• Title/Summary/Keyword: Threat Security

Search Result 1,066, Processing Time 0.03 seconds

A Study of Realtime Malware URL Detection & Prevention in Mobile Environment (모바일 환경에서 실시간 악성코드 URL 탐지 및 차단 연구)

  • Park, Jae-Kyung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.6
    • /
    • pp.37-42
    • /
    • 2015
  • In this paper, we propose malware database in mobile memory for realtime malware URL detection and we support realtime malware URL detection engine, that is control the web service for more secure mobile service. Recently, mobile malware is on the rise and to be new threat on mobile environment. In particular the mobile characteristics, the damage of malware is more important, because it leads to monetary damages for the user. There are many researches in cybercriminals prevention and malware detection, but it is still insufficient. Additionally we propose the method for prevention Smishing within SMS, MMS. In the near future, mobile venders must build the secure mobile environment with fundamental measures based on our research.

A Study of Countermeasures for Advanced Persistent Threats attacks by malicious code (악성코드의 유입경로 및 지능형 지속 공격에 대한 대응 방안)

  • Gu, MiSug;Li, YongZhen
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.4
    • /
    • pp.37-42
    • /
    • 2015
  • Due to the advance of ICT, a variety of attacks have been developing and active. Recently, APT attacks using malicious codes have frequently occurred. Advanced Persistent Threat means that a hacker makes different security threats to attack a certain network of a company or an organization. Exploiting malicious codes or weaknesses, the hacker occupies an insider's PC of the company or the organization and accesses a server or a database through the PC to collect secrets or to destroy them. The paper suggested a countermeasure to cope with APT attacks through an APT attack process. It sought a countermeasure to delay the time to attack taken by the hacker and suggested the countermeasure able to detect and remove APT attacks.

  • PDF

A Study on Response Technique of Routing Attack under Wireless Ad Hoc Network. Environment (Wireless Ad Hoc Network환경에서의 라우팅 공격 대응 기법에 관한 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.1
    • /
    • pp.105-112
    • /
    • 2014
  • The utilization of Wireless Ad Hoc Network which can build easily network using wireless device in difficult situation to build network is very good. However, it has security threat element because it transfers data by only forwarding of wireless devices. The measures against this should be prepared because damage by especially routing attack can affect the entire network. It is hard to distinguish malicious node and normal node among nodes composing network and it is not easy also to detect routing attack and respond to this. In this paper, we propose new method which detect routing attack and can respond to this. The amount of traffic in all nodes is measured periodically to judge the presence or absence of attack node on the path set. The technique that hides inspection packet to suspected node and transmits is used in order to detect accurately attack node in the path occurred attack. The experiment is performed by comparing SRAODA and SEAODV technique to evaluate performance of the proposed technique and the excellent performance can be confirmed.

A Study on the Risk Management of Strategic Materials (전략물자 무역 리스크 관리 방안에 대한 연구)

  • LEE, Kyung-Lyung;LEE, Seoung-Taek
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.72
    • /
    • pp.115-137
    • /
    • 2016
  • Trade can be greatly influenced by the change of international trade environment due to the characteristics of remote transactions. Furthermore, in the circumstance of emphasizing the national security again, the importance of the risk management of special materials has been increasing. As it was noted at Chapter 4, significant results such as the threat of enterprises' sustainable growth can be occurred when companies are related to the unlawful export of strategic materials or experience discouragement of export of main products. As the decision of strategic materials greatly depend on a specialized knowledge there is a possibility of misjudgement of strategic materials in terms of ordinary companies which is not accustomed to them. Furthermore risk management is more difficult due to the inclusion to the items of export license. To prepare such a risk of export of strategic materials, firstly, it should be checked to find whether counter traders are working in the industry which is not related to the spread of weapons of mass destruction, secondly, an appropriate process shall be designed and operated for products to be safely delivered to the trade counter. Therefore, our export enterprises have to introduce CP(Compliance Program), AEO or ISO28000 considering suitability for their actual situations not only to promote export and but also to avoid risk of export control and additional expenses. Through these appropriate processes, an efficient and effective management of the trade risk of strategic materials can be accomplished.

  • PDF

A Study on the Methods of Fire-Safety in Cultural Property Wooden Buildings (목조 문화재 건축물의 화재 방재를 위한 조사 연구)

  • Chang, Hyung-Soon;Cho, Won-Seok;Kim, Heung-Gee
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.10 no.4
    • /
    • pp.25-32
    • /
    • 2008
  • The prevention of disasters in cultural property is very important management and historical duties. The reason can't be measured values with monetary scale of our contemporary. Therefore, this paper was considered fire-safety as one of terrible threat-disasters about the wooden buildings. This research deal with 47 cases cultural property wooden building by whole investigation(field survey and interview) in Gangnung province. The most buildings have basic fire extinguisher; ABC powder. A few buildings are rarely installed fire extinguishing equipments; outdoor fire hydrant, heat sensor, ground sprinkler, CO2-hose-reel. But these state is very insufficient for the fire-safety in cultural property wooden buildings. Specially as particular attention in province, forest fire of regional characteristic have close relation with cultural property fire. The majority of factor against forest and building fire is to provide monitoring and security system; CCTV, Fence, Sensor, Alarm and paid guard man against incendiary. Ultimately it is necessary to construct comprehensive disaster prevention system with the organic cooperation such as National Emergency Management Agency, Cultural Heritage Administration, Forest Service, local government officials and regional citizen.

  • PDF

Threats according to the Type of Software Updates and White-List Construction Scheme for Advanced Security (소프트웨어 업데이트 유형별 위협요소와 안전성 강화를 위한 화이트리스트 구성 방안)

  • Lee, Daesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.6
    • /
    • pp.1369-1374
    • /
    • 2014
  • In case of APT attacks, the update server is being used as a means of dissemination, the update program is running malicious code or data in applications such as anti-virus signature is vulnerable to manipulation, SW Update threat identification and prevention measures are urgently required. This paper presents a natiional and international SW update structure, update process exploits and response measures to examine, Through the extraction/analysis of a domestic famous SW update log, we are willing to select the necessary component of the normal program update to identify a white list.

The Sensitivity of the Parameters of Microcontroller Device with Coupling Caused by UWB-HPEM (Ultra Wideband-High Power Electromagnetics) (광대역 고출력 전자기 펄스에 의한 마이크로컨트롤러 소자의 매개변수들의 민감성 분석)

  • Hwang, Sun-Mook;Hong, Joo-Il;Huh, Chang-Su
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.59 no.2
    • /
    • pp.369-373
    • /
    • 2010
  • Modem electronic circuits are of importance for the function of communication, traffic systems and security systems. An intentional threat to these systems could be of big casualties and economic disasters. This paper has shown damage effect of microcontroller device with coupling caused by UWB-HPEM(Ultra Wideband-High Power Electromagnetics). The UWB measurements were done at an Anechoic Chamber using a RADAN UWB voltage source, which can generate a transient impulse of about 180 kV. The susceptibility level for microcontroller has been assessed by effect of various operation line lengths. The results of susceptibility analysis has showed that the effect of the reset line length on the MT(Ma1function Threshold) is larger than the effect of the different line length(Data, Power, Clock). With the knowledge of these parameters electronic system can be designed exactly suitable concerning the system requirements. Based on the results, susceptibility of microcontroller can be applied to protection plan to elucidate the effects of microwaves on electronic equipment.

Convenient Radar Received Power Prediction Method for North Korea SLBM Detection (북한 SLBM 탐지를 위한 레이다 수신전력 간편 추정 방법)

  • Seo, Hyeong-Pil;Park, Hyoung Hun;Lee, Kyoung-Haing
    • Journal of the Korea Society for Simulation
    • /
    • v.26 no.2
    • /
    • pp.51-58
    • /
    • 2017
  • This research focuses on convenient radar received power prediction method for detection predictions of North Korea SLBM(Submarine Launched Ballistic Missile). Recently, North Korea tested launching of SLBM which is threatening international security. Therefore, for active respondence to these threat, it is essential to analyze the radar detection prediction of SLBM. In this point of view, this work suggests a method for detection predictions for SLBM by simulating of RCS(Radar Cross Section) and wave propagation.

Network Defense Mechanism Based on Isolated Networks (격리 네트워크를 활용한 네트워크 방어 기법)

  • Jung, Yongbum;Park, Minho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.9
    • /
    • pp.1103-1107
    • /
    • 2016
  • Network assets have been protected from malware infection by checking the integrity of mobile devices through network access control systems, vaccines, or mobile device management. However, most of existing systems apply a uniform security policy to all users, and allow even infected mobile devices to log into the network inside for completion of the integrity checking, which makes it possible that the infected devices behave maliciously inside the network. Therefore, this paper proposes a network defense mechanism based on isolated networks. In the proposed mechanism, every mobile device go through the integrity check system implemented in an isolated network, and can get the network access only if it has been validated successfully.

XSSClassifier: An Efficient XSS Attack Detection Approach Based on Machine Learning Classifier on SNSs

  • Rathore, Shailendra;Sharma, Pradip Kumar;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.13 no.4
    • /
    • pp.1014-1028
    • /
    • 2017
  • Social networking services (SNSs) such as Twitter, MySpace, and Facebook have become progressively significant with its billions of users. Still, alongside this increase is an increase in security threats such as cross-site scripting (XSS) threat. Recently, a few approaches have been proposed to detect an XSS attack on SNSs. Due to the certain recent features of SNSs webpages such as JavaScript and AJAX, however, the existing approaches are not efficient in combating XSS attack on SNSs. In this paper, we propose a machine learning-based approach to detecting XSS attack on SNSs. In our approach, the detection of XSS attack is performed based on three features: URLs, webpage, and SNSs. A dataset is prepared by collecting 1,000 SNSs webpages and extracting the features from these webpages. Ten different machine learning classifiers are used on a prepared dataset to classify webpages into two categories: XSS or non-XSS. To validate the efficiency of the proposed approach, we evaluated and compared it with other existing approaches. The evaluation results show that our approach attains better performance in the SNS environment, recording the highest accuracy of 0.972 and lowest false positive rate of 0.87.