• 제목/요약/키워드: Threat Model

검색결과 520건 처리시간 0.024초

Optimal Internet Worm Treatment Strategy Based on the Two-Factor Model

  • Yan, Xiefei;Zou, Yun
    • ETRI Journal
    • /
    • 제30권1호
    • /
    • pp.81-88
    • /
    • 2008
  • The security threat posed by worms has steadily increased in recent years. This paper discusses the application of the optimal and sub-optimal Internet worm control via Pontryagin's maximum principle. To this end, a control variable representing the optimal treatment strategy for infectious hosts is introduced into the two-factor worm model. The numerical optimal control laws are implemented by the multiple shooting method and the sub-optimal solution is computed using genetic algorithms. Simulation results demonstrate the effectiveness of the proposed optimal and sub-optimal strategies. It also provides a theoretical interpretation of the practical experience that the maximum implementation of treatment in the early stage is critically important in controlling outbreaks of Internet worms. Furthermore, our results show that the proposed sub-optimal control can lead to performance close to the optimal control, but with much simpler strategies for long periods of time in practical use.

  • PDF

An Adaptive Probe Detection Model using Fuzzy Cognitive Maps

  • Lee, Se-Yul;Kim, Yong-Soo
    • 한국지능시스템학회:학술대회논문집
    • /
    • 한국퍼지및지능시스템학회 2003년도 ISIS 2003
    • /
    • pp.660-663
    • /
    • 2003
  • The advanced computer network technology enables connectivity of computers through an open network environment. There has been growing numbers of security threat to the networks. Therefore, it requires intrusion detection and prevention technologies. In this paper, we propose a network based intrusion detection model using Fuzzy Cognitive Maps(FCM) that can detect intrusion by the Denial of Service(DoS) attack detection method adopting the packet analyses. A DoS attack appears in the form of the Probe and Syn Flooding attack which is a typical example. The Sp flooding Preventer using Fuzzy cognitive maps(SPuF) model captures and analyzes the packet information to detect Syn flooding attack. Using the result of analysis of decision module, which utilized FCM, the decision module measures the degree of danger of the DoS and trains the response module to deal with attacks. The result of simulating the "KDD ′99 Competition Data Set" in the SPuF model shows that the Probe detection rates were over 97 percentages.

  • PDF

Implementation of Telebiometrics Application System Using Mobile Device

  • Shin, Yong-Nyuo;Kim, Jae-Sung
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • 제14권1호
    • /
    • pp.34-40
    • /
    • 2014
  • Today, with the wide use of mobile devices, the amount of business transactions conducted through such devices is increasing drastically. However, there are several limitations in the area of authentication for mobile use, which requires strong authentication mechanisms to satisfy security and convenience requirements. The proposed model and application system provide a framework to ensure the security and reliability of the flow of biometric information for telebiometric applications using mobile devices. We also specify protocols for each model and implement a mobile telebiometric application to improve security vulnerabilities compared to storage in a microSD match on card (MOC) based on the proposed model. As a consequence of this implementation, we propose substantial guidelines for security countermeasures from both technical and managerial perspectives in order to establish a safe mobile environment for the use of telebiometric systems.

정수계획법을 이용한 최적 감시장비 배치모형에 관한 연구 (An Optimal Surveillance Units Assignment Model Using Integer Programming)

  • 서성철;정규련
    • 한국국방경영분석학회지
    • /
    • 제23권1호
    • /
    • pp.14-24
    • /
    • 1997
  • This study is to develop an optimal surveillance units assignment model in order to obtain the maximized surveillance efficiency with the limited surveillance units. There are many mathematical models which deal with problems to assign weapons such as aircrafts, missiles and guns to targets. These models minimize the lost required to attack, the threat forecast from the enemy, or both of them. However, a problem of the efficient assignment of surveillance units is not studied yet, nevertbless it is important in the battlefield surveillance system. This paper is concerned with the development of the optimal surveillance units assignment model using integer programming. An optimal integer solution of the model can be obtained by using linear programming and branch and bound method.

  • PDF

A Model to Investigate the Security Challenges and Vulnerabilities of Cloud Computing Services in Wireless Networks

  • Desta Dana Data
    • International Journal of Computer Science & Network Security
    • /
    • 제23권10호
    • /
    • pp.107-114
    • /
    • 2023
  • The study provides the identification of vulnerabilities in the security issues by Wireless Network. To achieve it the research focus on packet flow analysis, end to end data communication, and the security challenges (Cybercrime, insider threat, attackers, hactivist, malware and Ransomware). To solve this I have used the systematic literature review mechanisms and demonstrative tool namely Wireshark network analyzer. The practical demonstration identifies the packet flow, packet length time, data flow statistics, end- to- end packet flow, reached and lost packets in the network and input/output packet statics graphs. Then, I have developed the proposed model that used to secure the Wireless network solution and prevention vulnerabilities of the network security challenges. And applying the model that used to investigate the security challenges and vulnerabilities of cloud computing services is used to fulfill the network security goals in Wireless network. Finally the research provides the model that investigate the security challenges and vulnerabilities of cloud computing services in wireless networks

통합보안관리 시스템 보안성 평가모델 (Unified Threat Management System Security Evaluation Model)

  • 강상원;전인오;양해술
    • 한국산학기술학회:학술대회논문집
    • /
    • 한국산학기술학회 2009년도 추계학술발표논문집
    • /
    • pp.578-581
    • /
    • 2009
  • 본 논문에서는 통합보안관리 시스템에 대해서 주요 기능을 분석하고 시장동향을 조사하였으며, 기존의 소프트웨어 품질 평가 기술 및 표준화에 관한 연구를 추진하고, 통합보안관리 시스템의 보안성 품질 평가 모델을 개발하였다. 본 연구를 통하여 도출된 통합보안관리 시스템의 보안성 품질 평가 모델을 통하여 통합보안관리 시스템의 품질을 향상시키는데 중요한 역할을 할 것으로 본다.

  • PDF

시스템 상태 모형을 사용한 위협 탐지 기법 (Threat Detection Using System State Model)

  • 곽미라;조동섭
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2006년도 제37회 하계학술대회 논문집 D
    • /
    • pp.2087-2088
    • /
    • 2006
  • 사람의 분석에 의존하는 침입 탐지 기법은 침입의 특징 중 일부를 간과하거나 잘못 파악하여 오류의 여지를 가진다. 이에 우리는 시스템의 행태에서 나타나는 정보들이 그 자체에서 발견되는 위험의 조짐이 침입 탐지의 근거가 되는 시스템을 설계하고자 한다. 본 논문에서는 이러한 시스템을 위해 시스템의 상태 정보 수집, 수집 정보를 바탕으로 한 상태 모형의 구성과 이것의 침입 탐지를 위한 활용 방법을 제안한다.

  • PDF

전산망 사건을 이용한 침입 감지 및 감사 추적 시스템 설계 (Design of Intrusion Detection and Audit Trail System using Network Events)

  • 김기중;윤상훈;이용준;류근호
    • 한국정보처리학회논문지
    • /
    • 제4권9호
    • /
    • pp.2342-2353
    • /
    • 1997
  • 정보 산업의 급속한 발전에 따라, 컴퓨터 통신망을 통한 자료의 위협 및 손실에 대처하기 위한 방법중에 하나로서 현재 방호벽 시스템에 대한 연구가 활발히 진행되고 있다. 따라서, 이 논문에서는 효율적인 전산망 보호를 위하여 방호벽 시스템과 전산망 감사 추적 시스템과의 연계성을 통하여 전산망에 대한 위협 및 손실을 줄일 수 있는 방법 및 문제 발생시 사후 조치할 수 있는 시스템 모델을 제시하고자 한다. 또한, 감사 자료 분석을 위하여 감사 분석기에서 사용되는 데이터베이스의 유형과 감사 분석기의 실행 모델을 제시한다. 전산망 감사 추적 시스템은 불법 침입자에 대한 모든 활동을 감시함으로서, 침입 유형을 식별하고, 감사 자료를 분석하는 기능을 갖는다.

  • PDF

스마트폰 이용자의 악성코드용 모바일 백신 이용 의도에 영향을 미치는 요인 (The Factors Affecting Smartphone User's Intention to use Mobile Anti-Malware SW)

  • 장재영;김지동;김범수
    • 한국IT서비스학회지
    • /
    • 제13권2호
    • /
    • pp.113-131
    • /
    • 2014
  • Smartphone security threat has become an important issue in Information Science field following the wide distribution of smartphones. However, there are few studies related to such. Therefore, this study examined the factors affecting the intention of smartphone users to use the mobile vaccine against malware with the Protection Motivation Theory. To secure the reliability of the study, a surveying agency was commissioned. A total of 263 respondents, excluding 37 respondents who are users of iOS, which does not have mobile vaccine in the smart phone, or who gave invalid responses, were surveyed. The results showed that perception of the installed mobile vaccine significantly affected the Response Efficacy and Self-efficacy, and that the Perceived Severity, Perceived Vulnerability, Response Efficacy, and Self-efficacy significantly influenced the intention to use the mobile vaccine. On the other hand, Installation Perception of mobile vaccine itself did not affect the Perceived Severity and Perceived Vulnerability. This study is significant since it presented the new evaluation model of threat evaluation and response evaluation in the Protection Motivation Theory in accepting the security technology and raised the need for the promotion and exposure of mobile vaccine, since perception of mobile vaccine installation affects the response evaluation. It also found that the promotion must consider the seriousness of smartphone security, outstanding attribute of mobile vaccine, and user-friendliness of mobile vaccine above all.

안전한 공급망 관리를 위한 국방사이버보호 파트너십 인증 방안 연구 (A Study on the Citation of Defense Cyber Protection Partnership for Safe Supply Chain Management)

  • 김종화;김용철;김경민;강정흥
    • 융합보안논문지
    • /
    • 제19권3호
    • /
    • pp.101-107
    • /
    • 2019
  • 우리 군(軍)의 사이버 공간은 적들로부터 지속적인 위협을 받고 있다. 이러한 사이버 위협은 군(軍)이 보유하고 있는 정보화 자산을 대상으로 한 것으로 조직의 정보화 자산에 대한 안전성 확보는 매우 중요하다. 그러나 정보화 자산은 군(軍) 뿐만 아니라 어떠한 조직도 100% 자급자족할 수는 없기 때문에 공급망에 의한 정보화 자산 획득은 어쩔 수 없는 선택이다. 따라서 군 공급망에 대한 안전을 확보하기 위해 공급망 보호대책 검토 후, 이를 근거로 공급망 업체를 검증된 신뢰모델 기반의 파트너십 인증(引證)을 통해 군 공급망 안전을 확보하기 위한 방안을 제시하였다.