• 제목/요약/키워드: Expected Attack

검색결과 215건 처리시간 0.03초

Virtual Clustering 기법을 적용한 Integration Security System 구축에 관한 연구 (A Study on Building an Integration Security System Applying Virtual Clustering)

  • 서우석;박대우;전문석
    • 정보보호학회논문지
    • /
    • 제21권2호
    • /
    • pp.101-110
    • /
    • 2011
  • 최근 Application에 대한 공격을 통하여 네트워크와 데이터베이스에 대한 방어정책인 침입탐지 룰(rule)을 무력화시키고, 침해사고를 유발한다. 이러한 공격으로부터 내부 네트워크와 데이터베이스의 안전성을 확보하기 위한 통합보안에 관한 연구가 필요하다. 본 논문에서는 침입탐지 룰을 설정한 Application에 대한 공격을 차단하기 위한 통합보안 시스템 구축에 관한 연구이다. 네트워크 기반의 공격을 탐지하여 대응하고, 내부 Integration Security System을 Virtual clustering과 Load balancing 기법으로 공격을 분산시키며, Packet 모니터링과 분석을 통하여 공격 목적지 Packet에 대한 방어정책 설정, 공격 Packet 분석, 기록, 룰 업데이트를 한다. 또한 공격 유형별 방어정책을 설정하여 Virtual Machine 분할 정책을 통한 접근 트래픽 해소, 공격차단에 적용하는 Integration Security System을 제안하고 방어를 실험한다. 본 연구 결과는 외부 해커의 공격에 대한 통합보안 방어를 위한 현실적인 자료를 제공하게 될 것이다.

Hyper-encryption Scheme for Data Confidentiality in Wireless Broadband (WiBro) Networks

  • Hamid, Abdul;Hong, Choong-Seon
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2007년도 춘계학술발표대회
    • /
    • pp.1096-1097
    • /
    • 2007
  • We address the data confidentiality for wireless broadband (WiBro) networks. In WiBro, as the channel is wireless in nature, it suffers from passive and active attack. Passive attack, for example is to decrypt traffic based on statistical analysis and active attack is to modify traffic or inject new traffic from unauthorized mobile stations. Due to high mobility, frequent session key distribution is a bottleneck for the mobile stations. In aspect of WiBro, there is a communication between mobile station to base station, and also in mobile station to mobile station. It is expected to ensure data confidentiality while maintaining minimum overhead for the resource constrained mobile stations. In this paper, we proposed a security framework based on the concept of hyper-encryption to provide data confidentiality for wireless broadband networks.

  • PDF

다수표적지역에 대한 공격 항공기 할당모형 (Assignment Model of Attack Aircraft for Multi-Target Area)

  • 노상기;하석태
    • 한국국방경영분석학회지
    • /
    • 제17권1호
    • /
    • pp.159-176
    • /
    • 1991
  • The probability of target survival is the most important factor in the target assignment, Most of the studies about it have assumed the case of one target and ane weapon type. Therefore, they can not be applied to the real situation. In this paper. the quantity and type of enemy assets of the friendly force are considered simultaneously. Considered defense type is the coordinated defense with no impact point prediction. The objective function is to minimize the expected total survival value of targets which are scattered in the defense area. The rules of aircraft assignment are as follows : first, classify targets into several groups, each of those has the same desired damage level secondly. select the critical group which has the least survival value in accordance with the additional aircraft assignment, and finally. assign the same number of attack assets against each target in the critical group. In this paper, the attack assets, the escort assets, and the defense assets are considered. The model is useful to not only the simple aircraft assignment problem but also the complicated wargame models.

  • PDF

Smart Grid 해외 공격사례 및 한국 Smart Grid에 대한 예상 공격분석과 보안대책 (Eexpected Attack and Security Measures for the Korea Smart Grid through)

  • 천우성;박대우
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2011년도 제44차 하계학술발표논문집 19권2호
    • /
    • pp.71-74
    • /
    • 2011
  • 2030년까지 한국에 Smart Grid를 구축할 계획을 가지고 추진하고 있다. Smart Grid는 지능형 전력망으로 기존의 전력망에 IT를 접목시켜 통신을 실시하여 양방향성을 가지게 된다. 기존의 전력망에 부가될 IT전기기기들은 기존에 IT가 지니고 있는 취약점들이 있어 기존의 Smart Grid공격에 노출되어 있다. 본 논문에서는 한국보다 먼저 구축되어서 활용되고 있는 미국의 Smart Grid에 대한 공격사례를 분석한다. 그리고 한국 Smart Grid에 대한 전기IT기기의 취약점을 분석하여, 한국 Smart Grid에 대한 예상 공격을 분석하고, 보안 대책을 제시한다. 본 논문은 한국 Smart Grid에 안정성과 보안성을 갖춘 기술 자료로 활용할 것이다.

  • PDF

An Approach for Applying Network-based Moving Target Defense into Internet of Things Networks

  • Park, Tae-Keun;Park, Kyung-Min;Moon, Dae-Sung
    • 한국컴퓨터정보학회논문지
    • /
    • 제24권9호
    • /
    • pp.35-42
    • /
    • 2019
  • In this paper, we propose an approach to apply network-based moving target defense into Internet of Things (IoT) networks. The IoT is a technology that provides the high interconnectivity of things like electronic devices. However, cyber security risks are expected to increase as the interconnectivity of such devices increases. One recent study demonstrated a man-in-the-middle attack in the statically configured IoT network. In recent years, a new approach to cyber security, called the moving target defense, has emerged as a potential solution to the challenge of static systems. The approach continuously changes system's attack surface to prevent attacks. After analyzing IPv4 / IPv6-based moving target defense schemes and IoT network-related technologies, we present our approach in terms of addressing systems, address mutation techniques, communication models, network configuration, and node mobility. In addition, we summarize the direction of future research in relation to the proposed approach.

Presentation Attack Detection (PAD) for Iris Recognition System on Mobile Devices-A Survey

  • Motwakel, Abdelwahed;Hilal, Anwer Mustafa;Hamza, Manar Ahmed;Ghoneim, Hesham E.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12spc호
    • /
    • pp.415-426
    • /
    • 2021
  • The implementation of iris biometrics on smartphone devices has recently become an emerging research topic. As the use of iris biometrics on smartphone devices becomes more widely adopted, it is to be expected that there will be similar efforts in the research community to beat the biometric by exploring new spoofing methods and this will drive a corresponding requirement for new liveness detection methods. In this paper we addresses the problem of presentation attacks (Spoofing) against the Iris Recognition System on mobile devices and propose novel Presentation Attack Detection (PAD) method which suitable for mobile environment.

Coupling effects of vortex-induced vibration for a square cylinder at various angles of attack

  • Zheng, Deqian;Ma, Wenyong;Zhang, Xiaobin;Chen, Wei;Wu, Junhao
    • Wind and Structures
    • /
    • 제34권5호
    • /
    • pp.437-450
    • /
    • 2022
  • Vortex-induced vibration (VIV) is a significant concern when designing slender structures with square cross sections. VIV strongly depends on structural dynamics and flow states, which depend on the conditions of the approaching flow and shape of a structure. Therefore, the effects of the angle of attack on the coupling effects of VIV for a square cylinder are expected to be significant in practice. In this study, the aerodynamic forces for a fixed and elastically mounted square cylinder were measured using wind pressure tests. Aerodynamic forces on the stationary cylinder are firstly discussed by comparisons of variation of statistical aerodynamic force and wind pressure coefficient with wind angle of attack. The coupling effect between the aerodynamic forces and the motion of the oscillating square cylinder by VIV is subsequently investigated in detail at typical wind angels of attack with occurrence of three typical flow regimes, i.e., leading-edge separation, separation bubble (reattachment), and attached flow. The coupling effect are illustrated by discussing the onset of VIV, characteristics of aerodynamic forces during VIV, and interaction between motion and aerodynamic forces. The results demonstrate that flow states can be classified based on final separation points or the occurrence of reattachment. These states significantly influence coupling effects of the oscillating cylinder. Vibration enhances vortex shedding, which creates strong fluctuations in aerodynamic forces. However, differences in the lock-in range, aerodynamic force, and interaction process for angles of attack smaller and larger than the critical angle of attack revealed noteworthy characteristics in the VIV of a square cylinder.

EMICS: E-mail based Malware Infected IP Collection System

  • Lee, Taejin;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권6호
    • /
    • pp.2881-2894
    • /
    • 2018
  • Cyber attacks are increasing continuously. On average about one million malicious codes appear every day, and attacks are expanding gradually to IT convergence services (e.g. vehicles and television) and social infrastructure (nuclear energy, power, water, etc.), as well as cyberspace. Analysis of large-scale cyber incidents has revealed that most attacks are started by PCs infected with malicious code. This paper proposes a method of detecting an attack IP automatically by analyzing the characteristics of the e-mail transfer path, which cannot be manipulated by the attacker. In particular, we developed a system based on the proposed model, and operated it for more than four months, and then detected 1,750,000 attack IPs by analyzing 22,570,000 spam e-mails in a commercial environment. A detected attack IP can be used to remove spam e-mails by linking it with the cyber removal system, or to block spam e-mails by linking it with the RBL(Real-time Blocking List) system. In addition, the developed system is expected to play a positive role in preventing cyber attacks, as it can detect a large number of attack IPs when linked with the portal site.

타원형 날개의 공력 특성 연구 (A Study on the Aerodynamic Load Characteristics of an Elliptic Airfoil)

  • 이기영;손명환;김해원
    • 한국군사과학기술학회지
    • /
    • 제6권4호
    • /
    • pp.29-37
    • /
    • 2003
  • Using a wind tunnel testing, the aerodynamic load characteristics of an elliptic airfoil was described. The experimental data was obtained for angles of attack $-20^{\circ}$ to $+20^{\circ}$ with $2^{\circ}$ increments at a chord Reynolds number of $0.99{\times}105$ and $2.48{\times}105$. For each test case, chordwise suction pressure distributions and wake surveys were obtained. Static pressure measurements were made over a 10 sec averaging time at a 10 Hz sampling rate. For each case, wake survey was conducted with a pilot-static probe at 1.0c downstream from the trailing edge at very fine spacing to resolve the wake velocity deficit profile. As can be expected, suction pressure coefficient was increased with angle of attack. The normal force, CNmax, appeared peak value at the incidence angle of $12^{\circ}~14^{\circ}$, and the significant increase in profile drag at this range of angles of attack.

Privacy-Preserving H.264 Video Encryption Scheme

  • Choi, Su-Gil;Han, Jong-Wook;Cho, Hyun-Sook
    • ETRI Journal
    • /
    • 제33권6호
    • /
    • pp.935-944
    • /
    • 2011
  • As a growing number of individuals are exposed to surveillance cameras, the need to prevent captured videos from being used inappropriately has increased. Privacy-related information can be protected through video encryption during transmission or storage, and several algorithms have been proposed for such purposes. However, the simple way of evaluating the security by counting the number of brute-force trials is not proper for measuring the security of video encryption algorithms, considering that attackers can devise specially crafted attacks for specific purposes by exploiting the characteristics of the target video codec. In this paper, we introduce a new attack for recovering contour information from encrypted H.264 video. The attack can thus be used to extract face outlines for the purpose of personal identification. We analyze the security of previous video encryption schemes against the proposed attack and show that the security of these schemes is lower than expected in terms of privacy protection. To enhance security, an advanced block shuffling method is proposed, an analysis of which shows that it is more secure than the previous method and can be an improvement against the proposed attack.