• Title/Summary/Keyword: Security Intelligence

Search Result 738, Processing Time 0.024 seconds

Defense ICT Supply Chain Security Threat Response Plan (국방 ICT 공급에 대한 보안 위협 대응 방안)

  • Lee, Yong-Joon
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.125-134
    • /
    • 2020
  • The potential security threat is increasing as the supply of ICT products to the defense sector increases with the development of information and communication technology. Attempts to neutralize, such as intelligence gathering and destruction, through attacks on the defense power support system and the intelligence system of the weapons system could pose a fatal threat.Therefore, security measures of supply chain shear system that take into account ICT product production and operation stage to maintenance stage are needed in defense field. In the paper, technical and administrative measures for responding to 12 ICT supply chain security threats at each stage of the defense ICT supply chain life cycle were presented.

Technological Trends in Intelligent Cyber Range (지능형 사이버 훈련장의 기술 동향)

  • Yu, J.H.;Koo, K.J.;Kim, I.K.;Moon, D.S.
    • Electronics and Telecommunications Trends
    • /
    • v.37 no.4
    • /
    • pp.36-45
    • /
    • 2022
  • As the interest in achieving an intelligent society grows with the fourth industrial revolution's development, information and communications technologies technologies like artificial intelligence (AI), Internet of Things, virtual reality, information security, and blockchain technology are being actively employed in different fields for achieving an intelligent society. With these modifications, the information security paradigm in industrial and public institutions, like personal sensitive data, is quickly changing, and it is exposed to different cyber threats and breaches. Furthermore, as the number of cyber threats and breaches grows, so does the need for rapid detection and response. This demand can be satisfied by establishing cyber training programs and fostering experts that can improve cyber security abilities. In this study, we explored the domestic and international technology trends in cyber security education and training facilities for developing experts in information security. Additionally, the AI technology application in the cyber training ground, which can be established to respond to and deter cyber threats that are becoming more intelligent, was examined.

MalDC: Malicious Software Detection and Classification using Machine Learning

  • Moon, Jaewoong;Kim, Subin;Park, Jangyong;Lee, Jieun;Kim, Kyungshin;Song, Jaeseung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1466-1488
    • /
    • 2022
  • Recently, the importance and necessity of artificial intelligence (AI), especially machine learning, has been emphasized. In fact, studies are actively underway to solve complex and challenging problems through the use of AI systems, such as intelligent CCTVs, intelligent AI security systems, and AI surgical robots. Information security that involves analysis and response to security vulnerabilities of software is no exception to this and is recognized as one of the fields wherein significant results are expected when AI is applied. This is because the frequency of malware incidents is gradually increasing, and the available security technologies are limited with regard to the use of software security experts or source code analysis tools. We conducted a study on MalDC, a technique that converts malware into images using machine learning, MalDC showed good performance and was able to analyze and classify different types of malware. MalDC applies a preprocessing step to minimize the noise generated in the image conversion process and employs an image augmentation technique to reinforce the insufficient dataset, thus improving the accuracy of the malware classification. To verify the feasibility of our method, we tested the malware classification technique used by MalDC on a dataset provided by Microsoft and malware data collected by the Korea Internet & Security Agency (KISA). Consequently, an accuracy of 97% was achieved.

A Comparative Study on the Individual Personality and Intelligence for Criminal (개인의 성격과 지능이 범죄에 미치는 영향에 관한 연구)

  • Rim, Sang-Gon
    • Korean Security Journal
    • /
    • no.8
    • /
    • pp.309-336
    • /
    • 2004
  • Approximately equivalent to character disorder or character neuroses or behavioral reaction. For a discussion of the term as used currently, in the 1968 revision of psychiatric nomenclature(DSM-II). In DSM-I(1952 nomenclature), this term referred to those cases in which the personality, in its struggle for adjustment to internal and external stresses, utilized primarily a pattern of action or behavior rather than symptoms in the mental, somatic or emotional spheres. There is minimal subjective anxiety and little or no sense of distress. As thus defined, there are three main groups of personality disorder, personality pattern disturbance, personality trait disturbance and sociopathic, personality disturbance. Morton Prince asks whether a subconscious process can perform the same function as are ordinarily performed by conscious intelligence that is to say memory, perception, reasoning, imagination, volition, affectivity, etc? He cites clinical material at great length, concluding that the quality of the functions performed they frequently exhibit, that which is characteristic of intelligence.

  • PDF

A Study on the Vulnerability Assessment Model for National Defense Intelligence System Using SNA (사회연결망분석 개념을 적용한 국방정보체계 취약점 분석·평가 모형 연구)

  • Jang, Youngcheon;Kang, Kyongran;Choi, Bongwan
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.3
    • /
    • pp.421-430
    • /
    • 2017
  • In this research, we propose a methodology for assessing security vulnerability of the national defense intelligence system, considering not only target elements but also the interconnection relationship of the whole system. Existing approaches decide the security vulnerability of the whole system by assessing only target elements. However, those approaches have an issue with potentially showing the same outcome for the systems that have identical target elements but the different types of interconnection relationships. We propose a more practical assessment method which takes the interconnection relationship of a whole system into consideration based on the concept of SNA(Social Network Analysis).

Vehicles Auto Collision Detection & Avoidance Protocol

  • Almutairi, Mubarak;Muneer, Kashif;Ur Rehman, Aqeel
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.107-112
    • /
    • 2022
  • The automotive industry is motivated to provide more and more amenities to its customers. The industry is taking advantage of artificial intelligence by increasing different sensors and gadgets in vehicles machoism is forward collision warning, at the same time road accidents are also increasing which is another concern to address. So there is an urgent need to provide an A.I based system to avoid such incidents which can be address by using artificial intelligence and global positioning system. Automotive/smart vehicles protection has become a major study of research for customers, government and also automotive industry engineers In this study a two layered novel hypothetical approach is proposed which include in-time vehicle/obstacle detection with auto warning mechanism for collision detection & avoidance and later in a case of an accident manifestation GPS & video camera based alerts system and interrupt generation to nearby ambulance or rescue-services units for in-time driver rescue.

Time Series Crime Prediction Using a Federated Machine Learning Model

  • Salam, Mustafa Abdul;Taha, Sanaa;Ramadan, Mohamed
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.119-130
    • /
    • 2022
  • Crime is a common social problem that affects the quality of life. As the number of crimes increases, it is necessary to build a model to predict the number of crimes that may occur in a given period, identify the characteristics of a person who may commit a particular crime, and identify places where a particular crime may occur. Data privacy is the main challenge that organizations face when building this type of predictive models. Federated learning (FL) is a promising approach that overcomes data security and privacy challenges, as it enables organizations to build a machine learning model based on distributed datasets without sharing raw data or violating data privacy. In this paper, a federated long short- term memory (LSTM) model is proposed and compared with a traditional LSTM model. Proposed model is developed using TensorFlow Federated (TFF) and the Keras API to predict the number of crimes. The proposed model is applied on the Boston crime dataset. The proposed model's parameters are fine tuned to obtain minimum loss and maximum accuracy. The proposed federated LSTM model is compared with the traditional LSTM model and found that the federated LSTM model achieved lower loss, better accuracy, and higher training time than the traditional LSTM model.

A Study on Korea Coast Guard Intelligence Centered on legal and Institutional comparison to other organizations, domestic and international (해양경비안전본부 정보활동의 법적·제도적 측면의 문제점 분석 및 개선방안 연구)

  • Soon, Gil-Tae
    • Korean Security Journal
    • /
    • no.44
    • /
    • pp.85-116
    • /
    • 2015
  • Found in 23 Dec 1953 to cope with illegal fishing of foreign ships and coastal guard duty, Korea Coast Guard was re-organized as an office under Ministry of Public Safety since the outbreak of sinking of passenger ship "Sewolho". In the course of re-organization, intelligence and investigation duty were transferred to Police Department except "Cases happened on the sea". But the definition of intelligence duty is vague and there are lots of disputes over the jurisdiction and range of activities. With this situation in consideration, the object of this study is to analyse legal and institutional characteristic of KCG Intelligence, to compare them to that of Police Department, foreign agencies like Japan Coast Guard and US Coast Guard, to expose the limit and to suggest solution. To summarize the conclusion, firstly, in the legal side, there is no legal basis on intelligence in [The Government Organization Act], no regulation for mission, weak basis in application act. Secondly, in the institutional side, stated in the minor chapter of [The Government Organization Act], 'the cases happened on sea' is a quite vague definition, while guard, safety, maritime pollution duty falls under 'on the sea' category, intelligence fell to 'Cases happened on the sea' causing coast guard duty and intelligence have different range. In addition, reduced organization and it's manpower led to ineffective intelligence activities. In the case of Police Department, there is definite lines on 'administration concerning public security' in [The Government Organization Act], specified the range of intelligence activities as 'collect, make and distribute information concerning public security' which made the range of main duty and intelligence identical. Japanese and US coast guards also have intelligence branch and performing activities appropriate for the main missions of the organizations. To have superiority in the regional sea, neighboring countries Japan and China are strengthening on maritime power, China has launched new coast guard bureau, Japan has given the coast guard officers to have police authority in the regional islands, and to support the objectives, specialized intelligence is organized and under development. To secure maritime sovereignty and enhance mission capability in maritime safety duty, it is strongly recommended that the KCG intelligence should have concrete legal basis, strengthen the organization and mission, reinforce manpower, and ensure specialized training administrative system.

  • PDF

Intelligence in the Internet Era: Understanding OSINT and Case Analysis (인터넷 시대의 정보활동: OSINT의 이해와 적용사례분석)

  • Lee, Wan-Hee;Yun, Min-Woo;Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.34
    • /
    • pp.259-278
    • /
    • 2013
  • With advances of information technology (IT) and the Internet, it became much easier to search and collect information through many different types of web search engine. Such information only restricted to the intelligence services became available to the public, and the increased open source changed the intelligence collection activities of governments. Open Source Intelligence (OSINT) was introduced to organize and analyze the large volumes of information. OSINT is actively used after the 9/11 terrorist attack, and the United States government invest a huge amount of budget to conduct research and develope technology about OSINT. Although many Western countries recognize the importance of OSINT and deal with open source as priority, South Korea has not fully understand the important role of OSINT. Therefore, this study introduces the fundamental principles of OSINT and provides practical examples of OSINT usage. OSINT is an effective source to prevent terrorist attacks as well as a variety of crimes. Extensive discussion and suggestions for future usages are provided.

  • PDF

The Role of Intelligence Activity in the Building of Israel and its Identity (이스라엘의 정체성과 국가형성과정에서 정보의 역할 연구)

  • Seok, Jae-Wang
    • Korean Security Journal
    • /
    • no.42
    • /
    • pp.251-276
    • /
    • 2015
  • The purpose of this article is to examine Israeli intelligence activity which had contributed to the building of Israel and of its national identity. In the late 19th, the Jews scattered around the world had shared the image of victims shaped in the history of the persecution. In this process, intelligence activity was a staple factor which established the state of Israel; political and religious community. Fighting against Arabs, Israel's intelligence agents had played key role in migrating Jews to Palestine and building their own state. In other words, Intelligence activity was the instrument of implementing political Zionism, Jewish nationalism. Even after independence in 1948, despite the opposition of Arab, Israeli intelligence agencies had persuaded the United States and the Soviet Union to recognize Israel as a member of the international society. Arab countries, nevertheless, had regarded Israel as 'a state to be disappeared', and its national identity was totally denied. However, Israel officially gained recognition for statehood through Arab-Israeli war and summit talks with Egypt. Israel finally restored the 'Promised Land' that is recorded in the Bible and established its identity of a winner. In conclusion, Israeli intelligence agency played a decisive role in founding the nation and even forming the consciousness of the people.

  • PDF