• Title/Summary/Keyword: SecurityCommunication

Search Result 4,361, Processing Time 0.035 seconds

Blocking Intelligent Dos Attack with SDN (SDN과 허니팟 기반 동적 파라미터 조절을 통한 지능적 서비스 거부 공격 차단)

  • Yun, Junhyeok;Mun, Sungsik;Kim, Mihui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.1
    • /
    • pp.23-34
    • /
    • 2022
  • With the development of network technology, the application area has also been diversified, and protocols for various purposes have been developed and the amount of traffic has exploded. Therefore, it is difficult for the network administrator to meet the stability and security standards of the network with the existing traditional switching and routing methods. Software Defined Networking (SDN) is a new networking paradigm proposed to solve this problem. SDN enables efficient network management by programming network operations. This has the advantage that network administrators can flexibly respond to various types of attacks. In this paper, we design a threat level management module, an attack detection module, a packet statistics module, and a flow rule generator that collects attack information through the controller and switch, which are components of SDN, and detects attacks based on these attributes of SDN. It proposes a method to block denial of service attacks (DoS) of advanced attackers by programming and applying honeypot. In the proposed system, the attack packet can be quickly delivered to the honeypot according to the modifiable flow rule, and the honeypot that received the attack packets analyzed the intelligent attack pattern based on this. According to the analysis results, the attack detection module and the threat level management module are adjusted to respond to intelligent attacks. The performance and feasibility of the proposed system was shown by actually implementing the proposed system, performing intelligent attacks with various attack patterns and attack levels, and checking the attack detection rate compared to the existing system.

A study on the creation of mission performance data using search drone images (수색용 드론 이미지를 활용한 임무수행 데이터 생성에 관한 연구)

  • Lee, Sang-Beom;Lim, Jin-Taek
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.22 no.4
    • /
    • pp.179-184
    • /
    • 2021
  • Along with the development of the fourth industry, the public sector has increasingly paid more attention to search using drones and real-time monitoring, for various goals. The drones are used and researched to complete a variety of searching and monitoring missions, including search for missing persons, security, coastal patrol and monitoring, speed enforcement, highway and urban traffic monitoring, fire and wildfire monitoring, monitoring of illegal fishing in reservoirs and protest rally monitoring. Police stations, fire departments and military authorities, however, concentrate on the hardware part, so there are little research on efficient communication systems for the real-time monitoring of data collected from high-performance resolution and infrared thermal imagining cameras, and analysis programs suitable for special missions. In order to increase the efficiency of drones with the searching mission, this paper, therefore, attempts to propose an image analysis technique to increase the precision of search by producing image data suitable for searching missions, based on images obtained from drones and provide the foundation for improving relevant policies and establishing proper platforms, based on actual field cases and experiments.

Trend Forecasting and Analysis of Quantum Computer Technology (양자 컴퓨터 기술 트렌드 예측과 분석)

  • Cha, Eunju;Chang, Byeong-Yun
    • Journal of the Korea Society for Simulation
    • /
    • v.31 no.3
    • /
    • pp.35-44
    • /
    • 2022
  • In this study, we analyze and forecast quantum computer technology trends. Previous research has been mainly focused on application fields centered on technology for quantum computer technology trends analysis. Therefore, this paper analyzes important quantum computer technologies and performs future signal detection and prediction, for a more market driven technical analysis and prediction. As analyzing words used in news articles to identify rapidly changing market changes and public interest. This paper extends conference presentation of Cha & Chang (2022). The research is conducted by collecting domestic news articles from 2019 to 2021. First, we organize the main keywords through text mining. Next, we explore future quantum computer technologies through analysis of Term Frequency - Inverse Document Frequency(TF-IDF), Key Issue Map(KIM), and Key Emergence Map (KEM). Finally, the relationship between future technologies and supply and demand is identified through random forests, decision trees, and correlation analysis. As results of the study, the interest in artificial intelligence was the highest in frequency analysis, keyword diffusion and visibility analysis. In terms of cyber-security, the rate of mention in news articles is getting overwhelmingly higher than that of other technologies. Quantum communication, resistant cryptography, and augmented reality also showed a high rate of increase in interest. These results show that the expectation is high for applying trend technology in the market. The results of this study can be applied to identifying areas of interest in the quantum computer market and establishing a response system related to technology investment.

A Sanitizer for Detecting Vulnerable Code Patterns in uC/OS-II Operating System-based Firmware for Programmable Logic Controllers (PLC용 uC/OS-II 운영체제 기반 펌웨어에서 발생 가능한 취약점 패턴 탐지 새니타이저)

  • Han, Seungjae;Lee, Keonyong;You, Guenha;Cho, Seong-je
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.1
    • /
    • pp.65-79
    • /
    • 2020
  • As Programmable Logic Controllers (PLCs), popular components in industrial control systems (ICS), are incorporated with the technologies such as micro-controllers, real-time operating systems, and communication capabilities. As the latest PLCs have been connected to the Internet, they are becoming a main target of cyber threats. This paper proposes two sanitizers that improve the security of uC/OS-II based firmware for a PLC. That is, we devise BU sanitizer for detecting out-of-bounds accesses to buffers and UaF sanitizer for fixing use-after-free bugs in the firmware. They can sanitize the binary firmware image generated in a desktop PC before downloading it to the PLC. The BU sanitizer can also detect the violation of control flow integrity using both call graph and symbols of functions in the firmware image. We have implemented the proposed two sanitizers as a prototype system on a PLC running uC/OS-II and demonstrated the effectiveness of them by performing experiments as well as comparing them with the existing sanitizers. These findings can be used to detect and mitigate unintended vulnerabilities during the firmware development phase.

Cyber attack group classification based on MITRE ATT&CK model (MITRE ATT&CK 모델을 이용한 사이버 공격 그룹 분류)

  • Choi, Chang-hee;Shin, Chan-ho;Shin, Sung-uk
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.1-13
    • /
    • 2022
  • As the information and communication environment develops, the environment of military facilities is also development remarkably. In proportion to this, cyber threats are also increasing, and in particular, APT attacks, which are difficult to prevent with existing signature-based cyber defense systems, are frequently targeting military and national infrastructure. It is important to identify attack groups for appropriate response, but it is very difficult to identify them due to the nature of cyber attacks conducted in secret using methods such as anti-forensics. In the past, after an attack was detected, a security expert had to perform high-level analysis for a long time based on the large amount of evidence collected to get a clue about the attack group. To solve this problem, in this paper, we proposed an automation technique that can classify an attack group within a short time after detection. In case of APT attacks, compared to general cyber attacks, the number of attacks is small, there is not much known data, and it is designed to bypass signature-based cyber defense techniques. As an attack model, we used MITRE ATT&CK® which modeled many parts of cyber attacks. We design an impact score considering the versatility of the attack techniques and proposed a group similarity score based on this. Experimental results show that the proposed method classified the attack group with a 72.62% probability based on Top-5 accuracy.

A Study on the Crisis Management Standard Manual for Large-scale Human Accident at Workplace for Efficiency of Disaster Response (재난대응 효율화를 위한 사업장 대규모 인적사고 위기관리 표준매뉴얼 개정방안 연구)

  • Woo Sub Shim;Sang Beam Kim
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.3
    • /
    • pp.656-664
    • /
    • 2023
  • Purpose: The Ministry of Employment and Labor manages disasters based on the standard manual for risk management of large-scale human accidents in workplaces when large-scale disasters such as fires and collapses occur in workplaces. We are going to check the standard manual currently in operation and suggest improvement plans for the insufficient items. Method: Accordingly, the standard manual was checked together with internal and external experts in the disaster management manual and disaster management staff at headquarters and local government offices, and items to be improved were identified with priority. Result: In case of a collapse accident, it is necessary for the Ministry of Public Administration and Security to accurately present the selection criteria in order to eliminate the controversy over the selection of the disaster management department. In addition, it seems necessary to supplement the details of the disaster safety communication network operation and evacuation guidelines. Conclusion: In the future, in order to improve the disaster management system that meets the public's eye level, it is expected to prepare a standard manual for risk management of large-scale human accidents in workplaces that guarantees the lives and safety of workers through the collection of opinions from experts in the relevant field, disaster management personnel, and the general public.

Application of Artificial Intelligence Technology for Dam-Reservoir Operation in Long-Term Solution to Flood and Drought in Upper Mun River Basin

  • Areeya Rittima;JidapaKraisangka;WudhichartSawangphol;YutthanaPhankamolsil;Allan Sriratana Tabucanon;YutthanaTalaluxmana;VarawootVudhivanich
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.30-30
    • /
    • 2023
  • This study aims to establish the multi-reservoir operation system model in the Upper Mun River Basin which includes 5 main dams namely, Mun Bon (MB), Lamchae (LC), Lam Takhong (LTK), Lam Phraphoeng (LPP), and Lower Lam Chiengkrai (LLCK) Dams. The knowledge and AI technology were applied aiming to develop innovative prototype for SMART dam-reservoir operation in future. Two different sorts of reservoir operation system model namely, Fuzzy Logic (FL) and Constraint Programming (CP) as well as the development of rainfall and reservoir inflow prediction models using Machine Learning (ML) technique were made to help specify the right amount of daily reservoir releases for the Royal Irrigation Department (RID). The model could also provide the essential information particularly for the Office of National Water Resource of Thailand (ONWR) to determine the short-term and long-term water resource management plan and strengthen water security against flood and drought in this region. The simulated results of base case scenario for reservoir operation in the Upper Mun from 2008 to 2021 indicated that in the same circumstances, FL and CP models could specify the new release schemes to increase the reservoir water storages at the beginning of dry season of approximately 125.25 and 142.20 MCM per year. This means that supplying the agricultural water to farmers in dry season could be well managed. In other words, water scarcity problem could substantially be moderated at some extent in case of incapability to control the expansion of cultivated area size properly. Moreover, using AI technology to determine the new reservoir release schemes plays important role in reducing the actual volume of water shortfall in the basin although the drought situation at LTK and LLCK Dams were still existed in some periods of time. Meanwhile, considering the predicted inflow and hydrologic factors downstream of 5 main dams by FL model and minimizing the flood volume by CP model could ensure that flood risk was considerably minimized as a result of new release schemes.

  • PDF

A Study on Improving Strategies of Itinerant Librarians' Job Environment at Small Libraries (작은도서관 순회사서 직무환경 개선방안 연구)

  • Chae, Hee-ra;Kim, You-seung
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.33 no.1
    • /
    • pp.71-94
    • /
    • 2022
  • While small libraries have steadily increased in quantity, parts of qualitative growth such as lack of manpower and poor operation have been pointed out as problems. Accordingly, with the aim of establishing a foundation for linkage and cooperation between public libraries and small libraries, the small library itinerant librarians project has been promoted since 2010, and its scale has been continuously expanding. However, the lack of manpower and poor operation still remain tasks to be solved, and the poor treatment and job environment of itinerant librarians have not improved. In this context, this study aims to examine the problems of small libraries and job problems experienced by itinerant librarians and to find ways to improve the job environment of itinerant librarians based on this. Through the analysis of previous studies, small libraries and net companies were investigated, and in-depth interviews were conducted with participants related to itinerant librarians and small libraries. Through interview data analysis, a total of 17 meaning topics were extracted, including 'lack of work authority', 'lack of work manual', 'lack of communication, community', 'lack of integrated operating system', 'poor treatment and working environment', 'malicious user', and 'lack of belonging'. Based on this, four improvement measures were proposed, including the improvement of the job authority and standard regulations of itinerant librarians, the establishment of a community organization, job security guarantees, and job education reinforcement.

A Study on the Maritime Law According to the Occurrence of Marine Accidents of MASS(Maritime Autonomous Surface Ship) (자율운항선박의 해양사고 발생에 따른 해상법적 고찰)

  • Lee, Young-Ju
    • Maritime Security
    • /
    • v.6 no.1
    • /
    • pp.37-56
    • /
    • 2023
  • Recently, with the rapid development of ICT(Information and Communication Technology) and AI(Artificial Intelligence) technology industries, the emergence of MASS(Maritime Autonomous Surface Ship), which were thought only in the distant future, is approaching a reality. Along with the development of these amazing technologies, changes in the private law sector, such as liability, compensation for damages, and maritime insurance, as well as in the public law sector, such as maritime safety, marine environment protection, and maintenance of maritime order, have become necessary in the field of maritime law. In particular, with the advent of a new type of ship called MASS that does not have a crew on board, the kind and type of liability, compensation for damages, and insurance contracts in the event of a marine accident will also change. In this paper, the general theory about concept, classification, effectiveness and future of MASS and the general theory about concept and various obligations and responsibilities under the maritime law for discussion of MASS are reviewed. Next, in addition, regarding the problems that may occur in the event of a marine accident from MASS, the status as a ship, the legal relationship of the chartering contract, obligation to exercise due diligence in making the vessel seaworthiness, subject of responsibility, and liability for damages and immunity are reviewed from the perspective of maritime law. In addition, in the degree four of MASS, the necessities of further research to clarify the attributable subjects and standards of responsibility in the event of a marine accident, as well as the necessities of institutional improvement such as technology development, enactment and amendment of law and funding are presented.

  • PDF

A Study on the Housing Environment in Farms for Practical Field Training of Young Farmers Focusing on the Farms for Practical Field Training of Korea National College of Agriculture and Fisheries (청년농업인의 현장실습장 주거환경에 관한 연구 -한국농수산대학 장기현장실습장을 중심으로-)

  • Joo, J.S.;Hwang, I.U.;Kim, J.S.;Kim, S.D.;Song, C.Y.
    • Journal of Practical Agriculture & Fisheries Research
    • /
    • v.20 no.1
    • /
    • pp.125-143
    • /
    • 2018
  • The study consisted of a survey of the residential satisfaction level of the 3rd grade students and a survey of accessibility from farms for practical field training to public facilities. According to the geographical location of the farms on the map, the average distance to facilities related to convenience or safety and health that students complained was about 12km. And that to social and public facilities was about 4.4km. Students pointed out the convenience of using transportation, commercial and convenient facilities, and the safety of anti-crime security facilities as complaints during the practice session. Residential satisfaction levels in five realms, such as facility and structure, convenience, safety, comfort and sociality, were not all reached at the satisfaction level. In particular, the satisfaction level of female students was sub-normal in the safety and convenience realms. The average satisfaction levels reviewed by department were sub-normal for horse industry and floriculture departments. By residential patterns, satisfaction with sharing with the farmers was higher than with other patterns. And satisfaction level by housing structure was much lower in the assembly and container structures Since residential satisfaction level is determined by the inside and outside environment of the dwelling, college should provide students with accurate and vivid data using information communication technologies.