, depending on the presence or absence of a self-replicating ability infected subjects, and are classified as viruses, worms, such as the Trojan horse. Mainly Web page search and P2P use, such as when you use a shareware, has become penetration is more likely to occur in such a situation. If you receive a malware attack, whether the e-mail is sent it is automatically, or will suffer damage such as reduced system performance, personal information leaks. While introducing the current malware, let us examine the measures and describes the contents related to the malicious code.

  • PDF

Development of a DEVS Simulator for Electronic Warfare Effectiveness Analysis of SEAD Mission under Jamming Attacks (대공제압(SEAD) 임무에서의 전자전 효과도 분석을 위한 DEVS기반 시뮬레이터 개발)

  • Song, Hae Sang;Koo, Jung;Kim, Tag Gon;Choi, Young Hoon;Park, Kyung Tae;Shin, Dong Cho
    • Journal of the Korea Society for Simulation
    • /
    • v.29 no.4
    • /
    • pp.33-46
    • /
    • 2020
  • The purpose of Electronic warfare is to disturbe, neutralize, attack, and destroy the opponent's electronic warfare weapon system or equipment. Suppression of Enemy Air Defense (SEAD) mission is aimed at incapacitating, destroying, or temporarily deteriorating air defense networks such as enemy surface-to-air missiles (SAMs), which is a representative mission supported by electronic warfare. This paper develops a simulator for analyzing the effectiveness of SEAD missions under electronic warfare support using C++ language based on the DEVS (Discrete Event Systems Specification) model, the usefulness of which has been proved through case analysis with examples. The SEAD mission of the friendly forces is carried out in parallel with SSJ (Self Screening Jamming) electronic warfare under the support of SOJ (Stand Off Jamming) electronic warfare. The mission is assumed to be done after penetrating into the enemy area and firing HARM (High Speed Anti Radiation Missile). SAM response is assumed to comply mission under the degraded performance due to the electronic interference of the friendly SSJ and SOJ. The developed simulator allows various combinations of electronic warfare equipment specifications (parameters) and operational tactics (parameters or algorithms) to be input for the purpose of analysis of the effect of these combinations on the mission effectiveness.

Effects of IR Reduction Design on RCS of UCAV (IR 저감 설계가 무인전투기의 RCS에 미치는 영향)

  • Song, Dong-Geon;Yang, Byeong-Ju;Myong, Rho-Shin
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.46 no.4
    • /
    • pp.297-305
    • /
    • 2018
  • The role of UCAV is to carry out various missions in hostile situations such as penetration and attack on the enemy territory. To this end, application of RF stealth technology is indispensable so as not to be caught by enemy radar. The X-47B UCAV with blended wing body configuration is a representative aircraft in which modern RCS reduction schemes are heavily applied. In this study, a model UCAV was first designed based on the X-47B platform and then an extensive RCS analysis was conducted to the model UCAV in the high-frequency regime using the Ray Launching Geometrical Optics (RL-GO) method. In particular, the effects of configuration of UCAV considering IR reduction on RCS were investigated. Finally, the effects of RAM optimized for the air intake of the model UCAV were analyzed.

PowerShell-based Malware Detection Method Using Command Execution Monitoring and Deep Learning (명령 실행 모니터링과 딥 러닝을 이용한 파워셸 기반 악성코드 탐지 방법)

  • Lee, Seung-Hyeon;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1197-1207
    • /
    • 2018
  • PowerShell is command line shell and scripting language, built on the .NET framework, and it has several advantages as an attack tool, including built-in support for Windows, easy code concealment and persistence, and various pen-test frameworks. Accordingly, malwares using PowerShell are increasing rapidly, however, there is a limit to cope with the conventional malware detection technique. In this paper, we propose an improved monitoring method to observe commands executed in the PowerShell and a deep learning based malware classification model that extract features from commands using Convolutional Neural Network(CNN) and send them to Recurrent Neural Network(RNN) according to the order of execution. As a result of testing the proposed model with 5-fold cross validation using 1,916 PowerShell-based malwares collected at malware sharing site and 38,148 benign scripts disclosed by an obfuscation detection study, it shows that the model effectively detects malwares with about 97% True Positive Rate(TPR) and 1% False Positive Rate(FPR).