• Title/Summary/Keyword: Threat Security

Search Result 1,066, Processing Time 0.028 seconds

The Systematic Structure of the Customs Act and Criminal Sanctions (관세법과 형벌체계의 구조)

  • 이경호
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.5 no.2
    • /
    • pp.141-165
    • /
    • 1999
  • The Customs Act provides for a general rule all goods entering Korea shall be subject to customs duties as set in the customs tariff schedules as other fees and taxes determined except those excluded by virtue of the Customs Act or intentional agreements. Importation begins from the time carrying vessel or aircraft enters Korea territorial jurisdiction with the intention to unload the same until the time the goods are released or withdrawn from the customhouse upon payment of the appropriate duties. Imported articles may be categorized into prohibited importations, dutiable importations and conditionally free importation. Some other articles are qualifiedly prohibited, meaning they can enter the country after compliance with certain conditions. If there is any conduct violating these act, criminal sanctions may be imposed for the prevention and suppression of smuggling and other frauds, and the enforcement of tariff and customs act. As a result importers who intentionally violates Korea Customs Act may be subject to criminal prosecution. Many major provisions of customs act have imposed severe sanctions for customs crimes in comparison with other crimes due to general rule of criminal law. There is a great deal of activity in Pusan area relating to smuggling of narcotics and prohibited drugs, obscene articles and weapons. On one side, criminals who seek to profit by narcotics or drug threaten public health and human environment, On other side, weapon smuggling is a significant threat to our national security. However the studies on customs crime and customs act have not been viewed. Thus this Article overviews especially the customs crime and criminal sanction focused on domestic customs act.

  • PDF

New Terrorism and National Crisis Management (뉴테러리즘과 국가위기관리)

  • Kim, Boum-Joong;Cho, Ho-Dae
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.10
    • /
    • pp.284-291
    • /
    • 2009
  • Changes in the environment of the 21st century, national crisis, national security threats taempoga yimyeonseo type of fast, flexible and diverse, principal, resulting in a diagnosis of a threat far greater than in the past and deal with uncertainty in the features have done. That this study, the traditional concept of terrorism and to examine the characteristics of new terrorism, terrorism by analyzing the actual conditions of, any country to be a target of terrorism, and terrorism, people also can become the target of a real national crisis management in situations In contrast with the policy dimensions of terrorism is to the recommendations.

Development of a Simplified Vulnerability Analysis Program for Naval Vessel (함정 간이 취약성 해석 프로그램 개발에 대한 연구)

  • Shin, Yun-Ho;Kwon, Jeong-Il;Chung, Jung-Hoon
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.50 no.6
    • /
    • pp.383-389
    • /
    • 2013
  • Analysis and review of survivability is one of the most important aspects when naval vessels are designed. Because aiming points of threat towards the naval vessels in the battle field could not be estimated exactly, probabilistic and statistic approach is frequently introduced to evaluate and enhance the vessel survivability. Some commercial survivability analysis programs are used to perform the analysis for enhancement of susceptibility, vulnerability and recoverability but, they are usually classified and impossible to be exported to other countries because of their national security. In this paper, a simplified vulnerability analysis program is developed to evaluate the vulnerability of the warship in aspects of structure, redundancy and its mission capability at the conceptual design stage. To verify the developed program, the analysis results were compared with those of the commercial program MOTISS(Measure of Total Integrated System Survivability).

Target Practising in a Global Commons: The Chinese ASAT Test and Outer Space Law

  • Dunk, Frans G. Von Der
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.22 no.1
    • /
    • pp.55-74
    • /
    • 2007
  • When the People's Republic of China destroyed one of its own defunct meteorological satellites, the Fengyun-1C, at an altitude of some 865 km above the earth's surface, the PRC was accused of initiating, or at the very least risking an(other) arms race in outer space also. The test also gave rise to a few legal questions as to the permissibility of this test, and the broader permissibility of using space for military and other weapon-touting activities, Whilst the test cannot be considered to constitute a direct threat to international peace and security so as to invoke relevant legal principles and consequences in terms of the UN Charter for example, it highlights the importance of such clauses in international space law as requiring international cooperation and consultation, due regard for the interests of all other countries both on earth and in outer space, and the further development of general regimes of registration and space debris-prevention. From that perspective, the PRC violated international outer space law not so much by the test itself but by the accompanying lack of information, consultation and due regard for other states', and indeed mankind's, interests.

  • PDF

Classification of HTTP Automated Software Communication Behavior Using a NoSQL Database

  • Tran, Manh Cong;Nakamura, Yasuhiro
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.5 no.2
    • /
    • pp.94-99
    • /
    • 2016
  • Application layer attacks have for years posed an ever-serious threat to network security, since they always come after a technically legitimate connection has been established. In recent years, cyber criminals have turned to fully exploiting the web as a medium of communication to launch a variety of forbidden or illicit activities by spreading malicious automated software (auto-ware) such as adware, spyware, or bots. When this malicious auto-ware infects a network, it will act like a robot, mimic normal behavior of web access, and bypass the network firewall or intrusion detection system. Besides that, in a private and large network, with huge Hypertext Transfer Protocol (HTTP) traffic generated each day, communication behavior identification and classification of auto-ware is a challenge. In this paper, based on a previous study, analysis of auto-ware communication behavior, and with the addition of new features, a method for classification of HTTP auto-ware communication is proposed. For that, a Not Only Structured Query Language (NoSQL) database is applied to handle large volumes of unstructured HTTP requests captured every day. The method is tested with real HTTP traffic data collected through a proxy server of a private network, providing good results in the classification and detection of suspicious auto-ware web access.

Using weighted Support Vector Machine to address the imbalanced classes problem of Intrusion Detection System

  • Alabdallah, Alaeddin;Awad, Mohammed
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.10
    • /
    • pp.5143-5158
    • /
    • 2018
  • Improving the intrusion detection system (IDS) is a pressing need for cyber security world. With the growth of computer networks, there are constantly daily new attacks. Machine Learning (ML) is one of the most important fields which have great contribution to address the intrusion detection issues. One of these issues relates to the imbalance of the diverse classes of network traffic. Accuracy paradox is a result of training ML algorithm with imbalanced classes. Most of the previous efforts concern improving the overall accuracy of these models which is truly important. However, even they improved the total accuracy of the system; it fell in the accuracy paradox. The seriousness of the threat caused by the minor classes and the pitfalls of the previous efforts to address this issue is the motive for this work. In this paper, we consolidated stratified sampling, cost function and weighted Support Vector Machine (WSVM) method to address the accuracy paradox of ID problem. This model achieved good results of total accuracy and superior results in the small classes like the User-To-Remote and Remote-To-Local attacks using the improved version of the benchmark dataset KDDCup99 which is called NSL-KDD.

Exploiting Correlation Characteristics to Detect Covert digital communication

  • Huang, Shuhua;Liu, Weiwei;Liu, Guangjie;Dai, Yuewei;Tian, Wen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.8
    • /
    • pp.3550-3566
    • /
    • 2020
  • As a widely used way to exfiltrate information, wireless covert channel (WCC) brings a serious threat to communication security, which enables the wireless communication process to bypass the authorized access control mechanism to disclose information. Unlike the covert channel on the network layer, wireless covert channels on the physical layer (WCC-P) is a new covert communication mode to implement and improve covert wireless communication. Existing WCC-P scheme modulates the secret message bits into the Gaussian noise, which is also called covert digital communication system based on the joint normal distribution (CJND). Finding the existence of this type of covert channel remains a challenging work due to its high undetectability. In this paper, we exploit the square autocorrelation coefficient (SAC) characteristic of the CJND signal to distinguish the covert communication from legitimate communication. We study the sharp increase of the SAC value when the offset is equal to the symbol length, which is caused by embedding secret information. Then, the SAC value of the measured sample is compared with the threshold value to determine whether the measured sample is CJND sample. When the signal-to-noise ratio reaches 20db, the detection accuracy can reach more than 90%.

Target Practising in a Global Commons: The Chinese ASAT Test and Outer Space Law

  • Dunk, Frans G.Von Der
    • The Korean Journal of Air & Space Law and Policy
    • /
    • no.spc
    • /
    • pp.181-199
    • /
    • 2007
  • When the People's Republic of China destroyed one of its own defunct meteorological satellites, the Fengyun-1C, at an altitude of some 865 km above the earth's surface, the PRC was accused of initiating, or at the very least risking an(other) arms race in outer space also. The test also gave rise to a few legal questions as to the permissibility of this test, and the broader permissibility of using space for military and other weapon-touting activities, Whilst the test cannot be considered to constitute a direct threat to international peace and security so as to invoke relevant legal principles and consequences in terms of the UN Charter for example, it highlights the importance of such clauses in international space law as requiring international cooperation and consultation, due regard for the interests of all other countries both on earth and in outer space, and the further development of general regimes of registration and space debris-prevention. From that perspective, the PRC violated international outer space law not so much by the test itself but by the accompanying lack of information, consultation and due regard for other states', and indeed mankind's, interests.

  • PDF

Design of an Authentication System Based on Personal Identity Verification Card (전자신분증 기반의 개인 신분확인을 위한 인증시스템 설계)

  • Park, Young-Ho;Kong, Byung-Un;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.8
    • /
    • pp.1029-1040
    • /
    • 2011
  • Electronic identity (e-ID) card based on smartcard is a representative identity credential for on-line and off-line personal identification. The e-ID card can store the personal identity information securely, so that the information can be accessed fast, automated identity verification and used to determine the cardholder's authorization to access protected resources. Due to such features of an e-ID card, the number of government organizations and corporate enterprises that consider using e-ID card for identity management is increasing. In this paper, we present an authentication framework for access control system using e-ID cards by discussing the threat environment and security requirement against e-ID card. Specifically, to accomplish our purpose, we consider the Personal Identity Verification system as our target model.

A Comparative Study on Performance of Open Source IDS/IPS Snort and Suricata (오픈소스 IDS/IPS Snort와 Suricata의 탐지 성능에 대한 비교 연구)

  • Seok, Jinug;Choi, Moonseok;Kim, Jimyung;Park, Jonsung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.1
    • /
    • pp.89-95
    • /
    • 2016
  • Recent growth of hacking threats and development in software and technology put Network security under threat, In addition, intrusion, malware and worm virus have been increased due to the existence of variety of sophisticated hacking methods. The goal of this study is to compare Snort Alpha version with Suricata 2.0.11 version whereas previous study focuses on comparison between snort 2. x version under thread environment and Suricata under multi-threading environment. This thesis' experiment environment is set as followed. Intel (R) Core (TM) i5-4690 3. 50GHz (4threads) of CPU, 16GB of RAM, 3TB of Seagate HDD, Ubuntu 14.04 are used. According to the result, Snort Alpha version is superior to Suricata in performance, but Snort Alpha had some glitches when executing pcap files which created core dump errors. Therefore this experiment seeks to analyze which performs better between Snort Alpha version that supports multi packet processing threads and Suricata that supports multi-threading. Through this experiment, one can expect the better performance of beta and formal version of Snort in the future.