• Title/Summary/Keyword: Network Security Modeling

Search Result 190, Processing Time 0.031 seconds

Network Traffic Analysis between Two Military Bases Using Modeling and Simulation (M&S를 활용한 두 개의 군 부대간 네트워크 트래픽 용량 분석)

  • Park, Myunghwan;Yoo, Seunghoon;Seol, Hyeonju
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.22 no.3
    • /
    • pp.425-432
    • /
    • 2019
  • Modeling and Simulation(M&S) has widely been used in various areas such as industry, academy and military. Especially, military have used the technology for acquisition, training, and combat assessment. In this paper, we introduce our experience using M&S technique to analyze the network traffic amount and packet delay time between two military bases. For this, we modeled the current network configuration of the military bases and simulated the model with NS-3 tool. The result provided us for an insight regarding the required network performance between two bases.

Quantitative Risk Assessment on a Decentralized Cryptocurrency Wallet with a Bayesian Network (베이즈 네트워크를 이용한 탈중앙화 암호화폐 지갑의 정량적 위험성 평가)

  • Yoo, Byeongcheol;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.637-659
    • /
    • 2021
  • Since the creation of the first Bitcoin blockchain in 2009, the number of cryptocurrency users has steadily increased. However, the number of hacking attacks targeting assets stored in these users' cryptocurrency wallets is also increasing. Therefore, we evaluate the security of the wallets currently on the market to ensure that they are safe. We first conduct threat modeling to identify threats to cryptocurrency wallets and identify the security requirements. Second, based on the derived security requirements, we utilize attack trees and Bayesian network analysis to quantitatively measure the risks inherent in each wallet and compare them. According to the results, the average total risk in software wallets is 1.22 times greater than that in hardware wallets. In the comparison of different hardware wallets, we found that the total risk inherent to the Trezor One wallet, which has a general-purpose MCU, is 1.11 times greater than that of the Ledger Nano S wallet, which has a secure element. However, use of a secure element in a cryptocurrency wallet has been shown to be less effective at reducing risks.

A study on security requirements for Telecommuting in defense industry (방산업체 비대면(재택) 근무를 위한 보안 요구사항 연구)

  • Hwang Gue Sub;Yeon Seung Ryu
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.209-221
    • /
    • 2023
  • Due to the rapid spread of the COVID-19 virus in December 2019, the working environment was rapidly converted to telecommuting. However, since the defense industry is an organization that handles technology related to the military, the network separation policy is applied, so there are many restrictions on the application of telecommuting. Telecommuting is a global change and an urgent task considering the rapidly changing environment in the future. Currently, in order for defense companies to implement telecommuting, VPN, VDI, and network interlocking systems must be applied as essential elements. Eventually, some contact points will inevitably occur, which will increase security vulnerabilities, and strong security management is important. Therefore, in this paper, attack types are selected and threats are analyzed based on the attack tactics of the MITER ATT&CK Framework, which is periodically announced by MITER in the US to systematically detect and respond to cyber attacks. Then, by applying STRIDE threat modeling, security threats are classified and specific security requirements are presented.

Formation of Scenarios for The Development of The Tourism Industry of Ukraine With The Help of Cognitive Modeling

  • Shelemetieva, Tetiana;Zatsepina, Nataly;Barna, Marta;Topornytska, Mariia;Tuchkovska, Iryna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.8-16
    • /
    • 2021
  • The tourism industry is influenced by a large number of factors that affect the development scenarios of the tourism in different ways. At the same time, tourism is an important component of the national economy of any state, forms its image, investment attractiveness, is a source of income and a stimulus for business development. The aim of the article is to conduct an empirical study to identify the importance of cognitive determinants in the development of tourism. The study used general and special methods: systems analysis, synthesis, grouping, systematization, cognitive modeling, cognitive map, pulse method, predictive extrapolation. Target factors, indicators, and control factors influencing the development of tourism in Ukraine are determined and a cognitive model is built, which graphically reflects the nature of the influence of these factors. Four main scenarios of the Ukrainian tourism industry are established on the basis of creating a matrix of adjacency of an oriented graph and forecast modeling based on a scenario approach. The practical significance of the obtained results lies in the possibility of their use to forecast the prospects of tourism development in Ukraine, the definition of state policy to support the industry that will promote international and domestic tourism.

Modeling and Simulation of security system using PBN in distributed environmen (분산 환경에서 정책기반 시스템을 적용한 보안 시스템의 모델링 및 시뮬레이션)

  • Seo, Hee-Suk
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.2
    • /
    • pp.83-90
    • /
    • 2008
  • We introduce the coordination among the intrusion detection agents by BBA(BlackBoard Architecture) that belongs to the field of distributed artificial intelligence. The system which uses BBA for the coordination can be easily expanded by adding new agents and increasing the number of BB(BlackBoard) levels. Several simulation tests performed on the targer network will illustrate our techniques. And this paper applies PBN(Policy-Based Network) to reduce the false positives that is one of the main problems of IDS. The performance obtained from the coordination of intrusion detection agent with PBN is compared against the corresponding non PBN type intrusion detection agent. The application of the research results lies in the experimentation of the various security policies according to the network types in selecting the best security policy that is most suitable for a given network.

  • PDF

Tourism Information Reservation System considering the Security and Efficiency (보안 및 효율성을 고려한 관광 예약 정보 시스템)

  • Kim, Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.2
    • /
    • pp.67-72
    • /
    • 2015
  • As new Information technology such as IoT develops rapidly, a lot of changes are occurred in our lives. The Internet of Things is the network of physical objects or things embedded with electronics, software, sensors and connectivity to enable it to achieve greater value and service by exchanging data with the manufacturer, operator and/or other connected devices. This change is also applied to tourism industry. These days many people make a tour reservation using the internet. But it is required to consider the efficiency and security of tour reservation system. In this paper, we suggest a tour reservation system. First, we describe the computer reservation system, hotel reservation system and reservation system. Second, we perform the modeling of general reservation system and suggested reservation system. Third, performance evaluation is carried out with respect to efficiency and security. The results show that the suggested reservation system has a better performance than a general reservation system. At last we described the results and future works.

Attacker and Host Modeling for Cyber-Attack Simulation (사이버 공격 시뮬레이션을 위한 공격자 및 호스트 모델링)

  • 정정례;이장세;박종서;지승도
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.2
    • /
    • pp.63-73
    • /
    • 2003
  • The major objective of this paper is to propose the method of attacker and host modeling for cyber-attack simulation. In the security modeling and simulation for information assurance, it is essential the modeling of attacker that is able to generate various cyber-attack scenarios as well as the modeling of host, which is able to represent behavior on attack concretely The security modeling and simulation, which was announced by Cohen, Nong Ye and etc., is too simple to concretely analyze attack behavior on the host. And, the attacker modeling, which was announced by CERT, Laura and etc., is impossible to represent complex attack excepting fixed forms. To deal with this problem, we have accomplished attacker modeling by adopted the rule-based SES which integrates the existing SES with rule-based expert system for synthesis and performed host modeling by using the DEVS formalism. Our approach is to show the difference from others in that (ⅰ) it is able to represent complex and repetitive attack, (ⅱ) it automatically generates the cyber-attack scenario suitable on the target system, (ⅲ) it is able to analyze host's behavior of cyber attack concretely. Simulation tests performed on the sample network verify the soundness of proposed method.

  • PDF

Modeling Exponential Growth in Population using Logistic, Gompertz and ARIMA Model: An Application on New Cases of COVID-19 in Pakistan

  • Omar, Zara;Tareen, Ahsan
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.192-200
    • /
    • 2021
  • In the mid of the December 2019, the virus has been started to spread from China namely Corona virus. It causes fatalities globally and WHO has been declared as pandemic in the whole world. There are different methods which can fit such types of values which obtain peak and get flattened by the time. The main aim of the paper is to find the best or nearly appropriate modeling of such data. The three different models has been deployed for the fitting of the data of Coronavirus confirmed patients in Pakistan till the date of 20th November 2020. In this paper, we have conducted analysis based on data obtained from National Institute of Health (NIH) Islamabad and produced a forecast of COVID-19 confirmed cases as well as the number of deaths and recoveries in Pakistan using the Logistic model, Gompertz model and Auto-Regressive Integrated Moving Average Model (ARIMA) model. The fitted models revealed high exponential growth in the number of confirmed cases, deaths and recoveries in Pakistan.

Towards a Taxonomy of Business Process and Its Anomalies

  • Suchenia, Anna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.230-240
    • /
    • 2021
  • This paper presents the definition of a business process and a taxonomy of anomalies in BPMN. Graphical modeling is very popular nowadays and is easily understood by various specialists from different fields. Modeling is a graphical representation of processes in an organization using available rules and resources. Therefore, it is important to use a universal and comprehensive standard to describe models of processes, decisions and software. Such a standard is the BPMN notation, which is a precise notation, but unfortunately it is only a descriptive and graphical form that may contain inaccuracies. The aim of this paper is to collect and analyze available literature describing current state of knowledge about BPMN notation and to present problems and shortcomings related to this topic. The paper includes a taxonomy of problems, their definitions and examples of occurrence in real cases.

The Role of Computer Technologies in Contemporary Jewelry

  • Romanenkova, Julia;Bratus, Ivan;Gnatiuk, Liliia;Zaitseva, Veronika;Karpenko, Olga;Misko, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.71-76
    • /
    • 2022
  • The article aims to consider the role of computer technologies in contemporary jewelry art. The importance of computer programming, 3D-modeling and 3D-printing for the process of jewelry creating, its advertising and sales is emphasized. Both the positive features of the possibility of using computer technologies in jewelry and their shortcomings are considered. The process of changing the nature of jewelry design after the start of the use of digital technologies is highlighted. The issue of changing the perception and evaluation of a work of jewelry art, the creation of which uses mechanization, has been updated.