• 제목/요약/키워드: Network Security Modeling

검색결과 190건 처리시간 0.022초

M&S를 활용한 두 개의 군 부대간 네트워크 트래픽 용량 분석 (Network Traffic Analysis between Two Military Bases Using Modeling and Simulation)

  • 박명환;유승훈;설현주
    • 한국군사과학기술학회지
    • /
    • 제22권3호
    • /
    • pp.425-432
    • /
    • 2019
  • Modeling and Simulation(M&S) has widely been used in various areas such as industry, academy and military. Especially, military have used the technology for acquisition, training, and combat assessment. In this paper, we introduce our experience using M&S technique to analyze the network traffic amount and packet delay time between two military bases. For this, we modeled the current network configuration of the military bases and simulated the model with NS-3 tool. The result provided us for an insight regarding the required network performance between two bases.

베이즈 네트워크를 이용한 탈중앙화 암호화폐 지갑의 정량적 위험성 평가 (Quantitative Risk Assessment on a Decentralized Cryptocurrency Wallet with a Bayesian Network)

  • 유병철;김승주
    • 정보보호학회논문지
    • /
    • 제31권4호
    • /
    • pp.637-659
    • /
    • 2021
  • 2009년 비트코인 블록체인이 처음 생성된 이후 암호화폐 사용자는 꾸준히 증가하고 있다. 하지만 이러한 사용자들의 암호화폐 지갑에 보관된 자산을 노리는 해킹 공격도 증가하고 있다. 따라서 우리는 시중에 나와 있는 암호화폐 지갑들이 안전하게 만들어졌는지를 점검하기 위해 각 지갑에 내재된 위험성을 평가한다. 우리는 위협 모델링을 통해 암호화폐 지갑에 내재된 위협을 식별하고 보안 요구사항을 도출한다. 그리고 도출된 보안 요구사항을 바탕으로 실제 지갑들의 보안성을 분석하고 공격트리와 베이즈 네트워크 등을 활용하여 각 지갑의 위험성을 정량적으로 측정한다. 위험성 평가 결과, 하드웨어 지갑보다 소프트웨어 지갑의 평균적인 위험성이 1.22배 높은 것으로 나타났다. 그리고 하드웨어 지갑 간 비교에서는 secure element를 내장한 Ledger Nano S 지갑보다 범용 MCU를 내장한 Trezor One 지갑의 위험성이 1.11배 높은 것으로 나타났다. 하지만 secure element를 사용하는 것은 암호화폐 지갑의 위험성을 낮추는 데에는 상대적으로 효과가 낮은 것으로 나타났다.

방산업체 비대면(재택) 근무를 위한 보안 요구사항 연구 (A study on security requirements for Telecommuting in defense industry)

  • 황규섭;류연승
    • 융합보안논문지
    • /
    • 제23권5호
    • /
    • pp.209-221
    • /
    • 2023
  • 2019년 12월 코로나19 바이러스의 급격한 확산으로 인해 대면 중심의 근무환경이 비대면 중심의 근무환경으로 급격히 전환되었다. 그러나 방산업체의 경우 군과 관련된 기술을 다루는 조직으로 망분리 정책을 적용하고 있어 비대면 적용에 제한이 많은 상태이다. 비대면 근무는 전세계적인 변화이고 향후 급변하는 환경을 고려했을 때 방산업체도 적용해야 하는 시급한 과제이다. 때문에 현재 방산업체가 비대면 근무를 시행하기 위해서는 VPN, VDI, 망연동시스템 등은 필수 요소로 적용되어야 한다. 결국 필연적으로 일부 접점이 발생할 수 밖에 없는데 이로 인해 보안취약점이 증가할 것이며 적극적인 보안관리가 중요하다. 이에 본 논문에서는 미국의 MITER에서 사이버 공격을 체계적으로 탐지하고 대응하기 위해 주기적으로 발표하고 있는 MITRE ATT&CK Framework의 공격전술을 기반으로 공격유형을 선정, 위협을 분석하고 STRIDE 위협 모델링을 적용하여 보안위협을 분류, 구체적인 보안 요구사항을 제시하고자 한다.

Formation of Scenarios for The Development of The Tourism Industry of Ukraine With The Help of Cognitive Modeling

  • Shelemetieva, Tetiana;Zatsepina, Nataly;Barna, Marta;Topornytska, Mariia;Tuchkovska, Iryna
    • International Journal of Computer Science & Network Security
    • /
    • 제21권7호
    • /
    • pp.8-16
    • /
    • 2021
  • The tourism industry is influenced by a large number of factors that affect the development scenarios of the tourism in different ways. At the same time, tourism is an important component of the national economy of any state, forms its image, investment attractiveness, is a source of income and a stimulus for business development. The aim of the article is to conduct an empirical study to identify the importance of cognitive determinants in the development of tourism. The study used general and special methods: systems analysis, synthesis, grouping, systematization, cognitive modeling, cognitive map, pulse method, predictive extrapolation. Target factors, indicators, and control factors influencing the development of tourism in Ukraine are determined and a cognitive model is built, which graphically reflects the nature of the influence of these factors. Four main scenarios of the Ukrainian tourism industry are established on the basis of creating a matrix of adjacency of an oriented graph and forecast modeling based on a scenario approach. The practical significance of the obtained results lies in the possibility of their use to forecast the prospects of tourism development in Ukraine, the definition of state policy to support the industry that will promote international and domestic tourism.

분산 환경에서 정책기반 시스템을 적용한 보안 시스템의 모델링 및 시뮬레이션 (Modeling and Simulation of security system using PBN in distributed environmen)

  • 서희석
    • 한국시뮬레이션학회논문지
    • /
    • 제17권2호
    • /
    • pp.83-90
    • /
    • 2008
  • 본 연구에서는 분산인공지능의 한 영역인 블랙보드구조를 통한 침입탐지 에이전트간의 연동 방법에 대해서 소개한다. 연동을 위해서 블랙보드를 사용한 시스템은 쉽게 확장이 가능하여 새로운 에이전트를 추가하기 용이하고, 블랙보드의 레벨을 수정하기 용이하다. 대상시스템에 시뮬레이션을 수행한다. 본 연구에서는 정책기반 네트워크를 사용하여 침입 탐지의 성능을 높이고자 하는데, 이를 적용함으로써 false positive를 줄일 수 있다. 정책기반네트워크를 통해 침입탐지 에이전트들이 서로 연동함으로써 성능의 향상을 이룬다는 것을 기존의 시스템과 비교함으로써 증명한다. 본 연구의 결과는 다양한 보안 정책을 적용하는데 사용될 수 있다.

  • PDF

보안 및 효율성을 고려한 관광 예약 정보 시스템 (Tourism Information Reservation System considering the Security and Efficiency)

  • 김태경
    • 디지털산업정보학회논문지
    • /
    • 제11권2호
    • /
    • pp.67-72
    • /
    • 2015
  • As new Information technology such as IoT develops rapidly, a lot of changes are occurred in our lives. The Internet of Things is the network of physical objects or things embedded with electronics, software, sensors and connectivity to enable it to achieve greater value and service by exchanging data with the manufacturer, operator and/or other connected devices. This change is also applied to tourism industry. These days many people make a tour reservation using the internet. But it is required to consider the efficiency and security of tour reservation system. In this paper, we suggest a tour reservation system. First, we describe the computer reservation system, hotel reservation system and reservation system. Second, we perform the modeling of general reservation system and suggested reservation system. Third, performance evaluation is carried out with respect to efficiency and security. The results show that the suggested reservation system has a better performance than a general reservation system. At last we described the results and future works.

사이버 공격 시뮬레이션을 위한 공격자 및 호스트 모델링 (Attacker and Host Modeling for Cyber-Attack Simulation)

  • 정정례;이장세;박종서;지승도
    • 한국시뮬레이션학회논문지
    • /
    • 제12권2호
    • /
    • pp.63-73
    • /
    • 2003
  • The major objective of this paper is to propose the method of attacker and host modeling for cyber-attack simulation. In the security modeling and simulation for information assurance, it is essential the modeling of attacker that is able to generate various cyber-attack scenarios as well as the modeling of host, which is able to represent behavior on attack concretely The security modeling and simulation, which was announced by Cohen, Nong Ye and etc., is too simple to concretely analyze attack behavior on the host. And, the attacker modeling, which was announced by CERT, Laura and etc., is impossible to represent complex attack excepting fixed forms. To deal with this problem, we have accomplished attacker modeling by adopted the rule-based SES which integrates the existing SES with rule-based expert system for synthesis and performed host modeling by using the DEVS formalism. Our approach is to show the difference from others in that (ⅰ) it is able to represent complex and repetitive attack, (ⅱ) it automatically generates the cyber-attack scenario suitable on the target system, (ⅲ) it is able to analyze host's behavior of cyber attack concretely. Simulation tests performed on the sample network verify the soundness of proposed method.

  • PDF

Modeling Exponential Growth in Population using Logistic, Gompertz and ARIMA Model: An Application on New Cases of COVID-19 in Pakistan

  • Omar, Zara;Tareen, Ahsan
    • International Journal of Computer Science & Network Security
    • /
    • 제21권1호
    • /
    • pp.192-200
    • /
    • 2021
  • In the mid of the December 2019, the virus has been started to spread from China namely Corona virus. It causes fatalities globally and WHO has been declared as pandemic in the whole world. There are different methods which can fit such types of values which obtain peak and get flattened by the time. The main aim of the paper is to find the best or nearly appropriate modeling of such data. The three different models has been deployed for the fitting of the data of Coronavirus confirmed patients in Pakistan till the date of 20th November 2020. In this paper, we have conducted analysis based on data obtained from National Institute of Health (NIH) Islamabad and produced a forecast of COVID-19 confirmed cases as well as the number of deaths and recoveries in Pakistan using the Logistic model, Gompertz model and Auto-Regressive Integrated Moving Average Model (ARIMA) model. The fitted models revealed high exponential growth in the number of confirmed cases, deaths and recoveries in Pakistan.

Towards a Taxonomy of Business Process and Its Anomalies

  • Suchenia, Anna
    • International Journal of Computer Science & Network Security
    • /
    • 제21권11호
    • /
    • pp.230-240
    • /
    • 2021
  • This paper presents the definition of a business process and a taxonomy of anomalies in BPMN. Graphical modeling is very popular nowadays and is easily understood by various specialists from different fields. Modeling is a graphical representation of processes in an organization using available rules and resources. Therefore, it is important to use a universal and comprehensive standard to describe models of processes, decisions and software. Such a standard is the BPMN notation, which is a precise notation, but unfortunately it is only a descriptive and graphical form that may contain inaccuracies. The aim of this paper is to collect and analyze available literature describing current state of knowledge about BPMN notation and to present problems and shortcomings related to this topic. The paper includes a taxonomy of problems, their definitions and examples of occurrence in real cases.

The Role of Computer Technologies in Contemporary Jewelry

  • Romanenkova, Julia;Bratus, Ivan;Gnatiuk, Liliia;Zaitseva, Veronika;Karpenko, Olga;Misko, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • 제22권11호
    • /
    • pp.71-76
    • /
    • 2022
  • The article aims to consider the role of computer technologies in contemporary jewelry art. The importance of computer programming, 3D-modeling and 3D-printing for the process of jewelry creating, its advertising and sales is emphasized. Both the positive features of the possibility of using computer technologies in jewelry and their shortcomings are considered. The process of changing the nature of jewelry design after the start of the use of digital technologies is highlighted. The issue of changing the perception and evaluation of a work of jewelry art, the creation of which uses mechanization, has been updated.