• Title/Summary/Keyword: Attack Role

Search Result 188, Processing Time 0.026 seconds

Malwares Attack Detection Using Ensemble Deep Restricted Boltzmann Machine

  • K. Janani;R. Gunasundari
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.64-72
    • /
    • 2024
  • In recent times cyber attackers can use Artificial Intelligence (AI) to boost the sophistication and scope of attacks. On the defense side, AI is used to enhance defense plans, to boost the robustness, flexibility, and efficiency of defense systems, which means adapting to environmental changes to reduce impacts. With increased developments in the field of information and communication technologies, various exploits occur as a danger sign to cyber security and these exploitations are changing rapidly. Cyber criminals use new, sophisticated tactics to boost their attack speed and size. Consequently, there is a need for more flexible, adaptable and strong cyber defense systems that can identify a wide range of threats in real-time. In recent years, the adoption of AI approaches has increased and maintained a vital role in the detection and prevention of cyber threats. In this paper, an Ensemble Deep Restricted Boltzmann Machine (EDRBM) is developed for the classification of cybersecurity threats in case of a large-scale network environment. The EDRBM acts as a classification model that enables the classification of malicious flowsets from the largescale network. The simulation is conducted to test the efficacy of the proposed EDRBM under various malware attacks. The simulation results show that the proposed method achieves higher classification rate in classifying the malware in the flowsets i.e., malicious flowsets than other methods.

A Cause-Effect Model for Human Resource Management (정보시스템의 효율적인 인적자원 관리를 위한 Cause-Effect, Model의 활용)

  • Lee, Nam-Hoon;In, Hoh;Lee, Do-Hoon
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.161-169
    • /
    • 2006
  • According to the development of information system, many information system and application soft-ware are develop. However, cyber attack and incident have more increased to the development of them. To defend from cyber attack and incident, many organizations has run information security systems, such as Intrusion Detection System, Firewall, VPN etc, and employed information Security person till now But they have many difficulty in operating these information security component because of the lack of organizational management and analysis of each role. In this paper, We propose the formal Cause-Effect Model related with the information security system and administrative mission per each security. In this model, we regard information system and information system operator as one information component. It is possible to compose the most suitable information component, such as information system, human resource etc., according to the analysis of Cause-Effect Model in this paper. These analysis and approaching methodology can make effective operation of each limited resource in organization and effective defense mechanism against many malicious cyber attack and incident.

  • PDF

Influence of corrosive phenomena on bearing capacity of RC and PC beams

  • Malerba, Pier Giorgio;Sgambi, Luca;Ielmini, Diego;Gotti, Giordano
    • Advances in concrete construction
    • /
    • v.5 no.2
    • /
    • pp.117-143
    • /
    • 2017
  • The attack of environmental aggressive agents progressively reduces the structural reliability of buildings and infrastructures and, in the worst exposition conditions, may even lead to their collapse in the long period. A change in the material and sectional characteristics of a structural element, due to the environmental damaging effects, changes its mechanical behaviour and varies both the internal stress redistribution and the kinematics through which it reaches its ultimate state. To identify such a behaviour, the evolution of both the damaging process and its mechanical consequences have to be taken into account. This paper presents a computational approach for the analysis of reinforced and prestressed concrete elements under sustained loading conditions and subjected to given damaging scenarios. The effects of the diffusion of aggressive agents, of the onset and development of the corrosion state in the reinforcement and the corresponding mechanical response are studied. As known, the corrosion on the reinforcing bars influences the damaging rate in the cracking pattern evolution; hence, the damage development and the mechanical behaviours are considered as coupled phenomena. The reliability of such an approach is validated in modelling the diffusion of the aggressive agents and the changes in the mechanical response of simple structural elements whose experimental behaviour is reported in Literature. A second set of analyses studies the effects of the corrosion of the tendons of a P.C. beam and explores potentially unexpected structural responses caused by corrosion under different aggressive exposition. The role of the different types and of the different positions of the damaging agents is discussed. In particular, it is shown how the collapse mode of the beam may switch from flexural to shear type, in case corrosion is caused by a localized chloride attack in the shear span.

Review on improving measurement of cyber terror management system

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.6
    • /
    • pp.89-96
    • /
    • 2016
  • Damage and attack size of cyber terror is growing to the national size. Not only targeting at a certain companies or individuals but number of cyber terror targeting government bodies or unspecific people is increasing. This is because compared to traditional weapon, input cost is very cheap but ripple effect and shock are much stronger, affecting not only certain groups but also each individuals. 'Anti-terror measurement for protection of nation and public safety' passed last month is one of the renowned measurement passed regardless of objection from opposition party. The opposition party went against this through filibuster for 192 hours but this finally passed National Congress due to lack of oppositions. Korean government is taking post actions after passage of anti-terror measurement. Legislation of enforcement ordinance and regulations is due by 6th of next month. This regulation will be executed from June 4th after legislation. Whenever there is any security issues such as hacking of Korea Hydro and Nuclear Power and National Intelligence Service happens, lot of attention is made to those hackers. However, social recognition or management of those hackers need lot more improvement. Especially, as market of internet of things is increasing, there is an increased anxiety on information security. But as we only rely on security solutions, this problems are keep happening. Therefore, active investment on nurturing hackers who play the role of 'spear and shield' shall be made. Government should put more efforts to allow white hackers to show their abilities. We should have a policy for supporting high-quality programs such as BoB. To make information protection industry into future growth engine, it is necessary to nurture professionals for information protection and white hackers through special programs. Politicians should make related regulations as soon as possible to remove factors that prevent swift management of cyber attack due to lack of legislation. Government should pay lot more financial investment to nurturing professional manpower than now. Protecting life and asset of nation is responsibility and duty of our government. We all should recognize that controlling cyber attack is a part of national defense.

Research on direction of future Korean military force establishment -focus on North Korea's nuclear threat and neighboring countries' counter military threat operation- (미래 한국군 군사력 건설방향에 대한 연구 - 북한 핵위협과 주변국 위협대비를 중심으로 -)

  • Kim, Yeon Jun
    • Convergence Security Journal
    • /
    • v.14 no.1
    • /
    • pp.11-21
    • /
    • 2014
  • South Korea should not be in subordinate position in international relationships like the past. As the status of middle power. South Korea achieves peaceful unification through overcoming North Korea's nuclear and conventional threats, and builds military power in Northeast Asia as a 'balancer'. This can firstly be achieved by constructing "attack systems triad". 'attack systems triad' can be established through integrating the C41SR as a common strategy for the purposes of preemptive deterrence and retaliatory deterrence against the dangers of the present and the future. Second, denial deterrence can be achieved by establishing "defense system triad" by combining common military power and defensive weapon system. Finally, development of independent advanced technological strategies can be achieved by building defense industry and combination of research and development through constructing "Infra triad". As for constructing and reinforcing the future of the ROK military, a unilateral principle and policy efforts to achieve the aforementioned force construction models are needed. This can only be achieved through the government's national vision to take on the role of mediator and a basis founded upon the consensus of the public.

Study on threat analysis about national important facility and control process (국가중요시설에 대한 위협분석과 처리절차에 관한 연구 - 인천국제공항을 중심으로 -)

  • Hwang, Ho-Won;Lee, Ki-Hun
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.17 no.2
    • /
    • pp.31-40
    • /
    • 2009
  • South Korea opened Incheon international airport(IIA) in march 29, 2001, with high expectations of becoming the distribution hub of Northeast Asia and aiming at a world best air hub. IIA compares quite well with any other leading airports in the world in it's facilities for the movement of people and vehicles. However, with the sequence of events following the September, 2001. terrorist attack and the war in Iraq, South Korea, an ally of the US, cannot be considered a safe haven from terrorism. At a point in time when national security is given utmost importance, it is necessary to reevaluate the security of airports, because international terrorism can only occur via air and seaports. Nowadays all the countries of the world have entered into competition for their national interests and innovation of their images. with the increasing role of international airports also comes an increased likelihood as a terrorist target, because it can affect so many people and countries. From the condition of current international terrorism, we can realize that our IIA is not completely safe from a terrorist attack. The major part of counterterrorism is event control process. It's very important for quickly saves an accident and rescues a life of person, In addition for the normalization which the airport operation is prompt. In conclusion, we should secure the legal responsibility and establish and establish a system under which we can work actively in order to implement counter terror activities from being taken an airport.

  • PDF

Design of a Coordinator-based Intrusion Detection System in Ubiquitous Sensor Network Environment (USN환경에서 코디네이터 기반의 침입탐지시스템 설계)

  • Kim, Hwang-Rae;Kang, Yeon-I
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.3
    • /
    • pp.984-990
    • /
    • 2010
  • Zigbee sensor network technology to build a ubiquitous environment has an important role. However, Zigbee technology, sensing environmental information within the local area to deliver the information because it was designed for the purpose of simple tasks, Attack by a variety of technologies that could potentially compromise the network is very high. To solve this problems, many defense mechanisms are presented in a lot of papers. But, to attack the existing Zigbee various response measures for the implementation of the functionality of the sensor nodes very heavy and high expensive problem. To resolve this problems, with superior computing power Zigbee network coordinator to install, based coordinator to intrusion detection systems is proposed. Coordinator-based IDS(Intrusion Detection System) of the Zigbee network is detected attack, and present a new approach to resolve, possible applications in various fields, so in real life Zigbee technology is expected to contribute to graft.

Development of guided weapon systems and the role of satellites (유도무기체계의 발전과 인공위성의 역할)

  • Hyun-seung Son;Kyung-won Oh
    • Journal of Aerospace System Engineering
    • /
    • v.17 no.4
    • /
    • pp.75-86
    • /
    • 2023
  • The guided missiles and decoy systems that have been developed have been likened to a spear and shield. When a new attack system appears, another defense system is developed, and the attack system is once again upgraded to neutralize it. Now, due to the limitations of the decoy system, guided weapons have become the main force of both the defense and attack systems. Also, these systems have been expanded to use Space systems as a means of defending against a guided weapon system that is too fast for terrestrial-based systems. Induced weapon systems started at the sub-sonic level, and have become so important that their speeds have become super-sonic and hyper-sonic. The concept of Space has been included in the range of guided missiles, and satellite systems have become essential elements of guided missiles. Focusing on the correlation between the guided missile system and the satellite system, we analyze the characteristics of modern guided munitions and the direction of development of the guided weapons system.

Influence of SO42- Ions Concentration on Sulfate Resistance of Cement Mortars (시멘트 모르타르의 황산염침식 저항성에 대한 SO42- 이온 농도의 영향)

  • Lee, Seung Tae
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.28 no.5A
    • /
    • pp.757-764
    • /
    • 2008
  • This paper was conducted to evaluate the durability of cement mortars exposed to varying concentrations of sodium sulfate for up to 540 days. Three types of cement mortars, namely OPC, SRC and SGC, were exposed to four sodium sulfate solutions with concentrations of 4225, 8450, 16900 and 33800 ppm of ${SO_4}^{2-}$ ions at ambient temperature. The sulfate deterioration was evaluated by measuring compressive strength and linear expansion of mortar specimens. Experimental results indicated that the maximum deterioration was noted in OPC mortar specimens in highly concentrated sulfate solution. In particular, the $C_3A$ content in cements plays a critical role in resisting expansion due to sodium sulfate attack. Additionally, the beneficial effect of GGBS was clearly observed showing a superior resistance against sodium sulfate attack, because of its lower permeability. Another important observation was that the parameters for the evaluation of deterioration degree are greatly dependent on the products formed by sulfate attack.

Avian Gut Immune System and Local Responses to Eimerial Parasites (조류의 장내 면역체계와 콕시듐(Eimeria)기생충들에 대한 국소면역 반응)

  • Lillehoj, H.S.
    • Korean Journal of Poultry Science
    • /
    • v.26 no.2
    • /
    • pp.131-144
    • /
    • 1999
  • Coccidiosis, an intestinal infection caused by intracellular protozoan parasites belonging to several different species of Eimeria seriously impairs the growth and feed utilization of livestock and poultry. Due to complex life cycle of organism and intricate host immune responses to Elmeria, coccidia vaccine development has been difficult. Understanding of basic imunobiology of pertinent host-parasite interactions is necessary for the development of novel control strategy. Although chickens infected with Eimeria spp. produce parasite-specific antibodies in both the circulation and mucosal secretions, antibody mediated responses play a minor role in protection gainst coccidiosis. Rather, increasing evidence show that cell-mediated immunity plays a major role in resistance to coccidiosis. T-lymphocytes appear to respond to coccidiosis both through cytokine production and a direct cytotoxic attack on infected cells. The exact mechanisms by which T-cells eliminate the parasites, however, remain to be investigated. Since it is crucial to understand the intestinal immune system in order to develop an immunological control strategy against any intestinal immune system in order to develop an immunological control strategy against any intestinal diseases, this presentation will summarize our current understanding of the avian intestinal immune system and mucosal immune responses to Eimeria, to provide a conceptual overview of the complex molecular and cellular events involved in intestinal immune responses to enteric pathogens.

  • PDF