• Title/Summary/Keyword: Security Event

Search Result 394, Processing Time 0.025 seconds

Ensemble Model using Multiple Profiles for Analytical Classification of Threat Intelligence (보안 인텔리전트 유형 분류를 위한 다중 프로파일링 앙상블 모델)

  • Kim, Young Soo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.3
    • /
    • pp.231-237
    • /
    • 2017
  • Threat intelligences collected from cyber incident sharing system and security events collected from Security Information & Event Management system are analyzed and coped with expanding malicious code rapidly with the advent of big data. Analytical classification of the threat intelligence in cyber incidents requires various features of cyber observable. Therefore it is necessary to improve classification accuracy of the similarity by using multi-profile which is classified as the same features of cyber observables. We propose a multi-profile ensemble model performed similarity analysis on cyber incident of threat intelligence based on both attack types and cyber observables that can enhance the accuracy of the classification. We see a potential improvement of the cyber incident analysis system, which enhance the accuracy of the classification. Implementation of our suggested technique in a computer network offers the ability to classify and detect similar cyber incident of those not detected by other mechanisms.

Android based Mobile Device Rooting Attack Detection and Response Mechanism using Events Extracted from Daemon Processes (안드로이드 기반 모바일 단말 루팅 공격에 대한 이벤트 추출 기반 대응 기법)

  • Lee, Hyung-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.479-490
    • /
    • 2013
  • Recently, the number of attacks by malicious application has significantly increased, targeting Android-platform mobile terminal such as Samsung Galaxy Note and Galaxy Tab 10.1. The malicious application can be distributed to currently used mobile devices through open market masquerading as an normal application. An attacker inserts malicious code into an application, which might threaten privacy by rooting attack. Once the rooting attack is successful, malicious code can collect and steal private data stored in mobile terminal, for example, SMS messages, contacts list, and public key certificate for banking. To protect the private information from the malicious attack, malicious code detection, rooting attack detection and countermeasure method are required. To meet this end, this paper investigates rooting attack mechanism for Android-platform mobile terminal. Based on that, this paper proposes countermeasure system that enables to extract and collect events related to attacks occurring from mobile terminal, which contributes to active protection from malicious attacks.

Design and Implementation of Virus Test Simulation using VMware (VMware를 이용한 바이러스 테스트 시뮬레이션 설계 및 구현)

  • 이중식;이종일;김홍윤;전완근
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.199-207
    • /
    • 2002
  • Comes in into recent times and there is on with a level where the attack against the computer virus and the hacking which stand is serious. The recently computer virus specific event knows is the substantial damage it will be able to occur from our life inside is a possibility of feeling. The virus which appears specially in 1999 year after seemed the change which is various, also the virus of the form which progresses appeared plentifully The part virus does it uses the password anger technique which relocates the cord of the oneself. Hereupon consequently the vaccine programs in older decode anger to do the password anger of the virus again are using emulation engine. The password anger technique which the like this virus is complicated and decode anger technique follow in type of O.S. and the type is various. It uses a multi emulation engine branch operation setup consequently from one system and to respect it will be able to use a multiple operation setup together it will use the VMware which is an application software which it does as a favor there is a possibility where it will plan 'Virus Test Simulation' and it will embody.

  • PDF

A Scientific Consideration of Military Thought (군사사상의 학문적 고찰)

  • Jin, Seok-Yong
    • Journal of National Security and Military Science
    • /
    • s.7
    • /
    • pp.1-24
    • /
    • 2009
  • This article deals with military thought in general. First I tried to distinguish 'thought' from 'theory', 'philosophy', and 'principle'. Thought means the act of thinking about or considering something, an idea or opinion, or a set of ideas about a particular subject, e.g. military affairs in the present discussion. Theory means a formal statement of the rules on which a subject of study is based or of ideas which are suggested to explain a fact or event or, more generally, an opinion or explanation. Philosophy means the use of reason in understanding such things as the nature of reality and existence, the use and limits of knowledge. Principle means a basic idea or rule that explains or controls how something happens or works. Chapter 3 summarized the characteristics of military thoughts into five points', (i) it is closely related with concrete experiences of a nation; (ii) it includes philosophical and logical arguments; (iii) it relies heavily on the political thought of a nation; (iv) it includes necessarily value-judgments; (v) it contains visions of a nation which are not only descriptions or explanations of military affairs, but also evaluations and advocacies. Chapter 4 considers the relation of international political thoughts to military thought. Throughout the history of the modem states system there have been three competing traditions of thought: the Hobbesian or realist tradition, which views international politics as a state of war; the Kantian or universalist tradition, which sees at work in international politics a potential community of mankind; and the Grotian or internationalist tradition, which views international politics as taking place within an international society. Chapter 5 considers the law of war, which is a body of law concerning acceptable justifications to engage in war (jus ad bellum) and the limits to acceptable wartime conduct (jus in bello). Among other issues, modem laws of war address declarations of war, acceptance of surrender and the treatment of prisoners of war, military necessity along with distinction and proportionality, and the prohibition of certain weapons that may cause unnecessary suffering.

  • PDF

Estimate of First-Passage Probability for Hazard Fluctuating Wind Velocity (재난 변동풍속의 최초파괴확률 평가)

  • Oh, Jong Seop;Heo, Seong Je
    • Journal of Korean Society of Disaster and Security
    • /
    • v.6 no.2
    • /
    • pp.23-30
    • /
    • 2013
  • A dynamic analysis of random vibration processes is concerned with the first excursion probability based on first passage time during some specified lifetime or duration of the excitation. This study is concerned with the estimation of first-passage probability for hazard fluctuate wind velocity in the major cities reflecting the recent meteorological with largest data samples (yearly 2003-2012). The basic wind speeds were standardized homogeneously to the surface roughness category C, and to 10m above the ground surface. In this paper, the hazard fluctuate wind velocities are treated as a time-independent (stationary) random process and Gaussian random processes. The first excursion probability were calculated from Poisson model based on the independent event of level crossing & two-state Markov model based on the envelopes of level crossing.

Development Considerations of Natural Disaster Command System for Public Officers through Analysis of Disaster Response Activities at On-Scene (풍수해 현장대응업무 분석을 통한 재난현장 일반직 공무원 대응편제 개발시 고려사항 연구)

  • We, Kum Sook;Jeong, An Young
    • Journal of Korean Society of Disaster and Security
    • /
    • v.6 no.1
    • /
    • pp.47-53
    • /
    • 2013
  • Standard Incident Command System in Korea is that Incident Command System for Emergency Rescue Operation, which is commanded only by Fire Fighting Agencies. However, in the event of a disaster such as the flood, storm, or landslide disaster, there are many disaster response activities performed by the General Public Officers at the disaster on-scene. Yet, there isn't an Natural Disaster Command System for the General Public Officers in Korea. Thus, we have studied the response activities needed cooperation among agencies and proposed some considerations of the Natural Disaster Command System for General Public Officers. The system will be useful to response and recover disaster rapidly, seamlessly, and cooperatively among General Public Officers and the related agencies.

The Study for Establishing the Criteria of Measurement Items in the Monitoring System for the Steel-Box Girder Bridge by FEM Analysis (구조해석에 의한 강상자형교 상시계측시스템 계측항목별 관리기준치 설정 연구)

  • Joo, Bong-Chul;Park, Ki-Tae;You, Young-Jun;Lee, Chin-Hyung;Hwang, Yoon-Koog
    • Journal of Korean Society of societal Security
    • /
    • v.2 no.4
    • /
    • pp.35-41
    • /
    • 2009
  • If any bridge has the monitoring system, the bridge manager can check the history of bridge behavior and the progress of the damage more exactly. When the unexpected event (ex: earthquake and flood) happens, the manager can check the safety condition of the bridge and make the pertinent action for bridge management which is reduction of vehicle speed or traffic control through the system. Additionary the manager can make the well-timed repair or reinforcement through the system, so he can save the management cost or the life cycle cost. This study presents the method of setting the criteria by FEM analysis in bridge monitoring system, and the standard progress for setting the criteria about measurement items of monitoring system for the steel box type bridge.

  • PDF

Authentication and Session Management based on Ajax (Ajax를 기반으로 한 인증 및 세션 관리)

  • Nam Sang-On;Daguil Rolyn C;Kim Gi-Weon;Song Jung-Gil
    • Journal of Internet Computing and Services
    • /
    • v.7 no.6
    • /
    • pp.157-174
    • /
    • 2006
  • Ajax interaction model changes the posture of web application to become a stateful over HTTP. Ajax applications are long-lived inthe browser. XMLHTTPRequest (XHR) is used to facilitate the data exchange. Using HTTPS over this interaction is not viable because of the frequency of data exchange. Moreover, switching of protocols form HTTP to HTTPS for sensitive information is prohibited because of server-of-origin policy. The longevity, constraint, and asynchronous features of Ajax application need to hove a different authentication and session fondling mechanism that invoke re-authentication. This paper presents an authentication and session management scheme using Ajax. The scheme is design lo invoke periodic and event based re-authentication in the background using digest authentication with auto-generated password similar to OTP (One Time Password). The authentication and session management are wrapped into a framework called AWASec (Ajax Web Application Security) for coupling to avoid broken authentication and session management.

  • PDF

Intelligence Security and Surveillance System in Sensor Network Environment Using Integrated Heterogeneous Sensors (이 기종간 통합 센서를 이용한 센서네트워크 환경에서의 지능형 보안감시 시스템)

  • Oh, Suk-Jun;Moon, Seung-Jin;Choi, Sun-O
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.7
    • /
    • pp.551-562
    • /
    • 2013
  • Current CCTV systems, which require continuous monitoring of the screens, have the limitation to detect and respond to the crime scenes in timely manner. Therefore, in recent years, the request for more intlligent surveillance system, with a ubiquitous sensor network, is increasing in order to behave more humanly fashions. Such systems require cllective data processing of the environments based on various sensors. In this article, we suggests a new paradigm based surveillance system which integrates PSD and dual PIR sensors. The proposed system evlves from a existing indoor intrusion detection system which can only identify the intrusion event to a better inteligent system with context awareness. We have conducted the various simulations in order to prove the effectiveness of the proposed system.

A Study on the decision of Scattering distance by Shape of Fragments in LPG Tank lorry Explosion (LPG 탱크로리 폭발시 파편 형상에 따른 비산거리 산정에 관한 연구)

  • Lee, Young Jin;Hwang, Yong Woo;Lee, Ik Mo;Moon, Jin Young
    • Journal of Korean Society of Disaster and Security
    • /
    • v.10 no.2
    • /
    • pp.29-34
    • /
    • 2017
  • LPG is a substance that requires a lot of attention because it can cause fatal damage to people and environment when an accident occurs. LPG is frequently accidents in transportation facilities as well as fixed facilities, among which LPG tank lorries are the most frequent accidents. When the LPG tank is evacuated, the LP gas leaks into two phases, leaks mostly to the gas and leaks to some liquid. At this time, the leaked gas will also sink downward because it is heavier than air, and if it continues to leak, it may form an explosion and explode by the ignition source. The purpose of this study is to present the evacuation distance by analyzing the effect distance of the LPG liquefied petroleum gas in the event of explosion. As a result of calculation of the scattering radius of the fragment, the cylinder fragment was scattered up to 561 m. Therefore, it is appropriate to set the distance to be escaped when the LPG tanker leaks to 561m or more.