• Title/Summary/Keyword: Threat Value

Search Result 172, Processing Time 0.019 seconds

A study on Classification of Insider threat using Markov Chain Model

  • Kim, Dong-Wook;Hong, Sung-Sam;Han, Myung-Mook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1887-1898
    • /
    • 2018
  • In this paper, a method to classify insider threat activity is introduced. The internal threats help detecting anomalous activity in the procedure performed by the user in an organization. When an anomalous value deviating from the overall behavior is displayed, we consider it as an inside threat for classification as an inside intimidator. To solve the situation, Markov Chain Model is employed. The Markov Chain Model shows the next state value through an arbitrary variable affected by the previous event. Similarly, the current activity can also be predicted based on the previous activity for the insider threat activity. A method was studied where the change items for such state are defined by a transition probability, and classified as detection of anomaly of the inside threat through values for a probability variable. We use the properties of the Markov chains to list the behavior of the user over time and to classify which state they belong to. Sequential data sets were generated according to the influence of n occurrences of Markov attribute and classified by machine learning algorithm. In the experiment, only 15% of the Cert: insider threat dataset was applied, and the result was 97% accuracy except for NaiveBayes. As a result of our research, it was confirmed that the Markov Chain Model can classify insider threats and can be fully utilized for user behavior classification.

A Study of Threat Evaluation using Learning Bayesian Network on Air Defense (베이지안 네트워크 학습을 이용한 방공 무기 체계에서의 위협평가 기법연구)

  • Choi, Bomin;Han, Myung-Mook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.22 no.6
    • /
    • pp.715-721
    • /
    • 2012
  • A threat evaluation is the technique which decides order of priority about tracks engaging with enemy by recognizing battlefield situation and making it efficient decision making. That is, in battle situation of multiple target it makes expeditious decision making and then aims at minimizing asset's damage and maximizing attack to targets. Threat value computation used in threat evaluation is calculated by sensor data which generated in battle space. Because Battle situation is unpredictable and there are various possibilities generating potential events, the damage or loss of data can make confuse decision making. Therefore, in this paper we suggest that substantial threat value calculation using learning bayesian network which makes it adapt to the varying battle situation to gain reliable results under given incomplete data and then verify this system's performance.

The Changes of Consumption Behavior in Bengkulu, Indonesia: Case of Purchasing Corona Prevention Products Through Indirect Ditribution Channel

  • Hayu, Rina Suthia;Sulistiyawan, Edy;Salim, Muhartini
    • Journal of Distribution Science
    • /
    • v.19 no.11
    • /
    • pp.27-36
    • /
    • 2021
  • Purpose: COVID-19, government regulation and social media have changed many aspects of life including consumption behavior. The influence of social media by spreading massive news about COVID-19 also have the impact toward emotions threat, perceived risk, and perceived value of consumption behavior in Bengkulu Province, Indonesia. This research aims to analyze the extent to which changes in the consumption behavior, mainly for purchasing of corona prevention products through indirect distribution channels. Research design, data and methodology: This research was descriptive quantitative using the IPA method with sample of people in Bengkulu Province. This study obtained 208 respondent data from questionnaires and tested the validity and reliability with corrected-item total correlation method. Results: The study found that COVID-19 pandemic and government regulation variable were in quadrant II, in quadrant III there were social media variable, emotions threat and perceived risk. Meanwhile, in quadrant IV there were perceived value variable. Conclusions: The findings indicated that COVID-19 and government regulation are the most variable that influence people to buy corona prevention product, meanwhile perceived value is the less influence variable. Therefore, government and marketers have to prepare strategic plan in order to raise people awareness to avoid corona by buying corona prevention product.

A Study on the Activation of Sharing Cyber-Threat Information among Businesses (기업의 사이버위협정보 공유 활성화에 관한 연구)

  • Seokeon Choe;Jongsub Lee;Geunsun Tak;Joowon Choi
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.4
    • /
    • pp.143-156
    • /
    • 2023
  • The domestic threat information sharing system to deal with various security threats in the rapidly changing cyber environment needs to be improved. In this study, to solve these problems and promote the activation of threat information sharing, we derive a research model based on the value-based containment model (VAM) for vital factors in information sharing. After conducting a Ricardian 5-point survey on a total of 204 individuals, the statistical results of the first 151 individuals were analyzed using SPSS and AMOS, and the statistical results of the second 204 individuals were analyzed using R-Studio. As a result, perceivability was found to have a significant impact as a core factor in the activation of cyber threat information sharing (β=0.405, p<0.01), and the hindrance factor was analyzed as innovation resistance (β=-0.152, p<0.01). Microscopically, the obtained results can be applied to factor analysis for activating information sharing of cyber threats by companies in the future, and macroscopically, they can contribute to the foundational development of a national cyber threat response system.

A Review of IPTV Threats Based on the Value Chain

  • Lee, Hong-Joo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.2
    • /
    • pp.163-177
    • /
    • 2009
  • The demand for services using digital technology is constantly increasing as new developments in digital consumer electronics and the Internet are made. This is especially true in terms of the demand for IPTV utilizing high speed Internet networks. Research on IPTV threats is important for facilitating financial transactions via IPTV and preventing illegal use or copying of digital content. Thus, this paper analyzes IPTV threats via the IPTV value chain. That is, the distribution system for IPTV service is analyzed along with the components of the value chain and corresponding IPTV security requirements or security technologies, in order to perform a threat analysis and research suitable for the IPTV service environment. This paper has a greater focus on the value chain of the IPTV business than the approach in previous research, in order to analyze security requirements and technologies that are more applicable to the business environment.

Artificial Intelligence based Threat Assessment Study of Uncertain Ground Targets (불확실 지상 표적의 인공지능 기반 위협도 평가 연구)

  • Jin, Seung-Hyeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.305-313
    • /
    • 2021
  • The upcoming warfare will be network-centric warfare with the acquiring and sharing of information on the battlefield through the connection of the entire weapon system. Therefore, the amount of information generated increases, but the technology of evaluating the information is insufficient. Threat assessment is a technology that supports a quick decision, but the information has many uncertainties and is difficult to apply to an advanced battlefield. This paper proposes a threat assessment based on artificial intelligence while removing the target uncertainty. The artificial intelligence system used was a fuzzy inference system and a multi-layer perceptron. The target was classified by inputting the unique characteristics of the target into the fuzzy inference system, and the classified target information was input into the multi-layer perceptron to calculate the appropriate threat value. The validity of the proposed technique was verified with the threat value calculated by inputting the uncertain target to the trained artificial neural network.

On Study is to Presidential Security Service in Korea and U.S Secret Service (한국과 미국의 국가원수경호조직 비교연구)

  • Min, Jea-Gi;Kim, Kye-Won
    • Korean Security Journal
    • /
    • no.8
    • /
    • pp.127-153
    • /
    • 2004
  • On Study is to presidential security service in Korea and U.S Secret Service. U.S Secret Service give emphasis a right of a people. This become the center of attention that Special Agent enforced comprehensive authority with Law enforcement, intelligence, security. Presidential security service in Korea emphasis a threat of North Korea in the past. but recent circumstances changed a threat of terrorism based Islamic Fundamentalism and emphasis a right of a people. You can't overemphasize the value of this point.

  • PDF

A Threat Assessment Algorithm for Multiple Ground Targets (다수의 대지표적을 위한 위협 평가 알고리즘)

  • Yoon, Moonhyung;Park, Junho;Yi, JeongHoon
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.7
    • /
    • pp.590-599
    • /
    • 2018
  • As a basic information to implement the fire plan that dominates multiple targets effectively under the battle environment with limited resources, such a process is mandatory that gives a priority order to a target with the high level of threat by quantitatively computing the threat level of an individual target through the analysis on the target. However, the study has still remained in the initial level on an evaluation algorithm for the threat level of the ground target. Considering this fact, the present paper proposes the evaluation algorithm for the threat by multiple ground targets. The proposed algorithm has a core point to consider the type of target and protected asset to implement the computation of proximity; set the additional value based on the weights indicating the significance of weapon and protected asset; and compute the threat level of a target that considers the characteristics of the target. The evaluation and verification of performances have been implemented through the simulation and visualization of an algorithm proposed in the present paper. From the performance result, as the proposed algorithm has been able to perform effectively the threat assessment according to the weights indicating the significance of weapons and protected assets under diverse environments where weapons and protected assets are located, high utility and effect are expected when applied to an actual ground weapon system.

Measure of the loss resulting from the threat in the University (대학교를 대상으로 한 위협에 따른 손실의 수치화)

  • 이현숙;변진욱;기주희;이동훈;임종인;박영우;윤재석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.4
    • /
    • pp.3-14
    • /
    • 2002
  • In this paper we classify the possible threat and introduce the method that measures the loss resulted from the threat in the university. This is the method that the amount of the loss minimized in the case of the same quality in damage as establish a economical prediction model. The method of measuring the loss is as follows. First, asset should be clearly identified and valued. Second, threats which may result in harm to asset should be classified. Third, vulnerabilities which is weaknesses associated with asset should be analyzed. Fourth, measure the value of the loss. we explain the valued method by the example.

A Study on the Threat Factors of Biodiversity on Hasidong Anin Coastal Dune (하시동·안인사구의 생물다양성 보전 위협 요인 분석)

  • Lee, Eun-Hye;Oh, Choong-Hyeon
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.24 no.3
    • /
    • pp.99-114
    • /
    • 2021
  • We examined a current status of damage in biodiversity and its causing factors in Hasidong Anin coastal dune, Gangneung-si, Gangwon province which is designated as ecological and landscape conservation area. In this study, we found that ecosystem and biodiversity have been primarily damaged by anthropogenic factors such as the construction of surrounding area, military facilities illegally dumped garbage and the expansion of windbreak forest. These factors occur to damage the landscape, ecosystem and biodiversity etc. There is a significant lack of basic data needed for preservation and restoration due to the lack of prior research and value assessment. In order to establish solutions for preservation and restoration, it is critical to collect fundamental data and implement value assessments. Therefore, further studies such as ecosystem services assessment, increasing biodiversity, spatial analysis and monitoring of various items related to coastal dunes are needed.