• Title/Summary/Keyword: Threat Security

Search Result 1,066, Processing Time 0.024 seconds

The Concept and Threat Analysis of Intrusion Detection System Protection Profile (침입탐지 시스템 보호프로파일의 개념 및 위협 분석)

  • 서은아;김윤숙;심민수
    • Convergence Security Journal
    • /
    • v.3 no.2
    • /
    • pp.67-70
    • /
    • 2003
  • Since IT industries grew, The information security of both individual and company has come to the front. But, nowadays, It is very hard to satisfy the diversity of security Protection Profile with simple Intrusion Detection System, because of highly developed Intrusion Skills. The Intrusion Detection System is the system that detects, reports and copes with of every kind of Intrusion actions immediately. In this paper, we compare the concept of IDS PPs and analyze the threat of PP.

  • PDF

A Review of IPTV Threats Based on the Value Chain

  • Lee, Hong-Joo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.2
    • /
    • pp.163-177
    • /
    • 2009
  • The demand for services using digital technology is constantly increasing as new developments in digital consumer electronics and the Internet are made. This is especially true in terms of the demand for IPTV utilizing high speed Internet networks. Research on IPTV threats is important for facilitating financial transactions via IPTV and preventing illegal use or copying of digital content. Thus, this paper analyzes IPTV threats via the IPTV value chain. That is, the distribution system for IPTV service is analyzed along with the components of the value chain and corresponding IPTV security requirements or security technologies, in order to perform a threat analysis and research suitable for the IPTV service environment. This paper has a greater focus on the value chain of the IPTV business than the approach in previous research, in order to analyze security requirements and technologies that are more applicable to the business environment.

KNN-Based Automatic Cropping for Improved Threat Object Recognition in X-Ray Security Images

  • Dumagpi, Joanna Kazzandra;Jung, Woo-Young;Jeong, Yong-Jin
    • Journal of IKEEE
    • /
    • v.23 no.4
    • /
    • pp.1134-1139
    • /
    • 2019
  • One of the most important applications of computer vision algorithms is the detection of threat objects in x-ray security images. However, in the practical setting, this task is complicated by two properties inherent to the dataset, namely, the problem of class imbalance and visual complexity. In our previous work, we resolved the class imbalance problem by using a GAN-based anomaly detection to balance out the bias induced by training a classification model on a non-practical dataset. In this paper, we propose a new method to alleviate the visual complexity problem by using a KNN-based automatic cropping algorithm to remove distracting and irrelevant information from the x-ray images. We use the cropped images as inputs to our current model. Empirical results show substantial improvement to our model, e.g. about 3% in the practical dataset, thus further outperforming previous approaches, which is very critical for security-based applications.

Sea Lines of Communication Security and Piracy (해상교통로(SLOC) 안보와 해적: 소말리아 해적퇴치작전 경험을 중심으로)

  • Kim, Meoung-Sung
    • Strategy21
    • /
    • s.36
    • /
    • pp.150-179
    • /
    • 2015
  • This thesis analyzes Somali piracy as a non-traditional threat to the Sea Lines of Communication (SLOC) and international countermeasures to the piracy. In an era of globally interdependent economies, the protection of sea lines and freedom of navigation are prerequisites for the development of states. Since the post-Cold War began in the early 1990s, ocean piracy has emerged as a significant threat to international trade. For instance, in the Malacca Strait which carries 30 percent of the world's trade volume, losses from failed shipping, insurance, plus other subsequent damages were enormous. Until the mid-2000s, navies and coast guards from Malaysia, Indonesia, Singapore, together with the International Maritime Organization (IMO), conducted anti-piracy operations in the Strait of Malacca. The combined efforts of these three maritime states, through information sharing and with reinforced assets including warships and patrol aircrafts, have successfully made a dent to lower incidents of piracy. Likewise, the United Nations' authorization of multinational forces to operate in Somali waters has pushed interdiction efforts including patrol and escort flotilla support. This along with self-reinforced security measures has successfully helped lower piracy from 75 incidents in 2012 to 15 in 2013. As illustrated, Somali piracy is a direct security threat to the international community and the SLOC which calls for global peacekeeping as a countermeasure. Reconstructing the economy and society to support public safety and stability should be the priority solution. Emphasis should be placed on restoring public peace and jurisdiction for control of piracy as a primary countermeasure.

Design for Zombie PCs and APT Attack Detection based on traffic analysis (트래픽 분석을 통한 악성코드 감염PC 및 APT 공격탐지 방안)

  • Son, Kyungho;Lee, Taijin;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.3
    • /
    • pp.491-498
    • /
    • 2014
  • Recently, cyber terror has been occurred frequently based on advanced persistent threat(APT) and it is very difficult to detect these attacks because of new malwares which cannot be detected by anti-virus softwares. This paper proposes and verifies the algorithms to detect the advanced persistent threat previously through real-time network monitoring and combinatorial analysis of big data log. In the future, APT attacks can be detected more easily by enhancing these algorithms and adapting big data platform.

Videogames in Cybersecurity: Philosophical and Psychological Review of Possible Impact

  • Bogdan, Levyk;Maletska, Mariia;Khrypko, Svitlana;Leonid, Kryvyzyuk;Olga, Dobrodum;Pasko, Katerina
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.249-256
    • /
    • 2021
  • An issue of security and threat is urgent as well as it concerns everyone: a person, community, state, etc. Today, the question of cybersecurity has become especially relevant due to general digitalization and the spread of the cyberculture. In terms of it, the growing popularity of videogames can be observed. Their impact on society differs significantly, therefore, it needs thorough consideration. The purpose of the article is to disclose the role of videogames in cybersecurity. To achieve the stated purpose, such methods as analysis, synthesis, systematization and practical involvement of videogames have been used. As a result, three levels of possible threat of videogames has been distinguished: videogames as a possibly dangerous software, as a tool of propaganda and spread of stereotypes, as a space for the creation of virtual communities. In conclusion, it is stated that videogames can be not only a threat, but also a tool for strengthening the cybersecurity.

A Study on the Criminal Threat and Privacy Protection with a Proxy Service (프록시 서비스를 통한 범죄 위협과 프라이버시 보호에 관한 연구)

  • Kang, Shin-Beom;Lee, Sang-Jin;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.317-326
    • /
    • 2012
  • Internet service provider is able to collect personal information to prevent the violations of the rights of service providers and customers using internet. But there are still many debates going on between a personal privacy and a regulation. Proxy servers are used in various technical purposes include bypass access. Although the proxy server users are increasing but there are not any proper institutional mechanisms and regulations to protect users. In this study, we discuss the two sides of a proxy service includes its privacy protection function and the cyber-crime threat and propose supplementary measures to mediate between the interests of public and private.

Cyber threat intelligence sharing system (사이버 위협 인텔리전스 공유 체계 연구)

  • Yang, Jun-ho;Kim, Chan-jin;Kim, Mee-yeon;Kim, Ji-hye;Kim, Jong-hyun;Youm, Heung-youl
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.647-650
    • /
    • 2018
  • With the advent of advanced technologies in the real world, the cyber domain has become wider and cyber threats are increasing. A cyber threat intelligence sharing system is needed to more effectively defend and respond to such cyber threats. Through the definition of cyber threat information expression standard, it enables rapid sharing, consistent analysis, and automated interpretation of cyber threat information possessed by individual security control providers or organizations.

  • PDF

Next Generation Convergence Security Framework for Advanced Persistent Threat (지능형 지속 위협에 대한 차세대 융합 보안 프레임워크)

  • Lee, Moongoo;Bae, Chunsock
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.9
    • /
    • pp.92-99
    • /
    • 2013
  • As a recent cyber attack has a characteristic that is intellectual, advanced, and complicated attack against precise purpose and specified object, it becomes extremely hard to recognize or respond when accidents happen. Since a scale of damage is very large, a corresponding system about this situation is urgent in national aspect. Existing data center or integration security framework of computer lab is evaluated to be a behind system when it corresponds to cyber attack. Therefore, this study suggests a better sophisticated next generation convergence security framework in order to prevent from attacks based on advanced persistent threat. Suggested next generation convergence security framework is designed to have preemptive responses possibly against APT attack consisting of five hierarchical steps in domain security layer, domain connection layer, action visibility layer, action control layer and convergence correspondence layer. In domain connection layer suggests security instruction and direction in domain of administration, physical and technical security. Domain security layer have consistency of status information among security domain. A visibility layer of Intellectual attack action consists of data gathering, comparison, decision, lifespan cycle. Action visibility layer is a layer to control visibility action. Lastly, convergence correspond layer suggests a corresponding system of before and after APT attack. An introduction of suggested next generation convergence security framework will execute a better improved security control about continuous, intellectual security threat.

The Design and Implementation of Simulated Threat Generator based on MITRE ATT&CK for Cyber Warfare Training (사이버전 훈련을 위한 ATT&CK 기반 모의 위협 발생기 설계 및 구현)

  • Hong, Suyoun;Kim, Kwangsoo;Kim, Taekyu
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.22 no.6
    • /
    • pp.797-805
    • /
    • 2019
  • Threats targeting cyberspace are becoming more intelligent and increasing day by day. To cope with such cyber threats, it is essential to improve the coping ability of system security officers. In this paper, we propose a simulated threat generator that automatically generates cyber threats for cyber defense training. The proposed Simulated Threat Generator is designed with MITRE ATT & CK(Adversarial Tactics, Techniques and Common Knowledge) framework to easily add an evolving cyber threat and select the next threat based on the threat execution result.