• 제목/요약/키워드: Attack Modeling

검색결과 152건 처리시간 0.028초

베이즈 네트워크를 이용한 탈중앙화 암호화폐 지갑의 정량적 위험성 평가 (Quantitative Risk Assessment on a Decentralized Cryptocurrency Wallet with a Bayesian Network)

  • 유병철;김승주
    • 정보보호학회논문지
    • /
    • 제31권4호
    • /
    • pp.637-659
    • /
    • 2021
  • 2009년 비트코인 블록체인이 처음 생성된 이후 암호화폐 사용자는 꾸준히 증가하고 있다. 하지만 이러한 사용자들의 암호화폐 지갑에 보관된 자산을 노리는 해킹 공격도 증가하고 있다. 따라서 우리는 시중에 나와 있는 암호화폐 지갑들이 안전하게 만들어졌는지를 점검하기 위해 각 지갑에 내재된 위험성을 평가한다. 우리는 위협 모델링을 통해 암호화폐 지갑에 내재된 위협을 식별하고 보안 요구사항을 도출한다. 그리고 도출된 보안 요구사항을 바탕으로 실제 지갑들의 보안성을 분석하고 공격트리와 베이즈 네트워크 등을 활용하여 각 지갑의 위험성을 정량적으로 측정한다. 위험성 평가 결과, 하드웨어 지갑보다 소프트웨어 지갑의 평균적인 위험성이 1.22배 높은 것으로 나타났다. 그리고 하드웨어 지갑 간 비교에서는 secure element를 내장한 Ledger Nano S 지갑보다 범용 MCU를 내장한 Trezor One 지갑의 위험성이 1.11배 높은 것으로 나타났다. 하지만 secure element를 사용하는 것은 암호화폐 지갑의 위험성을 낮추는 데에는 상대적으로 효과가 낮은 것으로 나타났다.

방산업체 비대면(재택) 근무를 위한 보안 요구사항 연구 (A study on security requirements for Telecommuting in defense industry)

  • 황규섭;류연승
    • 융합보안논문지
    • /
    • 제23권5호
    • /
    • pp.209-221
    • /
    • 2023
  • 2019년 12월 코로나19 바이러스의 급격한 확산으로 인해 대면 중심의 근무환경이 비대면 중심의 근무환경으로 급격히 전환되었다. 그러나 방산업체의 경우 군과 관련된 기술을 다루는 조직으로 망분리 정책을 적용하고 있어 비대면 적용에 제한이 많은 상태이다. 비대면 근무는 전세계적인 변화이고 향후 급변하는 환경을 고려했을 때 방산업체도 적용해야 하는 시급한 과제이다. 때문에 현재 방산업체가 비대면 근무를 시행하기 위해서는 VPN, VDI, 망연동시스템 등은 필수 요소로 적용되어야 한다. 결국 필연적으로 일부 접점이 발생할 수 밖에 없는데 이로 인해 보안취약점이 증가할 것이며 적극적인 보안관리가 중요하다. 이에 본 논문에서는 미국의 MITER에서 사이버 공격을 체계적으로 탐지하고 대응하기 위해 주기적으로 발표하고 있는 MITRE ATT&CK Framework의 공격전술을 기반으로 공격유형을 선정, 위협을 분석하고 STRIDE 위협 모델링을 적용하여 보안위협을 분류, 구체적인 보안 요구사항을 제시하고자 한다.

Molecular Modeling and Docking Studies of 3'-Hydroxy-N-methylcoclaurine 4'-O-Methyltransferase from Coptis chinensis

  • Zhu, Qiankun;Zhu, Mengli;Fan, Gaotao;Zou, Jiaxin;Feng, Peichun;Liu, Zubi;Wang, Wanjun
    • Bulletin of the Korean Chemical Society
    • /
    • 제35권1호
    • /
    • pp.62-68
    • /
    • 2014
  • Coptis chinensis 3'-hydroxy-N-methylcoclaurine 4'-O-methyltransferase (HOMT), an essential enzyme in the berberine biosynthetic pathway, catalyzes the methylation of 3'-hydroxy-N-methylcoclaurine (HMC) producing reticuline. A 3D model of HOMT was constructed by homology modeling and further subjected to docking with its ligands and molecular dynamics simulations. The 3D structure of HOMT revealed unique structural features which permitted the methylation of HMC. The methylation of HMC was proposed to proceed by deprotonation of the 4'-hydroxyl group via His257 and Asp258 of HOMT, followed by a nucleophilic attack on the SAM-methyl group resulting in reticuline. HOMT showed high substrate specificity for methylation of HMC. The study evidenced that Gly117, Thr312 and Asp258 in HOMT might be the key residues for orienting substrate for specific catalysis.

요소항력모델을 활용한 선저검사용 ROV 모델링 및 트래킹 시뮬레이션 (Modeling and Tracking Simulation of ROV for Bottom Inspection of a Ship using Component Drag Model)

  • 전명준;이동현;윤현규;구본국
    • 한국해양공학회지
    • /
    • 제30권5호
    • /
    • pp.374-380
    • /
    • 2016
  • The large drift and angle of attack motion of an ROV (Remotely operated vehicle) cannot be modeled using the typical hydrodynamic coefficients of conventional straight running AUVs and specific slender bodies. In this paper, the ROV hull is divided into several simple-shaped components to model the hydrodynamic force and moment. The hydrodynamic force and moment acting on each component are modeled as the components of added mass force and drag using the known values for simple shapes such as a cylinder and flat plate. Since an ROV is operated under the water, the only environmental force considered is the current effect. The target ROV dealt with in this paper has six thrusters, and it is assumed that its maneuvering motion is determined using a thrust allocation algorithm. Tracking simulations are carried out on the ship’s surface near the stern, bow, and midship sections based on the modeling of the hydrodynamic force and current effect.

Modeling and simulation of large crowd evacuation in hazard-impacted environments

  • Datta, Songjukta;Behzadan, Amir H.
    • Advances in Computational Design
    • /
    • 제4권2호
    • /
    • pp.91-118
    • /
    • 2019
  • Every year, many people are severely injured or lose their lives in accidents such as fire, chemical spill, public pandemonium, school shooting, and workplace violence. Research indicates that the fate of people in an emergency situation involving one or more hazards depends not only on the design of the space (e.g., residential building, industrial facility, shopping mall, sports stadium, school, concert hall) in which the incident occurs, but also on a host of other factors including but not limited to (a) occupants' characteristics, (b) level of familiarity with and cognition of the surroundings, and (c) effectiveness of hazard intervention systems. In this paper, we present EVAQ, a simulation framework for modeling large crowd evacuation by taking into account occupants' behaviors and interactions during an emergency. In particular, human's personal (i.e., age, gender, disability) and interpersonal (i.e., group behavior and interactions) attributes are parameterized in a hazard-impacted environment. In addition, different hazard types (e.g., fire, lone wolf attacker) and propagation patterns, as well as intervention schemes (simulating building repellent systems, firefighters, law enforcement) are modeled. Next, the application of EVAQ to crowd egress planning in an airport terminal under human attack, and a shopping mall in fire emergency are presented and results are discussed. Finally, a validation test is performed using real world data from a past building fire incident to assess the reliability and integrity of EVAQ in comparison with existing evacuation modeling tools.

시스템 보안을 위한 지식기반 모델링 (Knowledge-based Modeling for System Security)

  • 서희석;김희원
    • 한국컴퓨터산업학회논문지
    • /
    • 제4권4호
    • /
    • pp.491-500
    • /
    • 2003
  • 네트워크 보안은 정보통신 및 인터넷 기술이 발전함에 따라 그 중요성과 필요성이 더욱 절실해지고 있다. 본 연구에서는 침입차단 시스템, 운영체제 모델과 다양한 네트워크 구성요소들을 모델링 하였다. 각 모델은 MODSIM III 기반의 기본모델(Basic Model)과 결합모델(Compound Model)의 두 가지 유형으로 정의하였다. 대상 네트워크 환경에서 사용한 공격은 서비스 거부공격 형태인 SYN flooding 공격과 Smurf 공격을 발생하였다. 이 공격들에 대하여 패킷 필터 모델에 다양한 보안 정책을 적용하여 시뮬레이션을 실행하였다. 본 연구에서의 시뮬레이션을 통하여 보안정책의 강도를 점점 높였을 때 보안성능이 향상되는 점을 검증하였다.

  • PDF

Advanced In-Vessel Retention Design for Next Generation Risk Management

  • Kune Y. Suh;Hwang, Il-Soon
    • 한국원자력학회:학술대회논문집
    • /
    • 한국원자력학회 1997년도 추계학술발표회논문집(1)
    • /
    • pp.713-718
    • /
    • 1997
  • In the TMI-2 accident, approximately twenty(20) tons of molten core material drained into the lower plenum. Early advanced light water reactor (LWR) designs assumed a lower head failure and incorporated various measures for ex-vessel accident mitigation. However, one of the major findings from the TMI-2 Vessel Investigation Project was that one part of the reactor lower head wall estimated to have attained a temperature of 1100$^{\circ}C$ for about 30 minutes has seemingly experienced a comparatively rapid cooldown with no major threat to the vessel integrity. In this regard, recent empirical and analytical studies have shifted interests to such in-vessel retention designs or strategies as reactor cavity flooding, in-vessel flooding and engineered gap cooling of the vessel Accurate thermohydrodynamic and creep deformation modeling and rupture prediction are the key to the success in developing practically useful in-vessel accident/risk management strategies. As an advanced in-vessel design concept, this work presents the COrium Attack Syndrome Immunization Structures (COASIS) that are being developed as prospective in-vessel retention devices for a next-generation LWR in concert with existing ex-vessel management measures. Both the engineered gap structures in-vessel (COASISI) and ex-vessel (COASISO) are demonstrated to maintain effective heat transfer geometry during molten core debris attack when applied to the Korean Standard Nuclear Power Plant(KSNPP) reactor. The likelihood of lower head creep rupture during a severe accident is found to be significantly suppressed by the COASIS options.

  • PDF

Prediction of compressive strength of lightweight mortar exposed to sulfate attack

  • Tanyildizi, Harun
    • Computers and Concrete
    • /
    • 제19권2호
    • /
    • pp.217-226
    • /
    • 2017
  • This paper summarizes the results of experimental research, and artificial intelligence methods focused on determination of compressive strength of lightweight cement mortar with silica fume and fly ash after sulfate attack. The artificial neural network and the support vector machine were selected as artificial intelligence methods. Lightweight cement mortar mixtures containing silica fume and fly ash were prepared in this study. After specimens were cured in $20{\pm}2^{\circ}C$ waters for 28 days, the specimens were cured in different sulfate concentrations (0%, 1% $MgSO_4^{-2}$, 2% $MgSO_4^{-2}$, and 4% $MgSO_4^{-2}$ for 28, 60, 90, 120, 150, 180, 210 and 365 days. At the end of these curing periods, the compressive strengths of lightweight cement mortars were tested. The input variables for the artificial neural network and the support vector machine were selected as the amount of cement, the amount of fly ash, the amount of silica fumes, the amount of aggregates, the sulfate percentage, and the curing time. The compressive strength of the lightweight cement mortar was the output variable. The model results were compared with the experimental results. The best prediction results were obtained from the artificial neural network model with the Powell-Beale conjugate gradient backpropagation training algorithm.

세션화 방식을 통한 퍼지기반 네트워크 침입탐지시스템 (A Fuzzy-based Network Intrusion Detection System Through sessionization)

  • 박주기;최은복
    • 한국컴퓨터정보학회논문지
    • /
    • 제12권1호
    • /
    • pp.127-135
    • /
    • 2007
  • 인터넷의 광범위한 보급에 따라 컴퓨터를 이용한 불법적인 범죄가 증가하고 있고, 이러한 범죄를 막기 위한 정보보호 기술자체가 국가의 경쟁력이 되어 가고 있다. 본 논문에서는 퍼지 논리를 네트워크 침입탐지시스템에 적용하여 보안 전문가와 유사한 결과를 얻을 수 있는 자동화된 퍼지 논리기반의 침입탐지시스템을 제안한다. 프로토콜의 유사성과 시간적인 연속성을 통한 세션화된 패킷분류방식을 통한 퍼지 규칙을 본 시스템에 적용함으로서 다양하고 다변적인 공격패턴으로부터 신속한 침입 판정을 내릴 수 있다. 또한, 대용량의 네트워크 트래픽을 처리해야하는 현재의 네트워크 환경에서, 퍼지추론을 통한 자동화된 트래픽의 프로토콜별/세션별 분석결과를 보여 줌으로써 보안전문가들의 분석 시간과 비용을 절감할 수 있는 장점을 제공한다.

  • PDF

LSTM-based aerodynamic force modeling for unsteady flows around structures

  • Shijie Liu;Zhen Zhang;Xue Zhou;Qingkuan Liu
    • Wind and Structures
    • /
    • 제38권2호
    • /
    • pp.147-160
    • /
    • 2024
  • The aerodynamic force is a significant component that influences the stability and safety of structures. It has unstable properties and depends on computer precision, making its long-term prediction challenging. Accurately estimating the aerodynamic traits of structures is critical for structural design and vibration control. This paper establishes an unsteady aerodynamic time series prediction model using Long Short-Term Memory (LSTM) network. The unsteady aerodynamic force under varied Reynolds number and angles of attack is predicted by the LSTM model. The input of the model is the aerodynamic coefficients of the 1 to n sample points and output is the aerodynamic coefficients of the n+1 sample point. The model is predicted by interpolation and extrapolation utilizing Unsteady Reynolds-average Navier-Stokes (URANS) simulation data of flow around a circular cylinder, square cylinder and airfoil. The results illustrate that the trajectories of the LSTM prediction results and URANS outcomes are largely consistent with time. The mean relative error between the forecast results and the original results is less than 6%. Therefore, our technique has a prospective application in unsteady aerodynamic force prediction of structures and can give technical assistance for engineering applications.