• Title/Summary/Keyword: Expected Attack

Search Result 215, Processing Time 0.026 seconds

Pathgenicity on Ginseng and Sequence Assays of Ilyonectria radicicola Isolated from Chestnut Rhizosphere Soils (밤나무 근권토양에서 분리한 Ilyonectria radicicola 균주의 인삼에 대한 병원성 및 유전적 분석)

  • Seo, Mun Won;Song, Jeong Young;Kim, Sun Ick;Oh, Sang Keun;Kim, Hong Gi
    • Korean Journal of Medicinal Crop Science
    • /
    • v.26 no.4
    • /
    • pp.302-307
    • /
    • 2018
  • Background: A soil-borne pathogenic fungus, Ilyonectria radicicola (Cylindrocarpon destructans) causes root rot on ginseng (Panax ginseng C. A. Meyer) and is known to attack many other plants. The Nectria/Neonectria radicicola complex has been renamed as the I. radicicola complex after analysis of its multi-gene relatedness and morphological characteristics. The fungi in this complex have been reclassified into 16 species under the genus Ilyonectria based on characteristics analysis Methods and Results: To obtain useful data from the Korean ginseng root rot, I. radicicola was isolated from the rhizosphere soils of the chestnut tree. They were identified through a pathogenicity test and a survey of the morphological features. The existence of I. radicicola in soil samples was confirmed by PCR detections using nested PCR with species-specific primer sets. These were subsequenctly isolated on semi-selective media from PCR-positive soils. Genetic analysis of the I. radicicola complex containing these pathogens was done by comparing the DNA sequences of the histone h3 region. These isolates originating from the rhizosphere soils of chestnut constituted a clade with other closely related species or I. radicicola isolates originating from ginseng or other host plants, respectively. Additionally, the pathogenicity tests to analyze the characteristics of these I. radicicola isolates revealed that they caused weakly virulent root rot on ginseng. Conclusions: This is the first study reporting that I. radicicola isolates from chestnut rhizosphere soils can attack ginseng plant in Korea. Thus, these results are expected to provide informations in the selection of suitable fields for ginseng cultivation.

MITRE ATT&CK and Anomaly detection based abnormal attack detection technology research (MITRE ATT&CK 및 Anomaly Detection 기반 이상 공격징후 탐지기술 연구)

  • Hwang, Chan-Woong;Bae, Sung-Ho;Lee, Tae-Jin
    • Convergence Security Journal
    • /
    • v.21 no.3
    • /
    • pp.13-23
    • /
    • 2021
  • The attacker's techniques and tools are becoming intelligent and sophisticated. Existing Anti-Virus cannot prevent security accident. So the security threats on the endpoint should also be considered. Recently, EDR security solutions to protect endpoints have emerged, but they focus on visibility. There is still a lack of detection and responsiveness. In this paper, we use real-world EDR event logs to aggregate knowledge-based MITRE ATT&CK and autoencoder-based anomaly detection techniques to detect anomalies in order to screen effective analysis and analysis targets from a security manager perspective. After that, detected anomaly attack signs show the security manager an alarm along with log information and can be connected to legacy systems. The experiment detected EDR event logs for 5 days, and verified them with hybrid analysis search. Therefore, it is expected to produce results on when, which IPs and processes is suspected based on the EDR event log and create a secure endpoint environment through measures on the suspicious IP/Process.

A study to detect and leaked personal information on the smartphone. (스마트폰 상에서의 개인정보 유출 탐지 모니터링 연구)

  • Kim, Wung-Jun;Park, Sang-Hwi;Park, Sang-No;Kim, Chang-Su;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.606-608
    • /
    • 2014
  • Recent smartphone users constantly increases, an increase in malicious applications smartphones indiscretions exists within the Terminal, through the deployment of privacy disclosure, Singh and other victims also are on the rise. A typical personal way to malicious code masquerading as a normal application and install it on the handset of my text message or a personal note, such as personal information, the certificate directory, is the way that leaked. Therefore, to obtain permission to attack the root Terminal event by collecting malware infections and respond to determine whether it is necessary for the technique. In this paper, check the features of a Smartphone in real time systems, to carry out a study on the application throughout the Terminal to collect my attack event analysis, malware infection can determine whether or not the mobile security monitoring system. This prevents a user's personal information and take advantage of the top and spill are expected to be on the field.

  • PDF

Blockchain Based Data-Preserving AI Learning Environment Model for Cyber Security System (AI 사이버보안 체계를 위한 블록체인 기반의 Data-Preserving AI 학습환경 모델)

  • Kim, Inkyung;Park, Namje
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.12
    • /
    • pp.125-134
    • /
    • 2019
  • As the limitations of the passive recognition domain, which is not guaranteed transparency of the operation process, AI technology has a vulnerability that depends on the data. Human error is inherent because raw data for artificial intelligence learning must be processed and inspected manually to secure data quality for the advancement of AI learning. In this study, we examine the necessity of learning data management before machine learning by analyzing inaccurate cases of AI learning data and cyber security attack method through the approach from cyber security perspective. In order to verify the learning data integrity, this paper presents the direction of data-preserving artificial intelligence system, a blockchain-based learning data environment model. The proposed method is expected to prevent the threats such as cyber attack and data corruption in providing and using data in the open network for data processing and raw data collection.

A Study on the Deployment Plan of Fighter Aircraft Considering the Threat of Enemy Missiles (적 미사일 위협 고려한 전투기 전력 배치방안 연구)

  • Park, Inkyun;Ha, Yonghoon
    • Journal of the Korea Society for Simulation
    • /
    • v.29 no.4
    • /
    • pp.47-54
    • /
    • 2020
  • North Korea has recently developed and deployed missiles with various ranges as asymmetrical forces. Among them, short-range ballistic missiles with improved accuracy are expected to aim at achieving tactical goals by hitting important military facilities in Korea with a small number of missiles. Damage to the air force airfields, one of North Korea's main targets of missiles attack, could limit the operation of air force fighters essential to gaining air superiority. Based on the attack by the short range ballistic missiles, the damage probability of military airfields was simulated. And as the one of the concepts of passive defense, the way to reduce the loss of combat power was studied through the changes of the air force squadrons deployment. As a result, the effective deployment plan could be obtained to reduce the amount of power loss compared to the current deployment.

A study on the Establishment of a Digital Healthcare Next-Generation Information Protection System

  • Kim, Ki-Hwan;Choi, Sung-Soo;Kim, Il-Hwan;Shin, Yong-Tae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.7
    • /
    • pp.57-64
    • /
    • 2022
  • In this paper, the definition and overview of digital health care that has emerged recently, core technology, and We would like to propose a plan to establish a next-generation information protection system that can protect digital healthcare devices and data from cyber attacks. Various vulnerabilities exist for digital healthcare devices and data, and cyber attacks are possible for those vulnerabilities. Through an attack on digital health care devices and information and communication networks, it can directly adversely affect human life and health, Since digital healthcare data contains sensitive and personal information, it is essential to safely protect it from cyber attacks. In the case of this proposal, for continuous safe management of data and cyber attacks on equipment and communication networks for digital health devices, It is expected to be able to respond more effectively and continuously through the establishment of the next-generation information protection system.

A Captive Model Test on Hydrodynamic Force and Neutral Level Flight of BB2 Submarine in Straight Operation at Near Free Surface with Different Depths (자유수면 근처에서 직진하는 BB2 잠수함의 심도별 유체력과 중립운항에 대한 구속모형시험 연구)

  • Kwon, Chang-Seop;Kim, Dong-Jin;Yun, Kunhang;Kim, Yeon-Gyu
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.59 no.5
    • /
    • pp.288-295
    • /
    • 2022
  • In this study, the force and moment acting on a Joubert BB2 submarine model at depths near the free surface were measured through a captive model test with the scale ratio of 1/15. Based on the experiment, the pitch moment and heave force due to the "Tail suction effect", including the change in surge force with depth near the free surface, were quantitatively analyzed. The change of force and moment according to the relative position of the sail and the free surface was reviewed with the free surface waves generated for each depths. As a result, the angle of attack of the hull to counteract the pitch moment induced by the tail suction effect was derived. The effect of the hydrostatic moment component according to the angle of attack on the equilibrium of pitch moment was also taken into account. The control plane performance tests for the X-type rudder and sail plane were conducted in snorkel and surface depth conditions to figure out the control plane angles for the neutral level flight of the submarine at near free surface. The results of this study are expected to be used as a reference data for the neutral level flight of the submarine at near free surface operation in the free running model test as well as numerical studies.

Evaluation of Durability of Cement Matrix Replaced with Limestone Powder (석회석 미분말을 혼합한 시멘트 경화체의 내구성능 평가)

  • Woo-Sik Jang;Kwang-Pil Park
    • Journal of the Korean Recycled Construction Resources Institute
    • /
    • v.12 no.1
    • /
    • pp.102-109
    • /
    • 2024
  • In order to use limestone powder as a material for concrete, the mechanical and durability characteristics of cement matrices manufactured by varying the substitution rate were evaluated. In general, limestone powder did not contribute to the cement hydration reaction, so as a result of the compressive strength test of cement mortar using it, the compressive strength decreased as the substitution rate increased. However, as a result of evaluating the durability performance of cement mortar using limestone powder, such as chloride ion penetration resistance, carbonation resistance, and chemical attack resistance, small particles of limestone powder showed superior results compared to the unsubstituted control mortar due to the micro-filler effect of filling the fine pores inside the cement matrix. Therefore, limestone powder is expected to be used as an effective method for improving the durability of concrete. In this study, the durability was evaluated by changing the mixing amount of limestone powder to 0 %, 5 %, 10 %, and 15 %, but it is judged that it is necessary to study in more detail the effect on the durability by changing the end and mixing amount of limestone powder to various levels in the future.

Reinforcement Learning-Based Resource exhaustion attack detection and response in Kubernetes (쿠버네티스 환경에서의 강화학습 기반 자원 고갈 탐지 및 대응 기술에 관한 연구)

  • Ri-Yeong Kim;Seongmin Kim
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.81-89
    • /
    • 2023
  • Kubernetes is a representative open-source software for container orchestration, playing a crucial role in monitoring and managing resources allocated to containers. As container environments become prevalent, security threats targeting containers continue to rise, with resource exhaustion attacks being a prominent example. These attacks involve distributing malicious crypto-mining software in containerized form to hijack computing resources, thereby affecting the operation of the host and other containers that share resources. Previous research has focused on detecting resource depletion attacks, so technology to respond when attacks occur is lacking. This paper proposes a reinforcement learning-based dynamic resource management framework for detecting and responding to resource exhaustion attacks and malicious containers running in Kubernetes environments. To achieve this, we define the environment's state, actions, and rewards from the perspective of responding to resource exhaustion attacks using reinforcement learning. It is expected that the proposed methodology will contribute to establishing a robust defense against resource exhaustion attacks in container environments

Post-Quantum Security Strength Evaluation through Implementation of Quantum Circuit for SIMECK (SIMEC 경량암호에 대한 양자회로 구현 및 Post-Quantum 보안 강도 평가)

  • Song Gyeong Ju;Jang Kyung Bae;Sim Min Joo;Seo Hwa Jeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.6
    • /
    • pp.181-188
    • /
    • 2023
  • Block cipher is not expected to be safe for quantum computer, as Grover's algorithm reduces the security strength by accelerating brute-force attacks on symmetric key ciphers. So it is necessary to check the post-quantum security strength by implementing quantum circuit for the target cipher. In this paper, we propose the optimal quantum circuit implementation result designed as a technique to minimize the use of quantum resources (qubits, quantum gates) for SIMECK lightweight cryptography, and explain the operation of each quantum circuit. The implemented SIMECK quantum circuit is used to check the estimation result of quantum resources and calculate the Grover attack cost. Finally, the post-quantum strength of SIMECK lightweight cryptography is evaluated. As a result of post-quantum security strength evaluation, all SIMECK family cipher failed to reach NIST security strength. Therefore, it is expected that the safety of SIMECK cipher is unclear when large-scale quantum computers appear. About this, it is judged that it would be appropriate to increase the block size, the number of rounds, and the key length to increase the security strength.