• Title/Summary/Keyword: Attack Analysis

Search Result 1,704, Processing Time 0.029 seconds

Vulnerability Analysis and Demonstration of a GPS Spoofing Attack: Based on Product A (드론 환경에서의 GPS 스푸핑 공격 취약점 분석 및 실증: A 드론을 대상으로)

  • Youngjae Lee;Jinwook Kim;Wonbin Jung;Kyungroul Lee
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2024.01a
    • /
    • pp.109-111
    • /
    • 2024
  • 군사 목적으로 개발된 드론은 최근 다양한 산업 및 민간 분야로 확대되고 있으며, 이러한 확대에 따라, 드론이 급격하게 발전하여, 농업이나 무인 드론 택배와 같은 산업 전반적으로 긍정적인 효과를 창출하는 추세이다. 그러나 이러한 발전에 반하여, 드론에 장착된 카메라를 통한 사생활 침해나 테러 목적으로 활용하는 것과 같은 부정적인 측면이 드러나기 시작하였다. 특히, 드론의 위치와 밀접한 연관이 있는 GPS와 관련하여, 무인 이동체의 특성상, GPS 신호에 의존하여 사용자에게 드론의 위치를 전달하지만, 이러한 GPS 신호를 송신하는 위성은 거리가 매우 멀리 위치하고, 이에 따라, 신호 세기가 비교적 약한 문제점을 가진다. 이와 같은 문제점을 악용하는 GPS 스푸핑 공격이 등장하였으며, 이 공격은 만약 공격자가 GPS 신호를 조작하여 송신한다면, 드론에 장착된 GPS 수신기는 조작된 GPS 위치를 수신하며, 이에 따라, 드론의 제어권을 탈취하거나 충돌 유발, 비정상적인 비행 경로 유도와 같은 문제점이 발생한다. 본 논문에서는 최신의 상용화된 드론을 대상으로, GPS 스푸핑 공격의 취약점을 분석하고 실증한다. 이를 위하여, 공격자가 비행 금지 구역에 해당하는 GPS 신호를 조작하는 것으로 공격을 시도하고, 이에 따른 드론에서 준비된 동작인 강제 착륙과 같은 비정상적인 행위를 유발하여, 드론의 임무 수행 능력을 제한하는 취약점을 분석하고 실험을 통하여 실증한다. 본 논문의 결과를 토대로, 최신 드론에서 발생 가능한 보안 위협을 도출함으로써, 드론의 안전성을 향상시키기 위한 자료로 활용될 수 있을 것으로 사료된다.

  • PDF

Wearable Device Security Threat Analysis and Response Plan (웨어러블 디바이스 보안 위협 및 대응 방안)

  • Sung-Hwa Han
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.55-61
    • /
    • 2024
  • With the development of IoT technology, wearable services have also developed rapidly. Wearable devices required for this service are used as sensors and controllers in the form of smart bands. Wearable devices implement very concise SWlogic for possible long-term use and use wireless communication protocols to improve convenience. However, because this wearable device aims to be lightweight, it is more vulnerable to security than terminals used for other information services. Many smart healthcare or smart medical services are passive or do not apply security technology. By exploiting this security environment, attackers can obtain or modify important information through access to wearable devices. In this study, we analyzed the technical operating environment of wearable services and identified authentication information reuse attacks, BIAS attacks, battery drain attacks and firmware attacks on wearable devices. And we analyzed the mechanism of each security threat and confirmed the attack effect. In this study, we presented a response plan to respond to the identified security threats. When developing wearable services, it is expected that safer services can be built if the response plan proposed in this study is considered.

Analysis Technique for Chloride Behavior Using Apparent Diffusion Coefficient of Chloride Ion from Neural Network Algorithm (신경망 이론을 이용한 염소이온 겉보기 확산계수 추정 및 이를 이용한 염화물 해석)

  • Lee, Hack-Soo;Kwon, Seung-Jun
    • Journal of the Korea Concrete Institute
    • /
    • v.24 no.4
    • /
    • pp.481-490
    • /
    • 2012
  • Evaluation of chloride penetration is very important, because induced chloride ion causes corrosion in embedded steel. Diffusion coefficient obtained from rapid chloride penetration test is currently used, however this method cannot provide a correct prediction of chloride content since it shows only ion migration velocity in electrical field. Apparent diffusion coefficient of chloride ion based on simple Fick's Law can provide a total chloride penetration magnitude to engineers. This study proposes an analysis technique to predict chloride penetration using apparent diffusion coefficient of chloride ion from neural network (NN) algorithm and time-dependent diffusion phenomena. For this work, thirty mix proportions with the related diffusion coefficients are studied. The components of mix proportions such as w/b ratio, unit content of cement, slag, fly ash, silica fume, and fine/coarse aggregate are selected as neurons, then learning for apparent diffusion coefficient is trained. Considering time-dependent diffusion coefficient based on Fick's Law, the technique for chloride penetration analysis is proposed. The applicability of the technique is verified through test results from short, long term submerged test, and field investigations. The proposed technique can be improved through NN learning-training based on the acquisition of various mix proportions and the related diffusion coefficients of chloride ion.

Unguided Rocket Trajectory Analysis under Rotor Wake and External Wind (로터 후류와 외풍에 따른 무유도 로켓 궤적 변화 해석)

  • Kim, Hyeongseok;Chae, Sanghyun;Yee, Kwanjung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.46 no.1
    • /
    • pp.41-51
    • /
    • 2018
  • Downwash from helicopter rotor blades and external winds from various maneuvering make an unguided rocket change its trajectory and range. For the prediction of the trajectory and range, it is essential to consider the downwash effect. In this study, an algorithm was developed to calculate 6-Degree-Of-Freedom(6 DOF) forces and moments exerting on the rocket, and total flight trajectory of a 2.75-inch unguided rocket in a helicopter downwash flow field. Using Actuator Disk Model(ADM) analysis result, the algorithm could analyze the entire trajectory in various initial launch condition such as launch angle, launch velocity, and external wind. The algorithm that considered the interference between a fuselage and external winds could predict the trajectory change more precisely than inflow model analysis. Using the developed algorithm, the attitude and trajectory change mechanism by the downwash effect were investigated analyzing the effective angle of attack change and characteristics of pitching stability of the unguided rocket. Also, the trajectory and range changes were analyzed by considering the downwash effect with external winds. As a result, it was concluded that the key factors of the rocket range change were downwash area and magnitude which effect on the rocket, and the secondary factors were the dynamic pressure of the rocket and the interference between a fuselage and external winds. In tailwind case which was much influential on the range characteristics than other wind cases, the range of the rocket rose as increasing the tailwind velocity. However, there was a limit that the range of the rocket did not increase more than the specific tailwind velocity.

A Study on Using EAV (MERIDIAN) by Analysis of Cerebrovascular Disease Risk Factors (뇌혈관질환 위험요인과의 분석을 통한 EAV(MERIDIAN)활용에 관한 연구)

  • Kim, Young-Eun;Kim, Il-Wha;Moon, A-Ji;Kim, Nam-Kwen;Lee, Seung-Geun;Lee, Key-Sang
    • The Journal of Korean Medicine
    • /
    • v.31 no.5
    • /
    • pp.136-145
    • /
    • 2010
  • Objectives: Electroacupuncture according to Voll (EAV) has been used to quantify the skin's electrical resistance and conductance over acupuncture points that, based on traditional Chinese medicine, represent the state of health or disease of the organ or tissue. However, it doesn't have enough objective data yet, so the purpose of this study was to aid in the use of EAV in analysis of cerebrovascular disease risk factors. Methods: This study researched the clinical statistics of 216 cases: cerebrovascular attack (CVA) group 43, control group 173. We measured control meridian points (CMP) on hands and feet and the cardio ankle vascular index (CAVI) which represents atherosclerosis severity, and sex, age, hypertension, diabetes, dyslipidemia, and obesity. The data were then analyzed by t-test, chi-square test and logistic regression. Results: Between the CVA and control groups, there were not statistically significant differences in CMP. However, logistic regression analysis of the presence of CVA, mean of CMP heart and lung, sex, age, DBP (diastolic blood pressure), and HDL (high density lipoprotein) cholesterol showed that the risk of CVA was 1.1 times increased with CMP heart (p=0.002), in men was 4.12 times higher than in women (p=0.001), 1.09 times higher with age (p=0.000), 1.04 times higher with DBP (p=0.045), while was lower by 0.924 times with CMP lung (p=0.005) and 0.957 times with HDL cholesterol (p=0.006). Conclusion: Although there were not clear evidence or mechanisms about EAV, this study showed that if we study EAV further, we may be able to apply EAV as an objective instrument of oriental medicine in cerebrovascular disease.

A Study on The Excessive Liver-Symptoms(肝實證) in The Analysis of Five Visceral Symptoms By The Five Pathogenic Factors(五邪) (오장변증중(五臟辨證中) 간실증(肝實證)의 오사(五邪)에 의한 연구)

  • Kim, Jae-Hong;Kim, Tae-Hee
    • The Journal of Internal Korean Medicine
    • /
    • v.15 no.1
    • /
    • pp.176-209
    • /
    • 1994
  • 1. The Jung-Sa(正邪) of the Excessive Liver-Symptoms belongs to the eleven symptoms, there are blue face, blue thin fingernail, anger, fancy of larg body, dizziness, eye flame, Bell's palsy, hard swelling pain at braest, side pain going on the belly from the side, side pain and movement at the left side. 2. The Mi-Sa(微邪) of the Excessive Liver-Symptoms belongs to the four symptoms, there are meat in eye, edema in cheek, lack of appetite and diarrhea. 3. The Juk-Sa(賊邪) of the Excessive Liver-Symptoms belongs to the only one symptom, this is nosebleeding. 4. The Hu-Sa(虛邪) of the Excessive Liver-Symptoms belongs to the three symptoms, there are scrotum constraction, strain in belly and constipation. 5. The Sil-Sa(實邪) of the Excessive Liver-Symptoms belongs to the twenty eight symptoms, there are red eye, raised eyes(兩眼上?), spitting blood, sternocostal turgid pain, turgidity in belly, drooping testis, vomiting water acid, sickening, belching, confusion, impatience, frequent forgetfulness, headache, giddness, eye pain, deaf, ringing in the ear, feeling inverse, drying mouth, stuffiness sensation in the chest, chest pain, stuffiness sensation in the belly, bellyache, quadriplegia, spasm of extremities, tremor, alternate spells of fever and chills, high fever and strain in muscle. 6. Those symptoms, Red corner of the eye, red face, swelling on the forehead, stiff-neck and back strong, opisthotonos, constracture of the limbs, vomiting yellow bitter water, speech impediment, epilepsy, depression, strong tongue, different thing in throat, fullness and distention of the gastric region, feeling sick and tenesmus, have no connected with the Excessive Liver-Symptoms(肝實證) 7. The Excessive Liver-Symptoms(肝實證) is connected with the ganjabyoung(肝自病) and Hwa(火) which the pathology is, than because Mock(木) is excessive and Mock-Saeng-Hwa(木生火), the ganjabyoung(肝自病) and Sil-Sa(實邪) are many. 8. There are the sixteen symptoms with the exception of The Excessive Liver-Symptoms(肝實證), because supposed that the scholars in medicine included the union syndroms(合病), the combine syndroms(兼病) and the analysis of symptoms(辨證) in The Analysis of Five Visceral Symptoms. 9. During consideration of the symptoms at the above statements, where are many causes by Gan-Pung(肝風), there is difficult of distinction between the excessive Liver-Symptoms(肝實證) and C.V.A(Cerebral Vascular Attack). Because than NaeKyung(內經) distinguished between the excessive Liver-Symptoms(肝實證) and C.V.A., the future medical specialists connected with the excessive Liver-Symptoms(肝實證) and C.V.A.. 10. An appearance of Sang-Hwa(相火) that the liver possessed is divided into an appearance of Hwa(火), there will be making a study att the more necessary. 11. The cuases of each syndroms are consist of the origins of syndroms, its pathology and the positions where the syndroms appeared, I consider that is the various ways how judge the syndroms except the Five Pathogenic Factors(五邪). 12. If more than study will be achieved in all, the new definition will be standed about the Excessive and Deficient Five Visceral Syndroms(五臟虛實證), I consider this will be the foundation data that study the Oriental Medicine and the important data that is a judgement standard of clininc.

  • PDF

A Real-Time and Statistical Visualization Methodology of Cyber Threats Based on IP Addresses (IP 주소 기반 사이버공격 실시간 및 통계적 가시화 방법)

  • Moon, Hyeongwoo;Kwon, Taewoong;Lee, Jun;Ryou, Jaecheol;Song, Jungsuk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.465-479
    • /
    • 2020
  • Regardless of the domestic and foreign governments/companies, SOC (Security Operation Center) has operated 24 hours a day for the entire year to ensure the security for their IT infrastructures. However, almost all SOCs have a critical limitation by nature, caused from heavily depending on the manual analysis of human agents with the text-based monitoring architecture. Even though, in order to overcome the drawback, technologies for a comprehensive visualization against complex cyber threats have been studying, most of them are inappropriate for the security monitoring in large-scale networks. In this paper, to solve the problem, we propose a novel visual approach for intuitive threats monitoring b detecting suspicious IP address, which is an ultimate challenge in cyber security monitoring. The approach particularly makes it possible to detect, trace and analysis of suspicious IPs statistically in real-time manner. As a result, the system implemented by the proposed method is suitably applied and utilized to the real-would environment. Moreover, the usability of the approach is verified by successful detecting and analyzing various attack IPs.

The Study of Statistical Optimization of MTBE Removal by Photolysis(UV/H2O2) (광분해반응을 통한 MTBE 제거에 대한 통계적 최적화 연구)

  • Chun, Sukyoung;Chang, Soonwoong
    • Journal of the Korean GEO-environmental Society
    • /
    • v.12 no.9
    • /
    • pp.55-61
    • /
    • 2011
  • This study investigate the use of ultraviolet(UV) light with hydrogen peroxide($H_2O_2$) for Methyl Tert Butyl Ether(MTBE) degradation in photolysis reactor. The process in general demands the generation of OH radicals in solution at the presence of UV light. These radicals can then attack the MTBE molecule and it is finally destroyed or converted into a simple harmless compound. The MTBE removal by photolysis were mathematically described as the independent variables such as irradiation intensity, initial concentration of MTBE and $H_2O_2$/MTBE ratio, and these were modeled by the use of response surface methodology(RSM). These experiments were carried out as a Box-Behnken Design(BBD) consisting of 15 experiments. Regression analysis term of Analysis of Variance(ANOVA) shows significantly p-value(p<0.05) and high coefficients for determination values($R^2$=94.60%) that allow satisfactory prediction of second-order regression model. And Canonical analysis yields the stationery point for response, with the estimate ridge of maximum responses and optimal conditions for Y(MTBE removal efficiency, %) are $x_1$=25.75 W of irradiation intensity, $x_2$=7.69 mg/L of MTBE concentration and $x_3$=11.04 of $H_2O_2$/MTBE molecular ratio, respectively. This study clearly shows that RSM is available tool for optimizing the operating conditions to maximize MTBE removal.

Rule-base Expert System for Privacy Violation Certainty Estimation (개인정보유출 확신도 도출을 위한 전문가시스템개발)

  • Kim, Jin-Hyung;Lee, Alexander;Kim, Hyung-Jong;Hwang, Jun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.4
    • /
    • pp.125-135
    • /
    • 2009
  • Logs from various security system can reveal the attack trials for accessing private data without authorization. The logs can be a kind of confidence deriving factors that a certain IP address is involved in the trial. This paper presents a rule-based expert system for derivation of privacy violation confidence using various security systems. Generally, security manager analyzes and synthesizes the log information from various security systems about a certain IP address to find the relevance with privacy violation cases. The security managers' knowledge handling various log information can be transformed into rules for automation of the log analysis and synthesis. Especially, the coverage of log analysis for personal information leakage is not too broad when we compare with the analysis of various intrusion trials. Thus, the number of rules that we should author is relatively small. In this paper, we have derived correlation among logs from IDS, Firewall and Webserver in the view point of privacy protection and implemented a rule-based expert system based on the derived correlation. Consequently, we defined a method for calculating the score which represents the relevance between IP address and privacy violation. The UI(User Interface) expert system has a capability of managing the rule set such as insertion, deletion and update.

Quantifying Chloride Ingress in Cracked Concrete Using Image Processing (이미지 분석을 이용한 균열 콘크리트 내 염화물 침투 정량화 평가)

  • Kim, Kun-Soo;Park, Ki-Tae;Kim, Jaehwan
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.26 no.4
    • /
    • pp.57-64
    • /
    • 2022
  • Chloride, which is one of the main deterioration factors in reinforced concrete structures, can degrade the performance of the structure due to chloride-induced corrosion of steel. Chloride content at steel depth or the rate of chloride penetration is necessary to determine deterioration of reinforced concrete or to calculate initiation time of steel corrosion caused by chloride attack. Chlorides in concrete are generally identified with typical two methods including chloride profiling using potentiometric titration method and discoloration method using AgNO3 solution. The former is advantageous to estimate chloride penetration rate (diffusion coefficient in general) with measured chloride contents directly, but it is laborious. In the case of latter, while the result is obtained easily with the range of discoloration, the error may occur depending on workmanship when the depth of chloride ingress is measured. This study shows that chloride penetrated depth is evaluated with the results obtained from discoloration method through image analysis, thereby the error is minimized by workmanship. In addition, the effect of micro-crack in concrete is studied on chloride penetration. In conclusion, the depth of chloride penetration was quantified with image analysis and as it was confirmed that chlorides can rapidly penetrate through micro-cracks, caution is especially required for cracks in concrete structure.