• Title/Summary/Keyword: Space Threat

Search Result 146, Processing Time 0.023 seconds

A Study on Integrated Airworthiness Certification Criteria for Avionics Software Safety and Security (항공소프트웨어 안전과 보안을 위한 통합 감항 인증기준 개발 연구)

  • Han, Man-Goon;Park, Tae-Kyou
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.46 no.1
    • /
    • pp.86-94
    • /
    • 2018
  • As the use of software is increasing in aircraft system, an exposure to the threat of safety and security also continues to grow. Although certification criteria for software safety such as DO-178C have already been established, specific certification criteria for software security have not yet been included. Recently DO-326A, DO-356 and DO-355 have been published separately for aircraft and system airworthiness security certification criteria. However, to comply individual certification criteria and procedures, it requires the additional cost and effort. Therefore, this paper proposes the efficient integrated certification criteria saving cost, effort and time by combining the certification criteria for software safety and security.

A Study on the Demand Forecast and Implication for Fine Dust Free Zone (미세먼지 차단 프리 존에 대한 수요전망과 시사점 연구)

  • Ha, Seo Yeong;Kjm, Tae Hyung;Jung, Chang Duk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.3
    • /
    • pp.45-55
    • /
    • 2020
  • Recently, as the awareness of fine dust has increased in Korea, various countermeasures have been suggested. This study examines the current status of fine dust free zones at home and abroad in order to analyze changes in guest space according to the occurrence of fine dust and to find activity patterns. I would like to predict and find implications. The purpose of this study is to forecast demand centering on domestic and foreign countermeasures for dust and domestic industry. In order to secure competitiveness for the smart city in the era of the 4th Industrial Revolution, the research is aimed at proposing a strategic plan to cope with the fine dust that is a threat to urban space. The research method is described in the following order.

Optimal Path Planning for UAVs under Multiple Ground Threats (다수 위협에 대한 무인항공기 최적 경로 계획)

  • Kim, Bu-Seong;Bang, Hyo-Chung;Yu, Chang-Gyeong;Jeong, Eul-Ho
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.34 no.1
    • /
    • pp.74-80
    • /
    • 2006
  • This paper addresses the trajectory optimization of Unmanned Aerial Vehicles(UAVs) under multiple ground threats like enemy's anti-air radar sites. The power of radar signal reflected by the vehicle and the flight time are considered in the performance cost to be minimized. The bank angle is regarded as control input for a 1st-order lag vehicle, and input parameter optimization method based on Sequential Quadratic Programming (SQP) is used for trajectory optimization. The proposed path planning method provides more practical trajectories with enhanced survivability than those of Voronoi diagram method.

Defense Strategy against Multiple Anti-Ship Missiles using Anti-Air Missiles (다수 대함유도탄에 대한 함정의 대공방어유도탄 운용기법 연구)

  • Kim, Do-Wan;Yun, Joong-Sup;Ryoo, Chang-Kyung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.39 no.4
    • /
    • pp.354-361
    • /
    • 2011
  • In this paper, an efficient defense strategy of single naval ship using short range anti-air missiles against the threat of multiple anti-ship missiles is suggested. The defense logic is based on the estimated future trajectory of anti-ship missiles by using current radar information. The logic is designed to maximize the range of interception of anti-ship missiles so that the chance of interception can be increased although the prior tries turn out to be fail. Basically, the decision making for the allocation of a defense missile is achieved by comparing the total kill probability and the estimated intercepting point. Performance of the proposed logic is investigated by nonlinear planar numerical simulations.

Polymorphic Path Transferring for Secure Flow Delivery

  • Zhang, Rongbo;Li, Xin;Zhan, Yan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2805-2826
    • /
    • 2021
  • In most cases, the routing policy of networks shows a preference for a static one-to-one mapping of communication pairs to routing paths, which offers adversaries a great advantage to conduct thorough reconnaissance and organize an effective attack in a stress-free manner. With the evolution of network intelligence, some flexible and adaptive routing policies have already proposed to intensify the network defender to turn the situation. Routing mutation is an effective strategy that can invalidate the unvarying nature of routing information that attackers have collected from exploiting the static configuration of the network. However, three constraints execute press on routing mutation deployment in practical: insufficient route mutation space, expensive control costs, and incompatibility. To enhance the availability of route mutation, we propose an OpenFlow-based route mutation technique called Polymorphic Path Transferring (PPT), which adopts a physical and virtual path segment mixed construction technique to enlarge the routing path space for elevating the security of communication. Based on the Markov Decision Process, with considering flows distribution in the network, the PPT adopts an evolution routing path scheduling algorithm with a segment path update strategy, which relieves the press on the overhead of control and incompatibility. Our analysis demonstrates that PPT can secure data delivery in the worst network environment while countering sophisticated attacks in an evasion-free manner (e.g., advanced persistent threat). Case study and experiment results show its effectiveness in proactively defending against targeted attacks and its advantage compared with previous route mutation methods.

A Study on the Advancement of the Contingency Plan upon Prediction of Toxicity Damage Considering Seasonal Characteristics (계절 특성을 고려한 독성 피해예측에 따른 위기대응 고도화에 관한 연구)

  • Hwang, Man Uk;Hwang, Yong Woo;Lee, Ik Mo;Min, Dal Ki
    • Journal of Korean Society of Disaster and Security
    • /
    • v.9 no.2
    • /
    • pp.23-32
    • /
    • 2016
  • Today the issue of deterioration of industrial complexes that are located close to life space of residents has been raised as a cause of threats to the safety of local communities. In this study, in order to improve the current risk analysis and scope of community notification, simulated threat zones were comparatively analyzed by utilizing the threat zones of alternative accident scenarios and modes of seasonal weather, and the area with a high probability of damage upon the leakage of toxic substances was predicted by examining wind directions observed at each time slot for each season. In addition, limit evacuation time and minimum separation distance to minimize casualties were suggested, and a proposal to enable more reasonable safety measures for on-site workers and nearby residents made by reviewing the risk management plan currently utilized for emergency response.

An Efficient Management Model of Security Policy in the Unified Threat Management System (통합 보안 시스템에서의 효율적인 보안 정책 관리 모델)

  • Joo, Heon-Sik;Kim, Jong-Wan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.9
    • /
    • pp.99-107
    • /
    • 2010
  • This paper showed that the integrated system to fortify security was much more efficient than the respective system through the analysis of problems from Firewall and IPS system in the existing security systems. The results of problem analysis revealed that there were the delay of processing time and lack of efficiency in the existing security systems. Accordingly, their performance was evaluated by using the separated Firewall, IPS system, and the integrated system. The result of evaluation shows that the integrated security system this paper suggested is five times faster than the existing one in terms of processing speed of response. This paper demonstrated the excellence of the proposed security system is also more than fivefold in session handling per second and six times process speeding in the CPU processing performance. In addition, several security policies are applied, and it provided a fact that it gave an excellent performance when it comes to protecting from harmful traffic attacks. In conclusion, this paper emphasized that fortifying the integrated security system was more efficient than fortifying the existing one considering in various respects such as cost, management, time, space and so on.

Detecting Abnormalities in Fraud Detection System through the Analysis of Insider Security Threats (내부자 보안위협 분석을 통한 전자금융 이상거래 탐지 및 대응방안 연구)

  • Lee, Jae-Yong;Kim, In-Seok
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.153-169
    • /
    • 2018
  • Previous e-financial anomalies analysis and detection technology collects large amounts of electronic financial transaction logs generated from electronic financial business systems into big-data-based storage space. And it detects abnormal transactions in real time using detection rules that analyze transaction pattern profiling of existing customers and various accident transactions. However, deep analysis such as attempts to access e-finance by insiders of financial institutions with large scale of damages and social ripple effects and stealing important information from e-financial users through bypass of internal control environments is not conducted. This paper analyzes the management status of e-financial security programs of financial companies and draws the possibility that they are allies in security control of insiders who exploit vulnerability in management. In order to efficiently respond to this problem, it will present a comprehensive e-financial security management environment linked to insider threat monitoring as well as the existing e-financial transaction detection system.

A Home Management System Using Smart Devices in an IoT Environment (IoT 환경에서의 스마트디바이스를 활용한 주택관리시스템)

  • Ryu, Chang-Su
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.807-808
    • /
    • 2016
  • With the recent rise in nuclear families and single-member families, there is a need for the kind of home management unaffected by neither space nor time. Moreover, electronic devices in and around the home need to be managed efficiently and prevented from overheating, and there is an increasing risk of fire, theft, and leak of personal data with these devices, which is leading to an increase in the economic costs. Accordingly, there is a growing need for an efficient and secure smart home management system. This paper proposes a home management system that uses smart devices. This system has addressed the shortcomings of a conventional Internet-based home network. Furthermore, it communicates with IoT-enabled devices and features intelligent information home appliances that are isolated from personally identifiable information and which are secure against advanced persistent threats, a type of cyber-attack.

  • PDF

Fraud Detection in E-Commerce

  • Alqethami, Sara;Almutanni, Badriah;AlGhamdi, Manal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.312-318
    • /
    • 2021
  • Lack of knowledge and digital skills is a threat to the information security of the state and society, so the formation and development of organizational culture of information security is extremely important to manage this threat. The purpose of the article is to assess the state of information security of the state and society. The research methodology is based on a quantitative statistical analysis of the information security culture according to the EU-27 2019. The theoretical basis of the study is the theory of defense motivation (PMT), which involves predicting the individual negative consequences of certain events and the desire to minimize them, which determines the motive for protection. The results show the passive behavior of EU citizens in ensuring information security, which is confirmed by the low level of participation in trainings for the development of digital skills and mastery of basic or above basic overall digital skills 56% of the EU population with a deviation of 16%. High risks to information security in the context of damage to information assets, including software and databases, have been identified. Passive behavior of the population also involves the use of standard identification procedures when using the Internet (login, password, SMS). At the same time, 69% of EU citizens are aware of methods of tracking Internet activity and access control capabilities (denial of permission to use personal data, access to geographical location, profile or content on social networking sites or shared online storage, site security checks). Phishing and illegal acquisition of personal data are the biggest threats to EU citizens. It have been identified problems related to information security: restrictions on the purchase of products, Internet banking, provision of personal information, communication, etc. The practical value of this research is the possibility of applying the results in the development of programs of education, training and public awareness of security issues.