• 제목/요약/키워드: Attack Mitigation

검색결과 50건 처리시간 0.024초

Effects of unconfined blast on strategic structures and its protective measures

  • Choubey, Bishwajeet;Dutta, Sekhar C.;Hussain, Md. Ahsaan
    • Structural Engineering and Mechanics
    • /
    • 제84권2호
    • /
    • pp.167-180
    • /
    • 2022
  • A strategic structure when exposed to direct hit of conventional bomb/projectile are severely damaged because of large amounts of energy released by the impact and penetration of bomb. When massive concrete slabs suffer a direct hit, the energy released during impact and penetration process are able to easily break up large mass of concrete. When over stressed under such impact of bombs, the concrete structure fails showing brittle behavioural nature. This paper is intended to study and suggest the protective measures for structures used for strategic application by adopting a means to dissipate the large quantum of energy released. To quantitatively evaluate the force, displacement and energy in such scenario, a fine numerical model of the proposed layered structure of different combinations was built in ANSYS programme in which tri-nitrotoluene (TNT) explosive was detonated at penetration depth calculated for GP1000 Lbs bomb. The distinct blast mitigation effect of the proposed structure was demonstrated by adopting various layers/barriers created as protective measures for the strategic structure. The calculated result shows that the blast effect on the structure is potentially reduced due to provision of buster slab with sand cushioning provided as protective measure to the main structure. This concept of layered protective measures may be adopted for safeguarding strategic structures such as Domes, Tunnels and Underground Structures.

A Survey on UAV Network for Secure Communication and Attack Detection: A focus on Q-learning, Blockchain, IRS and mmWave Technologies

  • Madhuvanthi T;Revathi A
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제18권3호
    • /
    • pp.779-800
    • /
    • 2024
  • Unmanned Aerial Vehicle (UAV) networks, also known as drone networks, have gained significant attention for their potential in various applications, including communication. UAV networks for communication involve using a fleet of drones to establish wireless connectivity and provide communication services in areas where traditional infrastructure is lacking or disrupted. UAV communication networks need to be highly secured to ensure the technology's security and the users' safety. The proposed survey provides a comprehensive overview of the current state-of-the-art UAV network security solutions. In this paper, we analyze the existing literature on UAV security and identify the various types of attacks and the underlying vulnerabilities they exploit. Detailed mitigation techniques and countermeasures for the protection of UAVs are described in this paper. The survey focuses on the implementation of novel technologies like Q-learning, blockchain, IRS, and mmWave. This paper discusses network simulation tools that range in complexity, features, and programming capabilities. Finally, future research directions and challenges are highlighted.

국방 네트워크 환경에서 ATT&CK 기반 취약점 완화 체계 구축 방안 (Vulnerability Mitigation System Construction Method Based on ATT&CK in M ilitary Internal Network Environment)

  • 안광현;이한희;박원형;강지원
    • 융합보안논문지
    • /
    • 제20권4호
    • /
    • pp.135-141
    • /
    • 2020
  • 국방부는 주기적인 사이버방호 훈련을 실시함에 따라 사이버작전의 전력과 역량을 보강하고 있다. 하지만 적 사이버공격 능력 수준을 고려할 때 군의 사이버방호 능력 수준은 현저히 낮으며 군용 네트워크망에 대한 사이버위협을 대응할 수 있는 보호대책과 대응체계가 명확하게 설계되어 있지 않아 민·관의 사이버보안 능력 수준에도 못 미치고 있는 실태이다. 따라서 본 논문에서는 국내·외 사이버보안 프레임워크를 참조하여 국방 네트워크망 취약점 완화 체계를 구축할 수 있는 요소로 군 특수성을 지닌 군 내부망 주요 위협 정보 및 국방정보시스템 보안 요구사항을 파악하고, 공격자의 의도파악과 전술, 기법 및 절차 정보(ATT&CK)를 적용하여 국방 네트워크 환경에 대한 사이버공격을 효율적으로 보호 해주는 군 내부망 취약점 완화 체계 구축 방안을 제안한다.

MS Windows에서 인젝션 공격 및 방어 기법 연구 (A Study on Injection Attacks and Defenses on Microsoft Windows)

  • 성호준;조창연;이호웅;조성제
    • 한국소프트웨어감정평가학회 논문지
    • /
    • 제16권2호
    • /
    • pp.9-23
    • /
    • 2020
  • 기업이나 기관의 데스크톱 및 엔터프라이즈 서버용 운영체제로 마이크로소프트사의 Windows가 많이 활용되고 있고 사이버 공격의 주요 대상이 되고 있다. 마이크로소프트사는 다양한 보호 기술을 제공하고 주기적인 보안 패치를 통해 노력하고 있지만, 여전히 DLL 인젝션(injection)이나 프로세스 인젝션 등의 공격 위협이 존재하고 있다. 본 논문에서는 Windows 시스템에서 12가지 인젝션 공격 기법에 대해 분석하고, 4개의 응용 프로그램들을 대상으로 인젝션 공격 실험을 수행한다. 실험 결과를 통해 인젝션 공격의 위험성을 파악하고, 마이크로소프트에서에서 제공하는 인젝션 공격에 대한 완화 기술의 유효성을 검증한다. 실험 결과, 현재 응용 프로그램들이 여러 인젝션 공격에 취약함을 알 수 있었다. 최종적으로, 이러한 인젝션 공격에 대한 완화 기법을 제시하고 효용성을 분석하였다.

Passive Benign Worm Propagation Modeling with Dynamic Quarantine Defense

  • Toutonji, Ossama;Yoo, Seong-Moo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제3권1호
    • /
    • pp.96-107
    • /
    • 2009
  • Worm attacks can greatly distort network performance, and countering infections can exact a heavy toll on economic and technical resources. Worm modeling helps us to better understand the spread and propagation of worms through a network, and combining effective types of mitigation techniques helps prevent and mitigate the effects of worm attacks. In this paper, we propose a mathematical model which combines both dynamic quarantine and passive benign worms. This Passive Worm Dynamic Quarantine (PWDQ) model departs from previous models in that infected hosts will be recovered either by passive benign worms or quarantine measure. Computer simulation shows that the performance of our proposed model is significantly better than existing models, in terms of decreasing the number of infectious hosts and reducing the worm propagation speed.

울릉도의 귀화식물 분포 (The Distribution of non-native Plants in Ulleung Island)

  • 박수현;고강석;길지현
    • 한국자원식물학회지
    • /
    • 제19권2호
    • /
    • pp.237-242
    • /
    • 2006
  • Non-native flora of the Ulleung island, located in the eastern part of South Korea, was surveyed as 54 taxa with 16 families, 35 genera, 53 species and 1 variety. Considering the geographical distribution aspects of the island, the flora of the island showed more closely related with Korean Peninsular than Japan. Poaceace (28%) and Asteraceae (24%) represents more than 50% of the non-native flora in Ulleung island, meaning that they have an advantage of seed dispersal and adaptation to new environments. Ulleung island is comparatively small island of vulnerable to the attack of invasive alien plants but presently, it has the least number of non-native plants than other areas in South Korea. Therefore, we need to take much interest in prevention and mitigation of non-native plant in the future.

Evaluating and Mitigating Malicious Data Aggregates in Named Data Networking

  • Wang, Kai;Bao, Wei;Wang, Yingjie;Tong, Xiangrong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권9호
    • /
    • pp.4641-4657
    • /
    • 2017
  • Named Data Networking (NDN) has emerged and become one of the most promising architectures for future Internet. However, like traditional IP-based networking paradigm, NDN may not evade some typical network threats such as malicious data aggregates (MDA), which may lead to bandwidth exhaustion, traffic congestion and router overload. This paper firstly analyzes the damage effect of MDA using realistic simulations in large-scale network topology, showing that it is not just theoretical, and then designs a fine-grained MDA mitigation mechanism (MDAM) based on the cooperation between routers via alert messages. Simulations results show that MDAM can significantly reduce the Pending Interest Table overload in involved routers, and bring in normal data-returning rate and data-retrieval delay.

Mitigation of Adverse Effects of Malicious Users on Cooperative Spectrum Sensing by Using Hausdorff Distance in Cognitive Radio Networks

  • Khan, Muhammad Sajjad;Koo, Insoo
    • Journal of information and communication convergence engineering
    • /
    • 제13권2호
    • /
    • pp.74-80
    • /
    • 2015
  • In cognitive radios, spectrum sensing plays an important role in accurately detecting the presence or absence of a licensed user. However, the intervention of malicious users (MUs) degrades the performance of spectrum sensing. Such users manipulate the local results and send falsified data to the data fusion center; this process is called spectrum sensing data falsification (SSDF). Thus, MUs degrade the spectrum sensing performance and increase uncertainty issues. In this paper, we propose a method based on the Hausdorff distance and a similarity measure matrix to measure the difference between the normal user evidence and the malicious user evidence. In addition, we use the Dempster-Shafer theory to combine the sets of evidence from each normal user evidence. We compare the proposed method with the k-means and Jaccard distance methods for malicious user detection. Simulation results show that the proposed method is effective against an SSDF attack.

A Cost-Optimization Scheme Using Security Vulnerability Measurement for Efficient Security Enhancement

  • Park, Jun-Young;Huh, Eui-Nam
    • Journal of Information Processing Systems
    • /
    • 제16권1호
    • /
    • pp.61-82
    • /
    • 2020
  • The security risk management used by some service providers is not appropriate for effective security enhancement. The reason is that the security risk management methods did not take into account the opinions of security experts, types of service, and security vulnerability-based risk assessment. Moreover, the security risk assessment method, which has a great influence on the risk treatment method in an information security risk assessment model, should be security risk assessment for fine-grained risk assessment, considering security vulnerability rather than security threat. Therefore, we proposed an improved information security risk management model and methods that consider vulnerability-based risk assessment and mitigation to enhance security controls considering limited security budget. Moreover, we can evaluate the security cost allocation strategies based on security vulnerability measurement that consider the security weight.

보건의료관점에서 본 국가재난안전관리 체계 및 대책 (A brief review of national management system in public health and medical aspect)

  • 김지희;이시영
    • 한국방재학회:학술대회논문집
    • /
    • 한국방재학회 2008년도 정기총회 및 학술발표대회
    • /
    • pp.375-376
    • /
    • 2008
  • Recently the increase of natural disaster and man-made disaster, newly emerging infectious diseases and bioterrorism attack changed the world in many aspects. So the Ministry of Health and Welfare and other related agencies are trying to solve the problems with disasters. We discussed these problems in the following eleven categories. (1) emergency medicine (2) communicable disease control, (3) food safety control, (4) public facilities safety, (5) social welfare facilities safety, (6) bioterrorism control, (7) geriatric health care, (8) insurance support, (9) overseas disaster victim support, (10) national organization protection, (11) fire fighter safety in forest fire. Through the reviews on the various kinds of disaster, we proposed the disaster control measure for the near future.

  • PDF