• Title/Summary/Keyword: Threat Analysis

Search Result 976, Processing Time 0.024 seconds

A Study on the Simplified Estimating Method of Off-site Consequence Analysis by Concentration of Hydrochloric Acid (염산수용액의 농도별 간이 영향 평가 방법 연구)

  • Jung, Y.k.;Kim, B.;Heo, H.;Yoo, B.;Sin, C.;Yoon, Y.;Yoon, J.;Ma, B.
    • Journal of the Korean Society of Safety
    • /
    • v.32 no.2
    • /
    • pp.52-58
    • /
    • 2017
  • One of the most important elements of the management of chemical accident is threat zone estimation of fires, explosions and toxic gas dispersion based on chemical releases. The threat zone estimation is going to be standard of emergency response for the first defender and base line data of off-site risk assesment (hereinafter referred to as "ORA") and risk management plan (hereinafter referred to as "RMP"). Generally, ALOHA form EPA(U.S.) and Kora(from KOREA MINISTRY OF ENVIRONMENT) has been used for the off-site consequence analysis in Korea. However it is hard to predict accurate consequences rapidly in case of emergency. Hydrochloric acid is a multipurpose raw material used in many industrial applications such as chemical, metal and food industries. It is usually treated in concentrations from 10 ~ 35 %, and release accident have occurred frequently. In this study, we have developed a simplified estimating method and equation to calculate threat zone easily in case of emergency due to release accident of hydrochloric acid.

Malware Detection Using Deep Recurrent Neural Networks with no Random Initialization

  • Amir Namavar Jahromi;Sattar Hashemi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.177-189
    • /
    • 2023
  • Malware detection is an increasingly important operational focus in cyber security, particularly given the fast pace of such threats (e.g., new malware variants introduced every day). There has been great interest in exploring the use of machine learning techniques in automating and enhancing the effectiveness of malware detection and analysis. In this paper, we present a deep recurrent neural network solution as a stacked Long Short-Term Memory (LSTM) with a pre-training as a regularization method to avoid random network initialization. In our proposal, we use global and short dependencies of the inputs. With pre-training, we avoid random initialization and are able to improve the accuracy and robustness of malware threat hunting. The proposed method speeds up the convergence (in comparison to stacked LSTM) by reducing the length of malware OpCode or bytecode sequences. Hence, the complexity of our final method is reduced. This leads to better accuracy, higher Mattews Correlation Coefficients (MCC), and Area Under the Curve (AUC) in comparison to a standard LSTM with similar detection time. Our proposed method can be applied in real-time malware threat hunting, particularly for safety critical systems such as eHealth or Internet of Military of Things where poor convergence of the model could lead to catastrophic consequences. We evaluate the effectiveness of our proposed method on Windows, Ransomware, Internet of Things (IoT), and Android malware datasets using both static and dynamic analysis. For the IoT malware detection, we also present a comparative summary of the performance on an IoT-specific dataset of our proposed method and the standard stacked LSTM method. More specifically, of our proposed method achieves an accuracy of 99.1% in detecting IoT malware samples, with AUC of 0.985, and MCC of 0.95; thus, outperforming standard LSTM based methods in these key metrics.

A Study on Graph-Based Heterogeneous Threat Intelligence Analysis Technology (그래프 기반 이기종 위협정보 분석기술 연구)

  • Ye-eun Lee;Tae-jin Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.3
    • /
    • pp.417-430
    • /
    • 2024
  • As modern technology advances and the proliferation of the internet continues, cyber threats are also on the rise. To effectively counter these threats, the importance of utilizing Cyber Threat Intelligence (CTI) is becoming increasingly prominent. CTI provides information on new threats based on data from past cyber incidents, but the complexity of data and changing attack patterns present significant analytical challenges. To address these issues, this study aims to utilize graph data that can comprehensively represent multidimensional relationships. Specifically, the study constructs a heterogeneous graph based on malware data, and uses the metapath2vec node embedding technique to more effectively identify cyber attack groups. By analyzing the impact of incorporating topology information into traditional malware data, this research suggests new practical applications in the field of cyber security and contributes to overcoming the limitations of CTI analysis.

The Concept and Threat Analysis of Intrusion Detection System Protection Profile (침입탐지 시스템 보호프로파일의 개념 및 위협 분석)

  • 서은아;김윤숙;심민수
    • Convergence Security Journal
    • /
    • v.3 no.2
    • /
    • pp.67-70
    • /
    • 2003
  • Since IT industries grew, The information security of both individual and company has come to the front. But, nowadays, It is very hard to satisfy the diversity of security Protection Profile with simple Intrusion Detection System, because of highly developed Intrusion Skills. The Intrusion Detection System is the system that detects, reports and copes with of every kind of Intrusion actions immediately. In this paper, we compare the concept of IDS PPs and analyze the threat of PP.

  • PDF

Analysis of Cyber Threat Level based on Indicator of Compromise (침해지표 기반의 사이버 위협수준 분석)

  • Cho, Hyeisun;Lee, Seulgi;Kim, Nakhyun;Kim, Byungik;Yoo, Dongyoung;Kim, Moon-Hyun
    • Annual Conference of KIPS
    • /
    • 2017.04a
    • /
    • pp.291-294
    • /
    • 2017
  • 최근 국내에서 신 변종 공격이 대량으로 발생함에 따라, 한정적인 보안전문 인력과 기존의 장비로 분석 및 대응하는데 어려움이 있다. 본 논문에서는, 대량으로 발생하는 침해사고에 대해 분석 우선순위를 확인하고자, 침해사고에 활용된 침해지표들의 위협을 분석하고 이를 정량적인 값인 침해지표 위협수준(TL_IoC, Threat Level of IoC)로 도출하는 방안을 제안한다. 이를 통해, 침해지표의 위협수준을 직관적으로 확인함으로써 침해사고의 대응수준을 신속하게 판단하고, 위협수준이 높은 침해사고에 대해 능동적으로 빠르게 분석함으로써 대량의 침해사고를 효율적으로 대응할 수 있다.

Structural robustness of RC frame buildings under threat-independent damage scenarios

  • Ventura, Antonio;De Biagi, Valerio;Chiaia, Bernardino
    • Structural Engineering and Mechanics
    • /
    • v.65 no.6
    • /
    • pp.689-698
    • /
    • 2018
  • This study focuses on a novel procedure for the robustness assessment of reinforced concrete (RC) framed structures under threat-independent damage scenarios. The procedure is derived from coupled dynamic and non-linear static analyses. Two robustness indicators are defined and the method is applied to two RC frame buildings. The first building was designed for gravity load and earthquake resistance in accordance with Eurocode 8. The second was designed according to the tie force (TF) method, one of the design quantitative procedures for enhancing resistance to progressive collapse. In addition, in order to demonstrate the suitability and applicability of the TF method, the structural robustness and resistance to progressive collapse of the two designs is compared.

A Research on the LYNX-ESM System Operating and Performance Prediction Simulation Based on DEVS (이산사건 모델링 및 시뮬레이션 기반 LYNX-ESM 체계 시뮬레이션에 관한 연구)

  • Shin, Dong-Cho;Yun, Ki-Cheonn
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.9 no.4
    • /
    • pp.61-70
    • /
    • 2006
  • This paper is to describe LYNX-ESM Simulation System to simulate for EW operating environment analysis and system performance verification of LYNX-ESM system using Discrete Event Simulation(DEVS) Methodology. This system consists of 3 PC with TCP/IP network. Each PC is loaded with Modeling & Simulation program based DEVS. Each connected program conducts EW simulation. As a result, we analyze the operating environment of the maritime EW threat, simulate the EW threat discrimination and geolocation capability, and estimate the LYNX-ESM system effectiveness before real LYNX-ESM system development.

Analysis on Presidential Security Threat of Cyber Physical System by Cyber Attack Focusing Intelligent Building System (사이버물리시스템에 대한 사이버공격 경호위협 분석 - 지능형건물관리시스템을 중심으로 -)

  • Choi, Junesung;Lee, Sam Youl
    • Journal of IKEEE
    • /
    • v.24 no.2
    • /
    • pp.669-672
    • /
    • 2020
  • In this paper, we analyzed the characteristics of cyber attacks and major threat scenarios that could occur around intelligent building management Systems(IBS) by cyber attack security threats against cyber physics systems. Generally determined that lowering the likelihood of aggression against predictable threats would be a more realistic approach to attack response. The countermeasures against this need to be applied to multi-layered defense systems, and three alternatives were proposed: preliminary cyber safety diagnosis for protection targets and the establishment of mobile security control systems.

A Study on the Mission Effect of a Sea-based BMD system (해상기반 탄도미사일 방어체계의 임무효과에 관한 연구)

  • Lee, Kyoung Haing;Choi, Jeong Hwan
    • Journal of Aerospace System Engineering
    • /
    • v.10 no.1
    • /
    • pp.118-126
    • /
    • 2016
  • North Korea has continued developing ballistic missiles with various ranges. Even through the recent launch long-range missiles, it can be inferred that North Korea's Missile technology has reached a level where it can even threaten the US. moreover, through the three times nuclear tests, North Korea is known to have succeeded at gaining 10~20KT of explosive power as well as the minimization and lightening of nuclear warhead. Considering the short length of war zone in Korean peninsula and the possibility of nuclear equipment, if be the most severe threat across the whole peninsula. Since the midcourse phase flight takes the longest time, ROK should establish the ability to intercept at this middle phase. From this perspective, this paper describes mission effect of a sea-based BMD system through empirical threat and flight characteristic analysis using MIT model that was not suggested in original research.

Reliability Analysis of Interleaved Memory with a Scrubbing Technique (인터리빙 구조를 갖는 메모리의 스크러빙 기법 적용에 따른 신뢰도 해석)

  • Ryu, Sang-Moon
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.20 no.4
    • /
    • pp.443-448
    • /
    • 2014
  • Soft errors in memory devices that caused by radiation are the main threat from a reliability point of view. This threat can be commonly overcome with the combination of SEC (Single-Error Correction) codes and scrubbing technique. The interleaving architecture can give memory devices the ability of tolerating these soft errors, especially against multiple-bit soft errors. And the interleaving distance plays a key role in building the tolerance against multiple-bit soft errors. This paper proposes a reliability model of an interleaved memory device which suffers from multiple-bit soft errors and are protected by a combination of SEC code and scrubbing. The proposed model shows how the interleaving distance works to improve the reliability and can be used to make a decision in determining optimal scrubbing technique to meet the demands in reliability.