• Title/Summary/Keyword: Network Vulnerability

Search Result 419, Processing Time 0.023 seconds

Trends and methods of preventing router attacks using network vulnerability (네트워크 취약점을 통한 공유기 공격동향 및 예방방법)

  • Lee, Young-Hyeon;Kim, Ki-Hwan;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.262-265
    • /
    • 2015
  • In modern society, the spread of computers and smart phones, the Internet has become part of life. Therefore, the most places, wired/wireless router is installed. Crackers can attack the user to use the router by exploiting network vulnerabilities. therefore, the administrator is able to try cracker variety of attacks sloppy router, vaccine is installed also computer and smartphone users, appearance and address of the usual Internet is not deer medium and similar. In this paper, we look at a method for preventing in each attack seen for typical network attacks.

  • PDF

A Study on the Social Disaffiliation of the Homeless (노숙자의 사회적 연계단절에 관한 연구)

  • Nam, Ki-Cheol
    • Korean Journal of Social Welfare
    • /
    • v.42
    • /
    • pp.199-224
    • /
    • 2000
  • Homelessness became a major social problem in Korea. And the homeless presents many kinds of problems in social functioning. In studies on the homeless, Physical and mental health, alcohol and subtance abuse, the vulnerability of the social support have been frequently described as major characteristics of the homeless. Of the homeless' psychosocial characteristics, this article focused on the lack of the social support, which plays a important role on the exit from homelessness. The lack of social support has been mentioned as cause for homelessness. But a few researchers stressed the perspective that the homelessness causes the lack of social support. This article analyzed empirically the lack of social support among the homeless in terms of "social disaffiliation". This article hypothesized: (a) as longer homeless duration, the extent of the perceived social support would be decreased, (b) as longer homeless duration, the magnitude of the social network would be decreased, (c) as longer homeless duration, the ratio of the homeless in social network would be increased. Survey data collected from 355 homeless persons (sheltered homeless) at 82 shelters in Seoul. The result of analysis supports 'social disaffiliation hypotheses'. The result of this study suggests that the social work intervention to strengthen social support and social network be critically important in homeless shelter.

  • PDF

Security Vulnerability Verification for Open Deep Learning Libraries (공개 딥러닝 라이브러리에 대한 보안 취약성 검증)

  • Jeong, JaeHan;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.117-125
    • /
    • 2019
  • Deep Learning, which is being used in various fields recently, is being threatened with Adversarial Attack. In this paper, we experimentally verify that the classification accuracy is lowered by adversarial samples generated by malicious attackers in image classification models. We used MNIST dataset and measured the detection accuracy by injecting adversarial samples into the Autoencoder classification model and the CNN (Convolution neural network) classification model, which are created using the Tensorflow library and the Pytorch library. Adversarial samples were generated by transforming MNIST test dataset with JSMA(Jacobian-based Saliency Map Attack) and FGSM(Fast Gradient Sign Method). When injected into the classification model, detection accuracy decreased by at least 21.82% up to 39.08%.

AAA Mechanism for the Integration between Heterogeneous Network in Wireless Network Roaming Environment (무선 네트워크 로밍 환경에서 이기종 네트워크간 연동을 위한 AAA 메커니즘)

  • Moon, Jong-Sik;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.481-492
    • /
    • 2008
  • With the advancement of the Internet and networks, the combination of wired/wireless technologies is spreading rapidly since it enables the creation of new services and provides new features to both users and service providers. In such wired/wireless integrated services, network integration is very important because such systems are integrated by a linkage between heterogeneous networks and they involve an integration of transmission technologies across networks. In this situation, existing security and communication technologies are unsuitable since the network are integrated with heterogeneous networks. The network may also have several security vulnerability. Also, form of service that users offer will be service for roaming user. In these service, we must provide fast authentication and security at roaming. Therefore in this paper we proposed roaming and AAA mechanism in heterogeneous network environment. Our system provides secure communication and efficiency.

Development of comprehensive earthquake loss scenarios for a Greek and a Turkish city: seismic hazard, geotechnical and lifeline aspects

  • Pitilakis, Kyriazis D.;Anastasiadis, Anastasios I.;Kakderi, Kalliopi G.;Manakou, Maria V.;Manou, Dimitra K.;Alexoudi, Maria N.;Fotopoulou, Stavroula D.;Argyroudis, Sotiris A.;Senetakis, Kostas G.
    • Earthquakes and Structures
    • /
    • v.2 no.3
    • /
    • pp.207-232
    • /
    • 2011
  • The development of reliable earthquake mitigation plans and seismic risk management procedures can only be based on the establishment of comprehensive earthquake hazard and loss scenarios. Two cities, Grevena (Greece) and D$\ddot{u}$zce (Turkey), were used as case studies in order to apply a comprehensive methodology for the vulnerability and loss assessment of lifelines. The methodology has the following distinctive phases: detailed inventory, identification of the typology of each component and system, evaluation of the probabilistic seismic hazard, geotechnical zonation, ground response analysis and estimation of the spatial distribution of seismic motion for different seismic scenarios, vulnerability analysis of the exposed elements at risk. Estimating adequate earthquake scenarios for different mean return periods, and selecting appropriate vulnerability functions, expected damages of the water and waste water systems in D$\ddot{u}$zce and of the roadway network and waste water system of Grevena are estimated and discussed; comparisons with observed earthquake damages are also made in the case of D$\ddot{u}$zce, proving the reliability and the efficiency of the proposed methodology. The results of the present study constitute a sound basis for the development of efficient loss scenarios for lifelines and infrastructure facilities in seismic prone areas. The first part of this paper, concerning the estimation of the seismic ground motions, has been utilized in the companion paper by Kappos et al. (2010) in the same journal.

Vasa Vasorum Densities in Human Carotid Atherosclerosis Is Associated with Plaque Development and Vulnerability

  • Joo, Sung-Pil;Lee, Seung-Won;Cho, Yong-Hwan;Kim, You-Sub;Seo, Bo-Ra;Kim, Hyung-Seok;Kim, Tae-Sun
    • Journal of Korean Neurosurgical Society
    • /
    • v.63 no.2
    • /
    • pp.178-187
    • /
    • 2020
  • Objective : The extensive vasa vasorum network functions as a conduit for the entry of inflammatory cells or factors that promote the progression of angiogenesis and plaque formation. Therefore, we investigated the correlation between the carotid vasa vasorum activities and carotid plaque vulnerability using indocyanine green video angiography (ICG-VA) during carotid endarterectomy (CEA). Methods : Sixty-nine patients who underwent CEA were enrolled prospectively from September 2015 to December 2017. During CEA, a bolus of ICG was injected intravenously before and after resecting the atheroma. Additionally, we performed immunohistochemistry using CD68 (a surface marker of macrophages), CD117 (a surface marker of mast cells), and CD4 and CD8 (surface markers of T-cells) antibodies to analyze the resected plaque specimens. Results : The density of active vasa vasorum was observed in all patients using ICG-VA. The vasa vasorum externa (VVE) and interna (VVI) were seen in 11 (16%) and 57 patients (82.6%), respectively. Macroscopically, the VVE-type patterns were strongly associated with preoperative angiographic instability (81.8%, p=0.005) and carotid plaque vulnerability (90.9%, p=0.017). In contrast, the VVI-type patterns were weakly associated with angiographic instability (31.6%) and plaque vulnerability (49.1%). CD68-stained macrophages and CD117-stained mast cells were observed more frequently in unstable plaques than in stable plaques (p<0.0001, p=0.002, respectively). Conclusion : The early appearance of VVE, along with the presence of many microvessel channels that provided nutrients to the developing and expanding atheroma during ICG-VA, was strongly associated with unstable carotid plaques. The degree of infiltration of macrophages and mast cells is possibly related to the formation of unstable plaques.

A study on vulnerability analysis and incident response methodology based on the penetration test of the power plant's main control systems (발전소 주제어시스템 모의해킹을 통한 취약점 분석 및 침해사고 대응기법 연구)

  • Ko, Ho-Jun;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.295-310
    • /
    • 2014
  • DCS (Distributed Control System), the main control system of power plants, is an automated system for enhancing operational efficiency by monitoring, tuning and real-time operation. DCS is becoming more intelligent and open systems as Information technology are evolving. In addition, there are a large amount of investment to enable proactive facility management, maintenance and risk management through the predictive diagnostics. However, new upcoming weaponized malware, such as Stuxnet designed for disrupting industrial control system(ICS), become new threat to the main control system of the power plant. Even though these systems are not connected with any other outside network. The main control systems used in the power plant usually have been used for more than 10 years. Also, this system requires the extremely high availability (rapid recovery and low failure frequency). Therefore, installing updates including security patches is not easy. Even more, in some cases, installing security updates can break the warranty by the vendor's policy. If DCS is exposed a potential vulnerability, serious concerns are to be expected. In this paper, we conduct the penetration test by using NESSUS, a general-purpose vulnerability scanner under the simulated environment configured with the Ovation version 1.5. From this result, we suggest a log analysis method to detect the security infringement and react the incident effectively.

A Robust Biometric-based User Authentication Protocol in Wireless Sensor Network Environment (무선센서네트워크 환경에서 생체기반의 개선된 사용자 인증 프로토콜)

  • Shin, Kwang-Cheul
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.3
    • /
    • pp.107-123
    • /
    • 2013
  • In a wireless sensor network environment, it is required to ensure anonymity by keeping sensor nodes' identifiers not being revealed and to support real-time authentication, lightweight authentication and synchronization. In particular, there exist possibilities of location information leakage by others, privacy interference and security vulnerability when it comes to wireless telecommunications. Anonymity has been an importance issue in wired and wireless network environment, so that it has been studied in wide range. The sensor nodes are interconnected among them based on wireless network. In terms of the sensor node, the researchers have been emphasizing on its calculating performance limit, storage device limit, and smaller power source. To improve of biometric-based D. He scheme, this study proposes a real-time authentication protocol using Unique Random Sequence Code(URSC) and variable identifier for enhancing network performance and retaining anonymity provision.

Retrofit Prioritization of Highway Network considering Seismic Risk of System (지진 위험도를 고려한 도로 교통망의 내진보강 우선순위 결정)

  • Na, Ung-Jin;Park, Tae-Won;Shinozuka, Masanobu
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.12 no.6
    • /
    • pp.47-53
    • /
    • 2008
  • This research focuses on the issue of seismic retrofit prioritization based on the Caltrans' highway network serving Los Angeles and Orange counties. Retrofit prioritization is one of most important problems in earthquake engineering, and it is a problem that most decision makers face in the process of resource allocation. This study demonstrates the methods of prioritized resource allocation in the process of retrofitting a regional highway network. For the criteria of a retrofit ranking, seismic vulnerability and the importance of network link are first introduced. Subsequently, link-based seismic retrofit cases are simulated, investigating the effects of the seismic retrofit in terms of seismic performance, such as driver's delay. In this study, probabilistic scenario earthquakes are used to perform a probabilistic seismic risk analysis. The results show that the retrofit prioritization can be differently defined and ranked depending on the stakeholders. This study provides general guidelines for prioritization strategy for the effective retrofitting of a highway network system.

A Policy-based Secure Framework for Constructing Secure Networking (안전한 네트워크 구성을 위한 정책기반 보안 프레임워크)

  • 박상길;장종수;손승원;노봉남
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.8C
    • /
    • pp.748-757
    • /
    • 2002
  • Cyber-terror trials are increased in nowadays and these attacks are commonly using security vulnerability and information gathering method by variable services grew by the continuous development of Internet Technology. IDS's application environment is affected by this increasing Cyber Terror. General Network based IDS detects intrusion by signature based Intrusion Detection module about inflowing packet through network devices. Up to now security in network is commonly secure host, an regional issue adopted in special security system but these system is vulnerable intrusion about the attack in globally connected Internet systems. Security mechanism should be produced to expand the security in whole networks. In this paper, we analyzer the DARPA's program and study Infusion Detection related Technology. We design policy security framework for policy enforcing in whole network and look at the modules's function. Enforcement of security policy is acted by Intrusion Detection system on gateway system which is located in network packet's inflow point. Additional security policy is operated on-line. We can design and execute central security policy in managed domain in this method.