• Title/Summary/Keyword: Threat Security

Search Result 1,066, Processing Time 0.029 seconds

Research Trends and Considerations of Invasion Threat and Countermeasures for Connected Car Security (커넥티드 카 보안을 위한 침해 위협 분석 및 대응방안 연구)

  • Lee, Young Hun;Ryu, Jung Hyun;Kim, Nam Yong;Park, Jong Hyuk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.253-256
    • /
    • 2018
  • 최근 4차 산업혁명은 기존에 한정적이던 사물들의 역할을 끝없이 확장시키는 특징을 가진다. 인터넷을 기반으로 인간, 사물, 환경 등 모든 것은 연결이 가능한 Internet of Things(IoT) 시대가 다가오고 있다. 사람과 사물, 사물과 사물 간의 정보를 상호 소통하여 안전기능과 사용자의 편의성을 향상시키고 있으며, ICT의 융복합의 발전에 따라 자동차도 기존과 다르게 IoT 환경에 포함된다. 커넥티드 카는 차량, 인프라, 모바일 디바이스, 주변 환경 간의 통신을 통해 실시간으로 다양한 정보를 자동차를 중심으로 수집할 수 있게 되었으며 이를 기반으로 커넥티드 카 산업이 발전하고 있다. 그러나 이러한 발전 과정 속에서 커넥티드 카의 보안성의 문제는 반드시 해결되어야 한다. 보안성이 확보되지 않는다면, 자동차에서 발생하는 운전자에 대한 악의적인 공격을 통해 일반적인 보안 침해사고 수준을 넘어 사고를 유발시킬 경우 인명과 재산상의 큰 피해를 발생시킬 수 있다. 본 논문에서는 커넥티드 카의 통신구조를 알아보고 취약점 분석과 이에 대한 대응 방안을 제안하여 안전한 커넥티드 카의 활용 방안을 연구한다.

A Protection Method using Destination Address Packet Sampling for SYN Flooding Attack in SDN Environments (SDN 환경에서의 목적지 주소별 패킷 샘플링을 이용한 SYN Flooding 공격 방어기법)

  • Bang, Gihyun;Choi, Deokjai;Bang, Sangwon
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.1
    • /
    • pp.35-41
    • /
    • 2015
  • SDN(Software Defined Networking) has been considered as a new future computer network architecture and DDoS(Distributed Denial of Service) is the biggest threat in the network security. In SDN architecture, we present the technique to defend the DDoS SYN Flooding attack that is one of the DDoS attack method. First, we monitor the Backlog queue in order to reduce the unnecessary monitoring resources. If the Backlog queue of the certain server is occupied over 70%, the sFlow performs packet sampling with the server address as the destination address. To distinguish between the attacker and the normal user, we use the source address. We decide the SYN packet threshold using the remaining Backlog queue that possible to allow the number of connections. If certain sources address send the SYN packet over the threshold, we judge that this address is attacker. The controller will modify the flow table entry to block attack traffics. By using this method, we reduce the resource consumption about the unnecessary monitoring and the protection range is expanded to all switches. The result achieved from our experiment show that we can prevent the SYN Flooding attack before the Backlog queue is fully occupied.

Polymorphic Path Transferring for Secure Flow Delivery

  • Zhang, Rongbo;Li, Xin;Zhan, Yan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2805-2826
    • /
    • 2021
  • In most cases, the routing policy of networks shows a preference for a static one-to-one mapping of communication pairs to routing paths, which offers adversaries a great advantage to conduct thorough reconnaissance and organize an effective attack in a stress-free manner. With the evolution of network intelligence, some flexible and adaptive routing policies have already proposed to intensify the network defender to turn the situation. Routing mutation is an effective strategy that can invalidate the unvarying nature of routing information that attackers have collected from exploiting the static configuration of the network. However, three constraints execute press on routing mutation deployment in practical: insufficient route mutation space, expensive control costs, and incompatibility. To enhance the availability of route mutation, we propose an OpenFlow-based route mutation technique called Polymorphic Path Transferring (PPT), which adopts a physical and virtual path segment mixed construction technique to enlarge the routing path space for elevating the security of communication. Based on the Markov Decision Process, with considering flows distribution in the network, the PPT adopts an evolution routing path scheduling algorithm with a segment path update strategy, which relieves the press on the overhead of control and incompatibility. Our analysis demonstrates that PPT can secure data delivery in the worst network environment while countering sophisticated attacks in an evasion-free manner (e.g., advanced persistent threat). Case study and experiment results show its effectiveness in proactively defending against targeted attacks and its advantage compared with previous route mutation methods.

A comparative study of machine learning methods for automated identification of radioisotopes using NaI gamma-ray spectra

  • Galib, S.M.;Bhowmik, P.K.;Avachat, A.V.;Lee, H.K.
    • Nuclear Engineering and Technology
    • /
    • v.53 no.12
    • /
    • pp.4072-4079
    • /
    • 2021
  • This article presents a study on the state-of-the-art methods for automated radioactive material detection and identification, using gamma-ray spectra and modern machine learning methods. The recent developments inspired this in deep learning algorithms, and the proposed method provided better performance than the current state-of-the-art models. Machine learning models such as: fully connected, recurrent, convolutional, and gradient boosted decision trees, are applied under a wide variety of testing conditions, and their advantage and disadvantage are discussed. Furthermore, a hybrid model is developed by combining the fully-connected and convolutional neural network, which shows the best performance among the different machine learning models. These improvements are represented by the model's test performance metric (i.e., F1 score) of 93.33% with an improvement of 2%-12% than the state-of-the-art model at various conditions. The experimental results show that fusion of classical neural networks and modern deep learning architecture is a suitable choice for interpreting gamma spectra data where real-time and remote detection is necessary.

Attacks, Detection, and Countermeasures in WSN Network Layer (WSN의 네트워크 계층에서의 공격과 탐지 및 대응 방안)

  • Lee, Daeun;Rhee, Eugene
    • Journal of IKEEE
    • /
    • v.23 no.2
    • /
    • pp.413-418
    • /
    • 2019
  • Attacks on existing sensor networks include sniffing, flooding, and spoofing attacks. The basic countermeasures include encryption and authentication methods and switching methods. Wormhole attack, HELLO flood attack, Sybil attack, sinkhole attack, and selective delivery attack are the attacks on the network layer in wireless sensor network (WSN). These attacks may not be defended by the basic countmeasures mentioned above. In this paper, new countermeasures against these attacks include periodic key changes and regular network monitoring. Moreover, we present various threats (attacks) in the network layer of wireless sensor networks and new countermeasures accordingly.

Study on radar deployment for improving the ballistic missile detection probability (탄도미사일 탐지 확률 향상을 위한 레이더 배치에 관한 연구)

  • Park, Tae-yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.518-520
    • /
    • 2014
  • Radar Cross Section(RCS) is very important factor to detect target by radar. Even if the same target, RCS value is significantly different according to the direction facing the radar. Therefore, it is advantageous to place the radar, where RCS is larger to increase the probability of detecting a target with a radar. North Korean ballistic missiles are major threat to our security, ballistic missiles should be detected early and traced for ballistic missile defense. In this paper, it is analyzed that ballistic missile's RCS characteristics and trajectory and proposed a way of radar deployment to improve the detection probability of ballistic missile.

  • PDF

Random Vibration Analysis of Portable Power Supply Container for Radar With U.S. Military Standards (미 군사규격을 적용한 레이더 전력공급용 이동식 컨테이너의 Random Vibration 해석)

  • Do, Jae-Seok;Hur, Jang-Wook
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.21 no.9
    • /
    • pp.71-77
    • /
    • 2022
  • In times of war or emergencies, weapon systems, such as radars, must receive stable power. This can be achieved using improved onboard portable power systems made of steel containers. However, a breakdown can occur in the event of random vibration during transportation via a vehicle or train. Electrical-power shortages or restrictions pose a significant threat to security. In this study, Composite Wheeled Vehicle(CWV) data and rail cargo data with Acceleration Spectral Density(ASD), specified in MIL-STD-810H METHOD 514.8, were interpreted as input data of the three-axis random vibration method using ANSYS 19.2. Modal analysis was performed up to 500 Hz, and deformations in modes 1 to 117 were calculated to utilize all ASD data. The maximum equivalent stress in the three-axis direction was obtained using a random vibration analysis. Similarly, the margin of safety was calculated using the derived equivalent stress and material properties. Overall, the analysis verified that the portable container designed for the power supply system satisfied the required vibration demands.

Antagonistic Activity of Siderophore-Producing Bacteria from Black Rice Rhizosphere against Rice Blast Fungus Pyricularia oryzae

  • Nabila, Nabila;Kasiamdari, Rina Sri
    • Microbiology and Biotechnology Letters
    • /
    • v.49 no.2
    • /
    • pp.217-224
    • /
    • 2021
  • Rice blast caused by Pyricularia oryzae, which is a major threat to food security worldwide, markedly decreases the yield of rice. Some rhizobacteria called 'plant growth-promoting rhizobacteria' inhibit plant pathogens and improve plant growth by secreting iron-chelating siderophores. The decreased availability of iron adversely affects the survival of pathogens, especially fungal pathogens, in the rhizosphere. This study aimed to determine the morphological diversity of siderophore-producing bacteria, analyze the type of siderophores produced by the bacteria, and examine their growth-inhibitory activity against Pyricularia oryzae. The rhizobacteria were isolated from the rhizosphere of Sembada Hitam variety of black rice plants in Pakem, Sleman, Yogyakarta, Indonesia. In total, 12 distinct isolates were screened for the production of siderophores. It was found that 9 out of 12 bacteria produced siderophore and most of them were Gram positive bacteria. The best siderophore-producing isolates with different type of siderophore were used in further studies. The IS3 and IS14 isolates were found to be the best siderophore producer that produced hydroxamate and mixed type of hydroxamate-carboxylate type of siderophore, respectively. In the dual culture assay, IS14 showed a strong antagonistic effect against Pyricularia oryzae by the 81.17% inhibition.

A study on Improving the Performance of Anti - Drone Systems using AI (인공지능(AI)을 활용한 드론방어체계 성능향상 방안에 관한 연구)

  • Hae Chul Ma;Jong Chan Moon;Jae Yong Park;Su Han Lee;Hyuk Jin Kwon
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.19 no.2
    • /
    • pp.126-134
    • /
    • 2023
  • Drones are emerging as a new security threat, and the world is working to reduce them. Detection and identification are the most difficult and important parts of the anti-drone systems. Existing detection and identification methods each have their strengths and weaknesses, so complementary operations are required. Detection and identification performance in anti-drone systems can be improved through the use of artificial intelligence. This is because artificial intelligence can quickly analyze differences smaller than humans. There are three ways to utilize artificial intelligence. Through reinforcement learning-based physical control, noise and blur generated when the optical camera tracks the drone may be reduced, and tracking stability may be improved. The latest NeRF algorithm can be used to solve the problem of lack of enemy drone data. It is necessary to build a data network to utilize artificial intelligence. Through this, data can be efficiently collected and managed. In addition, model performance can be improved by regularly generating artificial intelligence learning data.

Some New Problems of International Aviation Security- Considerations Forcused on its Legal Aspects (최근국제항공보안대책(最近國際航空保安対策)의 제간제(諸間題) -특히 법적측면(法的測面)을 중심(中心)으로-)

  • Choi, Wan-Sik
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.5
    • /
    • pp.53-75
    • /
    • 1993
  • This article is concerned with the comment on "Some New Problems of International Aviation Security-Considerations Forcused on its Legal Aspects". Ever since 1970, in addition to the problem of failure to accept the Tokyo, Hague and Montreal Conventions, there has been also the problem of parties to them, failing to comply with their obligations under the respective treaties, in the form especially of nominal penalties or the lack of any effort to prosecute after blank refusals to extradite. There have also been cases of prolonged detention of aircraft, passengers and hostages. In this regard, all three conventions contain identical clauses which submit disputes between two or more contracting States concerning the interpretation or application of the respective conventions to arbitration or failing agreement on the organization of the arbitration, to the International Court of Justice. To the extent to which contracting States have not contracted out of this undertaking, as I fear they are expressly allowed to do, this promision can be used by contracting States to ensure compliance. But to date, this avenue does not appear to have been used. From this point of view, it may be worth mentioning that there appears to be an alarming trend towards the view that the defeat of terrorism is such an overriding imperative that all means of doing so become, in international law, automatically lawful. In addition, in as far as aviation security is concerned, as in fact it has long been suggested, what is required is the "application of the strictest security measures by all concerned."In this regard, mention should be made of Annex 17 to the Chicago Convention on Security-Safeguarding International Civil Aviation against Acts of Unlawful Intereference. ICAO has, moreover, compiled, for restricted distribution, a Security Manual for Safeguarding Civil Aviation Against Acts of Unlawful Interference, which is highly useful. In this regard, it may well be argued that, unless States members of ICAO notify the ICAO Council of their inability to comply with opecific standards in Annex 17 or any of the related Annexes in accordance with Article 38 of the 1944 Chicago Convention on International Civil Aviation, their failure to do so can involve State responsibility and, if damage were to insure, their liability. The same applies to breaches of any other treaty obligation. I hope to demonstrate that although modes of international violence may change, their underlying characteristics remain broadly similar, necessitating not simply the adoption of an adequate body of domestic legislation, firm in its content and fairly administered, but also an international network of communication, of cooperation and of coordination of policies. Afurther legal instrument is now being developed by the Legal Committee of ICAO with respect to unlawful acts at International airports. These instruments, however, are not very effective, because of the absence of universal acceptance and the deficiency I have already pointed out. Therefore, States, airports and international airlines have to concentrate on prevention. If the development of policies is important at the international level, it is equally important in the domestic setting. For example, the recent experiences of France have prompted many changes in the State's legislation and in its policies towards terrorism, with higher penalties for terrorist offences and incentives which encourage accused terrorists to pass informations to the authorities. And our government has to tighten furthermore security measures. Particularly, in the case an unarmed hijacker who boards having no instrument in his possession with which to promote the hoax, a plaintiff-passenger would be hard-pressed to show that the airline was negligent in screening the hijacker prior to boarding. In light of the airline's duty to exercise a high degree of care to provide for the safety of all the passengers on board, an acquiescence to a hijacker's demands on the part of the air carrier could constitute a breach of duty only when it is clearly shown that the carrier's employees knew or plainly should have known that the hijacker was unarmed. The general opinion is that the legal oystem could be sufficient, provided that the political will is there to use and apply it effectively. All agreed that the main responsibility for security has to be borne by the governments. A state that supports aviation terrorism is responsible for violation of International Aviation Law. Generally speaking, terrorism is a violation of international law. It violates the sovereign rights of states, and the human rights of the individuals. We have to contribute more to the creation of a general consensus amongst all states about the need to combat the threat of aviation terrorism. I think that aviation terrorism as becoming an ever more serious issue, has to be solved by internationally agreed and closely co - ordinated measures.

  • PDF