• Title/Summary/Keyword: Security Event

Search Result 394, Processing Time 0.031 seconds

Detection of False Data Injection Attacks in Wireless Sensor Networks (무선 센서 네트워크에서 위조 데이터 주입 공격의 탐지)

  • Lee, Hae-Young;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.3
    • /
    • pp.83-90
    • /
    • 2009
  • Since wireless sensor networks are deployed in open environments, an attacker can physically capture some sensor nodes. Using information of compromised nodes, an attacker can launch false data injection attacks that report nonexistent events. False data can cause false alarms and draining the limited energy resources of the forwarding nodes. In order to detect and discard such false data during the forwarding process, various security solutions have been proposed. But since they are prevention-based solutions that involve additional operations, they would be energy-inefficient if the corresponding attacks are not launched. In this paper, we propose a detection method that can detect false data injection attacks without extra overheads. The proposed method is designed based on the signature of false data injection attacks that has been derived through simulation. The proposed method detects the attacks based on the number of reporting nodes, the correctness of the reports, and the variation in the number of the nodes for each event. We show the proposed method can detect a large portion of attacks through simulation.

Marine Incidents Management and Information Exchange Technologies in the Process of Safe Ship Operation

  • Oleksiy, Melnyk;Yana, Volianska;Oleg, Onishchenko;Svitlana, Onyshchenko;Alla, Bondar;Andrii, Golovan;Nataliia, Cheredarchuk;Iryna, Honcharuk;Tetyana, Obnyavko
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.64-70
    • /
    • 2023
  • Maritime transport is dominant in the overall volume of all international transportation. Existence and overcoming of problems, which cause pressure on shipping safety, remain actual and fully concern both maritime and inland transport. Increasing speed and cargo capacity of the ships along with the reduction of crew members lead to the automation of a growing number of work processes, which indicates the need to actively introduce appropriate measures in the security system of sea-going ships and commercial ports and to develop modern approaches to minimize negative events and incidents in the process of ship operation. Advantages in use of modern methods of monitoring the safety of ship operations, management of possible events and incidents, including investigation of accidents, first, aimed at prevention of negative occurrences and ways of prevention on this basis. Considering statistics on incidents increase, this work presents analysis of general ship accident rate, study of major accidental events growth annually, and investigation of causes of incidents, which most frequently occur in port waters and at open sea. A survey of current approaches to ensuring the safety of shipping by implementing effective tools, such as event and incident management, has been conducted.

Comparison of System Call Sequence Embedding Approaches for Anomaly Detection (이상 탐지를 위한 시스템콜 시퀀스 임베딩 접근 방식 비교)

  • Lee, Keun-Seop;Park, Kyungseon;Kim, Kangseok
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.2
    • /
    • pp.47-53
    • /
    • 2022
  • Recently, with the change of the intelligent security paradigm, study to apply various information generated from various information security systems to AI-based anomaly detection is increasing. Therefore, in this study, in order to convert log-like time series data into a vector, which is a numerical feature, the CBOW and Skip-gram inference methods of deep learning-based Word2Vec model and statistical method based on the coincidence frequency were used to transform the published ADFA system call data. In relation to this, an experiment was carried out through conversion into various embedding vectors considering the dimension of vector, the length of sequence, and the window size. In addition, the performance of the embedding methods used as well as the detection performance were compared and evaluated through GRU-based anomaly detection model using vectors generated by the embedding model as an input. Compared to the statistical model, it was confirmed that the Skip-gram maintains more stable performance without biasing a specific window size or sequence length, and is more effective in making each event of sequence data into an embedding vector.

Small nations' choices to cope with direct security threats: a comparative study on the security strategies of the five East-Central European states between two world wars (안보의 진공을 타개하기 위한 약소국의 선택: - 전간기 중·동부유럽 5개국의 외교, 안보정책 비교연구)

  • Kim, Shin-Kyu
    • East European & Balkan Studies
    • /
    • v.32
    • /
    • pp.257-281
    • /
    • 2012
  • Are the policies and strategies which weak and small states choose to follow for ensuring their's own security meaningless? Can the fate of weak states be guaranteed only by the neighboring benign strong states and be in certain international relations favoring for them? In this paper, to answer these questions, what kinds of security policies and foreign policies had small states chosen which were in the face of threats of great powers will be examined. Between the two world war, the series of event which took place in central and eastern European countries(CEEc) have been selected to examine the hypothesis and theories of international relations and foreign policies, and at the same time cited as examples of failed foreign policy and security strategy. During interwar periods, CEEc were the prime examples for examining what kind of policies and strategies had the small states chosen over the international relations in which the smalls had to struggle to survive between neighbouring the powers and between the hostiles. Furthermore, for the measures which the smalls had chosen had no effect when the great power threatened military to them, the main purpose of this paper is to examine what was the best choose to depend their survival. For this purpose, in this paper, several strategies which the smalls can choose and the counterfactuals, that is "if the smalls chosen another strategies, they could...", will be examined.

A Study of Preventing Social Engineering Attack on Smartphone with Using NFC (NFC를 이용한 스마트폰 상의 사회 공학적 공격 방지 기법 연구)

  • Suh, Jangwon;Lee, Eunyoung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.2
    • /
    • pp.23-35
    • /
    • 2015
  • When people stands near someone's mobile device, it can easily be seen by others. To rephrase this, attackers use human psychology to earn personal information or credit information or other. People are exposed by social engineering attacks. It is certain that we need more than just recommendation for the security to avoid social engineering attacks. This is why I proposed this paper. In this paper, I proposed an authentication technique using NFC and Hash function to stand against social engineering attack. Proposed technique result is showing that it could prevent shoulder surfing, touch event information, spyware attack using screen capture and smudge attack which relies on detecting the oily smudges left behind by user's fingers. Besides smart phone, IPad, Galaxy tab, Galaxy note and more mobile devices has released and releasing. And also, these mobile devices usage rate is increasing widely. We need to attend these matters and study in depth.

Impact of Outage on Security Values of Firms in Energy Storage Industry (정전이 에너지 저장장치산업 관련 기업 주가에 미치는 영향 분석)

  • Kim, Jin-A;Lee, Jae-Hee;Joo, Sung-Kwan
    • Proceedings of the KIEE Conference
    • /
    • 2009.07a
    • /
    • pp.549_550
    • /
    • 2009
  • 전력산업의 경쟁체제 도입에 따른 전력설비 투자부진현상은 정전 발생 확률을 높였고, 이에 따른 대비책 마련 및 경제적 파급효과 분석과 관련된 연구가 대두되었다. 국내에서 수행된 정전의 경제적 파급효과 분석은 정전비용 산정에만 초점을 맞추어 수행되었기 때문에 잠재적인 경제적 영향성을 고려하여 정전과 금융시장의 상관관계 분석이 필요하다. 본 논문은 이벤트 스터디(Event Study)기법 적용을 통해 정전이 에너지 저장장치산업 관련 기업 주가에 미치는 영향을 분석한다.

  • PDF

Security Issues and Trends in Automotive Black-box (차량용 블랙박스 보안 이슈 동향)

  • Kim, M.S.;Choi, S.G.;Jeong, C.Y.;Han, J.W.
    • Electronics and Telecommunications Trends
    • /
    • v.27 no.4
    • /
    • pp.123-129
    • /
    • 2012
  • 최근 교통사고가 발생하는 경우, 사고 발생의 책임 소재에 대한 판단을 용이하게하고, 사고예방의 효과가 높은 이유로 택시, 버스와 같은 대중교통 시설과 개인 차량에 교통사고 상황을 영상으로 기록할 수 있는 차량용 영상기록 블랙박스(VEDR: Video Event Data Recorder)의 장착이 증가하고 있다. 그러나 이러한 블랙박스의 설치 및 활용에 대한 법적 규정이 미비하여 개인의 사생활 침해 가능성과 범죄에의 악용 우려가 높다. 본고에서는 차량용 블랙박스의 사용과 함께 발생할 수 있는 보안적인 문제점들을 살펴보았다. 특히 차량용 블랙박스에서 발생할 수 있는 보안적인 문제들 중에서 현재 사회적으로 가장 이슈가 되고 있는 블랙박스에 저장된 데이터의 위 변조 문제와 개인의 프라이버시 보호 문제를 중심으로 살펴보았다. 또한 이러한 보안 문제와 관련한 국내 외의 법률 동향을 살펴보았으며, 향후 제정될 이러한 법률들을 지원하기 위하여 보완하여야 할 문제와 추가로 고려되어야 하는 문제 등을 함께 살펴보았다.

  • PDF

Security Simulation with Collaboration of Intrusion Detection System and Firewall (침입 탐지 시스템과 침입 차단 시스템의 연동을 통한 보안 시뮬레이션)

  • 서희석;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.10 no.1
    • /
    • pp.83-92
    • /
    • 2001
  • For the prevention of the network intrusion from damaging the system, both IDS (Intrusion Detection System) and Firewall are frequently applied. The collaboration of IDS and Firewall efficiently protects the network because of making up for the weak points in the each demerit. A model has been constructed based on the DEVS (Discrete Event system Specification) formalism for the simulation of the system that consists of IDS and Firewall. With this model we can simulation whether the intrusion detection, which is a core function of IDS, is effectively done under various different conditions. As intrusions become more sophisticated, it is beyond the scope of any one IDS to deal with them. Thus we placed multiple IDS agents in the network where the information helpful for detecting the intrusions is shared among these agents to cope effectively with attackers. If an agent detects intrusions, it transfers attacker's information to a Firewall. Using this mechanism attacker's packets detected by IDS can be prevented from damaging the network.

  • PDF

Development of SVDB for performance improvement of security (보안 시스템의 성능 향상을 위한 SVDB 개발)

  • 이원영;조대호
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2002.11a
    • /
    • pp.17-21
    • /
    • 2002
  • 네트워크 보안의 중요성과 필요성이 증대됨에 따라 많은 조직들이 다양한 보안 시 스템을 네트워크에 적용하고 있다. 침입 차단 시스템, 침입 탐지 시스템, 취약점 스캐너와 같은 보안 시스템들이 취약성 정보를 공유하게 되면 일관된 통합 보안 환경을 구축할 수 있다. 본 연구진은 통합 보안 시뮬레이션 환경의 구축을 위해 여러 보안 시스템 모델들이 사용할 수 있는 취약성 정보들을 집약시킴으로써 보안 시스템간의 정보 공유를 쉽게 할 수 있는 SVDB (Simulation based Vulnerability Data Base)를 구축하였다. 네트워크의 한 구성요소인 SVDB는 보안 시스템 모델의 구성에 필요한 다양한 정보를 담고 있어 한 호스트나 네트워크가 갖는 취약성을 조기에 발견할 수 있다. 또한 SVDB는 침입 탐지 시스템과 같은 보안 시스템이 존재하는 네트워크를 시뮬레이션 하는데 필요한 보안 정보를 제공한다. 보안시스템을 위한 시뮬레이션 모델은 DEVS (Discrete EVent system Specification) 방법론을 사용하여 구성하였다. 또한 이렇게 구축된 시뮬레이션 모델들이 SVDB와 연동하기 위한 인터페이스 모듈을 구현하였다. 취약성 스캐너, 침입 탐지 시스템, 침임 차단 시스템이 정보를 공유함으로써 공격에 효과적인 대응하는 것을 시뮬레이션을 통해 보인다.

  • PDF

Design and Implementation of a Stock Market Management System using CORBA (CORBA를 이용한 주식매매 관리 시스템 설계 및 구현)

  • Hwang, Jun;Kim, Young-Sin
    • Journal of Internet Computing and Services
    • /
    • v.2 no.3
    • /
    • pp.93-98
    • /
    • 2001
  • It is difficult to develop Electronic Commerce System due to expansion, maintenance and repair of the system. In this paper, the author proposes 3-Tier structure Stock Market Management System using JAVA and CORBA. The event service of CORBA supports the interactive environment. For improvement of expansion, performance, security, maintenance, repair. and efficiency, the 3-Tier structure Stock Market Management System is implemented using CORBA and JDBC middle ware in this environment.

  • PDF