• 제목/요약/키워드: Attack Analysis

검색결과 1,722건 처리시간 0.221초

Analysis of Security Requirements on DCU and Development Protection Profile based on Common Criteria Version 3.1 (DCU 보안요구사항 분석 및 CC v3.1 기반의 보호프로파일 개발)

  • Cho, Youngjun;Kim, Sinkyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제24권5호
    • /
    • pp.1001-1011
    • /
    • 2014
  • Smart Grid Devices could have security vulnerabilities that have legacy communication networks because of the fact that Smart Grid employs bi-directional communications and adopted a variety of communication interface. Consequently, it is required to build concrete response processes and to minimize the damage of the cyber attacks including security evaluation and certification methods. DCU is designed to collect meter data from numerous smart meter and send to utility's server so DCU installed between smart meter and utility's server. For this reason, If DCU compromised by attacker then attacker could use DCU to launching point for and attack on other devices. However, DCU's security evaluation and certification techniques do not suffice to be deployed in smart grid infrastructure. This work development DCU protection profile based on CC, it is expected that provide some assistance to DCU manufacturer for development of DCU security target and to DCU operator for help safety management of DCU.

Authenticated Mobile IPv6 Binding Update Protocol for Micro/Pico Cell Environments (마이크로 및 피코 셀 환경에 적합한 인증된 모바일 IPv6 바인딩 갱신 프로토콜)

  • Lee, Gi-Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • 제8권6호
    • /
    • pp.1519-1523
    • /
    • 2007
  • In this paper, we propose the fast and secure binding update protocol as handoff or handover in the micro and pico environment based on mobile IPv6. The nodes or routers on participating in this protocol generate their addresses from cryptographically generated addresses (CGAs) method unlike previous address generation method. The mobile node (MN) includes in home network or home link has limited power and computational abilities. So the home agent (HA) of the MN executes key agreement protocol with the correspondent node (CN) on behalf of the MN. The CN then creates a ticket on including session key, lifetime of ticket. and so on. It then transmits it to the MN via the HA of the MN. The ticket is used to communicate directly between the MN and its CN. In performance analysis, we analyze security of proposed binding update protocol under various attack scenarios and efficiency by comparing proposed protocol with prior binding update protocols. Finally we make a conclusion of this paper and present future works.

  • PDF

Contrast Analysis for CBRN attacks on educational research and best practices (테러대비를 위한 CBRNE교육 선진사례 분석에 관한 연구)

  • Kim, Tae hwan;Park, Dae woo;Hong, Eun sun
    • Journal of the Society of Disaster Information
    • /
    • 제5권1호
    • /
    • pp.78-100
    • /
    • 2009
  • This study is to protect peoples' life, minimize the property damage by coping with threats quickly and take more preventive measures in advance against nuclear bomb, CBR, and potential explosive. For this, CBRNE(Chemical, Biological, Radiological, Nuclear, Explosive) program research was used. Thanks to advance in technology, terrorist groups and even individuals make or keep nuclear and CBR weapons. And also it's likely that disaster and threats from a toxic gas, acute pathogens, accidents in the nuclear power plants and a high explosive could be happened a lot. Recently more organized terrorist groups maintain random attacks for unspecified individuals and also it's highly likely that a large-scale terrorist attack by WMD and CBRNEwill be done. To take strict measures against CBRNE attacks by terrorists is on the rise as an urgent national task. Moreover biological weapons are relatively easy and inexpensive to obtain or produce and cause mass casualties with a small amount. For this reason, more than 25 countries have already possessed them. In the 21 st century, the international safety environment marks the age of complicated threats : transnational threats such as comprehensive security and terror, organized crime, drug smuggling, illegal trade of weapons of mass destruction, and environmental disruption along with traditional security threats. These cause military threats, terror threats, and CBRNE threats in our daily life to grow. Therefore it needs to come up with measures in such areas as research development, policy, training program. Major industrial nations on CBRNE like USA, Canada, Switzerland, and Israel have implemented various educational programs. These researches could be utilized as basic materials for drawing up plans for civil defense, emergency services and worldwide countermeasures against CBRNE.

  • PDF

Security Analysis of Blockchain Systems: Case Study of Cryptocurrencies (블록체인 시스템의 보안성 분석: 암호 화폐에서의 사례 연구)

  • Lee, Sungbum;Lee, Boohyung;Myung, Sein;Lee, Jong-Hyouk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제28권1호
    • /
    • pp.5-14
    • /
    • 2018
  • With the advance of the 4th industrial revolution, Internet of Things (IoT) technology is actively being studied. In the era of the IoT, a decentralized operation is required to reduce load on servers and enable autonomous IoT data communication rather than focusing on centralized operation of being server client structures. This paper analyzes the security of a blockchain, a new form of distributed database platform that supports integrity and permanence of data. To achieve this, we divide the blockchain's major operations into a consensus process, network communication process, and key management process, and then describe possible attacks and countermeasures in each process. We also describe the attack occurred in typical cryptocurrency platforms such as Bitcoin and Ethereum.

Establishment for Efficiency Air-To-Ground Air Operation Model in Link-16 (Link-16 기반의 효율적인 공대지 항공작전 모델 설계)

  • Lee, Hyeong-Heon;Jang, Hyeong-Jun;Kim, Yeong-Gu;Lim, Jae-Sung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • 제13권5호
    • /
    • pp.861-868
    • /
    • 2010
  • As CAS, X-ATK, and INT models considered as the most typical Air-to-Ground operation models in ROKAF are mainly designed as the voice-centered system between aircraft and ground control facilities, it is critical to newly develop the Link-16 based model for the ROK-US combined operation between F-15K, AWACS, M-SAM, and KDX-III equipped with Link-16. Former studies had been limited to the CAS operation, and they had mainly focused on reducing the voice transmission time to exchange the information between each mission step with maintaining existing operation steps. Therefore, this paper makes up the weak point in former studies, thereby designing new Air-to-Ground operation model for CAS, X-ATK, INT mission using Enterprise Architecture OV6c, which enables both aircraft and ground control facilities or between aircraft to obtain the real-time information on the location, identification, armament and the real-time image data through the broadcasting function. Based on the analysis of new operation model, we come to a conclusion that by simultaneously exchanging the information on mission between nodes concerned through the broadcasting function of Link-16. It is possible to cut down superfluous steps among the mission steps, and to reduce the mission time. It is clear that it gives rise to improve the battle efficiency and the decision-making tempo as well as the battlefield situational awareness.

Antioxidant Property of Genistein: Inhibitory Effect on HOCI Induced Protein Degradation, DNA Cleavage, and Cell Death

  • Choi, Je-Min;Ryu, Hyun-Jin;Chung, Jae-Hwan;Park, Jae-Chul;Hwang, Jae-Kwan;Shin, Dong-Bum;Lee, Sang-Kyou;Ryang, Ryung
    • Food Science and Biotechnology
    • /
    • 제14권3호
    • /
    • pp.399-404
    • /
    • 2005
  • The aim of this study was to investigate the in vitro antioxidant profiles of genistein and other isoflavonoids. The reactivity of genistein towards stable radical and reactive oxygen species including ${\bullet}\;ABTS^+$, ${\bullet}{O_2}^-$, $H_2O_2$ and HOCl has been investigated, and the effects were compared with other isoflavonoids and antioxidants. All the tested isoflavonoids showed remarkable ${\bullet}\;ABTS^+$ scavenging activity and genistein was more potent than BHT and ascorbic acid. Genistein was more effective in scavenging hypochlorous acid than superoxide and hydrogen peroxide. At $10\;{\mu}M$ concentrations of genistein and genistin showed about 90% inhibitory effect on HOCl, while BHT and ascorbic acid showed lower than 50% inhibitory effect. Moreover, genistein could inhibit plasmid DNA cleavage, protein degradation and cell death from HOCl attack, while daidzein, BHT and ascorbic acid could not protect them effectively. These results suggest that genistein is a more potent radical scavenger than other isoflavonoids, and it can remarkably reduce cellular damage induced by HOCl.

A Study on Cloud Computing for Detecting Cyber Attacks (사이버공격 탐지를 위한 클라우드 컴퓨팅 활용방안에 관한 연구)

  • Lee, Jun-Won;Cho, Jae-Ik;Lee, Seok-Jun;Won, Dong-Ho
    • Journal of Advanced Navigation Technology
    • /
    • 제17권6호
    • /
    • pp.816-822
    • /
    • 2013
  • In modern networks, data rate is getting faster and transferred data is extremely increased. At this point, the malicious codes are evolving to various types very fast, and the frequency of occurring new malicious code is very short. So, it is hard to collect/analyze data using general networks with the techniques like traditional intrusion detection or anormaly detection. In this paper, we collect and analyze the data more effectively with cloud environment than general simple networks. Also we analyze the malicious code which is similar to real network's malware, using botnet server/client includes DNS Spoofing attack.

Short-term Coexisting Intracerebral Hemorrhage and Cerebral Infarctions

  • Song, Kwan-Su;Moon, Jae-Gon;Lee, Ho-Kook;Kim, Chang-Hyun;Hwang, Do-Yun
    • Journal of Korean Neurosurgical Society
    • /
    • 제38권6호
    • /
    • pp.419-424
    • /
    • 2005
  • Objective : Short-term coexisting intracerebral hemorrhage and cerebral infarctions defined as the recurrent stroke presented with different type within three weeks. Despite the high recurrence rate of stroke, little attention and insufficient clinical data had been given to short-term coexisting intracerebral hemorrhage and cerebral infarction's features. This study aims to estimate the risk factors and present the clinical features of short-term coexisting intracerebral hemorrhage and cerebral infarctions. Methods : We investigated 18 patients with short-term coexisting intracerebral hemorrhage and cerebral infarctions who were admitted to our hospital between January 1995 and January 2005. They were subdivided by the recurrence interval such as a group of within one week and another of between one and three weeks as hyperacute and acute respectively. Results : The mean interval between strokes was 6.64 days. Lesional analysis showed that short-term coexisting intracerebral hemorrhage and cerebral infarctions in this study occurred at the other side in 12 cases [66.7%]. The abnormality on the electrocardiographic feature [23.5%] and long-term history of hypertension [20.5%] were the most common risk factors. However, short-term history of diabetes was more common in hyperacute group than in acute group [P<0.05]. The mean number of risk factors was three in acute group. It is larger than that of hyperacute group [P<0.05]. Conclusion : If the patients who experienced cerebrovascular attack have many risk factors, they tend to be the cases of acute coexisting intracerebral hemorrhage and cerebral infarctions than hyperacute. Therefore, that cases are required to be vigilant to the change of patients' state up to three weeks in the treatment.

Ventricular premature complexes and associated factors in the early postinfarction period (급성 심근경색증 회복 초기의 심실기외 수축 발생에 관련하는 인자에 대한 연구)

  • Choi, Jong-Hoa;Hyun, Myung-Soo;Kim, Young-Jo;Shim, Bong-Sup;Lee, Hyun-Woo
    • Journal of Yeungnam Medical Science
    • /
    • 제7권1호
    • /
    • pp.61-68
    • /
    • 1990
  • To assess the role of multiple factors in influencing occurrence of ventricular premature complexes after acute myocardial infarction twenty-four hour Holter electrocardiographic tape recording were made in 40 survivors of an acute myocardial infarction 10 to 20 days after attack. Ventricular premature complexes were found in 72.5percent of the patients. The incidence and grade of ventricular premature complexes in the early postinfarction period were not correlated with left ventricular function, age, sex, smoking, dibetes mellitus, previous angina, and previous myocardial infarction. The occurrence of ventricular premature complexes showed a positive correlation with the occurrence of ST-T change. The occurrence of ventricular premature complexes during sleep hours was compared to the awake state. In 22 patients. the incidence of ventricular premature complexes was reduced during sleep. If patients free of ectopic activity during 24-hour monitoring sessions are excluded from analysis, the 22 of patients, or in 76percent, sleep was associated with a lowered occurrence of ventricular extrasystoles.

  • PDF

Analysis on the Correlation of Humor Style Types Shown in (<런닝맨>에서 나타난 유머스타일 유형 상관관계 분석)

  • Kim, Joon
    • Journal of Digital Convergence
    • /
    • 제17권11호
    • /
    • pp.157-162
    • /
    • 2019
  • This thesis analyzed the intermediation and correlation of positive humor style and negative humor style through an entertainment program broadcasted on SBS. For the theoretical background, the Humor Style Questionnaire(HSQ) developed by Martin et al., was selected. As the research methods, first, after classifying the types of humor style of members of , this study analyzed how the positive humor style and negative humor style would intermediate the formation of humor, and also the correlation of humor style of members. The types of positive humor style and negative humor style shown in were balanced in 4:4, which was classified in accordance with age, career experience, and power. The mediation of humor formation occurred at the point where humors confronted. The humor style had the correlation with twist.