• Title/Summary/Keyword: Attack Role

Search Result 188, Processing Time 0.024 seconds

A Scheme for Identifying Malicious Applications Based on API Characteristics (API 특성 정보기반 악성 애플리케이션 식별 기법)

  • Cho, Taejoo;Kim, Hyunki;Lee, Junghwan;Jung, Moongyu;Yi, Jeong Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.187-196
    • /
    • 2016
  • Android applications are inherently vulnerable to a repackaging attack such that malicious codes are easily inserted into an application and then resigned by the attacker. These days, it occurs often that such private or individual information is leaked. In principle, all Android applications are composed of user defined methods and APIs. As well as accessing to resources on platform, APIs play a role as a practical functional feature, and user defined methods play a role as a feature by using APIs. In this paper we propose a scheme to analyze sensitive APIs mostly used in malicious applications in terms of how malicious applications operate and which API they use. Based on the characteristics of target APIs, we accumulate the knowledge on such APIs using a machine learning scheme based on Naive Bayes algorithm. Resulting from the learned results, we are able to provide fine-grained numeric score on the degree of vulnerabilities of mobile applications. In doing so, we expect the proposed scheme will help mobile application developers identify the security level of applications in advance.

Model Proposal for Detection Method of Cyber Attack using SIEM (SIEM을 이용한 침해사고 탐지방법 모델 제안)

  • Um, Jin-Guk;Kwon, Hun-Yeong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.43-54
    • /
    • 2016
  • The occurrence of cyber crime is on the rise every year, and the security control center, which should play a crucial role in monitoring and early response against the cyber attacks targeting various information systems, its importance has increased accordingly. Every endeavors to prevent cyber attacks is being attempted by information security personnel of government and financial sector's security control center, threat response Center, cyber terror response center, Cert Team, SOC(Security Operator Center) and else. The ordinary method to monitor cyber attacks consists of utilizing the security system or the network security device. It is anticipated, however, to be insufficient since this is simply one dimensional way of monitoring them based on signatures. There has been considerable improvement of the security control system and researchers also have conducted a number of studies on monitoring methods to prevent threats to security. In accordance with the environment changes from ESM to SIEM, the security control system is able to be provided with more input data as well as generate the correlation analysis which integrates the processed data, by extraction and parsing, into the potential scenarios of attack or threat. This article shows case studies how to detect the threat to security in effective ways, from the initial phase of the security control system to current SIEM circumstances. Furthermore, scenarios based security control systems rather than simple monitoring is introduced, and finally methods of producing the correlation analysis and its verification methods are presented. It is expected that this result contributes to the development of cyber attack monitoring system in other security centers.

Attack Capability Analysis for Securing Self-Survival of Air Defense Weapons (대공방어무기의 자기생존성 확보를 위한 공격능력분석)

  • Kim, Sea Ill;Shin, Jin
    • Journal of the Korea Society for Simulation
    • /
    • v.30 no.3
    • /
    • pp.11-17
    • /
    • 2021
  • The 30mm anti-aircraft gun has been developed with various types of weapon systems such as protective, protective complex, and wheel-type anti-aircraft artillery. The role of this anti-aircraft gun is an important anti-aircraft weapon in charge of air defense. Anti-aircraft weapons are tasked with defending the airspace from aircraft attacks. In particular, anti-aircraft weapons are organized in combination with mechanized units. And anti-aircraft weapons are prone to attack by enemies because they operate on the front lines of the battlefield. The enemy is expected to attack our troops by covering up or concealing as much as possible in order to increase their viability. Therefore, this study analyzed whether our 30mm anti-aircraft bullets could subdue the enemy in cover. This study analyzed the performance of 30mm anti-aircraft bullets using the M&S technique. For this study, live shooting and simulation method by M&S were used for the experiment. In this study, steel plate and plywood were used for the live shooting experiment. In addition, in the simulation process through M&S, this study used the PRODAS model, AUTODYN model, and Split-x model to analyze the trajectory, penetration, and fragmentation capability of 30mm anti-aircraft bullets. According to the experimental results, it has been proven that 30mm anti-aircraft bullets can destroy enemy armored vehicles. 30mm anti-aircraft bullets succeeded in quickly subduing enemies concealed in general buildings or forests. In this way, it was possible to minimize damage to allies in advance.

Adaptive Power Saving Mechanism of Low Power Wake-up Receivers against Battery Draining Attack (배터리 소모 공격에 대응하는 저전력 웨이크업 리시버의 적응형 파워 세이빙 메커니즘)

  • So-Yeon Kim;Seong-Won Yoon;Il-Gu Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.3
    • /
    • pp.393-401
    • /
    • 2024
  • Recently, the Internet of Things (IoT) has been widely used in industries and daily life that directly affect human safety, life, and assets. However, IoT devices, which need to meet low-cost, lightweight, and low-power requirements, face a significant problem of shortened battery lifetime due to battery draining attacks and interference. To solve this problem, the 802.11ba standard for the Wake-up Receiver (WuR) has emerged, this feature is playing a crucial role in minimizing energy consumption. However, the WuR protocol did not consider security mechanisms in order to reduce latency and overhead. Therefore, in this study, anAdaptive Power Saving Mechanism (APSM) is proposed for low-power WuR to counter battery draining attacks. APSM can minimize abnormally occurring power consumption by exponentially increasing power-saving time in environments prone to attacks. According to experimental results, the proposed APSM improved energy consumption efficiency by a minimum of 13.77% compared to the traditional Legacy Power Saving Mechanism (LPSM) when attack traffic ratio is 10% or more of the total traffic.

A Review on the Change in Submarine Roles in Naval Warfare: Based on Warfare Paradigm (전쟁 패러다임의 전환에 따른 잠수함의 역할 변화에 대한 고찰)

  • Jang, Jun-Seop
    • Strategy21
    • /
    • s.46
    • /
    • pp.89-122
    • /
    • 2020
  • The longing for submarine manufacture and the fear of her power had exited for a long time, but submarine that could submerge and attack was built from 20th century by science technology development. The question, 'Submarine can exercise her power in naval warfare?' had exited before World War I, but the effective value of submarine was shown in the procedure of a chain of naval warfare during World War I and World War II. Germany and the United States made the best use of submarines at that time. The submarines of these nations mounted fierce attack on the enemy's battleships and merchant ships and blocked the sea lanes for war material. These fierce attack on ships became impossible After World War II, and the major powers reduced and coordinated the defence budget, so they considered the role of submarine. However, submarine is still powerful weapon system because she can secretly navigate under the water, and one of the most important force in the navy. The aim of this thesis is analyzing submarine roles in each naval warfare and integrating maritime strategy and weapon system technology into her roles. First, the research about represent submarine roles like anti-surfaceship warfare, anti-submarine warfare, intelligence gathering, land attack, supporting special operation and mine landing warfare will be presented, then the major naval warfare where submarine participated(during ex-World War I, World War I, World War II, The Cold War Era and post Cold War) and the analyzing of submarine roles by time will be presented. Submarine was developed for anti-surfaceship warfare during ex-World War I but could not make remarkable military gain in naval warfare because her performance and weapon was inadequate. However, the effective value of submarine in the procedure of a chain of naval warfare was shown during World War I and World War II. The major powers put battleships into naval warfare undiscriminatingly to command the sea power and submarines did massive damage to enemy navy power, so put a restraint the maritime power of enemy, and blocked the sea lanes for war material. After World War II, the battlefield situation changed rapidly and the concept of preemption became difficult to apply in naval warfare. Therefore, the submarine was unable to concentrate on anti-surfaceship mission. Especially during the Cold War era, nuclear submarine came to appear and her weapon system developed rapidly. These development gave submarines special missions: anti-submarine warfare and intelligence gathering. At that time, United States and Soviet submarines tracked other nation's submarines loaded with nuclear weapons and departing from naval their base. The submarines also collected information on the volume of ships and a coastal missile launching site in company with this mission. After Cold War, the major powers despatched forces to major troubled regions to maintain world peace, their submarines approached the shores of these regions and attacked key enemy installations with cruise missiles. At that time, the United States eased the concept of preemption and made the concept of Bush doctrine because of possible 911 terrorism. The missiles fired from submarines and surface battleships accurately attacked key enemy installations. Many nations be strategically successful depending on what kind of mission a submarine is assigned. The patterns of future naval warfare that my country will provide against will be military power projection and coalition/joint operations. These suggest much more about what future missions we should assign to submarines.

Detection Mechanism of Attacking Web Service DoS using Self-Organizing Map (SOM(Self-Organizing Map)을 이용한 대용량 웹 서비스 DoS 공격 탐지 기법)

  • Lee, Hyung-Woo;Seo, Jong-Won
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.5
    • /
    • pp.9-18
    • /
    • 2008
  • Web-services have originally been devised to share information as open services. In connection with it, hacking incidents have surged. Currently, Web-log analysis plays a crucial clue role in detecting Web-hacking. A growing number of cases are really related to perceiving and improving the weakness of Web-services based on Web-log analysis. Such as this, Web-log analysis plays a central role in finding out problems that Web has. Hence, Our research thesis suggests Web-DoS-hacking detective technique In the process of detecting such problems through SOM algorithm, the emergence frequency of BMU(Best Matching Unit) was studied, assuming the unit with the highest emergence frequency, as abnormal, and the problem- detection technique was recommended through the comparison of what's called BMU as input data.

Involvement of the OsMKK4-OsMPK1 Cascade and its Downstream Transcription Factor OsWRKY53 in the Wounding Response in Rice

  • Yoo, Seung Jin;Kim, Su-Hyun;Kim, Min-Jeong;Ryu, Choong-Min;Kim, Young Cheol;Cho, Baik Ho;Yang, Kwang-Yeol
    • The Plant Pathology Journal
    • /
    • v.30 no.2
    • /
    • pp.168-177
    • /
    • 2014
  • Plant has possessed diverse stress signals from outside and maintained its fitness. Out of such plant responses, it is well known that mitogen-activated protein kinase (MAPK) cascade plays important role in wounding and pathogen attack in most dicot plants. However, little is understood about its role in wounding response for the economically important monocot rice plant. In this study, therefore, the involvement of MAPK was investigated to understand the wounding signaling pathway in rice. The OsMPK1 was rapidly activated by wounding within 10 min, and OsMPK1 was also activated by challenge of rice blast fungus. Further analysis revealed that OsMKK4, the upstream kinase of OsMPK1, phosphorylated OsMPK1 by wounding in vivo. Furthermore, OsMPK1 directly interacted with a rice defense-related transcription factor OsWRKY53. To understand a functional link between MAPK and its target transcription factor, we showed that OsMPK1 activated by the constitutively active mutant $OsMKK4^{DD}$ phosphorylated OsWRKY53 in vitro. Taken together, components involving in the wounding signaling pathway, OsMKK4-OsMPK1-OsWRKY53, can be important players in regulating crosstalk between abiotic stress and biotic stress.

The Emergence and Development of the Lamaist Gateway of $Lokap\bar{a}las$ during the $Jos\breve{o}n$ Dynasty - Some problems on the orientation of the Gateway of Lokapala and on the allocation of the Four Guardian Kings - (조선시대 라마계 천왕문의 수용 및 전개에 대하여 -천왕문의 배치와 사천왕 배열에 관한 문제-)

  • Yi, Dae-Am
    • Journal of architectural history
    • /
    • v.16 no.6
    • /
    • pp.47-66
    • /
    • 2007
  • $Lokap{\bar{a}}las$ are understood as the deities of four directions in Buddhism: $Dhrtar{\bar{a}}stra$ in the East, $Vir{\bar{u}}dhaka$ in the South, $Vir{\bar{u}}p{\bar{a}}ksa$ in the West and $Vai{\acute{s}}ravana$ in the North respectively. Their common name is, therefore, called as the "Four Guardian Kings", whose function is to prevent demonic forces from entering into its sacred world. Although the position of $Lokap{\bar{a}}las$ is to the lowest level in the hierarchy of the minor deities in Buddhism, the cult of $Lokap{\bar{a}}las$ was widely spread and prominent in the countries of Northern Buddhism. It played a significant role in terms of the state-protecting Buddhism, on behalf of it's esoteric and magic power. More than 20 Gateways of the $Lokap{\bar{a}}las$ and $Lokap{\bar{a}}la$ statues were still well preserved in Korea, and they were believed to be constructed after the Japanese attack in 1592. After war, monks had concentrated on restoring ruined temples and building many new Gateways of the Four Guardian Kings over the Korean peninsular. Under such circumstances, even though the $Lokap{\bar{a}}las$ played a significant role as the subject of cult in Korean Buddhism. they might have a small chance to be taught traditional Lama iconography exactly. The purpose of this essay is to examine the relation of orientation of the Gate way of $Lokap{\bar{a}}las$ and allocation of each Kings inside the gate.

  • PDF

Role-Based Network Access Control System on Open Network Two-Factor Authentication (네트워크 이중 인증을 통한 역할 기반 개방형 네트워크 접근 통제 시스템의 구현)

  • Lee, Chun-Jae;Cho, Ki-Ryang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.8B
    • /
    • pp.502-508
    • /
    • 2007
  • This paper proposes a method to shut out all of the not certified network access packet by embodying the two-factor(MAC ADDRESS, ID/PASSWORD) authentication system. The Authenticating Gateway System takes over central server's policy and permit or hold up the packet by inherited policy. And checks the whether or not patched the OS version and getting influenced from computer virus. And takes the information about client's resources(H/W, S/W) without Agent in the client. That makes more stability of network operating circumstance and fast facing the attack from hackers. In the fixed mobile network circumstance, This method provides more simplicity and less expenses than IEEE802.1x authentication system(cisco nac).

Cryptanalysis of an 'Efficient-Strong Authentiction Protocol (E-SAP) for Healthcare Applications Using Wireless Medical Sensor Networks'

  • Khan, Muhammad Khurram;Kumari, Saru;Singh, Pitam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.967-979
    • /
    • 2013
  • Now a day, Wireless Sensor Networks (WSNs) are being widely used in different areas one of which is healthcare services. A wireless medical sensor network senses patient's vital physiological signs through medical sensor-nodes deployed on patient's body area; and transmits these signals to devices of registered medical professionals. These sensor-nodes have low computational power and limited storage capacity. Moreover, the wireless nature of technology attracts malicious minds. Thus, proper user authentication is a prime concern before granting access to patient's sensitive and private data. Recently, P. Kumar et al. claimed to propose a strong authentication protocol for healthcare using Wireless Medical Sensor Networks (WMSN). However, we find that P. Kumar et al.'s scheme is flawed with a number of security pitfalls. Information stored inside smart card, if extracted, is enough to deceive a valid user. Adversary can not only access patient's physiological data on behalf of a valid user without knowing actual password, can also send fake/irrelevant information about patient by playing role of medical sensor-node. Besides, adversary can guess a user's password and is able to compute the session key shared between user and medical sensor-nodes. Thus, the scheme looses message confidentiality. Additionally, the scheme fails to resist insider attack and lacks user anonymity.