• Title/Summary/Keyword: Attack scenario

Search Result 88, Processing Time 0.024 seconds

Building an Analysis Model for Social Engineering Based Cyberspace Operations (사회공학 사이버작전 분석모델 정립연구)

  • Shin, Kyuyong;Kim, Jeewon;Lim, Hyun-myung;Kim, Yongju;Yoo, Jincheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1595-1606
    • /
    • 2018
  • Recently, there has been an increase in the number of social engineering techniques that indirectly attack the target system administrators or organizational weaknesses rather than the traditional technical cyber attacks that directly attacked the target systems. Accordingly, the type analysis and case study of social engineering techniques are being actively conducted. There has been, however, little effort to derive an analysis model that systematically analyzes social engineering based cyberspace operations. Therefore, this paper aims at building a Social Engineering Based Cyberspace Operations Analysis Model, which can be used as a reference framework for a case study or attack scenario generation of social engineering based cyberspace operations.

Extracting Neural Networks via Meltdown (멜트다운 취약점을 이용한 인공신경망 추출공격)

  • Jeong, Hoyong;Ryu, Dohyun;Hur, Junbeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1031-1041
    • /
    • 2020
  • Cloud computing technology plays an important role in the deep learning industry as deep learning services are deployed frequently on top of cloud infrastructures. In such cloud environment, virtualization technology provides logically independent and isolated computing space for each tenant. However, recent studies demonstrate that by leveraging vulnerabilities of virtualization techniques and shared processor architectures in the cloud system, various side-channels can be established between cloud tenants. In this paper, we propose a novel attack scenario that can steal internal information of deep learning models by exploiting the Meltdown vulnerability in a multi-tenant system environment. On the basis of our experiment, the proposed attack method could extract internal information of a TensorFlow deep-learning service with 92.875% accuracy and 1.325kB/s extraction speed.

A study on security threats to drones using open source and military drone attack scenarios using telemetry hijacking (오픈소스 활용 드론에 대한 보안 위협과 Telemetry Hijacking을 이용한 군용 드론 공격 시나리오 연구)

  • Lee, Woojin;Seo, Kyungdeok;Chae, Byeongmin
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.103-112
    • /
    • 2020
  • Recently, the interest in hobby/leisure drones is increasing in the private sector, and the military also uses drones in various countries such as North Korea, the United States, and Iran for military purposes such as reconnaissance and destruction. A variety of drone related research is underway, such as establishing and operating drone units within the Korean military. Inparticular, recently, as the size of drone flight control source code increases and the number of functions increases, drone developers are getting accustomed to using open sources and using them without checking for separate security vulnerabilities. However, since these open sources are actually accessible to attackers, they are inevitably exposed to various vulnerabilities. In this paper, we propose an attack scenario for military drones using open sources in connection with these vulnerabilities using Telemetry Hijacking techniques.

A Study on the Assessment of Critical Assets Considering the Dependence of Defense Mission (국방 임무 종속성을 고려한 핵심 자산 도출 방안 연구)

  • Kim Joon Seok;Euom Ieck Chae
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.189-200
    • /
    • 2024
  • In recent years, the development of defense technology has become digital with the introduction of advanced assets such as drones equipped with artificial intelligence. These assets are integrated with modern information technologies such as industrial IoT, artificial intelligence, and cloud computing to promote innovation in the defense domain. However, the convergence of the technology is increasing the possibility of transfer of cyber threats, which is emerging as a problem of increasing the vulnerability of defense assets. While the current cybersecurity methodologies focus on the vulnerability of a single asset, interworking of various military assets is necessary to perform the mission. Therefore, this paper recognizes these problems and presents a mission-based asset management and evaluation methodology. It aims to strengthen cyber security in the defense sector by identifying assets that are important for mission execution and analyzing vulnerabilities in terms of cyber security. In this paper, we propose a method of classifying mission dependencies through linkage analysis between functions and assets to perform a mission, and identifying and classifying assets that affect the mission. In addition, a case study of identifying key assets was conducted through an attack scenario.

Analyze Virtual Private Network Vulnerabilities and Derive Security Guidelines Based on STRIDE Threat Modeling (STRIDE 위협 모델링 기반 가상 사설망 취약점 분석 및 보안 요구사항 도출)

  • Kim, Da-hyeon;Min, Ji-young;Ahn, Jun-ho
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.27-37
    • /
    • 2022
  • Virtual private network (VPN) services are used in various environments related to national security, such as defense companies and defense-related institutions where digital communication environment technologies are diversified and access to network use is increasing. However, the number of cyber attacks that target vulnerable points of the VPN has annually increased through technological advancement. Thus, this study identified security requirements by performing STRIDE threat modeling to prevent potential and new vulnerable points that can occur in the VPN. STRIDE threat modeling classifies threats into six categories to systematically identify threats. To apply the proposed security requirements, this study analyzed functions of the VPN and formed a data flow diagram in the VPN service process. Then, it collected threats that can take place in the VPN and analyzed the STRIDE threat model based on data of the collected threats. The data flow diagram in the VPN service process, which was established by this study, included 96 STRIDE threats. This study formed a threat scenario to analyze attack routes of the classified threats and derived 30 security requirements for each element of the VPN based on the formed scenario. This study has significance in that it presented a security guideline for enhancing security stability of the VPN used in facilities that require high-level security, such as the Ministry of National Defense (MND).

Implementation and Evaluation of Simulation Based Critical Care Nursing Education Used with MicroSim(R) (MicroSim(R)을 병용한 시뮬레이션기반 중환자간호교육의 운영 및 평가)

  • Kim, Yun-Hee;Kim, Yun-Min;Kang, Seo-Young
    • The Journal of Korean Academic Society of Nursing Education
    • /
    • v.16 no.1
    • /
    • pp.24-32
    • /
    • 2010
  • Purpose: This study was conducted to evaluate the results after implementing a simulation based critical care nursing education with $MicroSim^{(R)}$. Method: Simulation based education was used for a clinical scenario on a patient with chronic obstructive pulmonary disease(COPD) and acute coronary syndrome(ACS). Self-learning program was used for an acute asthma attack and acute myocardial infarction(AMI) in the $MicroSim^{(R)}$. A total of 97 nursing students were chosen. A pretest and posttest was conducted to evaluate learning achievement, clinical performance ability and self-directed learning. Result: Learning achievement and clinical performance ability significantly increased but self-directed learning did not. Conclusion: Simulation based education used with $MicroSim^{(R)}$ was useful for improving learning achievement and clinical performance ability of nursing students. Further studies are needed to compare the effects of simulation based education.

Implementation of Natural Behavior Patterns of Monster based on Energy Model (에너지 모델 기반으로 한 몬스터의 자연스러운 행동 패턴 구현)

  • Lee, Jae Moon;Lim, Seong Kyu
    • Journal of Korea Game Society
    • /
    • v.14 no.5
    • /
    • pp.87-96
    • /
    • 2014
  • In developing games, realism is considered as an important factor to increase immersion. To do this, the paper developed 'Jungle Master' game applying the conventional energy model to movement of monsters in RPG. The main scenario of the game is that animals attack each other in order to survive the competition in jungle. While chasing monster : fleeing monster is 1:1 in the conventional energy model, it is extended as n:1 in order to increase fun. As the results, this paper showed that the energy model can be effectively applied to the real game and monsters can be implemented so that they can move in natural.

Interference Pattern Analysis of the Radiated Noise in Submarine Passive Sonar (잠수함 수동소나에서 방사소음의 간섭패턴 분석)

  • Kim, ByoungUk;An, SangKyum;Lee, Kuenhwa;Seong, WooJae;Hahn, JooYoung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.16 no.4
    • /
    • pp.456-464
    • /
    • 2013
  • Passive sonar in submarine can detect the target in long range and can attack using it. There are many noises which can be received at passive sonar of submarine. When noise received in the sonar it make diverse interference pattern depend on the ocean ambient and movement scenario. Interference pattern can be explained by theory of waveguide invariant. In this paper, analyze the interference pattern according to the relative motions of surface ship and submarine. And analyze the occurrence reason of 2 kinds of interference patterns those are usually display on the submarine console. The results show that if relative speed of submarine and target increase then gradient of interference pattern will increase. And closest point approach of submarine and target decrease then gradient of interference pattern will increase. Bathtube pattern usually appear when target pass though close to submarine and Pinetree pattern appear target pass though above of submarine.

A Study of Effectiveness of the Improved Security Operation Model Based on Vulnerability Database (취약점 데이터베이스 기반 개선된 보안관제 모델의 효과성 연구)

  • Hyun, Suk-woo;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1167-1177
    • /
    • 2019
  • In this paper, the improved security operation model based on the vulnerability database is studied. The proposed model consists of information protection equipment, vulnerability database, and a dashboard that visualizes and provides the results of interworking with detected logs. The evaluation of the model is analyzed by setting up a simulated attack scenario in a virtual infrastructure. In contrast to the traditional method, it is possible to respond quickly to threats of attacks specific to the security vulnerabilities that the asset has, and to find redundancy between detection rules with a secure agent, thereby creating an optimal detection rule.

Authentication Mechanism for Secure Fast Handover in HMIPv6 (HMIPv6 환경에서의 안전한 Fast Handover를 위한 인증 메커니즘)

  • Kim, Min-Kyoung;Kang, Hyun-Sun;Park, Chang-Seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.3
    • /
    • pp.91-100
    • /
    • 2007
  • In this paper, We design and propose a protocol for supporting secure and efficient mobility in integrating fast handover and HMIPv6. In the proposed protocol which is AAA-based HMIPv6, if the MN enters the MAP domain for the first time, then it performs an Initial Local Binding Update for authentication. We propose a secure Fast Handover method using the ticket provided by MAP, which includes the secret key for authentication. Also, we analyze and compare security properties of our proposed scheme with those of other scheme using various attack scenario.