• Title/Summary/Keyword: Threat List

Search Result 37, Processing Time 0.038 seconds

The Threat List Acquisition Method in an Engagement Area using the Support Vector Machines (SVM을 이용한 교전영역 내 위협목록 획득방법)

  • Koh, Hyeseung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.19 no.2
    • /
    • pp.236-243
    • /
    • 2016
  • This paper presents a threat list acquisition method in an engagement area using the support vector machines (SVM). The proposed method consists of track creation, track estimation, track feature extraction, and threat list classification. To classify the threat track robustly, dynamic track estimation and pattern recognition algorithms are used. Dynamic tracks are estimated accurately by approximating a track movement using position, velocity and time. After track estimation, track features are extracted from the track information, and used to classify threat list. Experimental results showed that the threat list acquisition method in the engagement area achieved about 95 % accuracy rate for whole test tracks when using the SVM classifier. In case of improving the real-time process through further studies, it can be expected to apply the fire control systems.

Fuzzy Rule-Based Method for Air Threat Evaluation (적기의 위협 평가 자동화를 위한 퍼지 규칙 방법론)

  • Choi, Byeong Ju;Kim, Ji Eun;Kim, Jin Soo;Kim, Chang Ouk
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.19 no.1
    • /
    • pp.57-65
    • /
    • 2016
  • Threat evaluation is a process to estimate the threat score which enemy aerial threat poses to defended assets. The objective of threat evaluation is concerned with making an engagement priority list for optimal weapon allocation. Traditionally, the threat evaluation of massive air threats has been carried out by air defence experts, but the human decision making is less effective in real aerial attack situations with massive enemy fighters. Therefore, automation to enhance the speed and efficiency of the human operation is required. The automatic threat evaluation by air defense experts who will perform multi-variable judgment needs formal models to accurately quantify their linguistic evaluation of threat level. In this paper we propose a threat evaluation model by using a fuzzy rule-based inference method. Fuzzy inference is an appropriate method for quantifying threat level and integrating various threat attribute information. The performance of the model has been tested with a simulation that reflected real air threat situation and it has been verified that the proposed model was better than two conventional threat evaluation models.

A study on Classification of Insider threat using Markov Chain Model

  • Kim, Dong-Wook;Hong, Sung-Sam;Han, Myung-Mook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1887-1898
    • /
    • 2018
  • In this paper, a method to classify insider threat activity is introduced. The internal threats help detecting anomalous activity in the procedure performed by the user in an organization. When an anomalous value deviating from the overall behavior is displayed, we consider it as an inside threat for classification as an inside intimidator. To solve the situation, Markov Chain Model is employed. The Markov Chain Model shows the next state value through an arbitrary variable affected by the previous event. Similarly, the current activity can also be predicted based on the previous activity for the insider threat activity. A method was studied where the change items for such state are defined by a transition probability, and classified as detection of anomaly of the inside threat through values for a probability variable. We use the properties of the Markov chains to list the behavior of the user over time and to classify which state they belong to. Sequential data sets were generated according to the influence of n occurrences of Markov attribute and classified by machine learning algorithm. In the experiment, only 15% of the Cert: insider threat dataset was applied, and the result was 97% accuracy except for NaiveBayes. As a result of our research, it was confirmed that the Markov Chain Model can classify insider threats and can be fully utilized for user behavior classification.

Threat-Based Security Analysis for the Domestic Smart Home Appliance (위협 모델링을 이용한 국내 스마트 홈 보안 분석에 대한 연구)

  • Hong, Paul;Lee, Sangmin;Park, Minsu;Kim, Seungjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.3
    • /
    • pp.143-158
    • /
    • 2017
  • Smart Home Appliance which makes people to operate machines in the home by remote control is service or technology to provide convenience. It is close to home, so it has privacy problem and security problem. If Smart Home Applications is attacked, Scale of damage is anticipated. In case of products from overseas country, various vulnerability has been announced every year. Therefore, It is necessary to identify and to analysis threats of Smart Home Appliance using systematically method for using safe Smart home appliance service. In this paper, we present check list for identifying and analyzing threats using Threat Modeling and then we analyzed the Domestic Smart Home Appliance using check list which we present.

A Study on The Prediction of Security Threat using Open Vulnerability List (오픈 취약성 목록을 이용한 보안 위협 예측에 관한 연구)

  • Huh, Seung-Pyo;Lee, Dae-Sung;Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.3-10
    • /
    • 2011
  • Recently, due to a series of DDoS attacks, government agencies have enhanced security measures and business-related legislation. However, service attack and large network violations or accidents are most likely to occur repeatedly in the near future. In order to prevent this problem, researches must be conducted to predict the vulnerability in advance. The existing research methods do not state the specific data used for the base of the prediction, making the method more complex and imprecise. Therefore this study was conducted using the vulnerability data used for the basis of machine learning technology prediction, which were retrieved from a reputable organization. Also, the study suggested ways to predict the future vulnerabilities based on the weaknesses found in prior methods, and certified the efficiency using experiments.

Threats according to the Type of Software Updates and White-List Construction Scheme for Advanced Security (소프트웨어 업데이트 유형별 위협요소와 안전성 강화를 위한 화이트리스트 구성 방안)

  • Lee, Daesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.6
    • /
    • pp.1369-1374
    • /
    • 2014
  • In case of APT attacks, the update server is being used as a means of dissemination, the update program is running malicious code or data in applications such as anti-virus signature is vulnerable to manipulation, SW Update threat identification and prevention measures are urgently required. This paper presents a natiional and international SW update structure, update process exploits and response measures to examine, Through the extraction/analysis of a domestic famous SW update log, we are willing to select the necessary component of the normal program update to identify a white list.

Critiques of 'The Endangered and Protected Wild Species List in Korea' Proposed by Korea Ministry of Environment and Listing Process - Is This the Best Process for the Current National Management of Endangered Wildlife and Plants in Korea? - (2011년 환경부 멸종위기종 등록절차 및 대상 멸종위기종 식물 목록 재고-과연 현재 국가 멸종위기종 관리가 최선의 방안인가? -)

  • Kim, Hui;Lee, Byong Cheon;Kim, Yong Shik;Chang, Chin-Sung
    • Journal of Korean Society of Forest Science
    • /
    • v.101 no.1
    • /
    • pp.7-19
    • /
    • 2012
  • After having announced legislation for threatened or endangered species on the List of Endangered and Threatened Wildlife and Plants in 2005, the Korea Ministry of Environment proposed (in June 2011) amending the list, thereby delisting or reclassifying endangered species using new quantitative criteria for two levels (I and II), as well as status reviews. The new legislation included 40 species remained in their original endangered status, but 19 species were delisted, 5 species were proposed as candidates for delisting, 29 species were given a new endangered listing, and 3 species were proposed for an endangered listing in Korea. We assessed the threatened status of 98 plants using the IUCN Red List Criteria (version 3.1) at the global level, and compared the Ministry's revised criteria with the IUCN Red List Criteria and ESA criteria used in the USA. Most species proposed by the Ministry do not qualify as threatened and one of the major difficulties found in applying IUCN Red List Criteria at the global scale was a lack of knowledge on the status of species at broader geographic scales and the perceived difficulty this causes. Under the current classification process, many endangered species, such as Abeliophyllum distichum, Leontice microrhyncha, Echinosophora koreensis, Leontopodium coreanum, Iris odaesanensis, and Corylopsis coreana at global level were excluded here. Knowledge gaps and uncertainties mean that the number of taxa at high risk of extinction may be substantially greater than is currently understood. Due to a lack of information on its taxonomic status, currently there is controversy over the Red List status of Physocarpus insularis. Also, Caragana koreana, which was an invalidly published name, should be excluded here. Although the Korea Ministry of Environment insisted this procedure was conducted by applying the modified IUCN threat categories and definitions, this evaluation has been carried out based only on subjective views and misapplication of the IUCN Red List Criteria. The current listings by the Korea Ministry of Environment should be challenged. We suggest that broad species concepts on endemic species are applied and also criteria that adequately address the proper quantitative knowledge should be used. It is suggested that the highest priorities for the Red List should be given to endemic species at least in the Korean peninsula first at global scale.

A Study on Tracking Method for Command and Control Framework Tools (명령 제어 프레임워크 (Command and Control Framework) 도구 추적 방안에 대한 연구)

  • Hyeok-Ju Gwon;Jin Kwak
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.721-736
    • /
    • 2023
  • The Command and Control Framework was developed for penetration testing and education purposes, but threat actors such as cybercrime groups are abusing it. From a cyber threat hunting perspective, identifying Command and Control Framework servers as well as proactive responding such as blocking the server can contribute to risk management. Therefore, this paper proposes a methodology for tracking the Command and Control Framework in advance. The methodology consists of four steps: collecting a list of Command and Control Framework-related server, emulating staged delivery, extracting botnet configurations, and collecting certificates that feature is going to be extracted. Additionally, experiments are conducted by applying the proposed methodology to Cobalt Strike, a commercial Command and Control Framework. Collected beacons and certificate from the experiments are shared to establish a cyber threat response basis that could be caused from the Command and Control Framework.

International Case Study and Strategy Proposal for IUCN Red List of Ecosystem(RLE) Assessment in South Korea (국내 IUCN Red List of Ecosystem(생태계 적색목록) 평가를 위한 국제 사례 연구와 전략 제시)

  • Sang-Hak Han;Sung-Ryong Kang
    • Journal of Wetlands Research
    • /
    • v.25 no.4
    • /
    • pp.408-416
    • /
    • 2023
  • The IUCN Red List of Ecosystems serves as a global standard for assessing and identifying ecosystems at high risk of biodiversity loss, providing scientific evidence necessary for effective ecosystem management and conservation policy formulation. The IUCN Red List of Ecosystems has been designated as a key indicator (A.1) for Goal A of the Kunming-Montreal Global Biodiversity Framework. The assessment of the Red List of Ecosystems discerns signs of ecosystem collapse through specific criteria: reduction in distribution (Criterion A), restricted distribution (Criterion B), environmental degradation (Criterion C), changes in biological interaction (Criterion D), and quantitative estimation of the risk of ecosystem collapse (Criterion E). Since 2014, the IUCN Red List of Ecosystems has been evaluated in over 110 countries, with more than 80% of the assessments conducted in terrestrial and inland water ecosystems, among which tropical and subtropical forests are distributed ecosystems under threat. The assessment criteria are concentrated on spatial signs (Criteria A and B), accounting for 68.8%. There are three main considerations for applying the Red List of Ecosystems assessment domestically: First, it is necessary to compile applicable terrestrial ecosystem types within the country. Second, it must be determined whether the spatial sign assessment among the Red List of Ecosystems categories can be applied to the various small-scale ecosystems found domestically. Lastly, the collection of usable time series data (50 years) for assessment must be considered. Based on these considerations, applying the IUCN Red List of Ecosystems assessment domestically would enable an accurate understanding of the current state of the country's unique ecosystem types, contributing to global efforts in ecosystem conservation and restoration.

Reconsideration of Rare and Endangered Plant Species in Korea Based on the IUCN Red List Categories (IUCN 적색목록 기준에 의한 환경부 멸종위기 야생식물종에 대한 평가)

  • Chang, Chin-Sung;Lee, Heung-Soo;Park, Tae-Yoon;Kim, Hui
    • The Korean Journal of Ecology
    • /
    • v.28 no.5
    • /
    • pp.305-320
    • /
    • 2005
  • Recently 64 species in Korea have been ranked as rare and endangered taxa by the Ministry of Environment using two categories, I and II. The original threat categories produced by the Ministry of Environment were developed to provide a standard for specifying animals and plants in danger of extinction and has been influential sources of information used in species conservation in Korea. However, the criteria by Ministry of Environment were applied to the whole taxa only by regional boundaries, especially in South Korea, rather than international context, and it also lacked an explicit framework that was necessary to ensure repeatability among taxa because of the absence of quantitative criteria to measure the likelihood of extinction. The World Conservation Union (IUCN) has developed quantitative criteria for assessing the conservation status of species. The threatened species categories, the 2000 IUCN Red List, proposed by SSC (Species Survival Commission) of IUCN have become widely recognized internationally. Details of threatened Korean plants, identified by applying the IUCN threat categories and definitions, were listed and analyzed. The number of species identified as threatened was only 34 out of 64 taxa (48.4%), while the rest of taxa were rejected from the original lists. Many of the species (51.6%, 33 taxa) excluded from the original list proposed by Ministry of Environment do not qualify as Critically Endangered, Endangered or Vulnerable because these taxa were widely distributed either in Japan or in China/far eastern Russia and there is no evidence of substantial decline in these countries. An evaluation of taxa in Korea has been carried out only based on subjective views and qualitative data, rather than quantitative scientific data, such as rates of decline, distribution range size, population size, and risk of extinction. Therefore, the national lists undermine the credibility of threatened species lists and invite misuse, which have been raised by other cases, qualitative estimate of risk, political influence, uneven taxonomic or geographical coverage. The increasing emphasis on international responsibilities means that global scale is becoming more significant. The current listings by Environment of Ministry of Korea should be challenged, and the government should seek to facilitate the resolution of disagreements. Especially the list should be flexible enough to handle uncertainty and also incorporates detailed, quantitative data. It is suggested that the highest priorities for the Red List should be given to endemic species in Korea first. After setting up the list of endemic species to Korea, quantitative data on population size and structure, distributional range, rated of decline, and habitat fragmentation should be collected as one of long term projects for the Red list categories. Transparency and accountability are the most important key factors. Also, species assessors are named and data sources referenced are required for the future objective evaluations on Korean plant taxa.