• Title/Summary/Keyword: Threat Security

Search Result 1,066, Processing Time 0.025 seconds

A Model for Power Quality Control Mechanism for Electric Power Market (전력시장체제하에서의 전력품질제어 메커니즘에 대한 모델링)

  • 이근준
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.52 no.7
    • /
    • pp.381-386
    • /
    • 2003
  • To provide a specified power quality under electric market system is becoming an important issue for customers and utility company. However, there is no realistic infra-structure to design a power system for the specified power quality. Present electric market is operating under the economic point of view. The low power price could be attractive, but the effect of low price could result the lower power quality for the long time and threat power system security. This paper presents a model which conceptualize the dynamic power quality control mechanism to minimize total cost of a society which is affected electric power quality. This model aims to produce a basic infra-structure to balance cost and quality under the electric market system.

An Adaptive Probe Detection Model using Fuzzy Cognitive Maps

  • Lee, Se-Yul;Kim, Yong-Soo
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.660-663
    • /
    • 2003
  • The advanced computer network technology enables connectivity of computers through an open network environment. There has been growing numbers of security threat to the networks. Therefore, it requires intrusion detection and prevention technologies. In this paper, we propose a network based intrusion detection model using Fuzzy Cognitive Maps(FCM) that can detect intrusion by the Denial of Service(DoS) attack detection method adopting the packet analyses. A DoS attack appears in the form of the Probe and Syn Flooding attack which is a typical example. The Sp flooding Preventer using Fuzzy cognitive maps(SPuF) model captures and analyzes the packet information to detect Syn flooding attack. Using the result of analysis of decision module, which utilized FCM, the decision module measures the degree of danger of the DoS and trains the response module to deal with attacks. The result of simulating the "KDD ′99 Competition Data Set" in the SPuF model shows that the Probe detection rates were over 97 percentages.

  • PDF

Easy Keypad - Soft Keyboard for Login Information Input in Smart Devices (쉬운 키패드 - 스마트 기기에서 사용하는 로그인 정보 입력만을 위한 소프트키보드)

  • Koh, Hyung Dae
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.2
    • /
    • pp.107-120
    • /
    • 2014
  • In this paper, we suggest a soft keyboard, called easy keypad, that we use only for login information input in smart devices. Especially, as easy keypad is applied to MTS(Mobile Trading System) we suggest easy keypad in MTS. Easy keypad UI in MTS represents 20 letters and users input login information by using 20 letters. We suggest protocol which decides letters represented in easy keypad UI, which is code for users to input login information by using 20 letters. We analyze easy keypad's safe degree for soft keyboard security threat, especially when it comes to point hacking, we suggest comparison among original soft keyboard's safe degree. Also we suggest mathematical fomula for measuring soft keyboard's convenience and then we analyze the result of soft keyboard's convenience by the presented mathematical formula.

네트워크 주소 변이 기반 Moving Target Defense 연구 동향

  • Woo, Samuel;Park, Kyungmin;Moon, Daesung;Kim, Ikkyun
    • Review of KIISC
    • /
    • v.28 no.2
    • /
    • pp.5-11
    • /
    • 2018
  • 지능형 지속 위협(Advanced Persistent Threat) 공격은 Intrusion Kill Chain과 같은 일련의 단계로 구성되어 있기 때문에 특정 단계가 차단되면 공격은 실패하게 된다. Moving Target Defense(MTD)는 보호대상의 주요 속성(네트워크, 운영체제, 소프트웨어, 데이터)을 변화시켜 Intrusion Kill Chain을 구성하는 각 단계를 차단하는 능동적 사전 보안 기술이다. MTD 전략 중에서 네트워크 주소 변이(Network Address Mutation) 기술은 보호대상의 네트워크 주소(IP. Port)를 능동적으로 변이하는 기술로써, Intrusion Kill Chain의 첫 단계인 정찰(Reconnaissance) 행위에 소요되는 비용을 급격하게 증가시킬 수 있는 효율적인 보안 기술이다. 본 논문은 네트워크 주소 변이 기술 분야의 관련 연구들을 살펴보고 네트워크 주소 변이 기술 설계 시 고려해야하는 보안 요구사항과 기능 요구사항을 제안한다.

Optimal Operation Algorithm for Wind Farms Based on Nonlinear Interior Point Method (비선형내점법 기반의 풍력발전단지 최적운용 알고리즘)

  • Lee, Seung-Min;Song, Hwa-Chang;Lee, Jang-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2011.07a
    • /
    • pp.694-695
    • /
    • 2011
  • The recent concerns over the threat of global climate change and the requirements of national reduction of $CO_2$ emission have led to the diversification of energy resources and a large scale integration of renewable resources. In these circumstances, the policy decision currently made by the government sector includes several programs to promote the equipment of large scale generating assets to use wind energy. However, the power systems and wind farms need such innovative operation scheme schemes that maintain an adequate level of system security for continuing growth of renewable resources. This paper presents a method for determining optimal operating points for wind farms by making use of a nonlinear interior point method.

  • PDF

A Study on Automatic Detection and Extraction of Unstructured Security Threat Information using Deep Learning (딥러닝 기술을 이용한 비정형 보안 위협정보 자동 탐지 및 추출 기술 연구)

  • Hur, YunA;Kim, Gyeongmin;Lee, Chanhee;Lim, HeuiSeok
    • Annual Conference on Human and Language Technology
    • /
    • 2018.10a
    • /
    • pp.584-586
    • /
    • 2018
  • 사이버 공격 기법이 다양해지고 지능화됨에 따라 침해사고 발생이 증가하고 있으며, 그에 따른 피해도 확산되고 있다. 이에 따라 보안 기업들은 다양한 침해사고를 파악하고 빠르게 대처하기 위하여 위협정보를 정리한 인텔리전스 리포트를 배포하고 있다. 하지만 인텔리전스 리포트의 형식이 정형화되어 있지 않고 점점 증가하고 있어, 인텔리전스 리포트를 수작업을 통해 분류하기 힘들다는 문제점이 있다. 이와 같은 문제를 해결하기 위해 본 논문에서는 개체명 인식 시스템을 활용하여 비정형 인텔리전스 리포트에서 위협정보를 자동으로 탐지하고 추출할 수 있는 모델을 제안한다.

  • PDF

Secure Remote User Authentication Protocol against Privileged-Insider Attack (Privileged-Insider 공격에 안전한 원격 사용자 인증 프로토콜)

  • Lee, SungYup;Park, YoHan;Park, YoungHo
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.4
    • /
    • pp.614-628
    • /
    • 2017
  • Recently, Due to the rapid development of the internet and IT technology, users can conveniently use various services provided by the server anytime and anywhere. However, these technologies are exposed to various security threat such as tampering, eavesdropping, and exposing of user's identity and location information. In 2016, Nikooghadam et al. proposed a lightweight authentication and key agreement protocol preserving user anonymity. This paper overcomes the vulnerability of Nikooghadam's authentication protocol proposed recently. This paper suggests an enhanced remote user authentication protocol that protects user's password and provides perfect forward secrecy.

DDoS Correspondence Index for Evaluating Performance Management

  • Kim, Hyung-Won;Lee, Nam-Yong;Kim, Jong-Bae
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.6
    • /
    • pp.618-622
    • /
    • 2010
  • The damages from DDoS attacks are increasing as DDoS attacks are taking various forms. This has resulted not only in decreased reliability of organizations and corporations but also in the threat of national security. Organizations and corporations are making significant efforts in developing a system through which they can appropriately correspond to DDoS attacks. However, the studies on objective index for evaluating the performance of DDoS correspondence are lacking. The majority of the existing studies have been on the information protection & management system on a large scale. Accordingly, the scope of this thesis will be limited to DDoS correspondence to propose correspondence index for quantitatively measuring and managing them. The statistical techniques such as SMART technique and factor analysis will be utilized accordingly.

Real-time Abnormal Behavior Detection by Online Data Collection (온라인 데이터 수집 기반 실시간 비정상 행위 탐지)

  • Lee, Myungcheol;Kim, ChangSoo;Kim, Ikkyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.208-209
    • /
    • 2016
  • APT (Advanced Persistent Threat) 공격 사례가 증가하면서, 이러한 APT 공격을 해결하고자 이상 행위 탐지 기술 관련 연구가 활발히 진행되고 있다. 최근에는 APT 공격의 탐지율을 높이기 위해서 빅데이터 기술을 활용하여 다양한 소스로부터 대규모 데이터를 수집하여 실시간 분석하는 연구들이 시도되고 있다. 본 논문은 빅데이터 기술을 활용하여 기존 시스템들의 실시간 처리 및 분석 한계를 극복하기 위한 실시간 비정상 행위 탐지 시스템에서, 파일 시스템에 수집된 오프라인 데이터 기반이 아닌 온라인 수집 데이터 기반으로 실시간 비정상 행위를 탐지하여 실시간성을 제고하고 입출력 병목 문제로 인한 처리 성능 확장성 문제를 해결하는 방법 및 시스템에 대해서 제안한다.

North's Launching Their Missile and Nuclear Test (뉴스초점 - 북한의 미사일 발사 그리고 핵실험)

  • Choo, Seung-Hwan
    • Journal of the Korean Professional Engineers Association
    • /
    • v.42 no.3
    • /
    • pp.35-40
    • /
    • 2009
  • After the yield of North Korea conducted underground the first nuclear test in 2006, which was less than a kiloton, it launched a vehicle on this April 9 again, which is believed to be a Taepo-dong 2 missile, defying international warnings that the move would violate U.N. resolutions, from Musudan-ni, North Korea. Its development and proliferation of ballistic missile and nuclear bomb technology pose a threat to the northeast Asian region and to international peace and security. In the other launching the missile, a newspaper reported that "While the launch was dubbed a failure by the U.S., it was an improvement over the North Koreans' July 2006 test of the Taepodong-2, said Green of the Center for Strategic and International Studies. "It was definitely better than last time, but it's still not an operational system," Green said.

  • PDF