• Title/Summary/Keyword: Attack time

Search Result 1,152, Processing Time 0.031 seconds

Design and Implementation of Cyber Range for Cyber Defense Exercise Based on Cyber Crisis Alert (사이버위기 경보 기반 사이버 방어 훈련장 설계 및 구축 연구)

  • Choi, Younghan;Jang, Insook;Whoang, Inteck;Kim, Taeghyoon;Hong, Soonjwa;Park, Insung;Yang, Jinsoek;Kwon, Yeongjae;Kang, Jungmin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.805-821
    • /
    • 2020
  • Cyber defense exercise should require training on the latest cyber attacks and have a similar process to defense cyber attacks. In addition, it is also important to train on cyber resilience that can perform normal tasks or support equivalent tasks regardless of cyber attacks. In this paper, we proposed and developed a cyber range that can strengthen the elements of cyber resilience by performing cyber defense exercise in real time based on the cyber crisis alert issued when a cyber attack occurs in Korea. When BLUE, YELLOW, ORANGE, and RED warnings are issued according to the cyber crisis, our system performs proactive response, real time response, and post response according to the alarm. It can improve trainee's capability to respond to cyber threats by performing cyber defense exercise in a cyber crisis environment similar to the actual situation of Korea.

USN's Efforts to Rebuild its Combat Power in an Era of Great Power Competition (강대국 간의 경쟁시대와 미 해군의 증강 노력)

  • Jung, Ho-Sub
    • Strategy21
    • /
    • s.44
    • /
    • pp.5-27
    • /
    • 2018
  • The purpose of this paper is to look at USN's efforts to rebuild its combat power in the face of a reemergence of great powers competition, and to propose some recommendations for the ROKN. In addition to the plan to augment its fleet towards a 355-ships capacity, the USN is pursuing to improve exponentially combat lethality(quality) of its existing fleet by means of innovative science and technology. In other words, the USN is putting its utmost efforts to improve readiness of current forces, to modernize maintenance facilities such as naval shipyards, and simultaneously to invest in innovative weapons system R&D for the future. After all, the USN seems to pursue innovations in advanced military Science & Technology as the best way to ensure continued supremacy in the coming strategic competition between great powers. However, it is to be seen whether the USN can smoothly continue these efforts to rebuild combat strength vis-a-vis its new competition peers, namely China and Russian navy, due to the stringent fiscal constraints, originating, among others, from the 2011 Budget Control Act effective yet. Then, it seems to be China's unilateral and assertive behaviors to expand its maritime jurisdiction in the South China Sea that drives the USN's rebuild-up efforts of the future. Now, some changes began to be perceived in the basic framework of the hitherto regional maritime security, in the name of declining sea control of the USN as well as withering maritime order based on international law and norms. However, the ROK-US alliance system is the most excellent security mechanism upon which the ROK, as a trading power, depends for its survival and prosperity. In addition, as denuclearization of North Korea seems to take significant time and efforts to accomplish in the years to come, nuclear umbrella and extended deterrence by the US is still noting but indispensible for the security of the ROK. In this connection, the naval cooperation between ROKN and USN should be seen and strengthened as the most important deterrents to North Korean nuclear and missile threats, as well as to potential maritime provocation by neighboring countries. Based on these observations, this paper argues that the ROK Navy should try to expand its own deterrent capability by pursuing selective technological innovation in order to prevent this country's destiny from being dictated by other powers. In doing so, however, it may be too risky for the ROK to pursue the emerging, disruptive innovative technologies such as rail gun, hypersonic weapon... etc., due to enormous budget, time, and very thin chance of success. This paper recommends, therefore, to carefully select and extensively invest on the most cost-effective technological innovations, suitable in the operational environments of the ROK. In particular, this paper stresses the following six areas as most potential naval innovations for the ROK Navy: long range precision strike; air and missile defense at sea; ASW with various unmanned maritime system (UMS) such as USV, UUV based on advanced hydraulic acoustic sensor (Sonar) technology; network; digitalization for the use of AI and big data; and nuclear-powered attack submarines as a strategic deterrent.

Efficient Feature Selection Based Near Real-Time Hybrid Intrusion Detection System (근 실시간 조건을 달성하기 위한 효과적 속성 선택 기법 기반의 고성능 하이브리드 침입 탐지 시스템)

  • Lee, Woosol;Oh, Sangyoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.471-480
    • /
    • 2016
  • Recently, the damage of cyber attack toward infra-system, national defence and security system is gradually increasing. In this situation, military recognizes the importance of cyber warfare, and they establish a cyber system in preparation, regardless of the existence of threaten. Thus, the study of Intrusion Detection System(IDS) that plays an important role in network defence system is required. IDS is divided into misuse and anomaly detection methods. Recent studies attempt to combine those two methods to maximize advantagesand to minimize disadvantages both of misuse and anomaly. The combination is called Hybrid IDS. Previous studies would not be inappropriate for near real-time network environments because they have computational complexity problems. It leads to the need of the study considering the structure of IDS that have high detection rate and low computational cost. In this paper, we proposed a Hybrid IDS which combines C4.5 decision tree(misuse detection method) and Weighted K-means algorithm (anomaly detection method) hierarchically. It can detect malicious network packets effectively with low complexity by applying mutual information and genetic algorithm based efficient feature selection technique. Also we construct upgraded the the hierarchical structure of IDS reusing feature weights in anomaly detection section. It is validated that proposed Hybrid IDS ensures high detection accuracy (98.68%) and performance at experiment section.

Phenylalanine Ammonia Lyase and Cinnamic Acid 4-Hydroxylase Activities of Rice and Pepper in response to UV and Wounding (벼와 고추에서 UV와 상처가 PAL 및 C4H 효소 활성에 미치는 영향)

  • Kim, Mi-Young;Yoon, Yong-Hwi;Lee, Jung-Hoon;Kim, Hak-Yoon;Shin, Dong-Hyun;Lee, In-Jung;Kim, Dal-Ung;Kim, Kil-Ung
    • Journal of Life Science
    • /
    • v.12 no.3
    • /
    • pp.274-280
    • /
    • 2002
  • The metabolites related to phenylpropanoid pathway play an important role in the self-defense of plants and induced by environmental stress like wounding, pathogen attack, UV-irradiation and so on. The mRNA level of rite phenylalanine ammonia lyase (PAL) was increased at 12 h to 48 h, however it was gradually decreased 48 h to 60 h after UV irradiation. The PAL enzyme activities in rice were peaked at the time of 24 h after UV irradiation, on the other hand, it was not affected by wounding. The PAL enzyme activities in pepper were raised high at 24 h and 10 h by UV irradiation and wounding respectively. The cinnamic acid 4-hydroxylase (C4H) activities were increased by wounding treatment and were detected from 12 h to end time point of experiment, while UV-irradiation didn't affect the C4H activity in rice and pepper. These results were assumed that the action of isoflavonid has an alternative effect on the defenses which include wounding and UV irradiation and on the diverse roles in rice and hot pepper.

Design and Implementation of Anomaly Traffic Control framework based on Linux Netfilter System and CBQ Routing Mechanisms (리눅스 Netfilter시스템과 CBQ 라우팅 기능을 이용한 비정상 트래픽 제어 프레임워크 설계 및 구현)

  • 조은경;고광선;이태근;강용혁;엄영익
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.129-140
    • /
    • 2003
  • Recently viruses and various hacking tools that threat hosts on a network becomes more intelligent and cleverer, and so the various security mechanisms against them have ken developed during last decades. To detect these network attacks, many NIPSs(Network-based Intrusion Prevention Systems) that are more functional than traditional NIDSs are developed by several companies and organizations. But, many previous NIPSS are hewn to have some weakness in protecting important hosts from network attacks because of its incorrectness and post-management aspects. The aspect of incorrectness means that many NIPSs incorrectly discriminate between normal and attack network traffic in real time. The aspect of post-management means that they generally respond to attacks after the intrusions are already performed to a large extent. Therefore, to detect network attacks in realtime and to increase the capability of analyzing packets, faster and more active responding capabilities are required for NIPS frameworks. In this paper, we propose a framework for real-time intrusion prevention. This framework consists of packet filtering component that works on netfilter in Linux kernel and traffic control component that have a capability of step-by-step control over abnormal network traffic with the CBQ mechanism.

Artificial Intelligence-based Security Control Construction and Countermeasures (인공지능기반 보안관제 구축 및 대응 방안)

  • Hong, Jun-Hyeok;Lee, Byoung Yup
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.1
    • /
    • pp.531-540
    • /
    • 2021
  • As cyber attacks and crimes increase exponentially and hacking attacks become more intelligent and advanced, hacking attack methods and routes are evolving unpredictably and in real time. In order to reinforce the enemy's responsiveness, this study aims to propose a method for developing an artificial intelligence-based security control platform by building a next-generation security system using artificial intelligence to respond by self-learning, monitoring abnormal signs and blocking attacks.The artificial intelligence-based security control platform should be developed as the basis for data collection, data analysis, next-generation security system operation, and security system management. Big data base and control system, data collection step through external threat information, data analysis step of pre-processing and formalizing the collected data to perform positive/false detection and abnormal behavior analysis through deep learning-based algorithm, and analyzed data Through the operation of a security system of prevention, control, response, analysis, and organic circulation structure, the next generation security system to increase the scope and speed of handling new threats and to reinforce the identification of normal and abnormal behaviors, and management of the security threat response system, Harmful IP management, detection policy management, security business legal system management. Through this, we are trying to find a way to comprehensively analyze vast amounts of data and to respond preemptively in a short time.

Development of Fungal Sapstain in Logs of Japanese Red Pine and Korean Pine (소나무와 잣나무 원목에서 변재변색 발생)

  • Kim, Gyu-Hyeok;Kim, Jae-Jin;Ra, Jong-Bum
    • Journal of the Korean Wood Science and Technology
    • /
    • v.30 no.2
    • /
    • pp.128-133
    • /
    • 2002
  • This study was conducted to investigate the influence of storage time on the sapstain development of Japanese red pine and Korean pine logs during storage in log yard, and their stain characteristics. Japanese red pine and Korean pine trees were harvested and cut into logs in mid January of 2001. These logs were transported to the two local sawmills where they were closely stacked in remote parts of log yard. The logs were then sampled destructively by cutting seven to nine 3-cm long discs along the length of each log at intervals of 3, 4, 5, 6, and 8 month after felling. The stain coverage and maximal radial penetration of stain were measured from the discs of the sampled logs after the isolation of causal staining fungi. The sapstain was primarily infested by the attack of bark beetles and the species of bark beetle was identified as Tomicus piniperda. The main fungal species isolated from stained wood was Ophiostoma species. Based on the present study, the logs could be stored in log yard until May without stain; but stain development was rapid after May and the severity of stain increased proportionally with storage time. Korean pine was more susceptible to fungal stain than Japanese red pine. During summer storage, decay started to develop in logs and the main species were identified as Tyromyces sp. and Schizophyllum commune. Information provided in this paper would be very useful to develop more effective control strategies for sapstain prevention in Japanese red pine and Korean pine logs.

Multi-fidelity uncertainty quantification of high Reynolds number turbulent flow around a rectangular 5:1 Cylinder

  • Sakuma, Mayu;Pepper, Nick;Warnakulasuriya, Suneth;Montomoli, Francesco;Wuch-ner, Roland;Bletzinger, Kai-Uwe
    • Wind and Structures
    • /
    • v.34 no.1
    • /
    • pp.127-136
    • /
    • 2022
  • In this work a multi-fidelity non-intrusive polynomial chaos (MF-NIPC) has been applied to a structural wind engineering problem in architectural design for the first time. In architectural design it is important to design structures that are safe in a range of wind directions and speeds. For this reason, the computational models used to design buildings and bridges must account for the uncertainties associated with the interaction between the structure and wind. In order to use the numerical simulations for the design, the numerical models must be validated by experi-mental data, and uncertainties contained in the experiments should also be taken into account. Uncertainty Quantifi-cation has been increasingly used for CFD simulations to consider such uncertainties. Typically, CFD simulations are computationally expensive, motivating the increased interest in multi-fidelity methods due to their ability to lev-erage limited data sets of high-fidelity data with evaluations of more computationally inexpensive models. Previous-ly, the multi-fidelity framework has been applied to CFD simulations for the purposes of optimization, rather than for the statistical assessment of candidate design. In this paper MF-NIPC method is applied to flow around a rectan-gular 5:1 cylinder, which has been thoroughly investigated for architectural design. The purpose of UQ is validation of numerical simulation results with experimental data, therefore the radius of curvature of the rectangular cylinder corners and the angle of attack are considered to be random variables, which are known to contain uncertainties when wind tunnel tests are carried out. Computational Fluid Dynamics (CFD) simulations are solved by a solver that employs the Finite Element Method (FEM) for two turbulence modeling approaches of the incompressible Navier-Stokes equations: Unsteady Reynolds Averaged Navier Stokes (URANS) and the Large Eddy simulation (LES). The results of the uncertainty analysis with CFD are compared to experimental data in terms of time-averaged pressure coefficients and bulk parameters. In addition, the accuracy and efficiency of the multi-fidelity framework is demonstrated through a comparison with the results of the high-fidelity model.

Development of Simulator for Analyzing Intercept Performance of Surface-to-air Missile (지대공미사일 요격 성능 분석 시뮬레이터 개발)

  • Kim, Ki-Hwan;Seo, Yoon-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.1
    • /
    • pp.63-71
    • /
    • 2010
  • In modern war, Intercept Performance of SAM(Surface to Air Missile) is gaining importance as range and precision of Missile and Guided Weapon on information warfare have been improved. An aerial defence system using Surface-to-air Radar and Guided Missile is needed to be built for prediction and defense from threatening aerial attack. When developing SAM, M&S is used to free from a time limit and a space restriction. M&S is widely applied to education, training, and design of newest Weapon System. This study was conducted to develop simulator for evaluation of Intercept Performance of SAM. In this study, architecture of Intercept Performance of SAM analysis simulator for estimation of Intercept Performance of various SAM was suggested and developed. The developed Intercept Performance of SAM analysis simulator was developed by C++ and Direct3D, and through 3D visualization using the Direct3D, it shows procedures of the simulation on a user animation window. Information about design and operation of Fighting model is entered through input window of the simulator, and simulation engine consisted of Object Manager, Operation Manager, and Integrated Manager conducts modeling and simulation automatically using the information, so the simulator gives user feedback in a short time.

CNN Model-based Arrhythmia Classification using Image-typed ECG Data (이미지 타입의 ECG 데이터를 사용한 CNN 모델 기반 부정맥 분류)

  • Yeon-Suk Bang;Myung-Soo Jang;Yousik Hong;Sang-Suk Lee;Jun-Sang Yu;Woo-Beom Lee
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.24 no.4
    • /
    • pp.205-212
    • /
    • 2023
  • Among cardiac diseases, arrhythmias can lead to serious complications such as stroke, heart attack, and heart failure if left untreated, so continuous and accurate ECG monitoring is crucial for clinical care. However, the accurate interpretation of electrocardiogram (ECG) data is entirely dependent on medical doctors, which requires additional time and cost. Therefore, this paper proposes an arrhythmia recognition module for the purpose of developing a medical platform through the analysis of abnormal pulse waveforms based on Lifelogs. The proposed method is to convert ECG data into image format instead of time series data, apply visual pattern recognition technology, and then detect arrhythmia using CNN model. In order to validate the arrhythmia classification of the CNN model by image type conversion of ECG data proposed in this paper, the MIT-BIH arrhythmia dataset was used, and the result showed an accuracy of 97%.