• Title/Summary/Keyword: Threat modeling

Search Result 130, Processing Time 0.032 seconds

The Relationship between National Identity, Threat Awareness, and Multi-cultural Acceptability - Moderating Effect of Living in Ethnic Places - (국민정체성과 위협의식, 다문화수용성의 관계에 관한 연구 - 외국인 밀집지역 거주여부의 조절효과를 중심으로 -)

  • Park, Seoyeon
    • Journal of the Korean Regional Science Association
    • /
    • v.35 no.1
    • /
    • pp.19-31
    • /
    • 2019
  • This study examines the effect of national identity and threat awareness on the multi-cultural acceptability and whether contact theory actually work. For the analysis, this study used '2013 Korea General Social Survey' data and compared two groups divided according to whether or not they live in ethnic places using structural equation modeling. The empirical analysis shows that national identity does not have a direct effect on multi-cultural acceptability, and threat awareness has a full mediating effect between national identity and multi-cultural acceptability. In addition, the negative effect of the threat awareness on multi-cultural acceptability was greater in groups living in ethnic places. The findings suggest that multi-cultural awareness education is necessary to reduce the threat awareness toward foreigners, and that community-level programs are needed to prevent and coordinate conflicts arising from contact between foreigners and Koreans.

Modeling of RC Frame Buildings for Progressive Collapse Analysis

  • Petrone, Floriana;Shan, Li;Kunnath, Sashi K.
    • International Journal of Concrete Structures and Materials
    • /
    • v.10 no.1
    • /
    • pp.1-13
    • /
    • 2016
  • The progressive collapse analysis of reinforced concrete (RC) moment-frame buildings under extreme loads is discussed from the perspective of modeling issues. A threat-independent approach or the alternate path method forms the basis of the simulations wherein the extreme event is modeled via column removal scenarios. Using a prototype RC frame building, issues and considerations in constitutive modeling of materials, options in modeling the structural elements and specification of gravity loads are discussed with the goal of achieving consistent models that can be used in collapse scenarios involving successive loss of load-bearing columns at the lowest level of the building. The role of the floor slabs in mobilizing catenary action and influencing the progressive collapse response is also highlighted. Finally, an energy-based approach for identifying the proximity to collapse of regular multi-story buildings is proposed.

A Study on the Security Evaluations and Countermeasure of Exposure Notification Technology for Privacy-Preserving COVID-19 Contact Tracing (COVID-19 동선 추적에서의 프라이버시 보호를 위한 Exposure Notification 기술에 대한 보안성 평가 및 대응 방안 연구)

  • Lee, Hojun;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.929-943
    • /
    • 2020
  • Various methods are being presented to identify the movements of COVID-19 infected persons and to protect personal privacy at the same time. Among them, 'Exposure Notification' released by Apple and Google follows a decentralized approach using Bluetooth. However, the technology must always turn on Bluetooth for use, which can create a variety of security threats. Thus, in this paper, the security assessment of 'Exposure Notification' was performed by applying 'STRIDE' and 'LINDDUN' among the security threat modeling techniques to derive all possible threats. It also presented a new Dell that derived response measures with security assessment results and improved security based on them.

Graph Database Design and Implementation for Ransomware Detection (랜섬웨어 탐지를 위한 그래프 데이터베이스 설계 및 구현)

  • Choi, Do-Hyeon
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.6
    • /
    • pp.24-32
    • /
    • 2021
  • Recently, ransomware attacks have been infected through various channels such as e-mail, phishing, and device hacking, and the extent of the damage is increasing rapidly. However, existing known malware (static/dynamic) analysis engines are very difficult to detect/block against novel ransomware that has evolved like Advanced Persistent Threat (APT) attacks. This work proposes a method for modeling ransomware malicious behavior based on graph databases and detecting novel multi-complex malicious behavior for ransomware. Studies confirm that pattern detection of ransomware is possible in novel graph database environments that differ from existing relational databases. Furthermore, we prove that the associative analysis technique of graph theory is significantly efficient for ransomware analysis performance.

A Study of Security Evaluation Criteria for Reconnaissance Drone (정찰 드론 보안성 평가 기준에 대한 연구)

  • Gu, Do-hyung;Kim, Seung-joo;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.3
    • /
    • pp.591-605
    • /
    • 2022
  • As drones are widely used, attack attempts using drone vulnerabilities are increasing, and drone security is growing in importance. This paper derives security requirements for reconnaissance drone delivered to government office through threat modeling. Threats are analyzed by the data flow of the drone and collecting possible vulnerabilities. Attack tree is built by analyzed threats. The security requirements were derived from the attack tree and compared with the security requirements suggested by national organizations. Utilizing the security requirements derived from this paper will help in the development and evaluation of secure drones.

Smart and Secure Point of Sale Framework with Threat Modeling and Formal Verification

  • Mona faraj Nasser alwahabi;Shaik Shakeel Ahamad
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.41-48
    • /
    • 2024
  • Existing PoS (Point of Sale) based payment frameworks are vulnerable as the Payment Application's integrity in the smart phone and PoS are compromised, vulnerable to reverse engineering attacks. In addition to these existing PoS (Point of Sale) based payment frameworks do not perform point-to-point encryption and do not ensure communication security. We propose a Smart and Secure PoS (SSPoS) Framework which overcomes these attacks. Our proposed SSPoS framework ensures point-to-point encryption (P2PE), Application hardening and Application wrapping. SSPoS framework overcomes repackaging attacks. SSPoS framework has very less communication and computation cost. SSPoS framework also addresses Heartbleed vulnerability. SSPoS protocol is successfully verified using Burrows-Abadi-Needham (BAN) logic, so it ensures all the security properties. SSPoS is threat modeled and implemented successfully.

Estimation of Safety Area for Intercept Debris by Using Modeling and Simulation (탄도탄 요격시험 안전구역 산출을 위한 모델링 및 시뮬레이션)

  • Lee, Sungkyun;Go, Jinyong;Han, Yongsu;Kim, Changhwan
    • Journal of the Korea Society for Simulation
    • /
    • v.29 no.1
    • /
    • pp.1-9
    • /
    • 2020
  • The ballistic missile threat continues to increase with the proliferation of missile technology. In response to this threat, many kinds of interceptors have been emphasized over the years. For development of interceptor, systematic flight tests are essential. Flight tests provide valuable data that can be used to verify performance and confirm the technological progress of ballistic missile defense system including interceptor. However, during flight tests, civilians near the test region could be risk due to a lot of intercept debris. For this reason, reliable estimate of safety area for the flight tests should be preceded. In this study, prediction of safety area is performed through modeling and simulation. Firstly, behaviors of ballistic missile and interceptor are simulated for those entire phase including interception to obtain the relative intercept velocity and the relative impact angle. By using obtained data of kinetic energy, the fragment ejection velocity is calculated and fragment trajectories are simulated by considering drag, gravity and wind effects. Based on the debris field formation and hazard evaluation of debris, final safety area is calculated.

Suggestion on the Prototype of the Korean Barriers through the Investigation and Modeling of RC Protective Installments in Contact Areas (접적지역 RC형 방호시설 조사와 모델링을 통한 한국형 방호벽 설계안의 제시)

  • Park, Young Jun;Lee, Min Su;Lee, Hui Man
    • Journal of the Korea Institute of Building Construction
    • /
    • v.16 no.4
    • /
    • pp.341-348
    • /
    • 2016
  • The aim of this study is to suggest design requirements on the military barriers which are installed to reduce critical damage on protective facilities against sudden pin-point attacks caused by North Korean artilleries. For this purpose, site investigation and review of design drawings associated with barriers built in the contact areas are conducted. With identified data concerning barriers, the geometric modeling, which is used in the structural analysis, is performed. And then, the possible threat of North Korea is determined based on intelligence preparation of battlefields. Once the structural modeling and threat analysis are completed, structural damage on barriers and protective facilities are assessed in terms of impact, penetration, scabbing, and blast pressure effects. According to the analysis results, the thickness of barriers should be 450mm at least and current established barriers need to be structurally reinforced via sectional enlargement.

A Simulation Analysis of Abnormal Traffic-Flooding Attack under the NGSS environment

  • Kim, Hwan-Kuk;Seo, Dong-Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1568-1570
    • /
    • 2005
  • The internet is already a part of life. It is very convenient and people can do almost everything with internet that should be done in real life. Along with the increase of the number of internet user, various network attacks through the internet have been increased as well. Also, Large-scale network attacks are a cause great concern for the computer security communication. These network attack becomes biggest threat could be down utility of network availability. Most of the techniques to detect and analyze abnormal traffic are statistic technique using mathematical modeling. It is difficult accurately to analyze abnormal traffic attack using mathematical modeling, but network simulation technique is possible to analyze and simulate under various network simulation environment with attack scenarios. This paper performs modeling and simulation under virtual network environment including $NGSS^{1}$ system to analyze abnormal traffic-flooding attack.

  • PDF

Zika Virus: Discovering Effective Protease Inhibitors via Template-Based Modeling

  • Choi, Yongseok
    • Proceeding of EDISON Challenge
    • /
    • 2016.03a
    • /
    • pp.86-89
    • /
    • 2016
  • The Zika virus, which is a member of the flavivirus genus, poses a serious threat to humanity because there is no vaccine or cure. Zika is suspected to cause microcephaly, and it is rapidly spreading throughout parts of Brazil. Surprisingly, there are no known protein structures for the virus which are essential for drug and vaccine development. This paper investigates the Zika virus's nonstructural proteins with template-based modeling by using GalaxyTBM/Refine/SC. GalaxyDock was used to examine the effectiveness of various known serine protease inhibitors in inhibiting the Zika viral protease. In testing five inhibitors, Kunitz soybean trypsin inhibitor showed the strongest binding affinity (-10.082 kcal/mol). This paper provides a rudimentary foundation for further drug discovery research regarding the Zika virus.

  • PDF