• Title/Summary/Keyword: Spread Vulnerability

Search Result 42, Processing Time 0.02 seconds

Classification of BcN Vulnerabilities Based on Extended X.805 (X.805를 확장한 BcN 취약성 분류 체계)

  • Yoon Jong-Lim;Song Young-Ho;Min Byoung-Joon;Lee Tai-Jin
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.427-434
    • /
    • 2006
  • Broadband Convergence Network(BcN) is a critical infrastructure to provide wired-and-wireless high-quality multimedia services by converging communication and broadcasting systems, However, there exist possible danger to spread the damage of an intrusion incident within an individual network to the whole network due to the convergence and newly generated threats according to the advent of various services roaming vertically and horizontally. In order to cope with these new threats, we need to analyze the vulnerabilities of BcN in a system architecture aspect and classify them in a systematic way and to make the results to be utilized in preparing proper countermeasures, In this paper, we propose a new classification of vulnerabilities which has been extended from the ITU-T recommendation X.805, which defines the security related architectural elements. This new classification includes system elements to be protected for each service, possible attack strategies, resulting damage and its criticalness, and effective countermeasures. The new classification method is compared with the existing methods of CVE(Common Vulnerabilities and Exposures) and CERT/CC(Computer Emergency Response Team/Coordination Center), and the result of an application to one of typical services, VoIP(Voice over IP) and the development of vulnerability database and its management software tool are presented in the paper. The consequence of the research presented in the paper is expected to contribute to the integration of security knowledge and to the identification of newly required security techniques.

Properties of a Social Network Topology of Livestock Movements to Slaughterhouse in Korea (도축장 출하차량 이동의 사회연결망 특성 분석)

  • Park, Hyuk;Bae, Sunhak;Pak, Son-Il
    • Journal of Veterinary Clinics
    • /
    • v.33 no.5
    • /
    • pp.278-285
    • /
    • 2016
  • Epidemiological studies have shown the association between transportation of live animals and the potential transmission of infectious disease between premises. This finding was also observed in the 2014-2015 foot-and-mouth disease (FMD) outbreak in Korea. Furthermore, slaughterhouses played a key role in the global spread of the FMD virus during the epidemic. In this context, in-depth knowledge of the structure of direct and indirect contact between slaughterhouses is paramount for understanding the dynamics of FMD transmission. But the social network structure of vehicle movements to slaughterhouses in Korea remains unclear. Hence, the aim of this study was to configure a social network topology of vehicle movements between slaughterhouses for a better understanding of how they are potentially connected, and to explore whether FMD outbreaks can be explained by the network properties constructed in the study. We created five monthly directed networks based on the frequency and chronology of on- and off-slaughterhouse vehicle movements. For the monthly network, a node represented a slaughterhouse, and an edge (or link) denoted vehicle movement between two slaughterhouses. Movement data were retrieved from the national Korean Animal Health Integrated System (KAHIS) database, which tracks the routes of individual vehicle movements using a global positioning system (GPS). Electronic registration of livestock movements has been a mandatory requirement since 2013 to ensure traceability of such movements. For each of the five studied networks, the network structures were characterized by small-world properties, with a short mean distance, a high clustering coefficient, and a short diameter. In addition, a strongly connected component was observed in each of the created networks, and this giant component included 94.4% to 100% of all network nodes. The characteristic hub-and-spoke type of structure was not identified. Such a structural vulnerability in the network suggests that once an infectious disease (such as FMD) is introduced in a random slaughterhouse within the cohesive component, it can spread to every other slaughterhouse in the component. From an epidemiological perspective, for disease management, empirically derived small-world networks could inform decision-makers on the higher potential for a large FMD epidemic within the livestock industry, and could provide insights into the rapid-transmission dynamics of the disease across long distances, despite a standstill of animal movements during the epidemic, given a single incursion of infection in any slaughterhouse in the country.

An Analysis Model Study on the Vulnerability in the Infectious Disease Spread of Public-use Facilities neighboring Senior Leisure Welfare Facilities (노인여가복지시설 주변 다중이용시설에서의 감염병 확산 취약성 분석 모델에 관한 연구)

  • Kim, Mijung;Kweon, Jihoon
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.28 no.4
    • /
    • pp.41-50
    • /
    • 2022
  • Purpose: This study aims to suggest an analysis model finding the relationship between building scale characteristics of Public-use facilities and infectious disease outbreaks around senior leisure welfare facilities and the features and their scopes where quarantine resources are to be concentrated. Methods: Reviewing previous studies found the user characteristics of senior leisure welfare facilities and scale characteristics of urban architectures. The data preprocessing was performed after collecting building data and infectious disease outbreak data in the analysis area. This study derived data for attributes of building size and frequency of infectious disease outbreaks in Public-use facilities around senior leisure welfare facilities. A computing algorithm was implemented to analyze the correlation between the building size characteristics and the infectious disease outbreak frequency as per the change of the spatial scope. Results: The results of this study are as follows: First, the suggested model was to analyze the correlation between the infection frequency and the number of senior leisure welfare facilities, the number of Public-use facilities, building area, total floor area, site area, height, building-to-land ratio, and floor area ratio varied as per the change of spatial scope. Second, correlation results varied between the infection frequency and the number of senior leisure welfare facilities, the number of Public-use facilities, building area, total floor area, site area, height, building-to-land ratio, and floor area ratio. Third, a negative correlation appeared in the analysis between the number of senior leisure welfare facilities and infection frequency. And positive correlations appeared noticeably in the study between the number of Public-use facilities, building area, total floor area, height, building-to-land ratio, and floor area ratio. Implications: This study can be used as primary data on the utilization of limited quarantine resources by analyzing the relationship between the Public-use facilities around the senior leisure welfare facilities and the spread of infectious diseases. In addition, it suggests that infectious disease prevention measures are necessary considering the spatial scope of the analysis area and the size of buildings.

Hacking and Countermeasure on Smart TV (스마트 TV 해킹 위협 및 대응방안 분석)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.313-317
    • /
    • 2014
  • Smart-phone, PC or tablet platforms, such as smart terminals spread to the masses trying to capitalize. Smart TV also is increasing. In Korea, market size of TV is growing fast with growth of risk of hacking. In this paper, several kinds of Smart TV hacking cases are presented with the possibility of attacks against the vulnerability analysis and countermeasures. Most of the Linux operating system is open. Thus, it is vulnerable for latest hacking techniques. Most are based on the Linux OS to enhance security mount Sand-Box. However, bypass procedure using the technique, or APT attacks can avoid San-Box technique. New hacking techniques and a variety of ways will occur in the future. Therefore, this paper will develop Smart TV, and it analysis of a security threat and establishes better prepared in the future because new hacking attacks are expected to prepare more.

Analysis of Privacy Violation Possibility of Partially Anonymized Big Data (온라인 상에 공개된 부분 익명화된 빅데이터의 프라이버시 침해 가능성 분석)

  • Jung, Kang-soo;Park, Seog;Choi, Dae-seon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.665-679
    • /
    • 2018
  • With the development of information and communication technology, especially wireless Internet technology and the spread of smart phones, digital data has increased. As a result, privacy issues which concerns about exposure of personal sensitive information are increasing. In this paper, we analyze the privacy vulnerability of online big data in domestic internet environment, especially focusing on portal service, and propose a measure to evaluate the possibility of privacy violation. For this purpose, we collected about 50 million user posts from the potal service contents and extracted the personal information. we find that potal service user can be identified by the extracted personal information even though the user id is partially anonymized. In addition, we proposed a risk measurement evaluation method that reflects the possibility of personal information linkage between service using partial anonymized ID and personal information exposure level.

Network based Anomaly Intrusion Detection using Bayesian Network Techniques (네트워크 서비스별 이상 탐지를 위한 베이지안 네트워크 기법의 정상 행위 프로파일링)

  • Cha ByungRae;Park KyoungWoo;Seo JaeHyun
    • Journal of Internet Computing and Services
    • /
    • v.6 no.1
    • /
    • pp.27-38
    • /
    • 2005
  • Recently, the rapidly development of computing environments and the spread of Internet make possible to obtain and use of information easily. Immediately, by opposition function the Hacker's unlawful intrusion and threats rise for network environments as time goes on. Specially, the internet consists of Unix and TCP/IP had many vulnerability. the security techniques of authentication and access controls cannot adequate to solve security problem, thus IDS developed with 2nd defence line. In this paper, intrusion detection method using Bayesian Networks estimated probability values of behavior contexts based on Bayes theory. The contexts of behaviors or events represents Bayesian Networks of graphic types. We profiled concisely normal behaviors using behavior context. And this method be able to detect new intrusions or modificated intrusions. We had simulation using DARPA 2000 Intrusion Data.

  • PDF

Analyzing Vulnerable Software Code Using Dynamic Taint and SMT Solver (동적오염분석과 SMT 해석기를 이용한 소프트웨어 보안 취약점 분석 연구)

  • Kim, Sungho;Park, Yongsu
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.3
    • /
    • pp.257-262
    • /
    • 2015
  • As software grows more complex, it contains more bugs that are not recognized by developers. Attackers can then use exploitable bugs to penetrate systems or spread malicious code. As a representative method, attackers manipulated documents or multimedia files in order to make the software engage in unanticipated behavior. Recently, this method has gained frequent use in A.P.T. In this paper, an automatic analysis method to find software security bugs was proposed. This approach aimed at finding security bugs in the software which can arise from input data such as documents or multimedia. Through dynamic taint analysis, how input data propagation to vulnerable code occurred was tracked, and relevant instructions in relation to input data were found. Next, the relevant instructions were translated to a formula and vulnerable input data were found via the formula using an SMT solver. Using this approach, 6 vulnerable codes were found, and data were input to crash applications such as HWP and Gomplayer.

AE Application for Fracture Behavior of SiC Reinforced CFRP Composites (SiC 강화 CFRP 복합재의 파괴거동에 관한 음향방출 적용)

  • Ryu, Yeong Rok;Yun, Yu Seong;Kwon, Oh Heon
    • Journal of the Korean Society of Safety
    • /
    • v.31 no.3
    • /
    • pp.16-21
    • /
    • 2016
  • Carbon Fiber Reinforced Plastic(CFRP) composite with a higher specific strength and rigidity is more excellent than conventional metallic materials or other organic polymer of FRP. It has been widely used in vehicles, aerospaces and high technology industries which are associated with nuclear power fields. However, CFRP laminated composite has several disadvantages as like a delamination, matrix brittleness and anisotropic fibers that are the weak points of the crack initiation. In this present work, the reinforced silicon carbide(SiC) particles were added to the interlayer of CFRP laminates in order to mitigate the physical vulnerability affecting the cracking and breaking of the matrix in the CFRP laminated composite because of excellent specific strength and thermal shock resistance characteristics of SiC. The 1wt% of SiC particles were spread into the CFRP prepreg by using a spray coating method. After that, CFRP prepregs were laminated for the specimen. Also, the twill woven type CFRP prepreg was used because it has excellent workability. Thus the mechanical and fracture behaviors of the twill woven CFRP laminated composite reinforced with SiC particles were investigated with the acoustic emission(AE) method under a fracture test. The results show that the SiC particles enhance the mechanical and fracture characteristics of the twill CFRP laminate composite.

Design and Implementation of Web-browser based Malicious behavior Detection System(WMDS) (웹 브라우저 기반 악성행위 탐지 시스템(WMDS) 설계 및 구현)

  • Lee, Young-Wook;Jung, Dong-Jae;Jeon, Sang-Hun;Lim, Chae-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.667-677
    • /
    • 2012
  • Vulnerable web applications have been the primary method used by the attackers to spread their malware to a large number of victims. Such attacks commonly make use of malicious links to remotely execute a rather advanced malicious code. The attackers often deploy malwares that utilizes unknown vulnerabilities so-called "zero-day vulnerabilities." The existing computer vaccines are mostly signature-based and thus are effective only against known attack patterns, but not capable of detecting zero-days attacks. To mitigate such limitations of the current solutions, there have been a numerous works that takes a behavior-based approach to improve detection against unknown malwares. However, behavior-based solutions arbitrarily introduced a several limitations that made them unsuitable for real-life situations. This paper proposes an advanced web browser based malicious behavior detection system that solves the problems and limitations of the previous approaches.

The Relationship between Individuals' Collectivistic Orientation and Social Distancing during the COVID-19 Crisis in Korea: The Mediating Role of Subjective Norm (코로나19 대유행 시기에 집단주의 성향과 사회적 거리두기 행동 간의 관계: 사회적 거리두기에 관한 주관적 규범의 매개효과)

  • Han, Jimin;Choi, Hoon-Seok
    • Korean Journal of Culture and Social Issue
    • /
    • v.27 no.3
    • /
    • pp.217-236
    • /
    • 2021
  • The present study examined the mediating role of the subjective norm about social distancing in the relationship between individuals' collectivistic orientation and their social distancing behavior during the early COVID-19 crisis in Korea. A total of 445 South Korean adults residing in Korea participated in a survey during which level 2 to 2.5 prevention policies were being enforced. Results indicated, as expected, that collectivism positively predicted the perceptions of subjective norm that supports social distancing, which in turn predicted positively individuals' participation in social distancing as prescribed by the central government. This result emerged regardless of the individuals' perception of personal vulnerability to COVID-19. We discuss implications of these findings and directions for future research regarding the link between individualism-collectivism and the behavioral immune system, along with the role of social distancing in effectively curbing the spread of corona virus during the pandemic.