• Title/Summary/Keyword: Security Analysis

Search Result 6,610, Processing Time 0.037 seconds

Cyber attack group classification based on MITRE ATT&CK model (MITRE ATT&CK 모델을 이용한 사이버 공격 그룹 분류)

  • Choi, Chang-hee;Shin, Chan-ho;Shin, Sung-uk
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.1-13
    • /
    • 2022
  • As the information and communication environment develops, the environment of military facilities is also development remarkably. In proportion to this, cyber threats are also increasing, and in particular, APT attacks, which are difficult to prevent with existing signature-based cyber defense systems, are frequently targeting military and national infrastructure. It is important to identify attack groups for appropriate response, but it is very difficult to identify them due to the nature of cyber attacks conducted in secret using methods such as anti-forensics. In the past, after an attack was detected, a security expert had to perform high-level analysis for a long time based on the large amount of evidence collected to get a clue about the attack group. To solve this problem, in this paper, we proposed an automation technique that can classify an attack group within a short time after detection. In case of APT attacks, compared to general cyber attacks, the number of attacks is small, there is not much known data, and it is designed to bypass signature-based cyber defense techniques. As an attack model, we used MITRE ATT&CK® which modeled many parts of cyber attacks. We design an impact score considering the versatility of the attack techniques and proposed a group similarity score based on this. Experimental results show that the proposed method classified the attack group with a 72.62% probability based on Top-5 accuracy.

Comparative Study of Anomaly Detection Accuracy of Intrusion Detection Systems Based on Various Data Preprocessing Techniques (다양한 데이터 전처리 기법 기반 침입탐지 시스템의 이상탐지 정확도 비교 연구)

  • Park, Kyungseon;Kim, Kangseok
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.11
    • /
    • pp.449-456
    • /
    • 2021
  • An intrusion detection system is a technology that detects abnormal behaviors that violate security, and detects abnormal operations and prevents system attacks. Existing intrusion detection systems have been designed using statistical analysis or anomaly detection techniques for traffic patterns, but modern systems generate a variety of traffic different from existing systems due to rapidly growing technologies, so the existing methods have limitations. In order to overcome this limitation, study on intrusion detection methods applying various machine learning techniques is being actively conducted. In this study, a comparative study was conducted on data preprocessing techniques that can improve the accuracy of anomaly detection using NGIDS-DS (Next Generation IDS Database) generated by simulation equipment for traffic in various network environments. Padding and sliding window were used as data preprocessing, and an oversampling technique with Adversarial Auto-Encoder (AAE) was applied to solve the problem of imbalance between the normal data rate and the abnormal data rate. In addition, the performance improvement of detection accuracy was confirmed by using Skip-gram among the Word2Vec techniques that can extract feature vectors of preprocessed sequence data. PCA-SVM and GRU were used as models for comparative experiments, and the experimental results showed better performance when sliding window, skip-gram, AAE, and GRU were applied.

Convergence Plan of IT Social Safety and SIB by Expanding Sharing Information Data (공유정보 데이터 확대로 인한 IT와 SIB의 사회인식)

  • Seo, DaeSung;Lim, HeonWook
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.97-105
    • /
    • 2022
  • This study deals with the credibility of citizens when investing in uncertain project companies, as well as the Social Performance Compensation Project (SIB) and the IT sharing economy. This allows the convergence of the three sectors to address investment inequalities in economic effectiveness and social security. Activates the model of the overall Social Impact Bond (SIB) process that successfully activates the exchange of information. The empirical presentation of the operations and techniques for social IT service finance examines how the innovation ecosystem can be created with social performance and reward projects. The analysis shows that small sharing institutions or citizens can participate directly to create the ability to connect with private investors, identify the possibility of recognizing non-shared barriers to participation, and show the great impact of citizen trust in IT sharing projects in uncertain areas. As a result, for the sake of social sharing and IT cooperation promoted by the City of Seoul, before the project has the ability to design directly, it will be responsible for reliability and safety in the planning of the project. Therefore, non-shared citizens can also participate in the platform that has been effectively constructed and created.

A Study on the Improvement of Collection, Management and Sharing of Maritime Traffic Information (해상교통정보의 수집, 관리 및 공유 개선방안에 관한 연구)

  • Shin, Gil-Ho;Song, Chae-Uk
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.4
    • /
    • pp.515-524
    • /
    • 2022
  • To effectively collect, manage, and share the maritime traffic information, it is necessary to identify the technology trends concerning this particular information and analyze its current status and problems. Therefore, this study observes the domestic and foreign technology trends involving maritime traffic information while analyzing and summarizing the current status and problems in collecting, managing, and sharing it. According to the data analysis, the problems in the collecting stage are difficulties in collecting visual information from long-distance radars, CCTVs, and cameras in areas outside the LTE network coverage. Notably, this explains the challenges in detecting smuggling ships entering the territorial waters through the exclusive economic zone (EEZ) in the early stage. The problems in the management stage include difficult reductions and expansions of maritime traffic information caused by the lack of flexibility in storage spaces mostly constructed by the maritime transportation system. Additionally, it is challenging to deal with system failure with system redundancy and backup as a countermeasure. Furthermore, the problems in the sharing stage show that it is difficult to share information with external operating organizations since the internal network is mainly used to share maritime transportation information. If at all through the government cloud via platforms such as LRIT and SASS, it often fails to effectively provide various S/W applications that help use maritime big data. Therefore, it is suggested that collecting equipment such as unmanned aerial vehicles and satellites should be constructed to expand collecting areas in the collecting stage. In the management and sharing stages, the introduction and construction of private clouds are suggested, considering the operational administration and information disclosure of each maritime transportation system. Through these efforts, an enhancement of the expertise and security of clouds is expected.

Mutilateralism vs. Bilateralism in Chinese Resource Diplomacy : Comparative Analysis on Chinese Foreign Policy toward Central Asia and Africa (중국 자원외교의 다자주의와 양자주의: 중앙아시아 및 아프리카에 대한 중국 자원외교 비교)

  • Kim, Ki-jung;Chun, Ja-hyun
    • Journal of International Area Studies (JIAS)
    • /
    • v.13 no.1
    • /
    • pp.107-133
    • /
    • 2009
  • International relations in the 21st century is featured by boundless competition among nations to secure sufficient energy resources for achieving economic development. Resource diplomacy, therefore, is competitive in its nature, which is derived from the fact that resources of the globe are limited. Chinese recent economic growth has been possible mainly due to its success in resource diplomacy. The Chinese resource diplomacy has shown two different patterns according to target regions. On the one hand, China has pursued multilateral approach to Central Asia region, by which China aimed to secure energy with joint exploration method in the region. Chinese resource diplomacy toward Africa, on the other hand, has been based on bilateral approach combined with unit-centered economic aid to African nations. This difference in Chinese foreign policy pattern seems to be derived from three factors: namely, Chinese strategic considerations on geopolitical condition, regional security sensitivity, and legacies of Chinese long-time non-alignment diplomacy since the 1950s. Whether China is able to maintain the current pattern of resource diplomacy will be depended on how wisely China pursue its relations with two other global powers: Russia in the Central Asia and the U.S. in Africa. In this regard, the Chinese resource diplomacy is expected to work as determining factor of shaping a pattern of tri-lateral strategic relations among the U.S., Russia, and China. Chinese resource diplomacy thus will determine the future direction of the global politics in terms of strategic arrangement.

Prospects of cross-strait relaions after the 20th National Congress of the Communist Party of China (중국공산당 제20차 전국대표대회 이후 양안관계 전망)

  • Wonkon Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.1
    • /
    • pp.161-168
    • /
    • 2023
  • Recently, China-Taiwan relations are facing a crisis, and at the same time, the U.S.-China relationship and the structure of Northeast Asia are greatly shaken, so we should pay attention to changes in cross-strait relations. This study aims to predict how cross-strait relations will change after the party convention by analyzing Xi Jinping's Taiwan policy, focusing on the "Political Report" of the 20th party convention and the content analysis of leadership personnel. The results of the study are as follows. First, as the amendment to the party constitution announced after the closing of the party convention stipulates the possibility of armed invasion, Xi Jinping will implement a tough Taiwan policy emphasizing unification. Second, strategic competition with the United States will continue to intensify in the future when analyzing the contents of Chapters 2, 11, 13, and 14 of the "Political Reporting" and the personnel management of diplomatic and security leadership. As a result, cross-strait relations are expected to show instability for a considerable period of time. Third, at a time when Taiwan rejects the unification plan of "one country, two systems" and the tendency to de-Chineseize is strengthening, there is a possibility that legislation or specific enforcement ordinances will be enacted to strengthen the existing "Anti-Secession Law." Fourth, it is expected that strong and warm two-sided strategies will be used together, such as taking a strong response to external forces interfering with the Taiwan issue and Taiwan independence forces, and using incentives for the Kuomintang(KMT) and Taiwanese who are friendly to unification.

Hypersonic Weapons and National Security (극초음속 무기체계의 개발 경쟁과 국가 안보의 함의)

  • Son, Hyun-Seung;Lee, Ho-il;Ko, Duk-Gon
    • Journal of Aerospace System Engineering
    • /
    • v.16 no.1
    • /
    • pp.56-69
    • /
    • 2022
  • Various advanced countries are accelerating the competition in the development of hypersonic weapons. North Korea is on the verge of building a new submarine equipped with a submarine-launched ballistic missile (SLBM). A series of new guided missiles tests have continued due to political competition between the U.S. and China. The Republic of Korea is planning to boost its military capabilities, which involves the development of nuclear-powered submarines, light aircraft carriers, and new guided missiles. The northeast Asian region continues to be tense amid military rivalry between the Republic of Korea, North Korea, the United States, China, Russia, and Japan. Accordingly, these countries' competition to develop weapons is also at the world's highest level. In this paper, we examine the functioning of a hypersonic weapons system conduct a technical analysis of its components. In addition, we analyze the direction of military development that the Korean military wants to pursue through the recently announced mid-term defense plan. We conclude by highlighting the technical limitations and implementation strategies to overcome the development of hypersonic weapons.

A Study on Risk Issues and Policy for Future Society of Digital Transformation: Focusing on Artificial Intelligence (디지털 전환의 미래사회 위험이슈 및 정책적 대응 방향: 인공지능을 중심으로)

  • Koo, Bonjin
    • Journal of Technology Innovation
    • /
    • v.30 no.1
    • /
    • pp.1-20
    • /
    • 2022
  • Digital transformation refers to the economic and social effects of digitisation and digitalisation. Although digital transformation acts as a useful tool for economic/social development and enhancing the convenience of life, it can have negative effects (misuse of personal information, ethical problems, deepening social gaps, etc.). The government is actively establishing policies to promote digital transformation to secure competitiveness and technological hegemony, however, understanding of digital transformation-related risk issues and implementing policies to prevent them are relatively slow. Thus, this study systematically identifies risk issues of the future society that can be caused by digital transformation based on quantitative analysis of media articles big data through the Embedded Topic Modeling method. Specifically, first, detailed issues of negative effects of digital transformation in major countries were identified. Then detailed issues of negative effects of artificial intelligence in major countries and Korea were identified. Further, by synthesizing the results, future direction of the government's digital transformation policies for responding the negative effects was proposed. The policy implications are as follows. First, since the negative effects of digital transformation does not only affect technological fields but also affect the overall society, such as national security, social issues, and fairness issues. Therefore, the government should not only promote the positive functions of digital transformation, but also prepare policies to counter the negative functions of digital transformation. Second, the detailed issues of future social risks of digital transformation appear differently depending on contexts, so the government should establish a policy to respond to the negative effects of digital transformation in consideration of the national and social context. Third, the government should set a major direction for responding negative effects of digital transformation to minimize confusion among stakeholders, and prepare effective policy measures.

Analysis of the factors of the failure of the North Korean Army's Great Bypass Maneuver to Honam during the Korea War from an indirect approach strategy: Focusing on the Naval and Marine Corps' Tongyeong Amphibious Operation to Stop the "Dislocation" (간접접근전략으로 본 6·25전쟁기 북한군의 호남 방면 대우회기동 실패 요인 분석 -'교란'을 저지한 해군·해병대의 통영상륙작전을 중심으로-)

  • Choi, Ho-jae
    • Maritime Security
    • /
    • v.6 no.1
    • /
    • pp.109-135
    • /
    • 2023
  • The North Korean military's maneuver toward Honam was the fastest maneuver the North Korean army had demonstrated during the Korean War, and it was a threatening attack that forced the Korean and Allied forces to fully adjust the defenses of the Nakdong River. However, when this study analyzed the North Korean military's maneuver toward Honam in terms of indirect approach strategy, there were a number of factors that inevitably led to its failure. In terms of implementing the indirect approach strategy, the North Korean military cited a number of failure factors, including the dispersion of combat forces, the inflexibility of changing the line of operation, the maneuvering of ground forces, and the lack of psychological distaction. However, the North Koreans were preparing for a final "surprise attack," in which the 7th Division, which was following the North Korean 6th Division, took another diversion and attempted to attack in the direction of Tongyeong. With this, the North Koreans intended to break through the Nakdong River defenses and head for Pusan. However, the North Korean attack was ultimately thwarted by the Korean Navy and Marine Corps' Tongyeong Amphibious Operation. With a swift maneuver using the sea as a maneuvering space, the Navy and Marine Corps occupied key points first, creating an advantageous situation and fending off an attack by the North Korean 7th Division. The Navy and Marine Corps' Tongyeong Amphibious Operation finally thwarted the North Korean military's maneuver toward Honam, thus maintaining the Nakdong River defenses.

  • PDF

Considerations for Implementing Online Art-Based Peer Supervision (온라인 미술기반 동료 슈퍼비전 실행에 대한 고려사항)

  • Yoon, Ra-Mi;Kim, Soo-In;Jung, HeeJae
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.5
    • /
    • pp.404-415
    • /
    • 2022
  • The purpose of this study is to propose considerations to help actual application based on the characteristics of the online art-based peer supervision execution process. Colleagues in the clinical art therapy doctoral program, including the researcher, attempted to repeatedly identify problems and apply improvements in the implementation process as research participants, and qualitatively analyzed the various data collected in the process. Looking at the characteristics of the analysis results, extensibility of materials and space was confirmed in terms of 'art-based' and initiative, convenience, and speed in terms of 'online'. The considerations identified through this are as follows. First, 'pre-structuring' should be based on clear boundaries and setting, prior consultation of the group, and self-directed preparation and attitude. Second, for the 'structural aspect of art', space and media to help immersion through creation, and stable implementation structure should be established. Third, in the 'technical aspect', it is necessary to apply a method that can deliver a work of art and a method that can communicate the creator's clear intention. Lastly, for the 'ethical aspect', it is necessary to use online software in accordance with the minimum security standards and to make efforts to repeatedly maintain confidentiality. This study is meaningful in that it suggested a practical method for maintaining the professional competence of art therapists and expanding networks among art therapists in various situations including pandemics.