• Title/Summary/Keyword: Attack tree

Search Result 108, Processing Time 0.023 seconds

Attack Tree Generation and Real-Time Attack Detection System Using Log Analysis (로그 분석을 이용한 공격 트리 생성과 실시간 공격 탐지 시스템)

  • Kim, Duhoe;Kim, Yonghyun;Kim, Donghwa;Shin, Dongkyoo;Shin, Dongil
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.207-210
    • /
    • 2017
  • 최근 국방부는 우리 군이 운영하는 내부망이 해킹에 의해 공격당한 사실을 발표했다. 국방부는 내부망은 외부와의 망 분리를 통해 안전하게 관리되고 있다고 밝혔지만, 이번 사건으로 군에서 사용하는 내부망에도 악성코드 공격이 가능한 취약점이 존재한다는 사실이 밝혀졌다. 본 논문에서는 국방부에서 사용되는 내부망과 일반적으로 사용하는 외부망에서도 보안을 강화할 수 있는 시스템을 개발했다. 본 시스템은 공격 등급을 적용한 트리를 생성하여 일정 수준이 되면 사용자에게 알리고 공격에 이르기 전에 시스템 단에서 차단이 가능하다. 본 논문에서 개발한 시스템을 사용하면 중요한 국가기밀자료나 지적 재산이 높은 자료를 가진 국가 및 기업들이 데이터를 보호 할 수 있고 시스템이 파괴당하는 것을 사전에 방지하여 물리적인 측면도 이점을 얻을 수 있다.

Attack Tree System for Predicting Target of Attempted Attack (미수 공격의 목표를 예측하기 위한 공격트리 시스템)

  • Song, Kyoungjin;Shin, Dongkyoo;Shin, Dongil
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.201-202
    • /
    • 2017
  • 정보통신 시스템이 나날이 발전하고 거대화되면서 해킹시도 또한 기하급수적으로 늘어나고 있다. 그러나 해킹 시도의 대다수는 성공으로 이어지지 않고, 단순의 탐색 경우가 대다수이다. 따라서 미수로 끝난 공격에서 공격 경로 및 공격 목표를 예측함으로써 추가적인 공격에 대비할 수 있는 시스템을 구축할 필요성이 있다. 그러므로 본 논문에서는 포렌식 분석, 해커의 문서, 보안 보고서 등을 토대로 공격 행위, 공격 결과 및 목표 등과 같은 공격 정보를 수집하고 공격트리를 만들어 레지스트리 정보, 프로세스 정보, 보안 로그 등과 같은 시스템 정보를 토대로 공격 목표를 찾는 시스템을 제안한다.

Tree Trunk Level Distribution of Entry Hole by Platypus koryoensis (Coleoptera: Platypodidae) and Its Implication to Tree Damage (광릉긴나무좀(Coleoptera: Platypodidae)의 수간내 분포와 참나무 피해)

  • Choi, Won-Il;Lee, Jung-Su;Choi, Kwang-Sik;Kim, Jong-Kuk;Shin, Sang-Chul
    • Korean journal of applied entomology
    • /
    • v.47 no.2
    • /
    • pp.127-131
    • /
    • 2008
  • Ambrosia beetle, Platypus koryoensis, is a vector of oak wilt disease caused by Raffaelea sp. in Korea. The degree of damage by oak wilt disease was dependent on the density of the beetles in the oak trunk, a relationship between the degree of damage by oak wilt disease and the density of beetle on the basis of the number of entry hole was studied. Entry hole distribution within tree trunk was analyzed by the nearest neighbor method. Thirty four oak trees (Quercus mongolica) located in survey area were selected and then degree of damage, the number of attack hole/$623cm^2$ in upper (50cm from the surface) and lower (surface) trunk and the nearest neighbor distance between the holes were measured. The number of hole and the nearest neighbor distance in upper and lower part were positively correlated with each other. As the degree of damage was severer, the number of the holes increased, whereas the nearest neighbor distance decreased. The distribution pattern of the hole was changed from clumped one to uniform as the severity of damage increased. These results suggested that Platypus koryoensis attacked the oak tree in concentrative manner at initial stage of attack but at final stage, it distributed uniformly to reduce intraspecific competition between the beetles.

Security Structure for Protection of Emergency Medical Information System (응급의료정보시스템의 보호를 위한 보안 구조)

  • Shin, Sang Yeol;Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.2
    • /
    • pp.59-65
    • /
    • 2012
  • Emergency medical information center performs role of medical direction about disease consult and pre-hospital emergency handling scheme work to people. Emergency medical information system plays a major role to be decreased mortality and disability of emergency patient by providing information of medical institution especially when emergency patient has appeared. But, various attacks as a hacking have been happened in Emergency medical information system recently. In this paper, we proposed security structure which can protect the system securely by detecting attacks from outside effectively. Intrusion detection was performed using rule based detection technique according to protocol for every packet to detect attack and intrusion was reported to control center if intrusion was detected also. Intrusion detection was performed again using decision tree for packet which intrusion detection was not done. We experimented effectiveness using attacks as TCP-SYN, UDP flooding and ICMP flooding for proposed security structure in this paper.

Cyber Threat and a Mitigation Method for the Power Systems in the Smart Grid

  • Kim, Myongsoo;Kim, Younghyun;Jeon, Kyungseok
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.3
    • /
    • pp.1043-1050
    • /
    • 2014
  • Obsolescent control systems for power systems are evolving into intelligent systems and connecting with smart devices to give intelligence to the power systems. As networks of the control system are growing, vulnerability is also increasing. The communication network of distribution areas in the power system connects closely to vulnerable environments. Many cyber-attacks have been founded in the power system, and they could be more critical as the power system becomes more intelligent. From these environment, new communication network architecture and mitigation method against cyber-attacks are needed. Availability and Fault Tree analysis used to show that the proposed system enhances performance of current control systems.

A Comparative Study on the Performance of Intrusion Detection using Decision Tree and Artificial Neural Network Models (의사결정트리와 인공 신경망 기법을 이용한 침입탐지 효율성 비교 연구)

  • Jo, Seongrae;Sung, Haengnam;Ahn, Byunghyuk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.4
    • /
    • pp.33-45
    • /
    • 2015
  • Currently, Internet is used an essential tool in the business area. Despite this importance, there is a risk of network attacks attempting collection of fraudulence, private information, and cyber terrorism. Firewalls and IDS(Intrusion Detection System) are tools against those attacks. IDS is used to determine whether a network data is a network attack. IDS analyzes the network data using various techniques including expert system, data mining, and state transition analysis. This paper tries to compare the performance of two data mining models in detecting network attacks. They are decision tree (C4.5), and neural network (FANN model). I trained and tested these models with data and measured the effectiveness in terms of detection accuracy, detection rate, and false alarm rate. This paper tries to find out which model is effective in intrusion detection. In the analysis, I used KDD Cup 99 data which is a benchmark data in intrusion detection research. I used an open source Weka software for C4.5 model, and C++ code available for FANN model.

A Security Scheme of Mobile Agent using QCRT from Colluded Truncation Attacks (공모된 체인 절단 공격으로부터 QCRT를 이용한 이동 에이전트의 보호 기법)

  • Jung, Chang-Ryul;Kim, Kwang-Oh;Song, Jin-Kook;Lee, Sung-Keun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.2
    • /
    • pp.382-388
    • /
    • 2011
  • This paper proposes a mechanism that guarantees secured performance against DDoS attack to protect data from free-roaming agent. Also, as it makes up QCRT(query chain relationship tree) structure which is an enhanced chain relation of existing chain relations that improves extension, It also finds malicious elements. The proposed mechanism extends chain relationship of agent as well by checking chain relation structure as a structure according to the route of agent. For it complements existing weakness with single-side chain relation extension, it guarantees secure performance against DDoS and truncation attacks from mobile agent.

Study on the Affects of Mounting Axisymmetric Inlet to Airframe

  • Ando, Yohei;Matsuo, Akiko;Kojima, Takayuki;Maru, Yusuke;Sato, Tetsuya
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2004.03a
    • /
    • pp.699-702
    • /
    • 2004
  • In this study, the affect of mounting axisymmetrical supersonic inlet to airfoil, which has 65 degree swept angle was numerically investigated. The parameter for this calculation are tree stream Mach number M=2.0 and 2.5, the distance between inlet spike and airfoil lower surface $L_{sw}$/$R_{cowl}$ = 1.21-1.54 and angle of attack to the airfoil 0-4. The mass capture ratio improved 3points in M=2.0 condition and 1points in M=2.5 while the mass capture ratio without airfoil surface was 57% and 71 % for each case. These are the result from increase of density and change of velocity deflection by the shock wave structure formed between inlet and airfoil surface. On the other hand, the distortion of Mach number at cowl lip plane increased by 13% in M=2.0, 3% in M=2.5 condition. The effects of the angle attack on the mass capture ratio is greater than that of the shock wave interaction between inlet and cowl, but the effects to the distortion is smaller in the range of this calculation condition. In the condition of M=2.0 with 4 degrees of angle of attack, inlet distortion of Mach number is mainly caused by the affects of the shock wave interaction between inlet and airfoil surface, while the largest angle of the velocity vector in the radial direction at cowl lip plane is caused by the affect of angle of attack. This large velocity vector made the flow inside the cowl subsonic and caused spillage, which interfere with the boundary layer of airfoil surface.

  • PDF

DDoS traffic analysis using decision tree according by feature of traffic flow (트래픽 속성 개수를 고려한 의사 결정 트리 DDoS 기반 분석)

  • Jin, Min-Woo;Youm, Sung-Kwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.1
    • /
    • pp.69-74
    • /
    • 2021
  • Internet access is also increasing as online activities increase due to the influence of Corona 19. However, network attacks are also diversifying by malicious users, and DDoS among the attacks are increasing year by year. These attacks are detected by intrusion detection systems and can be prevented at an early stage. Various data sets are used to verify intrusion detection algorithms, but in this paper, CICIDS2017, the latest traffic, is used. DDoS attack traffic was analyzed using the decision tree. In this paper, we analyzed the traffic by using the decision tree. Through the analysis, a decisive feature was found, and the accuracy of the decisive feature was confirmed by proceeding the decision tree to prove the accuracy of detection. And the contents of false positive and false negative traffic were analyzed. As a result, learning the feature and the two features showed that the accuracy was 98% and 99.8% respectively.

Infestation of the Longhorned Beetles Species (Cerambycidae) on Acacia seyal Del var. seyal in the Gum Arabic Belt of Sudan

  • Eisa, Maymoona Ahmed;Adam, Yahia Omar
    • Journal of Forest and Environmental Science
    • /
    • v.26 no.2
    • /
    • pp.113-116
    • /
    • 2010
  • The Acacia seyal Del. var. seyal belongs to family Mimosaceae is known locally as gum Talha tree. It is a multipurpose tree species occurs throughout the African gum belt in Savannah mostly in pure forest. In Sudan it thrives on heavy clay soils that receive an annual rainfall between 400-800 mm. It is an important source of rural energy (fuelwood and charcoal) and forage. As mentioned by Nair (2007) the economic damage causes by insect in natural forest often difficult to judge due to no enough research attention The tree is frequently affected by biotic factors among them the insect pests. During a survey in the 1980's the tree was severely infested by the longhorned beetles (Cerambycidae) severely infesting other Acacia species, but the ecological data are overlooked. Therefore, the objective of the study was to assess infestation characteristics and to determine environmental factors triggering the attack of longhorned beetles. A temporary random sampling technique was applied to observe the damage characteristics of the longhorned beetles on tree species during May-July 2007. Five sample plots occupies by A. seyal were taken in Kordofan region directly observed for the presence of hole of emergence of the longhorned beetles, presence of dusts, presence of insect stages, girdling as well as other characteristics of damage. The study results indicate that the infestation rate of trees in the sampled sites ranged between zero and 23.08%. Further ecological researches are recommended.