• Title/Summary/Keyword: Counter attack

Search Result 95, Processing Time 0.033 seconds

Study on threat analysis about national important facility and control process (국가중요시설에 대한 위협분석과 처리절차에 관한 연구 - 인천국제공항을 중심으로 -)

  • Hwang, Ho-Won;Lee, Ki-Hun
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.17 no.2
    • /
    • pp.31-40
    • /
    • 2009
  • South Korea opened Incheon international airport(IIA) in march 29, 2001, with high expectations of becoming the distribution hub of Northeast Asia and aiming at a world best air hub. IIA compares quite well with any other leading airports in the world in it's facilities for the movement of people and vehicles. However, with the sequence of events following the September, 2001. terrorist attack and the war in Iraq, South Korea, an ally of the US, cannot be considered a safe haven from terrorism. At a point in time when national security is given utmost importance, it is necessary to reevaluate the security of airports, because international terrorism can only occur via air and seaports. Nowadays all the countries of the world have entered into competition for their national interests and innovation of their images. with the increasing role of international airports also comes an increased likelihood as a terrorist target, because it can affect so many people and countries. From the condition of current international terrorism, we can realize that our IIA is not completely safe from a terrorist attack. The major part of counterterrorism is event control process. It's very important for quickly saves an accident and rescues a life of person, In addition for the normalization which the airport operation is prompt. In conclusion, we should secure the legal responsibility and establish and establish a system under which we can work actively in order to implement counter terror activities from being taken an airport.

  • PDF

Prior Task to Prepare for International Terrorism: Focusing on Multiple-use Facilities (국제테러리즘 대비를 위한 선결과제 : 다중이용시설을 중심으로)

  • Lee, Dae Sung
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.89-93
    • /
    • 2018
  • As terrorist organizations like ISIL and Al-Qaeda attack multiple-use facilities such as subways and department stores that many unknown citizens are using, the fear and anxiety are expanding. If international terrorism occurs in Korea, it may attack multiple-use facilities. Therefore, we need to have countermeasures against the attack. However, as the concept of multiple-use facilities has multi-faceted meanings and the scope is wide, there is a limitation in the preparation for international terrorism. In this study, it was tried to find the solution through reviewing the multiple-use facilities related laws. First of all, as the multiple-use facilities related laws were legislated by government organizations according to the necessities, the concept and scope are very inclusive. Therefore, it is possible to have controversies on the scope of the review related to anti-terrorism. Next, the department responsible for the international terrorism is not clear, which can make issue of rights and responsibility. To overcome such limitations, this study tried to set the concept and scope of multiple-use facilities and discussed the issue of the responsible department.

  • PDF

Power-Based Side Channel Attack and Countermeasure on the Post-Quantum Cryptography NTRU (양자내성암호 NTRU에 대한 전력 부채널 공격 및 대응방안)

  • Jang, Jaewon;Ha, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1059-1068
    • /
    • 2022
  • A Post-Quantum Cryptographic algorithm NTRU, which is designed by considering the computational power of quantum computers, satisfies the mathematically security level. However, it should consider the characteristics of side-channel attacks such as power analysis attacks in hardware implementation. In this paper, we verify that the private key can be recovered by analyzing the power signal generated during the decryption process of NTRU. To recover the private keys, the Simple Power Analysis (SPA), Correlation Power Analysis (CPA) and Differential Deep Learning Analysis (DDLA) were all applicable. There is a shuffling technique as a basic countermeasure to counter such a power side-channel attack. Neverthe less, we propose a more effective method. The proposed method can prevent CPA and DDLA attacks by preventing leakage of power information for multiplication operations by only performing addition after accumulating each coefficient, rather than performing accumulation after multiplication for each index.

DDoS Prevention System Using Double Firewall and Multi-Filtering Method (이중 방화벽과 다중 필터링을 이용한 DDoS 차단 시스템)

  • Cho, jiHo;Shin, Jiyong;Lee, Geuk
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.65-72
    • /
    • 2014
  • This paper proposes multi-filtering method on the double firewall to prevent DDoS attack. In the first firewall, R-PA filtering algorithm and rigid hop counter filtering method are applied by analyzing packet paths. In the second firewall, packets are examined to be distinguished abnormal from normal packets. Security policy system monitors each user sessions and if the traffic is over the threshold value, the system blocks that session for an assigned time.

Network System Survivability: A Framework of Transmission Control Protocol with Software Rejuvenation Methodology (네트워크 시스템 생존성 : 소프트웨어 재활기법을 이용한 TCP의 프레임워크)

  • Khin Mi Mi Aung;Park, Jong-Sou
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.07a
    • /
    • pp.121-125
    • /
    • 2003
  • In this paper, we propose a framework of Transmission Control Protocol with Software Rejuvenation methodology, which is applicable for network system survivability. This method is utilized to improve the survivability because it can limit the damage caused by successful attacks. The main objectives are to detect intrusions in real time, to characterize attacks, and to survive in face of attacks. To counter act the attacks' attempts or intrusions, we perform the Software Rejuvenation methods such as killing the intruders' processes in their tracks, halting abuse before it happens, shutting down unauthorized connection, and responding and restarting in real time. These slogans will really frustrate and deter the attacks, as the attacker can't make their progress. This is the way of survivability to maximize the deterrence against an attack in the target environment. We address a framework to model and analyze the critical intrusion tolerance problems ahead of intrusion detection on Transmission Control Protocol (TCP).

  • PDF

A COUNTER-BASED MAC REVISITED: WEAKENING THE UNDERLYING ASSUMPTION

  • Lee, Eon-Kyung;Lee, Sang-Jin
    • Journal of applied mathematics & informatics
    • /
    • v.24 no.1_2
    • /
    • pp.461-470
    • /
    • 2007
  • In CRYPTO 1995, Bellare, $Gu\'{e}rin$, and Rogaway proposed a very efficient message authentication scheme. This scheme is secure against adaptive chosen message attacks, under the assumption that its underlying primitive is a pseudorandom function. This article studies how to weaken that assumption. For an adaptive chosen message attack, we take into account two scenarios. On the one hand, the adversary intercepts the authenticated messages corresponding to messages chosen adaptively by herself, so the verifier does not receive them. On the other hand, the adversary can only eavesdrop the authenticated messages corresponding to messages chosen adaptively by herself, so the verifier receives them. We modify the original scheme. In the first scenario, our scheme is secure if the underlying primitive is a pseudorandom function. In the second scenario, our scheme is still secure under a weaker assumption that the underlying primitive is an indistinguishable-uniform function.

Relationship Between Plant Viral Encoded Suppressor to Post-transcriptional Gene Silencing and Elicitor to R Gene-specific Host Resistance

  • Park, Chang-Won;Feng Qu;Tao Ren;T. Jack Morris
    • The Plant Pathology Journal
    • /
    • v.20 no.1
    • /
    • pp.22-29
    • /
    • 2004
  • Many important horticultural and field crops are susceptible to virus infections or may possess a degree of resistance to some viruses, but become infected by others. Plant viruses enter cells through the presence of wounds, and replicate intracellularly small genomes that encode genes required for replication, cell-to-cell movement and encapsidation. There are numerous evidences from specific virus-host interactions to require the involvement of host factors and steps during viral replication cycle. However, viruses should deal with host defense responses either by general or specific mechanisms, targeting viral components or genome itself. On the other hand, the host plants have also adapted to defend themselves against viral attack by operating different lines of resistance responses. The defense-related interactions provide new insights into the complex molecular strategies for hosts for defense and counter-defense employed by viruses.

An Experimental Study for the Structure of Conical Vortex at the Low-Rise Building Roof by using a PIV Technique (PIV기법을 이용한 저층 건물 지붕에서 발생되는 원추형 와의 구조에 대한 실험적 연구)

  • Ji, Ho-Seong;Jeong, Eun-Ho;Kim, Kyung-Chun
    • Proceedings of the KSME Conference
    • /
    • 2000.04b
    • /
    • pp.667-672
    • /
    • 2000
  • The Characteristics of the conical vortices on the roof surface of a low-rise building has been investigated by using a PIV(Particle Image Velocimerty) technique. The scaled model of TTU building with 1:92 scaling ratio was used. The Reynolds number based on the free stream velocity and the length of the model was $1.96{\times}10^5$. When the angle of attack for the building model is $45^{\circ}$, the conical vortices are occurred symmetrically and the center of vortices are changed with respect to the angle of the approaching flow. The rotating direction of the conical vortices found to be counter-rotating. The secondary vortex motions are investigated using the instantaneous flow field data.

  • PDF

Authentication for Security on Satellite Control Communications (위성관제통신에서 안정성을 위한 인증)

  • Park, Jeong-Hyun;Rim, Sun-Bae
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.10
    • /
    • pp.2501-2511
    • /
    • 1997
  • This paper presents an authentication model for security on satellite command & control communications. The proposed authentication scheme is based on the modified Shamir's signature scheme using a satellite ID(Identity) and the model uses time stamp for protection of command replay attack from unauthorized center. The message authentication with command counter that includes an available key and the algorithm is for loading and execution of commands in the model. Two-way scheme for key change and confirmation between satellite control center and satellite is also proposed.

  • PDF

Enhancing Inoculation in the Spiral of Silence to Promote Resistance to Attacks: Examining Public Opinion on Taiwan-PRC Relations

  • Lin, Wayne Wei Kuo
    • Asian Journal for Public Opinion Research
    • /
    • v.10 no.3
    • /
    • pp.149-177
    • /
    • 2022
  • This study analyzes how inoculation affects the spiral of silence. Inoculation could be a beneficial tool in a democracy as it elevates citizens' resistance to attitude change "forced" by "the winning opinion" in the spiral of silence on a certain controversial issue. The study examines essential variables combined with the theories of inoculation and spiral of silence, such as resistance to counter-attitudinal attack, fear of isolation, and issue-involvement. A two-wave field experiment was employed to assess the formation of public opinion on Taiwan's political future with the People's Republic of China. Results support that inoculation enhanced people's resistance to attitude change and decreased their fear of isolation. Individuals who are more issue-involved were also shown to be more affected by inoculation, which allowed them to resist attitude change. The decreased fear of isolation, coupled with more issue involvement, might elevate people's willingness to speak out in public. More political discussions regarding an important public issue might be expected in a democracy.