• Title/Summary/Keyword: Attack Chain

Search Result 94, Processing Time 0.023 seconds

Effect of Ultrasound on the Decomposition of Sodium Dodecylbenzene Sulfonate in Aqueous Solution (Sodium Dodecylbenzene Sulfonate 수용액의 분해반응에서 초음파 효과)

  • Yim, Bong-Been
    • Journal of the Korean Chemical Society
    • /
    • v.48 no.6
    • /
    • pp.561-567
    • /
    • 2004
  • The influence of ultrasound frequency, dissolved gases, and initial concentration on the decomposition of sodium dodecylbenzene sulfonate(DBS) aqueous solution was investigated using ultrasound generator with 200 W ultrasound power. The decomposition rates at three frequencies(50, 200, and 600 kHz) examined under argon atmosphere were highest at 200 kHz. The highest observed decomposition rate at 200 kHz occurred in the presence of oxygen followed by air and argon, helium, and nitrogen. The effect of initial concentration of DBS on the ultrasonic decomposition was decreased with increasing initial concentration and would depend upon the formation of micelle in aqueous solution. It appears that the ultrasound frequency, dissolved gases, and initial concentration play an important role on the sonolysis of DBS. Sonolysis of DBS mainly take place at the interfacial region of cavitation bubbles by both OH radical attack and pyrolysis to alkyl chain, aromatic ring, and headgroup.

A Brute-force Technique for the Stepping Stone Self-Diagnosis of Interactive Services on Linux Servers (리눅스 서버에서 인터렉티브 서비스 Stepping Stone 자가진단을 위한 brute-force 기법)

  • Kang, Koo-Hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.5
    • /
    • pp.41-51
    • /
    • 2015
  • In order to hide their identities, intruders on the Internet often attack targets indirectly by staging their attacks through intermediate hosts known as stepping stones. In this paper, we propose a brute-force technique to detect the stepping stone behavior on a Linux server where some shell processes remotely logged into using interactive services are trying to connect other hosts using the same interactive services such as Telnet, Secure Shell, and rlogin. The proposed scheme can provide an absolute solution even for the encrypted connections using SSH because it traces the system calls of all processes concerned with the interactive service daemon and their child processes. We also implement the proposed technique on a CentOS 6.5 x86_64 environment by the ptrace system call and a simple shell script using strace utility. Finally the experimental results show that the proposed scheme works perfectly under test scenarios.

Cyber Weapon Model for the National Cybersecurity (국가사이버안보를 위한 사이버무기 모델 연구)

  • Bae, Si-Hyun;Park, Dae-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.2
    • /
    • pp.223-228
    • /
    • 2019
  • Recently, the United States has been trying to strengthen its cybersecurity by upgrading its position as an Unified Combatant Command that focuses on the Cyber Command in the United States, strengthening operations in cyberspace, and actively responding to cyber threats. Other major powers are also working to strengthen cyber capabilities, and they are working to strengthen their organization and power. The world demands economic power for its own interests rather than its own borders. But Cyber World is a world without borders and no defense. Therefore, a cyber weapon system is necessary for superiority in cyberspace (defense, attack) for national cybersecurity. In this paper, we analyze operational procedures for cyber weapons operation. And we design cyber weapons to analyze and develop the best cyber weapons to lead victory in cyberwarfare. It also conducts cyber weapons research to solve the confrontation between Cyber World.

Delivery Tracing Protect Model Based Smart Contract for Guaranteed Anonymity (익명성 보호를 위한 스마트 컨트랙트의 배송추적 방지 모델)

  • Kim, Young Chan;Kim, Young Soo;Im, Kwang Hyuk
    • Journal of Industrial Convergence
    • /
    • v.16 no.1
    • /
    • pp.15-20
    • /
    • 2018
  • Along with the increase of internet shopping, crimes that exploited personal information on the invoice of goods are becoming more and more advanced and becoming more and more classified from the interception of goods through voice phishing attack, injury, sexual offense. Therefore, in order to guarantee the anonymity of the customer's delivery information, there is a need for a delivery tracking prevention system which keeps the route information of the product's destination secret among delivery companies. For this purpose, We suggest that delivery tracing protect model based smart contract for guaranteed anonymity to protect the anonymity by encrypting delivery information and by separation of payment and personal information using the anonymity technique of block chain-based cryptography. Our proposed model contributes to expansion of internet shopping based on block chaining by providing information about product sales to company and guaranteeing anonymity of customer's delivery information to customer.

Development of Non-toxic Recombinant Ricin Vaccine and Evaluation of Vaccine Efficacy (독성을 제거한 재조합 리신 백신 개발 및 효능평가)

  • Hyeongseok Yun;Hae-Eun Joe;Dong Hyun Song;Chi Ho Yu;Young-Jo Song;Gyeung Haeng, Hur
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.27 no.2
    • /
    • pp.304-310
    • /
    • 2024
  • Ricin is a highly toxic protein which is produced in the seeds of the castor oil plant. Ricin toxin A chain has ribosomal RNA N-glycosylase activity that irreversibly hydrolyses the N-glycosidic bond of the adenine residue at position 4324 within the 28S rRNA. In this study, we developed non-toxic recombinant ricin vaccine(R51) in E. coli expression system, and evaluated efficacy of the R51 according to adjuvants. When the R51 was administered using aluminum hydroxide as an adjuvant, the vaccine efficacy was higher than that of TLR agonists or aluminum phosphate. Because it is time-consuming to administer the vaccine three times at three-week intervals, we investigated the survival rate and antibody titer of mice according to the change of time interval of vaccination. Interestingly, there was no difference in survival rate and antibody titer when R51 was administered at 0, 1, and 3 weeks or 0, 2, and 4 weeks compared to when administered at 0, 3, and 6 weeks. Therefore, the developed R51 vaccine is promising to protect soldiers from Ricin attack.

The analysis on Japan's New Maritime Strategy and the Development of its Naval Forces - focusing on Japan's countermeasure to China's pursuing of maritime hegemony - (일본의 신(新) 해양전략과 해상전력 발전 동향 분석 - 중국의 해양패권 추구에 대한 대응을 중심으로 -)

  • Bae, Joon-Hyung
    • Strategy21
    • /
    • s.40
    • /
    • pp.5-36
    • /
    • 2016
  • Recently, the Japanese government revised the three guidelines of its security policy, the National Security Strategy(NSS), the National Defense Program Outline and Midterm Defense Buildup Plan, exceptionally at one time. This means Japan has been seeking the new strategy and strengthening military power considering changing regional security environment. Moreover, Japan revised the security laws for the right to collective self-defense, which authorized the use of force even when Japan is not under attack. Also, Japan renewed the Guidelines for Japan-U.S. Defense Cooperation in twenty years, and has expanded JSDF's scope of activity to a worldwide level. These changes imply Japan would constantly seek to build military forces focusing on naval forces. Because Japan's naval forces, the JMSDF is the means that allow Japan to use its force at anywhere overseas and expand its roles and missions in international society by the basis of the right to collective self-defense. This research will analyze Japan's new maritime strategy and trend of force development and eventually look for the implication on our maritime security These days, Japan has perceived Chinese rapid increase of naval power and pursuing of maritime hegemony as a grave threat. In response to this, Japan is designing new maritime strategy, which are "remote islands defense and recapture" and proactively develop a new type of naval forces to accomplish this new strategy. The Japan's "remote island defense and recapture strategy" is to harden its defensive posture in Nansei islands which correspond to China's 1st island chain for chinese A2/AD strategy and directly encounter with China and to protect its own dominium and maritime interest while supporting US national strategy in East Asia. Japan continues to build compact, multi-functional ship to accomplish "remote island defense and recapture strategy" and keep strengthening its maritime power projection capability to include build of new amphibious ship, and large, multi-functional ship which can provide effective C2. These changes imply that Japan is shifting its strategy from passive and defensive to proactive and aggressive way and continues to pursue naval buildup.The implication of Japan's new maritime strategy and naval buildup needs to be observed carefully and we need to keep developing naval power required to protect our maritime sovereignty and interest.

Effects of PEGylated scFv Antibodies against Plasmodium vivax Duffy Binding Protein on the Biological Activity and Stability In Vitro

  • Kim, So-Hee;Lee, Yong-Seok;Hwang, Seung-Young;Bae, Gun-Won;Nho, Kwang;Kang, Se-Won;Kwak, Yee-Gyung;Moon, Chi-Sook;Han, Yeon-Soo;Kim, Tae-Yun;Kho, Weon-Gyu
    • Journal of Microbiology and Biotechnology
    • /
    • v.17 no.10
    • /
    • pp.1670-1674
    • /
    • 2007
  • Duffy binding protein (DBP) plays a critical role in Plasmodium vivax invasion of human red blood cells. We previously reported a single-chain antibody fragment (scFv) that was specific to P. vivax DBP (PvDBP). However, the stabilization and the half-life of scFvs have not been studied. Here, we investigated the effect of PEGylated scFvs on their biological activity and stability in vitro. SDS-PAGE analysis showed that three clones (SFDBII-12, -58, and -92) were formed as monomers (about 70 kDa) with PEGylation. Clone SFDBII-58 gave the highest yield of PEGylated scFv. Binding analysis using BIAcore between DBP and scFv showed that both SFDBII-12 and -58 were decreased approximately by two folds at the level of binding affinity to DBP after PEGylation. However, the SFDBII-92 clone still showed a relatively high level of binding affinity ($K_D=1.02{\times}10^{-7}\;M$). Binding inhibition assay showed that PEGylated scFv was still able to competitively bind the PvDBP and playa critical role in inhibiting the interactions between PvDBP protein expressed on the surface of Cos-7 cells and Duffy receptor on the surface of erythrocytes. When both scFvs and their PEGylated counterparts were exposed to trypsin, scFv was completely degraded only after 24 h, whereas 35% of PEGylated scFvs remained intact, maintaining their stability against the proteolytic attack of trypsin until 72 h. Taken together, these results suggest that the PEGylated scFvs retain their stability against proteolytic enzymes in vivo, with no significant loss in their binding affinity to target antigen, DBP.

Effects of Dietary Levels of Corn and Tuna Oils on the Formation of Preneoplastic Lesions in Rat Hepatocellular Carcinogenesis (쥐간세포암화과정에서 옥수수기름과 참치기름의 수준에 따른 전암성 병변의 변화)

  • Kim Sook hee;Kang Sang kyoung;Choi Hay mie
    • Journal of Nutrition and Health
    • /
    • v.38 no.1
    • /
    • pp.20-29
    • /
    • 2005
  • This study is conducted to determine the effects of dietary levels of corn and tuna oils on the formation of preneoplastic lesions in die-thylnitrosamine (DEN) induced rat hepatocarcinogenesis. Weanling male Sprague-Dawley rats were fed 2.5, 5, 15, 25% (w/w) corn or tuna oils. Hepatocellular carcinogenesis was induced by DEN (200 mg/kg body weight) and two-thirds partial hepactectomy was carried out 3 weeks later and were sacrificed 8 weeks after DEN initiation. Tuna oil group showed smaller area of placental glutathione S-transferase (GST-P) positive foci than com oil group. Com oil group of 25% (w/w) showed the widest area of GST -P positive foci, and tuna oil group showed significantly smaller area of GST-P positive foci than com oil in 25% (w/w) level but had no differences between oil levels. Thio-barbituric acid reactive substances (TBARS) content was the highest in 25% (w/w) level of tuna oil group fed long chain and highly polyunsaturated fatty acids. Also serum ${\gamma}$ -glutamyltranspeptidase (GGT) activities in 25% level of tuna oil group were significantly higher than by other levels. As oil contents increased, glucose 6-phosphatase (G6Pase) seems to decrease in com oil groups but remained the same in tuna oil groups. Glutathione reductase (GR) activities were significantly higher in tuna oil group, and the higher the level of tuna oil, the higher GR activities. But Cu/Zn superoxide dismutase (SOD) and glutathione peroxidase (GPx) activities didn't seem to be influenced by levels and kind of dietary fats. Therefore, as oil levels increased, com oil rich in n-6 fatty acids promoted carcinogenesis but tuna oil rich in eicosapentaenoic acid (EPA) and docosahexaenoic acid (DHA) of n-3 fatty acids suppressed. Although lipid peroxidation products were elevated in 25% (w/w) tuna oil group, GST-P positive foci didn't increase. Therefore pre-neoplastic lesions might be reduced through mediation of a lipid peroxidation process in tuna oil. As fat contents of tuna oil increased, elevated GR activities may give a rise to produce more reduced glutathione in order to protect against free radical attack, and high G6Pase activities remained the same and they contributed to membrane stability. So tuna oil diet seems to protect hepatocarcinogenesis.

Analysis of Influencing Factors of Cyber Weapon System Core Technology Realization Period (사이버 무기체계 핵심기술 실현시기의 영향 요인 분석)

  • Lee, Ho-gyun;Lim, Jong-in;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.281-292
    • /
    • 2017
  • It is demanded to promote research and development of cyber weapons system and core technology in response to the ongoing cyber attack of North Korea. In this paper, core technologies of the future cyber weapon system are developed and the factors affecting the realization timing of core technologies were analyzed. 9 core technology groups and 36 core technologies are derived. Afterwards, these core technology groups are compared to the operation phase of the joint cyber warfare guideline and the cyber kill chain of Lockheed Martin. As a result of the comparison, it is confirmed that the core technology groups cover all phases of the aforementioned tactics. The results of regression analyses performed on the degree of influence by each factor regarding the moment of core technology realization show that the moment of core technology realization approaches more quickly as factors such as technology level of the most advanced country, technology level of South Korea, technology transfer possibility from the military sector to the non-military sector(spin-off factor), and technology transfer possibility from the non-military sector to the military sector(spin-on factor) increase. On the contrary, the moment of core technology realization is delayed as the degree at which the advanced countries keep their core technologies from transferring decrease. The results also confirm that the moment of core technology realization is not significantly correlated to the economic ripple effect factor. This study is meaningful in that it extract core technologies of cyber weapon system in accordance with revision of force development directive and join cyber warfare guideline, which incorporated cyber weapon system into formal weapon system. Furthermore, the study is significant because it indicates the influential factor of the moment of core technology realization.

User Integrated Authentication System using EID in Blockchain Environment (블록체인 환경에서 EID를 이용한 사용자 통합 인증 시스템)

  • Kim, Jai-Yong;Jung, Yong-Hoon;Jun, Moon-Seog;Lee, Sang-Beon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.3
    • /
    • pp.24-31
    • /
    • 2020
  • Centralized systems in computing environments have various problems, such as privacy infringement due to hacking, and the possibility of privacy violations in case of system failure. Blockchain, one of the core technologies for the next generation of converged information, is expected to be an alternative to the existing centralized system, which has had various problems. This paper proposes a blockchain-based user authentication system that can identify users using EID in an online environment. Existing identification (ID)/password (PW) authentication methods require users to store personal information in multiple sites, and receive and use their respective IDs. However, the proposed system can be used without users signing up at various sites after the issuing of an EID. The proposed system issues an EID with a minimum of information, such as an e-mail address and a telephone number. By comparing the stability and efficiency of a centralized system, the proposed integrated authentication system proved to be excellent. In order to compare stability against existing systems, we chose attack methods and encroachments on the computing environment. To verify efficiency, the total throughput between the user's app, the issuance and certification-authority's servers, and the service provider's servers was compared and analyzed based on processing time per transaction.