• Title/Summary/Keyword: Threat Security

Search Result 1,066, Processing Time 0.031 seconds

The Importance of International Transport and Logistics Infrastructure in the Economic Development of the Country: The Case of the EU for Ukraine

  • Atamanenko, Yuliia;Komchatnykh, Olena;Larysa, Sukhomlyn;Viacheslav, Didkivskyi;Sulym, Borys;Losheniuk, Oksana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.198-205
    • /
    • 2021
  • For twenty years, in the EU there has been a trend of a lack of maritime infrastructure and a redundance of the road one, which has a negative impact on the economy. The intermodal transport market structure in the EU has not changed over the past ten years. The stability of transport systems due to the lack of changes in the transport market remains under threat, affecting supply chains and networks through the optimization of warehousing and transportation costs. The research methodology is based on a quantitative assessment of cause-and-effect relations between economic growth and transport and logistics in the EU. A statistical analysis of security indicators, intermodal and modal transport, international trade in goods within the EU and in the world trade in goods, the dynamics of GDP of the EU countries, the level of openness of the EU economy, investment and maintenance costs of different modes of transport and infrastructure has been carried out. The results show that in 2000- 2010 there were positive changes in the transport and logistics infrastructure of the EU, which had a positive effect on trade, openness of the economy of the EU, GDP growth. However, at that time, negative effects of environmental impact and the load on road and rail transport were accumulating. Investment in different modes of transport is limited, and technical maintenance and infrastructure maintenance costs form a significant part of GDP of the EU. A slowdown in economic growth leads to budget constraints and infrastructure financing gap. As a result, the freight and passenger intermodal and modal transport market structure remains virtually unchanged. The load on rail and road transport remains stable, despite the reduced level of transport hazards. Transport productivity has declined over the past ten years. Herewith, the intensification of trade and the openness of the EU economies require constant modernization and innovative renewal. The EU policy in this direction remains normative, uncontrolled, which is reflected in investment differences within the EU and maintenance costs.

Comparative Analysis of Cyber Attacks of Korea Government and Policy Countermeasures (한국의 사이버공격 비교 분석과 정책적 대응방안)

  • Kwon, Hyeokchun;Lee, Youngjun;Park, Wonhyung
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.19-26
    • /
    • 2020
  • The purpose of this paper is to ccompare and analyze North Korean cyber attacks and our responses by government, from the Roh Moo-hyun administration to the Moon Jae-in administration. The current conflict of interests on the Korean peninsula, such as the United States, China, and Russia, is leading to a conflict for the leadership of a new world order in cyberspace. Cyber attacks are accelerating and threats are rising. Cyber threats exhibit several characteristics. Above all, it is difficult to identify or track the subject of the threat. Also, with the development of information and communication technology, attack technology has become more intelligent, and it is not easy to prepare a means to respond. Therefore, it is necessary to improve continuous and preemptive response capacity for national cybersecurity, and to establish governance among various actors, such as international cooperation between countries or private experts.

Current Status and Challenges of BGP Hijacking Security Threat (BGP 하이재킹 보안 위협 대응 현황 및 과제)

  • Han, Wooyoung;Hong, Yunseok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.10
    • /
    • pp.1525-1530
    • /
    • 2022
  • BGP(Border Gateway Protocol) is a routing protocol that is actively used in inter-AS routing on the Internet. However, BGP routing protocol is vulnerable to BGP hijacking attacks that hijack the network by impersonating normal BGP sessions. BGP Hijacking attacks can lead to causing intercept IP traffic or interference with the normal service operation. Recently, BGP hijacking attacks, which have often occurred overseas, have also occurred in Korea. It means threatening the security of the Internet. In this paper, we analyze the overall process of attack through representative attack cases and virtual scenarios of BGP hijacking and based on the results of analyzing the application status of security technology to prevent BGP hijacking attacks by Korea and global major ISPs. It covers the technical proposal of ISPs and autonomous system operators should take to defend against BGP hijacking attacks.

Behavior and Script Similarity-Based Cryptojacking Detection Framework Using Machine Learning (머신러닝을 활용한 행위 및 스크립트 유사도 기반 크립토재킹 탐지 프레임워크)

  • Lim, EunJi;Lee, EunYoung;Lee, IlGu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1105-1114
    • /
    • 2021
  • Due to the recent surge in popularity of cryptocurrency, the threat of cryptojacking, a malicious code for mining cryptocurrencies, is increasing. In particular, web-based cryptojacking is easy to attack because the victim can mine cryptocurrencies using the victim's PC resources just by accessing the website and simply adding mining scripts. The cryptojacking attack causes poor performance and malfunction. It can also cause hardware failure due to overheating and aging caused by mining. Cryptojacking is difficult for victims to recognize the damage, so research is needed to efficiently detect and block cryptojacking. In this work, we take representative distinct symptoms of cryptojacking as an indicator and propose a new architecture. We utilized the K-Nearst Neighbors(KNN) model, which trained computer performance indicators as behavior-based dynamic analysis techniques. In addition, a K-means model, which trained the frequency of malicious script words for script similarity-based static analysis techniques, was utilized. The KNN model had 99.6% accuracy, and the K-means model had a silhouette coefficient of 0.61 for normal clusters.

Deep Learning Methods for Recognition of Orchard Crops' Diseases

  • Sabitov, Baratbek;Biibsunova, Saltanat;Kashkaroeva, Altyn;Biibosunov, Bolotbek
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.257-261
    • /
    • 2022
  • Diseases of agricultural plants in recent years have spread greatly across the regions of the Kyrgyz Republic and pose a serious threat to the yield of many crops. The consequences of it can greatly affect the food security for an entire country. Due to force majeure, abnormal cases in climatic conditions, the annual incomes of many farmers and agricultural producers can be destroyed locally. Along with this, the rapid detection of plant diseases also remains difficult in many parts of the regions due to the lack of necessary infrastructure. In this case, it is possible to pave the way for the diagnosis of diseases with the help of the latest achievements due to the possibilities of feedback from the farmer - developer in the formation and updating of the database of sick and healthy plants with the help of advances in computer vision, developing on the basis of machine and deep learning. Currently, model training is increasingly used already on publicly available datasets, i.e. it has become popular to build new models already on trained models. The latter is called as transfer training and is developing very quickly. Using a publicly available data set from PlantVillage, which consists of 54,306 or NewPlantVillage with a data volumed with 87,356 images of sick and healthy plant leaves collected under controlled conditions, it is possible to build a deep convolutional neural network to identify 14 types of crops and 26 diseases. At the same time, the trained model can achieve an accuracy of more than 99% on a specially selected test set.

Analysis of Efficiency of Major Information and Communication Infrastructure Analysis and Evaluation Methods Using DEA Model (DEA 모형을 이용한 주요정보통신기반시설 취약점 분석·평가의 효율성 분석)

  • Sun, Jong-wook;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.853-862
    • /
    • 2021
  • Today, disturbance and paralysis of information and communication infrastructure by electronic infringement of national infrastructure is emerging as a threat. Accordingly, the government regularly implements the vulnerability analysis and evaluation system of major information and communication infrastructure to protect the information system and control system of major infrastructure, and invests increased human and material resources every year to efficiently operate it. However, despite the government's efforts, as infringement accidents and attempts targeting national infrastructure continue to occur, the government's resource input to prepare the information protection foundation has little effect on the information protection activity result calculation, making the evaluation system not efficient. The question arises that it is not. Therefore, in this study, we use the DEA model to review the efficient operation of the vulnerability analysis and evaluation system for major information and communications infrastructure, and suggest improvement measures to enhance the level of information protection based on the analyzed results.

Water footprint estimation of selected crops in Laguna province, Philippines

  • Salvador, Johnviefran Patrick;Ahmad, Mirza Junaid;Choi, Kyung-Sook
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2022.05a
    • /
    • pp.294-294
    • /
    • 2022
  • In 2013, the Asian Development Bank classified the Philippines among the countries facing high food security risks. Evidence has suggested that climate change has affected agricultural productivity, and the effect of extreme climatic events notably drought has worsened each year. This had resulted in serious hydrological repercussions by limiting the timely water availability for the agriculture sector. Laguna is the 3rd most populated province in the country, and it serves as one of the food baskets that feed the region and nearby provinces. In addition to climate change, population growth, rapid industrialization, and urban encroachment are also straining the delicate balance between water demand and supply. Studies have projected that the province will experience less rainfall and an increase in temperature, which could simultaneously affect water availability and crop yield. Hence, understanding the composite threat of climate change for crop yield and water consumption is imperative to devise mitigation plans and judicious use of water resources. The water footprint concept elaborates the water used per unit of crop yield production and it can approximate the dual impacts of climate change on water and agricultural production. In this study, the water footprint (WF) of six main crops produced in Laguna were estimated during 2010-2020 by following the methodology proposed by the Water Footprint Network. The result of this work gives importance to WF studies in a local setting which can be used as a comparison between different provinces as well as a piece of vital information to guide policy makers to adopt plans for crop-related use of water and food security in the Philippines.

  • PDF

A study on Performance Evaluation for Network Architecture using Quantum Key Distribution Technology (양자암호기반의 통신망 구축 및 성능시험 검증연구)

  • Lee, Wonhyuk;Seok, Woojin;Park, Chanjin;Kwon, Woochang;Sohn, Ilkwon;Kim, Seunghae;Park, Byoungyoen
    • KNOM Review
    • /
    • v.22 no.2
    • /
    • pp.39-47
    • /
    • 2019
  • There are several big data-driven advanced research activities such as meteorological climate information, high energy physics, astronomy research, satellite information data, and genomic research data on KREONET. Since the performance degradation occurs in the environment with the existing network security equipment, methods for preventing the performance degradation on the high-performance research-only network and for high-speed research collaboration are being studied. In addition, the recent issue of quantum computers has been a threat to security using the existing encryption system. In this paper, we construct quantum cryptography-based communication network through environment construction and high-performance transmission test that build physical security through quantum cryptography-based communication network in end-to-end high-speed research network. The purpose of this study is to analyze the effect on network performance when performing physical encryption and to use it as basic data for constructing high-performance research collaboration network.

[Retracted]Cyber Threat Analysis on Network Communication in Power System and Countermeasures Suggestions ([논문철회]전력계통 네트워크 통신방식 변화에 따른 사이버위협 분석 및 대응방안 제시)

  • Il Hwan Ji;Seungho Jeon;Jung Taek Seo
    • Smart Media Journal
    • /
    • v.12 no.2
    • /
    • pp.91-102
    • /
    • 2023
  • The Energy Management System (EMS) communicates with power plants and substations, monitors the substations and plant operational status of the transmission and substation system for stability, continuity, real-time, and economy of power supply, and controls power plants and substations. Currently, the power exchange EMS communicates with power plants and substations based on the serial communication-based Distributed Network Protocol (DNP) 3.0 protocol. However, problems such as the difficulty of supply and demand of serial communication equipment and the lack of installation space for serial ports and modems are raised due to the continuous increase in new facilities to perform communication, including renewable power generation facilities. Therefore, this paper presents a TCP/IP-based communication method instead of the existing serial communication method of the power exchange EMS, and presents a security risk analysis that may occur due to changes in the communication method and a countermeasure to the security risk.

A Study on Improving Data Poisoning Attack Detection against Network Data Analytics Function in 5G Mobile Edge Computing (5G 모바일 에지 컴퓨팅에서 빅데이터 분석 기능에 대한 데이터 오염 공격 탐지 성능 향상을 위한 연구)

  • Ji-won Ock;Hyeon No;Yeon-sup Lim;Seong-min Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.549-559
    • /
    • 2023
  • As mobile edge computing (MEC) is gaining attention as a core technology of 5G networks, edge AI technology of 5G network environment based on mobile user data is recently being used in various fields. However, as in traditional AI security, there is a possibility of adversarial interference of standard 5G network functions within the core network responsible for edge AI core functions. In addition, research on data poisoning attacks that can occur in the MEC environment of standalone mode defined in 5G standards by 3GPP is currently insufficient compared to existing LTE networks. In this study, we explore the threat model for the MEC environment using NWDAF, a network function that is responsible for the core function of edge AI in 5G, and propose a feature selection method to improve the performance of detecting data poisoning attacks for Leaf NWDAF as some proof of concept. Through the proposed methodology, we achieved a maximum detection rate of 94.9% for Slowloris attack-based data poisoning attacks in NWDAF.