• Title/Summary/Keyword: Container Security

Search Result 111, Processing Time 0.023 seconds

A Technique for Accurate Detection of Container Attacks with eBPF and AdaBoost

  • Hyeonseok Shin;Minjung Jo;Hosang Yoo;Yongwon Lee;Byungchul Tak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.6
    • /
    • pp.39-51
    • /
    • 2024
  • This paper proposes a novel approach to enhance the security of container-based systems by analyzing system calls to dynamically detect race conditions without modifying the kernel. Container escape attacks allow attackers to break out of a container's isolation and access other systems, utilizing vulnerabilities such as race conditions that can occur in parallel computing environments. To effectively detect and defend against such attacks, this study utilizes eBPF to observe system call patterns during attack attempts and employs a AdaBoost model to detect them. For this purpose, system calls invoked during the attacks such as Dirty COW and Dirty Cred from popular applications such as MongoDB, PostgreSQL, and Redis, were used as training data. The experimental results show that this method achieved a precision of 99.55%, a recall of 99.68%, and an F1-score of 99.62%, with the system overhead of 8%.

A Study on Photon Characteristics Generated from Target of Electron Linear Accelerator for Container Security Inspection using MCNP6 Code (MCNP6 코드를 이용한 컨테이너 보안 검색용 전자 선형가속기 표적에서 발생한 광자 평가에 관한 연구)

  • Lee, Chang-Ho;Kim, Jang-Oh;Lee, Yoon-Ji;Jeon, Chan-hee;Lee, Ji-Eun;Min, Byung-In
    • Journal of the Korean Society of Radiology
    • /
    • v.14 no.3
    • /
    • pp.193-201
    • /
    • 2020
  • The purpose of this study is to evaluate the photon characteristics according to the material and thickness of the electrons incidented through a linear accelerator. The computer simulation design is a linear accelerator target consisting of a 2 mm thick tungsten single material and a 1.8 mm and 2.3 mm thick tungsten and copper composite material. In the research method, First, the behavior of primary particles in the target was evaluated by electron fluence and electron energy deposition. Second, photons occurring within the target were evaluated by photon fluence. Finally, the photon angle-energy distribution at a distance of 1 m from the target was evaluated by photon fluence. As a result, first, electrons, which are primary particles, were not released out of the target for electron fluence and energy deposition in the target of a single material and a composite material. Then, electrons were linearly attenuated negatively according to the target thickness. Second, it was found that the composite material target had a higher photon generation than the single material target. This confirmed that the material composition and thickness influences photon production. Finally, photon fluence according to the angular distribution required for shielding analysis was calculated. These results confirmed that the photon generation rate differed depending on the material and thickness of the linear accelerator target. Therefore, this study is necessary for designing and operating a linear accelerator use facility for container security screening that is being introduced in the country. In addition, it is thought that it can be used as basic data for radiation protection.

A Study on Photoneutron Characteristics Generated from Target and Collimator of Electron Linear Accelerator for Container Security Inspection using MCNP6 Code (MCNP6 코드를 이용한 컨테이너 보안 검색용 전자 선형가속기 표적과 조준기에서 발생한 광중성자 특성에 관한 연구)

  • Lee, Chang-Ho;Kim, Jang-Oh;Lee, Yoon-Ji;Jeon, Chan-hee;Lee, Ji-Eun;Min, Byung-In
    • Journal of the Korean Society of Radiology
    • /
    • v.14 no.4
    • /
    • pp.455-465
    • /
    • 2020
  • The purpose of this study is to evaluate the photoneutron characteristics generated by the linear accelerator target and collimator. The computer simulation design firstly, consisted of a target, a single material target and a composite material target. Secondly, it consisted of a cone beam and a fan beam depending on the type of the collimator. Finally, the material of the fan beam collimator is composed of a single material composed of only lead (Pb) and a composite material collimator composed of tungsten (W) and lead (Pb). The research method calculated the photoneutron production rate and energy spectrum using F2 tally from the surface of a virtual sphere at a distance of 100 cm from the target. As a result, firstly the photoneutron production rate was 20% difference, depending on the target. Secondly, depending on the type of the collimator, there was a 10% difference. Finally, depending on the collimator material, there was a 40% difference. In the photoneutron energy spectrum, the average photoneutron flux tended to be similar to the photoneutron production rate. As a result, it was confirmed that the 9 MeV linear accelerator photoneutron are production increased more by the collimator than by the target, and by the material, not the type of the collimator. Selecting and operating targets and collimator with low photoneutron production will be the most active radiation protection. Therefore, it is considered that this research can be a useful data for introducing and operating and radiation protection of a linear accelerator for container security inspection.

The Security Management Architecture for E504 EJB Container System (E504 EJB 컨테이너 시스템의 보안 관리 방법)

  • 서범수;김수형;박중기;이경호
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10e
    • /
    • pp.190-192
    • /
    • 2002
  • EJB(Enterprise Java Bean)컨테이너에서 보안은 크게 사용자 인증과 빈의 메소드 호출에 대한 접근 제어로 구분된다. 기업이 가지고 운영 중인 다양한 보안 플랫폼 상에 EJB 컨테이너가 구동되기 때문에 EJB 컨테이너는 개별 보안 시스템과 독립적인 방법으로 빈에 대한접근 제어 방법을 정의하고 있다. 본 논문에서는 E504(Enterprise 504) EJB 컨테이너 시스템에서의 사용자 인증 및 접근 제어 방법에 대해 논의한다.

  • PDF

A Study on the Applicability of IoT for Container Terminal (컨테이너 터미널의 사물인터넷(IoT) 적용가능성에 관한 연구)

  • Jeon, Sang-Hyeon;Kang, Dal-Won;Min, Se-Hong;Kim, Si-Hyun
    • Journal of Korea Port Economic Association
    • /
    • v.36 no.2
    • /
    • pp.1-18
    • /
    • 2020
  • The Internet of things (IoT) has been applied to a variety of industrial uses such as public service sectors, medical industries, automotive industries, and so on. Led by smart cities, this is typical. However, from a logistics perspective, the level of application is insufficient. This study examines the applicability of IoT-related technology in a container terminal, an object of the present invention, to derive an applicable plan. Analytic network process (ANP) analysis reveals the following results for IoT applications in container terminals: operating systems (26.7%), safety/environmental/security systems (26.4%), equipment maintenance systems (25.3%), and facility maintenance systems (21.6 %). The second ANP analysis reveals the following results: Economy (40.2%), productivity (21.1%), service level (19.5%), and utilizing technology level (19.2%). The application or standard of evaluation is important when applying IoT technology to container terminals; however, it is not concentrated in a certain area. It is desirable to build each container system with linkage and efficiency from a macroscopic view.

AI Smart Factory Model for Integrated Management of Packaging Container Production Process

  • Kim, Chigon;Park, Deawoo
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.148-154
    • /
    • 2021
  • We propose the AI Smart Factory Model for integrated management of production processes in this paper .It is an integrated platform system for the production of food packaging containers, consisting of a platform system for the main producer, one or more production partner platform systems, and one or more raw material partner platform systems while each subsystem of the three systems consists of an integrated storage server platform that can be expanded infinitely with flexible systems that can extend client PCs and main servers according to size and integrated management of overall raw materials and production-related information. The hardware collects production site information in real time by using various equipment such as PLCs, on-site PCs, barcode printers, and wireless APs at the production site. MES and e-SCM data are stored in the cloud database server to ensure security and high availability of data, and accumulated as big data. It was built based on the project focused on dissemination and diffusion of the smart factory construction, advancement, and easy maintenance system promoted by the Ministry of SMEs and Startups to enhance the competitiveness of small and medium-sized enterprises (SMEs) manufacturing sites while we plan to propose this model in the paper to state funding projects for SMEs.

Implementing Secure Container Transportation Systems Based on ISO 18185 Specification (ISO 18185 기반의 컨테이너 안전수송 시스템 구현)

  • Choo, Young-Yeol;Choi, Su-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.4
    • /
    • pp.1032-1040
    • /
    • 2010
  • This paper describes implementation of electonic seal (E-Seal) of a container based on ISO 18185 standard and development of monitoring systems checking E-Seal device and cargo states in the container for secure transportation from departure to destination. For lack of definition on confidentiality support in ISO 18185-4 standard, it is vulnerable to security attack such as sniffing. To cope with this, we developed encryption/decryption functions implementing RC5 and AES-128 standards and compared their performance. Experimental results showed that RC5 outperformed AES-128 in terms of time delay. In addition, RC5 had an advantage under the condition of large sized messages as well as CPUs with low performance. However, the portion of encryption/decryption processing time was less than 1 percent of response time including communication delay between E-Seal tags and readers. Hence, the performance difference between RC5 and AES-128 standards was trivial, which revealed that both specifications were allowable in developed systems.

Development of X-Ray Array Detector Signal Processing System (X-Ray 어레이 검출 모듈 신호처리 시스템 개발)

  • Lim, Ik-Chan;Park, Jong-Won;Kim, Young-Kil;Sung, So-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.10
    • /
    • pp.1298-1304
    • /
    • 2019
  • Since the 9·11 terror attack in 2001, the Maritime Logistics Security System has been strengthened and required X-ray image for every imported cargos from manufacturing countries to United States. For scanning cargos, the container inspection systems use high energy X-rays for examination of contents of a container to check the nuclear, explosive, dangerous and illegal materials. Nowadays, the X-ray cargo scanners are established and used by global technologies for inspection of suspected cargos in the customs agency but these technologies have not been localized and developed sufficiently. In this paper, we propose the X-ray array detector system which is a core component of the container scanning system. For implementation of X-ray array detector, the analog and digital signal processing units are fabricated with integrated hardware, FPGA logics and GUI software for real-time X-ray images. The implemented system is superior in terms of resolution and power consumption compared to the existing products currently used in ports.

An Empirical Investigation on the Effect of Logistics Security in Import and Export Risk Management (물류보안이 수출입 리스크관리에 미치는 영향에 관한 실증연구)

  • Yi, Hong-Won;Kim, Jae-Bong
    • Journal of Navigation and Port Research
    • /
    • v.38 no.3
    • /
    • pp.317-325
    • /
    • 2014
  • The government of South Korea has introduced various security measures in the supply chain, such as CSI (including a 24-hour rule) and AEO (Authorized Economic Operator), in compliance with global security trends and the war on terror. However, many participants in the import and export process are still unfamiliar with the purposes and functions of CSI, the 24-hour rule, and AEO. As such, considering these risks as obstacles or as factors that interfere with the import and export process, this study suggests proper management schemes, which can identify, measure and evaluate these risks.

IaC-VIMF: IaC-Based Virtual Infrastructure Mutagenesis Framework for Cyber Defense Training (IaC-VIMF: 사이버 공방훈련을 위한 IaC 기반 가상 인프라 변이 생성 프레임워크)

  • Joo-Young Roh;Se-Han Lee;Ki-Woong Park
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.527-535
    • /
    • 2023
  • To develop experts capable of responding to cyber security incidents, numerous institutions have established cyber training facilities to cultivate security professionals equipped with effective defense strategies. However, these challenges such as limited resources, scenario-based content development, and cost constraints. To address these issues, this paper proposes a virtual infrastructure variation generation framework. It provides customized, diverse IT infrastructure environments for each organization, allowing cyber defense trainers to accumulate a wide range of experiences. By leveraging Infrastructure-as-Code (IaC) containers and employing Word2Vec, a natural language processing model, mutable code elements are extracted and trained, enabling the generation of new code and presenting novel container environments.