• Title/Summary/Keyword: Attack time

Search Result 1,152, Processing Time 0.022 seconds

Visual Monitoring System of Multi-Hosts Behavior for Trustworthiness with Mobile Cloud

  • Song, Eun-Ha;Kim, Hyun-Woo;Jeong, Young-Sik
    • Journal of Information Processing Systems
    • /
    • v.8 no.2
    • /
    • pp.347-358
    • /
    • 2012
  • Recently, security researches have been processed on the method to cover a broader range of hacking attacks at the low level in the perspective of hardware. This system security applies not only to individuals' computer systems but also to cloud environments. "Cloud" concerns operations on the web. Therefore it is exposed to a lot of risks and the security of its spaces where data is stored is vulnerable. Accordingly, in order to reduce threat factors to security, the TCG proposed a highly reliable platform based on a semiconductor-chip, the TPM. However, there have been no technologies up to date that enables a real-time visual monitoring of the security status of a PC that is operated based on the TPM. And the TPB has provided the function in a visual method to monitor system status and resources only for the system behavior of a single host. Therefore, this paper will propose a m-TMS (Mobile Trusted Monitoring System) that monitors the trusted state of a computing environment in which a TPM chip-based TPB is mounted and the current status of its system resources in a mobile device environment resulting from the development of network service technology. The m-TMS is provided to users so that system resources of CPU, RAM, and process, which are the monitoring objects in a computer system, may be monitored. Moreover, converting and detouring single entities like a PC or target addresses, which are attack pattern methods that pose a threat to the computer system security, are combined. The branch instruction trace function is monitored using a BiT Profiling tool through which processes attacked or those suspected of being attacked may be traced, thereby enabling users to actively respond.

A Study on Cybersecurity Policy in the Context of International Security (국제협력을 통한 사이버안보 강화방안 연구)

  • Kim, So Jeong;Park, Sangdon
    • Convergence Security Journal
    • /
    • v.13 no.6
    • /
    • pp.51-59
    • /
    • 2013
  • Cyberspace, based on the dramatic development of information and communications technology, has brought enormous benefits to mankind. However, concerns over cyber terrorism and cyber attack are becoming serious. It is time to expand the global dialogue on international security issues in cyberspace. It is imperative to have a common understanding that cyberspace, the infrastructure for prosperity, should not be utilized as a space to create conflicts among states, and that all states agree to build confidence and peace in cyberspace. For this purpose, there are 3 tracks of international cooperations: 1)international cooperation such as UN and Conference on Cyberspace, 2)regional cooperations such as ARF and OSCE. 3)bilateral cooperations such US-Russia Cybersecurity Agreement, US-China presidential level dialogue. This paper will analyze the 1st track of international cooperations of UN and Conference on Cyberspace. With this, Korean government can prepare the forthcoming GGE activities and make our own strategy to deal with the global norms of good behaviour in cyberspace.

A Study on Preparation for ISD under the KORUS FTA -Lessons Learned from NAFTA ISD Cases- (NAFTA의 ISD 분쟁사례를 통한 한미 FTA의 ISD 시사점 및 대응방안)

  • Bae, Sung-Ho
    • International Commerce and Information Review
    • /
    • v.14 no.2
    • /
    • pp.369-387
    • /
    • 2012
  • Throughout intensive negotiations on the KORUS FTA and even after its ratification on March 15, 2012, ISD (Investor-State Dispute Settlement) has been at the center of many controversies within the FTA. Although the original function of the ISD is intended to be a protectional measure for foreign investors, there have been many foreign investors who tried to use the ISD as a tool to attack a government and nullify the public policy demanding tremendous amount of compensation. Many of the NAFTA ISD cases including Ehtyl v. Canada and UPS v. Canada demonstrate such a behavior by foreign investors. It is the right time for Korean government to conduct in depth studies on NAFTA ISD cases because the precedents provide invaluable insights including the legal reasoning by the decision making authorities including ICSID and UNCITRAL. The lessons we would learn from those cases would prepare Korean government for expected ISD claims by foreign investors and enable the government to maximize its efficiency in policy making process under a new international trade environment, the KORUS FTA.

  • PDF

Trap Culture Technique for Propagation of Arbuscular Mycorrhizal Fungi using Different Host Plants

  • Selvakumar, Gopal;Kim, Kiyoon;Walitang, Denver;Chanratana, Mak;Kang, Yeongyeong;Chung, Bongnam;Sa, Tongmin
    • Korean Journal of Soil Science and Fertilizer
    • /
    • v.49 no.5
    • /
    • pp.608-613
    • /
    • 2016
  • Arbuscular mycorrhizal fungi (AMF) spore propagation and long term maintenance is still a complicated technique for farmers. The use of AMF for their ability to promote plant growth and protect plants against pathogen attack and environmental stresses demands AMF propagation for large scale application. This study aimed to propagate AMF spores by trap culture technique and assess their ability to propagate with different host plants in a continuous plant cycle. Mycorrhizal inoculation by trap culture in maize resulted in longer shoots and roots than sudangrass plants. Increase in dry weight with higher percentage also was observed for maize plants. After first and second plant cycle, maize plants had the higher percentage of mycorrhizal response in terms of colonization and arbuscules than sudangrass. Maximum in spore count also achieved in the pots of maize plants. The results show that maize plant is more suitable host plant for AMF spore propagation and trap culture technique can be used effectively to maintain the AMF culture for long time.

Efficient Operation Model for Effective APT Defense (효율적인 APT 대응 시스템 운영 모델)

  • Han, Eun-hye;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.501-519
    • /
    • 2017
  • With the revolution of IT technology, cyber threats and crimes are also increasing. In the recent years, many large-scale APT attack executed domestically and internationally. Specially, many of the APT incidents were not recognized by internal organizations, were noticed by external entities. With fourth industrial revolution(4IR), advancement of IT technology produce large scale of sensitive data more than ever before; thus, organizations invest a mount of budget for various methods such as encrypting data, access control and even SIEM for analyzing any little sign of risks. However, enhanced intelligent APT it's getting hard to aware or detect. These APT threats are too much burden for SMB, Enterprise and Government Agencies to respond effectively and efficiently. This paper will research what's the limitation and weakness of current defense countermeasure base on Cyber Kill Chain process and will suggest effective and efficient APT defense operation model with considering of organization structure and human resources for operation.

Interpretation of the ROK-U.S. Alliance and PSI (한미동맹과 대량무기 확산방지구상에 대한 해석)

  • Kim, Joo-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.5
    • /
    • pp.1102-1112
    • /
    • 2012
  • The policy of the United States is a Korean Peninsula free of all nuclear weapons. The United States government was considering the possibility of military action to eliminate the North Korean nuclear threat. Talk of military action peaked from mid-1993 through mid-1994. Such an attack might have led directly to a Korean war. At that time the nuclear crisis solutioned by North Korea-United States negotiation and ROK-United States alliance. PSI's purpose is to prevent or at least inhibit the spread of weapons of mass destruction, their delivery systems, and related materials to and from states and non-state actors whose possession would be a serious threat to global or regional security. The most controversial activity of PSI is interdiction. North Korea has expressed grave concern over the initiative, stating that it has a sovereign right to develop, deploy, and export weapons, and that it would view any interdiction of its ships as a declaration of war. If South Korea is to execute interdiction North Korean ships expect tensions to increase dramatically on the peninsula with North Korea doing something quite provacative in response. South Korea cannot help approaching PSI with great caution, since it has to consider the ROK-United States alliance, and inter-Korean relations.

A Safety Evaluation of Moored Ship Motions by Observed Tsunami Profile

  • Cho, Ik-Soon;Kubo, Masayoshi;Kong, Gil-Young;Lee, Yun-Sok;Lee, Choong-Ro
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.1
    • /
    • pp.47-52
    • /
    • 2006
  • Recent warnings indicate that there is a potential risk of massive earthquake in Japan within 30 years. These earthquakes could produce large-scale tsunamis. Tsunamis are very powerful and can be traveled thousands of miles and caused damage in many countries. Consideration of the effect of tsunami to the moored ship is very important because it brings the loss of life and vast property damage. In this paper, the numerical simulation procedure to analyze the motions of a moored ship due to the observed waves of tsunami, Tokachi-off earthquake tsunami profile in northern Pacific coasts of Japan on September 26 in 2003. And the effects on the motions and mooring loads are investigated by numerical simulation. Numerical simulations consist of hydrodynamic analyses in a frequency domain and ship motion analyses in a time domain as the motions of moored ships are examined. As the process begins, the hydrodynamic and waveexciting forces for moored ships must be calculated. Ship motions and mooring forces can then be calculated by solving the equations of motion. In order to investigate the safety evaluation on the motions of moored ship by tsunami attack, we applied a numerical simulation procedure to a 135,000m3 LNG carrier moored at an offshore sea berth.

  • PDF

Register Pressure Aware Code Selection Algorithm for Multi-Output Instructions (Register Pressure를 고려한 다중 출력 명령어를 위한 개선된 코드 생성 방법)

  • Youn, Jong-Hee M.;Paek, Yun-Heung;Ko, Kwang-Man
    • The KIPS Transactions:PartA
    • /
    • v.19A no.1
    • /
    • pp.45-50
    • /
    • 2012
  • The demand for faster execution time and lower energy consumption has compelled architects of embedded processors to customize it to the needs of their target applications. These processors consequently provide a rich set of specialized instructions in order to enable programmers to access these features. Such an instruction is typically a $multi$-$output$ $instruction$ (MOI), which outputs multiple results parallely in order to exploit inherent underlying hardware parallelism. Earlier study has exhibited that MOIs help to enhance performance in aspect of instruction counts and code size. However the earlier algorithm does not consider the register pressure. So, some selected MOIs introduce register spill/reload code that increases the code size and instruction count. To attack this problem, we introduce a novel iterated instruction selection algorithm based on the register pressure of each selected MOIs. The experimental results show the suggested algorithm achieves 3% code-size reduction and 2.7% speed-up on average.

A Digital Image Watermarking Scheme using ElGamal Function (ElGarnal함수를 사용하는 디지털 이미지 워터마킹 기법)

  • Lee, Jean-Ho;Kim, Tai-Yun
    • The KIPS Transactions:PartC
    • /
    • v.9C no.1
    • /
    • pp.1-8
    • /
    • 2002
  • Digital image watermarking is a technique for the purpose of protecting the ownership of the image by embedding proprietary watermarks in a digital image. It is required for the digital image watermarking scheme to pursue the robustness against water marking attacks and the perceptual Invisibility more than usual in steganography area, to guarantee not a hidden watermarking algorithm but the publicity of water-marking algorithm details and hidden use of key, which can protect the unauthorized user access from detection. In this paper we propose a new copyright watermarking scheme, which is barred on one-way hash functions using ElGamal functions and modular operations. ElGamal functions are widely used in cryptographic systems. Our watermarking scheme is robust against LSB(least significant bit) attacks and gamma correction attack, and also perceptually invisible. We demonstrate the characteristics of our proposed watermarking scheme through experiments. It is necessary to proceed as the future work the algorithm of achieving at the same time both the pseudo-randomness for the steno-key generation and the asymmetric-key generation.

Design and Implementation of Security Kernel Module with Additional Password for Enhancing Administrator Authentication (관리자 인증 강화를 위한 추가적인 패스워드를 가지는 보안 커널모듈 설계 및 구현)

  • Kim, Ik-Su;Kim, Myung-Ho
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.675-682
    • /
    • 2003
  • Attackers collect vulnerabilities of a target computer system to intrude into it. And using several attack methods, they acquire root privilege. They steal and alter information in the computer system, or destroy the computer sysem. So far many intrusion detection systems and firewallshave been developed, but recently attackers go round these systems and intrude into a computer system . In this paper, we propose security kernel module to prevent attackers having acquired root privilege from doing illegal behaviors. It enhances administrator authentication with additional password, so prevents attackers from doing illegal behaviors such as modification of important files and installation of rootkits. It sends warning mail about sttacker's illegal behaviors to administrators by real time. So using information in the mail, they can estabilish new security policies.