• Title/Summary/Keyword: Threat Security

Search Result 1,066, Processing Time 0.027 seconds

Study on the countermeasures of the runway bombing using the mobile runway (이동식 활주로를 이용한 활주로 폭격 대응 방안에 관한 연구)

  • Seong, Min Cheol;Kim, Yongchul
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.35-41
    • /
    • 2019
  • Considering North Korea's strategy, North Korea's top hitting target in the event of a war is likely to be the main goal of the air force runway to neutralize the air force. As a countermeasure, there are emergency runway construction and runway emergency recovery operations. However, emergency runway construction is mainly intended for emergency landing and fueling and rearmament. The emergency runway restoration operation has also several limitations considering North Korea's threatening missile level, recovery time, and so on, so it cannot respond quickly to the North's runway bombing. In this study, we first describe the threat of North Korea's missiles and their air defense capabilities. Then the concept and limitations of the mobile runway, which is the next generation countermeasure, are presented.

Recent Developments in Piracy Attacks and Counter-Efforts of the International Community (해적행위의 최근 발생 동향과 국제사회의 대응)

  • Kim, Suk-Kyoon
    • Strategy21
    • /
    • s.41
    • /
    • pp.85-107
    • /
    • 2017
  • The purpose of this article is to explore recent developments in piracy attacks at the global level. This article provides an overview of global trend of recent piracy attacks and presents global counter-piracy efforts at the international and governmental as well as industry level. The issue of piracy has been a grave concern of the globe, becoming the biggest threat to the safety and security navigation and seaborne trade. Overall, piracy attacks in recent years have greatly diminished owing to multi-faceted counter-piracy efforts. However, Southeast Asia and West Africa have reemerged as an hotspot of piracy. A worrisome trend in these regions is that many of piracy attacks are committed by militant groups for financing their activities. As a result, the level of violence and the sophistication of attacks have escalated. The problem of contemporary piracy is beyond a particular region or coastal state, but a common concern of the international community. In order to address the global piracy problem, international cooperation should be further strengthened at the global level as well as the regional level. As a way of counter-piracy measures in Southeast Asian waters, the creation of a joint regional coast guard to patrol the highly piracy concentration areas needs to be considered.

Threats of MANPADS and Its Counter-Measures

  • Choi, Jin-Tai
    • International Journal of Contents
    • /
    • v.6 no.3
    • /
    • pp.89-96
    • /
    • 2010
  • The International air transportation industry provides a vital communication link which brings prosperity to many states in our modern age. This invaluable link has been threatened by terrorism. Airlines have been one of the most attractive targets in the eyes of terrorists for several reasons, including particularly the international and symbolic nature of aviation, and the potential of multigovernmental involvement which can inevitably generate wide publicity. Terrorist attacks against civil aviation have been committed since the earliest days of civil aviation history. The first attack against civil aircraft dates back to the early 1930s. Since then, aircraft hijacking and other forms of attack against air transport operations have become one of the most serious challenges to the safety of flying. In recent years, a new form of threats against civil aviation has appeared. Man-portable air defense systems (MANPADS) in the hands of criminals, terrorists, and other non-state actors pose a serious potential threat to passenger air travel, the commercial aviation industry, and military aircraft around the world. The purpose of this study is to provide some countermeasures against such attacks. In order to foster a better understanding of the problem, an introduction of MANPADS and a brief history of attacks using MANPADS are presented. It also examines the level of threats, trends of attacks using MANPADS and the possible countermeasures to be taken by the international community.

Survey on Phishing using Malicious Code in Internet Banking (인터넷 뱅킹에서 악성코드를 이용한 피싱에 관한 연구)

  • Kim, Ji Hyun;Lee, Dong-hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.753-756
    • /
    • 2012
  • The type of phishing changes rapidly and also threat model changes very fastly Accordingly, frauds develop new methods of attacks to avoid the counterparts. Recently, the type of phishing in internet banking is developing specifically. In this paper, to help encounter for it, we first review the meaning of phishing and the types of attacks in phishing in the second chapter,and in the third chapter, we will analyze phishing which is using malicious code in internet banking,and in the fourth chapter, we will describe the conclusion of this paper.

  • PDF

Individual users based SmartPhone Remote Management System Design and Implementation (개인사용자 기반 스마트폰 원격관리 시스템 설계 및 구현)

  • Kang, Sung-Tae;Jo, In-June
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.12
    • /
    • pp.2675-2681
    • /
    • 2012
  • By increasing of the population that uses smartphones, problems such as the leakage of private and confidential information due to portable and easy to store and movement of diverse contents occur for a variety of security threats. In this report, it provides helpful information to customers in order to respond various security threat by implementing and designing an remote administration system with using Mobile Device Management (MDM), technology. As a result, customers themselves can prevent information spill by managing remotely from WEB due to the lost and stolen. It is also possible to use control and monitoring.

A Comparative Study on Function and Performance of Snort and Suricata (Snort와 Suricata의 탐지 기능과 성능에 대한 비교 연구)

  • Jeong, Myeong Ki;Ahn, Seongjin;Park, Won Hyung
    • Convergence Security Journal
    • /
    • v.14 no.5
    • /
    • pp.3-8
    • /
    • 2014
  • We have tried to compare two different IDSs which are widespread over the network administrator, Snort and Suricata, in functional and performance aspects. Specifically, we focused on analyzing upon what functions for detecting threat were added newly and what Multi-Threading introduced newly for Suricata has influenced in a performance aspect. As a result, we could discover that there are some features in Suricata which has never existed in Snort such as Protocol Identification, HTTP Normalizer & Parser, and File Identification. Also, It was proved that the gap of PPS(Packets Per Second) becomes wider, as the number of CPU Cores which are working increase. Therefore, we could conclude that Suricata can be an efficient alternative for Snort considering the result that Suricata is more effective quantitatively as well as qualitatively.

Thinking about the training system of R.O.K. reserved force in the future (미래형 예비군 훈련체제 정립에 관한 연구)

  • Jeong, Won-Young
    • Journal of National Security and Military Science
    • /
    • s.5
    • /
    • pp.47-85
    • /
    • 2007
  • Reserved force's training(RFT) is undoubtedly the critical component to increase the national capability in case of emergency. It is because RFT plays an important role in maintaining the peace for the Korean peninsula as the key deterrence force power for more than 40 years. Considering the reserved force reform linked with the goal and the plan of Korean Defense Reform 2020', we can expect the utility of the reserved force as the potential combat power to make national defense resources more efficient and useful. In that sense, this study suggests some solutions to promote the reserved force's competency to demonstrate the ROK Armed Force's combat power as the equivalent partner with the active force as well as the future deterrence power. This study also analyzes the present training system including law and regulation, identifies some implications through the literature review, and designs the future ROK reserved force's training system by extracting new variables forecasting the future environment for national defense. In addition, this study includes its concerned systems generally without limiting the scope into the reserved force. Therefore we try to seek to prepare for mobilization readiness and to promote regional hometown defense capability in order to cope with the enemy's threat in case of emergency.

  • PDF

Unification of the Korean Peninsula and Military Integration Focusing on the Military Tasks (한반도 통일과 군사통합 (군사적 과제를 중심으로))

  • Han, Kwan Soo
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.125-134
    • /
    • 2015
  • This study aims to investigate what to be prepared and implemented for the military integration when South and North Korea are making progress toward unification. Although we can not exactly predict when the unification will be completed at this time, preparations for the military integration should be ready ahead of time. Since the failure of the military integration can threat the unification, elaborated and practical solutions are required. Therefore, the study tries to answer the following questions : 1) What types of the military integration are desirable and what are the prerequisites for the unification of Korean Peninsular? ; 2) What potential military tasks could be caused by military integration? ; 3) What are the core and major tasks among them and how could they be solved in practical aspects?

Design and implementation of an improved MA-APUF with higher uniqueness and security

  • Li, Bing;Chen, Shuai;Dan, Fukui
    • ETRI Journal
    • /
    • v.42 no.2
    • /
    • pp.205-216
    • /
    • 2020
  • An arbiter physical unclonable function (APUF) has exponential challenge-response pairs and is easy to implement on field-programmable gate arrays (FPGAs). However, modeling attacks based on machine learning have become a serious threat to APUFs. Although the modeling-attack resistance of an MA-APUF has been improved considerably by architecture modifications, the response generation method of an MA-APUF results in low uniqueness. In this study, we demonstrate three design problems regarding the low uniqueness that APUF-based strong PUFs may exhibit, and we present several foundational principles to improve the uniqueness of APUF-based strong PUFs. In particular, an improved MA-APUF design is implemented in an FPGA and evaluated using a well-established experimental setup. Two types of evaluation metrics are used for evaluation and comparison. Furthermore, evolution strategies, logistic regression, and K-junta functions are used to evaluate the security of our design. The experiment results reveal that the uniqueness of our improved MA-APUF is 81.29% (compared with that of the MA-APUF, 13.12%), and the prediction rate is approximately 56% (compared with that of the MA-APUF (60%-80%).

A Study on the Improvement of Bayesian networks in e-Trade (전자무역의 베이지안 네트워크 개선방안에 관한 연구)

  • Jeong, Boon-Do
    • International Commerce and Information Review
    • /
    • v.9 no.3
    • /
    • pp.305-320
    • /
    • 2007
  • With expanded use of B2B(between enterprises), B2G(between enterprises and government) and EDI(Electronic Data Interchange), and increased amount of available network information and information protection threat, as it was judged that security can not be perfectly assured only with security technology such as electronic signature/authorization and access control, Bayesian networks have been developed for protection of information. Therefore, this study speculates Bayesian networks system, centering on ERP(Enterprise Resource Planning). The Bayesian networks system is one of the methods to resolve uncertainty in electronic data interchange and is applied to overcome uncertainty of abnormal invasion detection in ERP. Bayesian networks are applied to construct profiling for system call and network data, and simulate against abnormal invasion detection. The host-based abnormal invasion detection system in electronic trade analyses system call, applies Bayesian probability values, and constructs normal behavior profile to detect abnormal behaviors. This study assumes before and after of delivery behavior of the electronic document through Bayesian probability value and expresses before and after of the delivery behavior or events based on Bayesian networks. Therefore, profiling process using Bayesian networks can be applied for abnormal invasion detection based on host and network. In respect to transmission and reception of electronic documents, we need further studies on standards that classify abnormal invasion of various patterns in ERP and evaluate them by Bayesian probability values, and on classification of B2B invasion pattern genealogy to effectively detect deformed abnormal invasion patterns.

  • PDF