• 제목/요약/키워드: Attack Role

Search Result 187, Processing Time 0.025 seconds

The relationship between the major market-based media and the government in Korea (한국의 민주화와 미디어 : 정부와 시장 주류 미디어의 관계)

  • Jo, Hang-Je
    • Korean journal of communication and information
    • /
    • v.16
    • /
    • pp.168-206
    • /
    • 2001
  • This study attempts to examine the relationships between the major market-based media and the government after closing military regime era, 1961-1987. After the military regime was collapsed, while the mass media in Korea obtained independence and autonomy from government, they have been confronted with the terrible competition not so much comparatively as before. The watchdog role in the traditional liberalism, which is regarded as normative relationship between the media and the government would be transformed in accordance with the market condition and the maturity of democracy. Thus, the watchdog metaphor has been variously deviated in rower-centered society; lap dog, guard dog, attack dog. liberalists argue that the primary democratic role of the media is to art as a public watchdog overseeing the state. Social democrats, however, criticize them as simplistic conception which could be only applied to the government. They argue that the media should be seen as a source of redress against the abuse of all forms of power over others; the home, the economy, and the civil society. The lap dog view is that the media is overwhelmingly dependent on the established power structure contrary to the watchdog. While the guard dog perspective is a means to preserve the power structure alarming with playing 'conflict role', the attack do8 aims to the private interest of the media in intruding into the politics. The attack dog perspective by T. Patterson could be composed of the interpretive style of report, the game schema report over the policy schema in the election, and the negativism against politics and government. The market-dominant press has been likely to transform from lap-guard dog into attack-guard dog. In Roh Tae Woo government(1988-1992), while the press was a lessened lap-guard dog before three parties merger in 1990, after merger the press had been transformed as the reinforced lap-guard dog because this merger entailed joint, party-to-party negotiations, and the formation of the new party preceded by dissolution of the ruling blot. In the early stage of Kim Young Sam government(1993-1997), the press has kept in pace with the reform movement drive-forced by the government. However, the press withdrew the support of Kim's reform in reaching the level of threat to ruling bloc. The press coalesced only circumstantially with government and was interested in preserving some margin of independence. The failure of Kim's reform proved the political muscle of the press in post-autho-ritarianism. In the middle stage of Kim Dae Jung government (1998-) that resulted in the shift of power structure as once-opposition party leader, the stress has been a manifested attack-guard dog owing to the anti-cold war policy, the realignment policy of power, and the minority-base of Kim's government. The press has endeavored to hold political communication within limits relatively less threatening to the established order.

  • PDF

EMICS: E-mail based Malware Infected IP Collection System

  • Lee, Taejin;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2881-2894
    • /
    • 2018
  • Cyber attacks are increasing continuously. On average about one million malicious codes appear every day, and attacks are expanding gradually to IT convergence services (e.g. vehicles and television) and social infrastructure (nuclear energy, power, water, etc.), as well as cyberspace. Analysis of large-scale cyber incidents has revealed that most attacks are started by PCs infected with malicious code. This paper proposes a method of detecting an attack IP automatically by analyzing the characteristics of the e-mail transfer path, which cannot be manipulated by the attacker. In particular, we developed a system based on the proposed model, and operated it for more than four months, and then detected 1,750,000 attack IPs by analyzing 22,570,000 spam e-mails in a commercial environment. A detected attack IP can be used to remove spam e-mails by linking it with the cyber removal system, or to block spam e-mails by linking it with the RBL(Real-time Blocking List) system. In addition, the developed system is expected to play a positive role in preventing cyber attacks, as it can detect a large number of attack IPs when linked with the portal site.

Mitigation of Phishing URL Attack in IoT using H-ANN with H-FFGWO Algorithm

  • Gopal S. B;Poongodi C
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.7
    • /
    • pp.1916-1934
    • /
    • 2023
  • The phishing attack is a malicious emerging threat on the internet where the hackers try to access the user credentials such as login information or Internet banking details through pirated websites. Using that information, they get into the original website and try to modify or steal the information. The problem with traditional defense systems like firewalls is that they can only stop certain types of attacks because they rely on a fixed set of principles to do so. As a result, the model needs a client-side defense mechanism that can learn potential attack vectors to detect and prevent not only the known but also unknown types of assault. Feature selection plays a key role in machine learning by selecting only the required features by eliminating the irrelevant ones from the real-time dataset. The proposed model uses Hyperparameter Optimized Artificial Neural Networks (H-ANN) combined with a Hybrid Firefly and Grey Wolf Optimization algorithm (H-FFGWO) to detect and block phishing websites in Internet of Things(IoT) Applications. In this paper, the H-FFGWO is used for the feature selection from phishing datasets ISCX-URL, Open Phish, UCI machine-learning repository, Mendeley website dataset and Phish tank. The results showed that the proposed model had an accuracy of 98.07%, a recall of 98.04%, a precision of 98.43%, and an F1-Score of 98.24%.

Using Machine Learning Techniques for Accurate Attack Detection in Intrusion Detection Systems using Cyber Threat Intelligence Feeds

  • Ehtsham Irshad;Abdul Basit Siddiqui
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.179-191
    • /
    • 2024
  • With the advancement of modern technology, cyber-attacks are always rising. Specialized defense systems are needed to protect organizations against these threats. Malicious behavior in the network is discovered using security tools like intrusion detection systems (IDS), firewall, antimalware systems, security information and event management (SIEM). It aids in defending businesses from attacks. Delivering advance threat feeds for precise attack detection in intrusion detection systems is the role of cyber-threat intelligence (CTI) in the study is being presented. In this proposed work CTI feeds are utilized in the detection of assaults accurately in intrusion detection system. The ultimate objective is to identify the attacker behind the attack. Several data sets had been analyzed for attack detection. With the proposed study the ability to identify network attacks has improved by using machine learning algorithms. The proposed model provides 98% accuracy, 97% precision, and 96% recall respectively.

A Secure Switch Migration for SDN with Role-based IBC

  • Lam, JunHuy;Lee, Sang-Gon;Andrianto, Vincentius Christian
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.9
    • /
    • pp.49-55
    • /
    • 2017
  • Despite the Openflow's switch migration occurs after the channel was established in secure manner (optional), the current cryptography protocol cannot prevent the insider attack as the attacker possesses a valid public/private key pair. There are methods such as the certificate revocation list (CRL) or the online certificate status protocol (OCSP) that tries to revoke the compromised certificate. However, these methods require a management system or server that introduce additional overhead for the communication. Furthermore, these methods are not able to mitigate power abuse of an insider. In this paper, we propose a role-based identity-based cryptography (RB-IBC) that integrate the identity of the node along with its role so the nodes within the network can easily mitigate any role abuse of the nodes. Besides that, by combining with IBC, it will eliminate the need of exchanging certificates and hence improve the performance in a secure channel.

A security problem and its solution in Ipsec (IPsec의 보안상 문제점과 해결방안)

  • Kim, Jung-Hyun;Won, You-Jip;Im, Eul-Gyu
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.37-38
    • /
    • 2006
  • In this paper, we describe a security problem of IPsec. And we propose a solution for this problem. The problem is a fragility of IPsec Gateway which is used in tunnel mode. The role of IPsec Gateway is encrypting or decrypting IPsec packets. Because of the role of IPsec Gateway, IPsec Gateway suffers overhead for decrypting numerous packets. Adversaries can easily attack IPsec Gateway using a DDoS attack. To solve this problem, we propose the "Priority based Random Packet Drop" method. In this method, the white list which is a list of normal users is created. After that, according to the frequency of uses, the method marks priorities of random drops to the white list. If anomalous traffic appeared, this method will drop many packets which consist of anomalous traffic. In simple experiment, we show our solution is proper to defend IPsec Gateway. For this experiment, we use empirical backbone traffic which includes DoS attacks.

  • PDF

Influence of supplementary cementitious materials on strength and durability characteristics of concrete

  • Praveen Kumar, V.V.;Ravi Prasad, D.
    • Advances in concrete construction
    • /
    • v.7 no.2
    • /
    • pp.75-85
    • /
    • 2019
  • The present study is focused on the mechanical and durability properties of ternary blended cement concrete mix of different grades 30 MPa, 50 MPa and 70 MPa. Three mineral admixtures (fly ash, silica fume and lime sludge) were used as a partial replacement of cement in the preparation of blended concrete mix. The durability of ternary blended cement concrete mix was studied by exposing it to acids HCl and $H_2SO_4$ at 5% concentration. Acid mass loss factors (AMLF), acid strength loss factor (ASLF) and acid durability factor (ADF) were determined, and the results were compared with the control mix. Chloride ions penetration was investigated by conducting rapid chlorination penetration test and accelerated corrosion penetration test on control mix and ternary blended cement concrete. From the results, it was evident that the usage of these mineral admixtures is having a beneficiary role on the strength as well as durability properties. The results inferred that the utilization of these materials as a partial replacement of cement have significantly enhanced the compressive strength of blended concrete mix in 30 MPa, 50 MPa and 70 MPa by 42.95%, 32.48% and 22.79%. The blended concrete mix shown greater resistance to acid attack compared to control mix concrete. Chloride ion ingress of the blended cement concrete mix was low compared to control mix implying the beneficiary role of mineral admixtures.

The Pattern Analysis for Gameplay of RPG(Role-Play Game) Genre base on Smart-phone : Toward 'Blade for Kakao' (스마트폰 기반 RPG 장르의 게임플레이 패턴 분석 : '블레이드 for Kakao'를 중심으로)

  • Han, Sang-Geun;Song, Seung-Keun
    • Cartoon and Animation Studies
    • /
    • s.38
    • /
    • pp.237-258
    • /
    • 2015
  • This research aims to analyze gamer's behavior pattern on 'Blade for Kakao' RPG genre based on smart-phone. Three subjects were recruited using the concurrent protocol method to conduct ten episodes in region 1. As a result, it derived four behavior patterns according to the combination of space type affordance and the arrangement affordance of obstacle(monster). The result of this research revealed the forward attack arranged for the fixed obstacles in the wide space, the indirect attack as avoid-type arranged for scattered obstacles in the same space, the hunting up attack once arranged for the crowded obstacles in the same space, and the pulling attack arranged for obstacles in the narrow space. Moreover, it revealed the character growth and the optimization of attack method according to the attribute affordance of the obstacle(monster). This research expect to offer the design guideline for game level design to investigate the relationship between the game play and affordance in RPG genre based on smart-phone.

Device RDoS Attack Determination and Response System Design (디바이스의 DDoS 공격 여부 판단 및 대응 시스템 설계)

  • Kim, Hyo-jong;Choi, Su-young;Kim, Min-sung;Shin, Seung-soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.108-110
    • /
    • 2021
  • Since 2015, attacks using the IoT protocol have been continuously reported. Among various IoT protocols, attackers attempt DDoS attacks using SSDP(Simple Service Discovery Protocol), and as statistics of cyber shelters, Korea has about 1 million open SSDP servers. Vulnerable SSDP servers connected to the Internet can generate more than 50Gb of traffic and the risk of attack increases gradually. Until recently, distributed denial of service attacks and distributed reflective denial of service attacks have been a security issue. Accordingly, the purpose of this study is to analyze the request packet of the existing SSDP protocol to identify an amplification attack and to avoid a response when an amplification attack is suspected, thereby preventing network load due to the occurrence of a large number of response packets due to the role of traffic reflection amplification.

  • PDF

Hacking Detection Mechanism of Cyber Attacks Modeling (외부 해킹 탐지를 위한 사이버 공격 모델링)

  • Cheon, Yang-Ha
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.9
    • /
    • pp.1313-1318
    • /
    • 2013
  • In order to actively respond to cyber attacks, not only the security systems such as IDS, IPS, and Firewalls, but also ESM, a system that detects cyber attacks by analyzing various log data, are preferably deployed. However, as the attacks be come more elaborate and advanced, existing signature-based detection methods start to face their limitations. In response to that, researches upon symptom detection technology based on attack modeling by employing big-data analysis technology are actively on-going. This symptom detection technology is effective when it can accurately extract features of attacks and manipulate them to successfully execute the attack modeling. We propose the ways to extract attack features which can play a role as the basis of the modeling and detect intelligent threats by carrying out scenario-based modeling.