• 제목/요약/키워드: Command Injection

검색결과 28건 처리시간 0.022초

Efforts against Cybersecurity Attack of Space Systems

  • Jin-Keun Hong
    • Journal of Positioning, Navigation, and Timing
    • /
    • 제12권4호
    • /
    • pp.437-445
    • /
    • 2023
  • A space system refers to a network of sensors, ground systems, and space-craft operating in space. The security of space systems relies on information systems and networks that support the design, launch, and operation of space missions. Characteristics of space operations, including command and control (C2) between space-craft (including satellites) and ground communication, also depend on wireless frequency and communication channels. Attackers can potentially engage in malicious activities such as destruction, disruption, and degradation of systems, networks, communication channels, and space operations. These malicious cyber activities include sensor spoofing, system damage, denial of service attacks, jamming of unauthorized commands, and injection of malicious code. Such activities ultimately lead to a decrease in the lifespan and functionality of space systems, and may result in damage to space-craft and, lead to loss of control. The Cybersecurity Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) matrix, proposed by Massachusetts Institute of Technology Research and Engineering (MITRE), consists of the following stages: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command & Control, Exfiltration, and Impact. This paper identifies cybersecurity activities in space systems and satellite navigation systems through the National Institute of Standards and Technology (NIST)'s standard documents, former U.S. President Trump's executive orders, and presents risk management activities. This paper also explores cybersecurity's tactics attack techniques within the context of space systems (space-craft) by referencing the Sparta ATT&CK Matrix. In this paper, security threats in space systems analyzed, focusing on the cybersecurity attack tactics, techniques, and countermeasures of space-craft presented by Space Attack Research and Tactic Analysis (SPARTA). Through this study, cybersecurity attack tactics, techniques, and countermeasures existing in space-craft are identified, and an understanding of the direction of application in the design and implementation of safe small satellites is provided.

페이로드 임베딩 사전학습 기반의 웹 공격 분류 모델 (Web Attack Classification Model Based on Payload Embedding Pre-Training)

  • 김연수;고영훈;엄익채;김경백
    • 정보보호학회논문지
    • /
    • 제30권4호
    • /
    • pp.669-677
    • /
    • 2020
  • 인터넷 사용자가 폭발적으로 늘어나면서 웹을 이용한 공격이 증가했다. 뿐만 아니라 기존의 방어 기법들을 우회하기 위해 공격 패턴이 다양해졌다. 전통적인 웹 방화벽은 알져지지 않은 패턴의 공격을 탐지하기 어렵다. 따라서 인공지능으로 비정상을 탐지하는 방식이 대안으로 연구되고 있다. 특히 공격에 악용되는 스크립트나 쿼리가 텍스트로 이루어져 있다는 이유로 자연어 처리 기법을 적용하는 시도가 일어나고 있다. 하지만 스크립트나 쿼리는 미등록 단어(Unknown word)가 다량 발생하기 때문에 자연어 처리와는 다른 방식의 접근이 필요하다. 본 논문에서는 BPE(Byte Pair Encoding)기법으로 웹 공격 페이로드에 자주 사용되는 토큰 집합을 추출하여 임베딩 벡터를 학습시키고, 주의 메커니즘 기반의 Bi-GRU 신경망으로 토큰의 순서와 중요도를 학습하여 웹 공격을 분류하는 모델을 제안한다. 주요 웹 공격인 SQL 삽입 공격, 크로스 사이트 스크립팅, 명령 삽입 공격에 대하여 분류 평가 결과 약 0.9990의 정확도를 얻었으며, 기존 연구에서 제안한 모델의 성능을 상회하는 결과를 도출하였다.

이중여자 유도형 풍력발전기 기반 풍력단지의 계통 연계점 전압제어 (Voltage Control for a Wind Power Plant Based on the Available Reactive Current of a DFIG and Its Impacts on the Point of Interconnection)

  • ;김진호;;강용철
    • 전기학회논문지
    • /
    • 제65권1호
    • /
    • pp.23-30
    • /
    • 2016
  • Wake effects cause wind turbine generators (WTGs) within a wind power plant (WPP) to produce different levels of active power and subsequent reactive power capabilities. Further, the impedance between a WTG and the point of interconnection (POI)-which depends on the distance between them-impacts the WPP's reactive power injection capability at the POI. This paper proposes a voltage control scheme for a WPP based on the available reactive current of the doubly-fed induction generators (DFIGs) and its impacts on the POI to improve the reactive power injection capability of the WPP. In this paper, a design strategy for modifying the gain of DFIG controller is suggested and the comprehensive properties of these control gains are investigated. In the proposed scheme, the WPP controller, which operates in a voltage control mode, sends the command signal to the DFIGs based on the voltage difference at the POI. The DFIG controllers, which operate in a voltage control mode, employ a proportional controller with a limiter. The gain of the proportional controller is adjusted depending on the available reactive current of the DFIG and the series impedance between the DFIG and the POI. The performance of the proposed scheme is validated for various disturbances such as a reactive load connection and grid fault using an EMTP-RV simulator. Simulation results demonstrate that the proposed scheme promptly recovers the POI voltage by injecting more reactive power after a disturbance than the conventional scheme.

PCM/PSK/PM 방식을 사용하는 정지궤도 위성의 슈퍼 천이 궤도에서 S-Band TC & R 통신 링크 성능 분석 (TC & R Communication Link Performance Analysis of Geostationary Satellite Employing PCM/PSK/PM on Super Synchronous Transfer Orbit)

  • 이선익;염경환
    • 한국전자파학회논문지
    • /
    • 제25권11호
    • /
    • pp.1142-1155
    • /
    • 2014
  • PCM/PSK/PM 변조 방식은 위성과 지상국간 원격명령과 원격측정 및 거리측정(레인징)을 위하여 S-band 주파수 대역에서 널리 사용되어 왔다. 본 논문에서는 정지궤도 위성 발사에 활용되고 있는 슈퍼 천이 궤도에서 PCM/PSK/PM 방식을 적용하는 정지궤도 위성과 지상국간 TC & R(Telemetry, Command and Ranging) 링크 성능이 확보되는지를 연구하였다. 위성의 제원은 Heritage를 고려하여 기존 정지궤도 위성에서 운용되는 제원으로 설정하였다. 이 결과, 상향 링크에서는 EIRP가 65 dBW이면 3 dB 이상의 여유 마진이 확보되는 것을 확인하였다. 하향 링크에서는 원격측정과 레인지 변조 지수를 조정함으로써 요구 마진(3 dB)을 얻을 수 있었고, 이에 상응하는 지상국 최소 G/T 성능을 찾아볼 수 있었다. 원지점 고도가 65,000 km와 70,000 km인 슈퍼 천이 궤도를 이용한 정지 궤도 진입이 추진될 경우에는 천리안 위성을 발사할 때 초기에 이미 운용되었던 지상국의 활용이 가능한 것으로 분석된다.

모터 파라미터 산포를 고려한 고속 운전에서의 속도제한 제어기 구현 (Implementation of Speed Limitation Controller Considering Motor Parameter Variation in High Speed Operation)

  • 김경훈;윤철;권우현
    • 전기학회논문지
    • /
    • 제66권11호
    • /
    • pp.1584-1590
    • /
    • 2017
  • This paper presents a implementation method of reliable speed limitation controller considering motor parameter variation in high speed operation. In spinning process of drum washing machine, speed increase has to be limited when unallowable imbalance mass is detected. Otherwise, severe noise and vibration can happen because noise and vibration are proportional to imbalance mass. To detect imbalance mass, d-axis current magnitude is used. However, we have to compensate for back-emf and power supply variation by means of detecting them because d-axis current is affected by both of them. On the other hand, we have to carefully estimate back-emf because back-emf is affected by stator resistance variation and inverter voltage error. Stator resistance variation can happen by manufacturing process for mass production or temperature variation in running. And there are inverter voltage errors between command voltage from micro-computer to inverter and real voltage from inverter to motor because of rising and falling time delay and turn-on resistance of power semiconductor switch. To solve this problem, we propose 2-step align current injection method which is to inject step-wise current right before starting. By this method, we can simply obtain stator resistance by ratio of voltage without inverter voltage error and current, and we can measure inverter voltage error. So we can obtain more exact model current, and then by simple calculation with compensation gain, we can estimate more accurate motor back-emf. We show that this method works well. It is verified through experiments.

DEVELOPMENT AND IMPLEMENTATION OF DISTRIBUTED HARDWARE-IN-THE-LOOP SIMULATOR FOR AUTOMOTIVE ENGINE CONTROL SYSTEMS

  • YOON M.;LEE W.;SUNWOO M.
    • International Journal of Automotive Technology
    • /
    • 제6권2호
    • /
    • pp.107-117
    • /
    • 2005
  • A distributed hardware-in-the-loop simulation (HILS) platform is developed for designing an automotive engine control system. The HILS equipment consists of a widely used PC and commercial-off-the-shelf (COTS) I/O boards instead of a powerful computing system and custom-made I/O boards. The distributed structure of the HILS system supplements the lack of computing power. These features make the HILS equipment more cost-effective and flexible. The HILS uses an automatic code generation extension, REAL-TIME WORKSHOP$^{ (RTW$^{) of MATLAB$^{ tool-chain and RT-LAB$^{, which enables distributed simulation as well as the detection and generation of digital event between simulation time steps. The mean value engine model, which is used in control design phase, is imported into this HILS. The engine model is supplemented with some I/O subsystems and I/O boards to interface actual input and output signals in real-time. The I/O subsystems are designed to imitate real sensor signals with high fidelity as well as to convert the raw data of the I/O boards to the appropriate forms for proper interfaces. A lot of attention is paid to the generation of a precise crank/ earn signal which has the problem of quantization in a conventional fixed time step simulation. The detection of injection! command signal which occurs between simulation time steps are also successfully compensated. In order to prove the feasibility of the proposed environment, a simple PI controller for an air-to-fuel ratio (AFR) control is used. The proposed HILS environment and I/O systems are shown to be an efficient tool to develop various control functions and to validate the software and hardware of the engine control system.

클립 토스터 : 페이스트재킹 공격 탐지 및 대응 기술 (Clip Toaster : Pastejacking Attack Detection and Response Technique)

  • 이은영;길예슬;이일구
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2022년도 춘계학술대회
    • /
    • pp.192-194
    • /
    • 2022
  • 본 논문은 페이스트재킹(Pastejacking) 공격 방식을 분석하고, 효과적으로 방어할 수 있는 방법인 클립 토스터를 제안한다. 컴퓨터 프로그래밍을 할 때 깃허브(GitHub), 스택 오버플로(Stack Overflow) 혹은 블로그의 코드를 복사하여 붙여넣기 하는 경우가 많다. 페이스트재킹은 사용자가 웹에 게시된 코드를 복사할 때 클립보드에 악성 데이터가 주입되는 공격으로 사용자가 의도하지 않은 악성 명령어를 실행시킬 수 있으며 위험한 코드 스니펫이 소프트웨어 내에 삽입되어 보안 위협이 발생할 수 있다. 본 논문에서는 개발자의 단말기와 프로그램 코드의 보안성 모두를 위협하는 페이스트재킹을 방어하기 위해 사용자에게 보안 위협 상황을 시각화하여 경고하는 방안인 클립 토스터를 제안한다. 클립 토스터는 보안 위협 알림을 시각화하고 사용자 동작에 방해 없이 사용자가 공격 여부를 효과적으로 탐지 및 대응할 수 있다.

  • PDF

저속 센서리스 제어의 역기전력 추정 성능 향상을 위한 모터 파라미터 추정과 전압 오차의 개선 (Identification of Motor Parameters and Improvement of Voltage Error for Improvement of Back-emf Estimation in Sensorless Control of Low Speed Operation)

  • 김경훈;윤철;조내수;장민호;권우현
    • 전기학회논문지
    • /
    • 제67권5호
    • /
    • pp.635-643
    • /
    • 2018
  • This paper propose a method to identify the motor parameters and improve input voltage error which affect the low speed position error of the back-emf(back electromotive force) based sensorless algorithm and to secure the operation reliability and stability even in the case where the load fluctuation is severe and the start and low speed operation frequently occurs. In the model-based observer used in this paper, stator resistance, inductance, and input voltage are particularly influential factors on low speed performance. Stator resistance can cause resistance value fluctuation which may occur in mass production process, and fluctuation of resistance value due to heat generated during operation. The inductance is influenced by the fluctuation due to the manufacturing dispersion and at a low speed where the change of the current is severe. In order to find stator resistance and inductance which have different initial values and fluctuate during operation and have a large influence on sensorless performance at low speed, they are commonly measured through 2-point calculation method by 2-step align current injection. The effect of voltage error is minimized by offsetting the voltage error. In addition, when the command voltage is used, it is difficult to estimate the back-emf due to the relatively large distortion voltage due to the dead time and the voltage drop of the power device. In this paper, we propose a simple circuit and method to detect the voltage by measuring the PWM(Pulse Width Modulation) pulse width and compensate the voltage drop of the power device with the table, thereby minimizing the position error due to the exact estimation of the back-emf at low speed. The suitability of the proposed algorithm is verified through experiment.