• 제목/요약/키워드: Critical infrastructure

검색결과 485건 처리시간 0.024초

가상 허니넷 기반 신종공격 탐지 기법 (Unknown Attack Detection Technique based on Virtual HoneyNet)

  • 현무용;엄익채;강대권
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2012년도 추계학술발표대회
    • /
    • pp.881-883
    • /
    • 2012
  • 최근 정보통신 기술의 발전으로 국가 주요 핵심 기반시설(Critical Infrastructure)의 제어시스템에 대한 개방형 프로토콜 적용 및 외부 시스템과의 연계 등이 점차 증가되고 일반화됨에 따라 국가 핵심 기반시설이 사이버 침해 및 공격에 따른 위협에 노출되고 있다. 특히 기존의 보안기술은 알려진 공격(well-known attack)에만 대응하도록 설계되었기 때문에 공격패턴이 알려지지 않은 신종 공격이 국가 주요 핵심 기반시설을 공격하면 막대한 피해가 불가피하다. 본 논문에서는 최근 IT분야의 화두로 떠오르고 있는 가상화(Virtualization)기술을 적용하여 기존 허니넷 시스템의 장점을 유지하면서 허니넷 시스템의 자원문제, 구축 및 운영관리 문제를 줄일 수 있는 가상 허니넷 모델을 제시하였다. 또한 공격의도 확인기반의 데이터 분석 및 수집기법, 포커스 지향 분석기법을 제시를 통해 분석 결 도출에 필요한 시간비용을 최소화하는 방안을 제안하였다.

Problems of Regulatory and Legal Support of Polygraph Application in Ukraine

  • Irkha, Yurii;Butenko, Oleksii;Pogrebytskyi, Mykola;Manzhai, Oleksandr;Krushynskyi, Serhii
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.203-206
    • /
    • 2021
  • The article is devoted to the study of the problems of polygraphic research to obtain forensically significant information. An analysis of the legal basis for the use of the polygraph in Ukraine. Problematic issues concerning the appropriateness of using a polygraph in the investigation and detection of crimes have been studied. The domestic legal norms that regulate this issue, as well as foreign experience are analyzed. The article reveals the essence of the polygraph, the legal basis and requirements for its use. Attention is drawn to the main difficulties of using a polygraph and ways to solve them.

Impact force localization for civil infrastructure using augmented Kalman Filter optimization

  • Saleem, Muhammad M.;Jo, Hongki
    • Smart Structures and Systems
    • /
    • 제23권2호
    • /
    • pp.123-139
    • /
    • 2019
  • Impact forces induced by external object collisions can cause serious damages to civil engineering structures. While accurate and prompt identification of such impact forces is a critical task in structural health monitoring, it is not readily feasible for civil structures because the force measurement is extremely challenging and the force location is unpredictable for full-scale field structures. This study proposes a novel approach for identification of impact force including its location and time history using a small number of multi-metric observations. The method combines an augmented Kalman filter (AKF) and Genetic algorithm for accurate identification of impact force. The location of impact force is statistically determined in the way to minimize the AKF response estimate error at measured locations and then time history of the impact force is accurately constructed by optimizing the error co-variances of AKF using Genetic algorithm. The efficacy of proposed approach is numerically demonstrated using a truss and a plate model considering the presence of modelling error and measurement noises.

커넥티드 의료기기 해킹 및 랜섬웨어 대응기술 동향 (Security Technology Trends to Prevent Medical Device Hacking and Ransomware)

  • 권혁찬;정병호;문대성;김익균
    • 전자통신동향분석
    • /
    • 제36권5호
    • /
    • pp.21-31
    • /
    • 2021
  • Ransomware attacks, such as Conti, Ryuk, Petya, and Sodinokibi, that target medical institutions are increasing rapidly. In 2020, in the United States., ransomware attacks affected over 600 separate clinics, hospitals, and organizations, and more than 18 million patient records. The cost of these attacks is estimated to be almost $21 billion USD. The first death associated with a ransomware attack was reported in 2020 by the University Hospital of Düesseldorf in Germany. In the case of medical institutions, as introduced in the Medjack report issued by TrapX Labs, in many cases, attackers target medical devices that are relatively insecure and then penetrate deep into more critical network infrastructure, such as EMR servers. This paper introduces security vulnerabilities of hospital medical devices, considerations for ransomware response by medical institutions, and related technology trends.

PSC교량의 부재별 상관관계를 고려한 시스템 지진취약도 분석 (Seismic Fragility Analysis of a Bridge System Considering the Correlation of Components of the PSC Bridge)

  • 안효준;신수봉;이종한
    • 한국지진공학회논문집
    • /
    • 제25권6호
    • /
    • pp.267-274
    • /
    • 2021
  • Seismic fragility analysis of a structure is generally performed for the expected critical component of a structure. The seismic fragility analysis assumes that all the components behave independently in a structural system. A bridge system consists of many inter-connected components. Thus, for an accurate evaluation of the seismic fragility of a bridge, the seismic fragility analysis requires the composition of probabilities considering the correlation between structural components. This study presented a procedure to obtain the seismic fragility curve of a bridge system, considering the correlation between bridge components. Seismic fragility analysis was performed on a PSC bridge that is considered as the central infrastructure. The analysis results showed that the probability of the seismic fragility curve of the bridge system was higher than that of each bridge component.

원격 감시 제어시스템에서 키 관리 방안 연구 (Research on key management for supervisory control and data acquisition system)

  • 이건직
    • 디지털산업정보학회논문지
    • /
    • 제16권4호
    • /
    • pp.29-42
    • /
    • 2020
  • SCADA (Supervisory Control and Data Acquisition) systems for remote monitoring, data acquisition and control are applied to major industrial infrastructures including power, water and railroad. Recently, there are many researches on key management scheme for secure communication due to change to the open network environment. These systems are located at far distances and are connected to the main control center through various types of communication methods. Due to the nature of these systems, they are becoming the significant targets of cyber attack. We propose an efficient key management scheme which is established on ID-based cryptosystem without an expensive computation on MTU (Master Terminal Unit), Sub-MTU, and RTU (Remote Terminal Unit). The proposed method is secure and effective in key management among multiple legitimate devices.

위성항법 시스템 및 기술 동향 (Survey on Navigation Satellite System and Technologies)

  • 이상욱;유준규;변우진
    • 전자통신동향분석
    • /
    • 제36권4호
    • /
    • pp.61-71
    • /
    • 2021
  • Navigation satellite systems (GPS, GLONASS etc.) provide three main services, i.e., positioning for location based services, navigation for multi-modal transportation services, and timing for communication and critical infrastructure services. They were started as military systems but were extended to civil service. Navigation satellite navigation system began with GPS in the USA and GLONASS in Russia at nearly the same time. Indian NavIC and Chines BDS announced their FOCs in 2016 and 2020, respectively and European Galileo and Japanese QZSS are catching up others. In these days, Navigation Satellite System, Positioning, Navigation, and Timing services are part of our daily life very closely. They are required for autonomous driving car, Unmanned vehicles like UAV, UGV, and UMV, 5G/6G telecommunications, world financial system, power system, survey, agriculture, and so on. The services among navigation satellite systems are very competitive and also cooperative one another. This article describes the status of these systems and evolution in the technical and service senses, which may be helpful for planning korea positioning system(KPS).

A Study on Deep Reinforcement Learning Framework for DME Pulse Design

  • Lee, Jungyeon;Kim, Euiho
    • Journal of Positioning, Navigation, and Timing
    • /
    • 제10권2호
    • /
    • pp.113-120
    • /
    • 2021
  • The Distance Measuring Equipment (DME) is a ground-based aircraft navigation system and is considered as an infrastructure that ensures resilient aircraft navigation capability during the event of a Global Navigation Satellite System (GNSS) outage. The main problem of DME as a GNSS back up is a poor positioning accuracy that often reaches over 100 m. In this paper, a novel approach of applying deep reinforcement learning to a DME pulse design is introduced to improve the DME distance measuring accuracy. This method is designed to develop multipath-resistant DME pulses that comply with current DME specifications. In the research, a Markov Decision Process (MDP) for DME pulse design is set using pulse shape requirements and a timing error. Based on the designed MDP, we created an Environment called PulseEnv, which allows the agent representing a DME pulse shape to explore continuous space using the Soft Actor Critical (SAC) reinforcement learning algorithm.

Study on Integrity Assessment of Pile Foundation Based on Seismic Observation Records

  • KASHIWA, Hisatoshi
    • 국제초고층학회논문집
    • /
    • 제9권4호
    • /
    • pp.369-376
    • /
    • 2020
  • Given the importance of quickly recovering livelihoods and economic activity after an earthquake, the seismic performance of the pile foundation is becoming more critical than before. In order to promote seismic retrofit of the pile foundations, it is necessary to develop a method for evaluating the seismic performance of the pile foundation based on the experimental data. In this paper, we focus on the building that was suffered severe damage to the pile foundation, conduct simulation analyses of the building, and report the results of evaluating the dynamic characteristics when piles are damaged using a system identification method. As a result, an analysis model that can accurately simulate the behavior of the damaged building during an earthquake was constructed, and it was shown that the system identification method could extract dynamic characteristics that may damage piles.

How the United States Marched the Semiconductor Industry into Its Trade War with China

  • Bown, Chad P.
    • East Asian Economic Review
    • /
    • 제24권4호
    • /
    • pp.349-388
    • /
    • 2020
  • The US-China trade war forced a reluctant semiconductor industry into someone else's fight, a very different position from its leading role in the 1980s trade conflict with Japan. This paper describes how the political economy of the global semiconductor industry has evolved since the 1980s. That includes both a shift in the business model behind how semiconductors go from conception to a finished product as well as the geographic reorientation toward Asia of demand and manufactured supply. It uses that lens to explain how, during the modern conflict with China, US policymakers turned to a legally complex set of export restrictions targeting the semiconductor supply chain in the attempt to safeguard critical infrastructure in the telecommunications sector. The potentially far-reaching tactics included weaponization of exports by relatively small but highly specialized American software service and equipment providers in order to constrain Huawei, a Fortune Global 500 company. It describes potential costs of such policies, some of their unintended consequences, and whether policymakers might push them further in the attempt to constrain other Chinese firms.