• Title/Summary/Keyword: attacks and countermeasures

Search Result 213, Processing Time 0.027 seconds

A Study on the Countermeasures for Securing Safety of Ship from Piracy Attacks

  • Noh, Seung-Dae;Kim, Cheol-Seung;Park, Sung-Hyeon
    • Journal of Navigation and Port Research
    • /
    • v.36 no.4
    • /
    • pp.273-278
    • /
    • 2012
  • This study is concerned with the applicable countermeasures for securing safety of ship from piracy attacks. For improvements and countermeasures, we analyzed the recent anti-piracy trends. In spite of international community's various activities for safety navigating, the number of piracy in Gulf of Aden and in the vicinity of Somali waters has been increasing dramatically in the last few years, so has the number of piracy on Korean vessels. In case of piracy attack which based on Somalia, it continues constantly and widely not only near shore, but coastal and oceanic waters. This study figures out the limitations of international community's efforts including military and legal improvements. There are no studies concerning the countermeasures of bridge protection by piracy. This study suggested the additional installation of outside door of bridge as well as the adjustment of piracy operation area(POA) of Korea navy.

Perspective on Bioterrorism in the United States (미국의 생물테러대책에 관한 고찰)

  • Kang, Young-gil;Kwon, Jeong- hoon
    • Journal of the Society of Disaster Information
    • /
    • v.5 no.1
    • /
    • pp.10-27
    • /
    • 2009
  • The fear briefly became reality in the U.S. after 9/11, as man-made anthrax spores were found in letters and in east coast post offices on a number of occasions. Anthrax attacks must be related to the terrorist attacks of September 11. These two accidents changed the situation completely. Characteristics are summarized as belows. First, it is necessary for all countries to create each own appropriate countermeasures against bioterrorism. In addition, it is urgent to consider countermeasures focusing on bioterror characteristics that terrorists may use biological agents because they can be extremely difficult to detect and do not cause illness for several hours to several days. Otherwise, those attacks will also show the panic and very real danger posed by the release of such toxins on an unsuspecting public. Second, it is crucial to manage the result thoroughly. A biological weapon is useful to a terrorist group mainly as a method of creating mass panic and disruption to a society. Because it is not easy to predict and collect information about how terrorists utilize pathogenic microbe as well as terror measures in their activities, more realistic approach should be taken to reduce damage. Third, to expand investment in research and development is necessary. Considering advances in microbiology and genetic engineering lately, it is likely that new pathogenic microbe would be created by the enemy. For that matter, it is imperative that medical countermeasures should be devised.

  • PDF

Experimental Analysis of Physical Signal Jamming Attacks on Automotive LiDAR Sensors and Proposal of Countermeasures (차량용 LiDAR 센서 물리적 신호교란 공격 중심의 실험적 분석과 대응방안 제안)

  • Ji-ung Hwang;Yo-seob Yoon;In-su Oh;Kang-bin Yim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.217-228
    • /
    • 2024
  • LiDAR(Light Detection And Ranging) sensors, which play a pivotal role among cameras, RADAR(RAdio Detection And Ranging), and ultrasonic sensors for the safe operation of autonomous vehicles, can recognize and detect objects in 360 degrees. However, since LiDAR sensors use lasers to measure distance, they are vulnerable to attackers and face various security threats. In this paper, we examine several security threats against LiDAR sensors: relay, spoofing, and replay attacks, analyze the possibility and impact of physical jamming attacks, and analyze the risk these attacks pose to the reliability of autonomous driving systems. Through experiments, we show that jamming attacks can cause errors in the ranging ability of LiDAR sensors. With vehicle-to-vehicle (V2V) communication, multi-sensor fusion under development and LiDAR anomaly data detection, this work aims to provide a basic direction for countermeasures against these threats enhancing the security of autonomous vehicles, and verify the practical applicability and effectiveness of the proposed countermeasures in future research.

A Survey on the Detection of SQL Injection Attacks and Their Countermeasures

  • Nagpal, Bharti;Chauhan, Naresh;Singh, Nanhay
    • Journal of Information Processing Systems
    • /
    • v.13 no.4
    • /
    • pp.689-702
    • /
    • 2017
  • The Structured Query Language (SQL) Injection continues to be one of greatest security risks in the world according to the Open Web Application Security Project's (OWASP) [1] Top 10 Security vulnerabilities 2013. The ease of exploitability and severe impact puts this attack at the top. As the countermeasures become more sophisticated, SOL Injection Attacks also continue to evolve, thus thwarting the attempt to eliminate this attack completely. The vulnerable data is a source of worry for government and financial institutions. In this paper, a detailed survey of different types of SQL Injection and proposed methods and theories are presented, along with various tools and their efficiency in intercepting and preventing SQL attacks.

DEVS-based Modeling Methodology for Cybersecurity Simulations from a Security Perspective

  • Kim, Jiyeon;Kim, Hyung-Jong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.2186-2203
    • /
    • 2020
  • Security administrators of companies and organizations need to come up with proper countermeasures against cyber-attacks considering infrastructures and security policies in their possession. In order to develop and verify such countermeasures, the administrators should be able to reenact both cyber-attacks and defenses. Simulations can be useful for the reenactment by overcoming its limitations including high risk and cost. If the administrators are able to design various scenarios of cyber-attacks and to develop simulation models from their viewpoints, they can simulate desired situations and observe the results more easily. It is challenging to simulate cyber-security issues, because there is lack of theoretical basis for modeling a wide range of the security field as well as pre-defined basic components used to model cyber-attacks. In this paper, we propose a modeling method for cyber-security simulations by developing a basic component and a composite model, called Abstracted Cyber-Security Unit Model (ACSUM) and Abstracted Cyber-security SIMulation model (ACSIM), respectively. The proposed models are based on DEVS(Discrete Event systems Specification) formalism, a modeling theory for discrete event simulations. We develop attack scenarios by sequencing attack behaviors using ACSUMs and then model ACSIMs by combining and abstracting the ACSUMs from a security perspective. The concepts of ACSUM and ACSIM enable the security administrators to simulate numerous cyber-security issues from their viewpoints. As a case study, we model a worm scenario using ACSUM and simulate three types of simulation models based on ACSIM from a different security perspective.

Threats of MANPADS and Its Counter-Measures

  • Choi, Jin-Tai
    • International Journal of Contents
    • /
    • v.6 no.3
    • /
    • pp.89-96
    • /
    • 2010
  • The International air transportation industry provides a vital communication link which brings prosperity to many states in our modern age. This invaluable link has been threatened by terrorism. Airlines have been one of the most attractive targets in the eyes of terrorists for several reasons, including particularly the international and symbolic nature of aviation, and the potential of multigovernmental involvement which can inevitably generate wide publicity. Terrorist attacks against civil aviation have been committed since the earliest days of civil aviation history. The first attack against civil aircraft dates back to the early 1930s. Since then, aircraft hijacking and other forms of attack against air transport operations have become one of the most serious challenges to the safety of flying. In recent years, a new form of threats against civil aviation has appeared. Man-portable air defense systems (MANPADS) in the hands of criminals, terrorists, and other non-state actors pose a serious potential threat to passenger air travel, the commercial aviation industry, and military aircraft around the world. The purpose of this study is to provide some countermeasures against such attacks. In order to foster a better understanding of the problem, an introduction of MANPADS and a brief history of attacks using MANPADS are presented. It also examines the level of threats, trends of attacks using MANPADS and the possible countermeasures to be taken by the international community.

A Countermeasure Resistant to Fault Attacks on CRT-RSA using Fault Infective Method (오류 확산 기법을 이용한 CRT-RSA 오류 주입 공격 대응 방안)

  • Ha, Jae-Cheol;Park, Jea-Hoon;Moon, Sang-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.75-84
    • /
    • 2008
  • Recently, the straightforward CRT-RSA was shown to be broken by fault attacks through many experimental results. In this paper, we analyze the fault attacks against CRT-RSA and their countermeasures, and then propose a new fault infective method resistant to the various fault attacks on CRT-RSA. In our CRT-RSA algorithm, if an error is injected in exponentiation with modulo p or q, then the error is spreaded by fault infective computation in CRT recombination operation. Our countermeasure doesn't have extra error detection procedure based on decision tests and doesn't use public parameter such as e. Also, the computational cost is effective compared to the previous secure countermeasures.

Professional Engineer's Role to Respond to Haeker Attacks (긴급제언: 해킹대응과 기술사의 역할)

  • Kwon, Young-Kwan
    • Journal of the Korean Professional Engineers Association
    • /
    • v.44 no.5
    • /
    • pp.26-30
    • /
    • 2011
  • The hacking attacks as a DDoS attack on a telecommunications network has depleted the network resources. When hacking attack occurs a user can not access to the network and can not use the telecommunication services. Professional Engineers with expertise and experience in the field of Information and communication could play an important role to respond to the hacking attacks. Professional Engineers will build the information and communication network system for the hacking countermeasures.

  • PDF

A Survey on Defense Mechanism against Distributed Denial of Service (DDoS) Attacks in Control System

  • Kwon, YooJin
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.1 no.1
    • /
    • pp.55-59
    • /
    • 2015
  • Denial of Service (DoS) attack is to interfere the normal user from using the information technology services. With a rapid technology improvements in computer and internet environment, small sized DoS attacks targeted to server or network infrastructure have been disabled. Thus, Distributed Denial of Service (DDoS) attacks that utilizes from tens to several thousands of distributed computers as zombie PC appear to have as one of the most challenging threat. In this paper, we categorize the DDoS attacks and classify existing countermeasures based on where and when they prevent, detect, and respond to the DDoS attacks. Then we propose a comprehensive defense mechanism against DDoS attacks in Control System to detect attacks efficiently.

Quantitative Approach for Calculating DRDoS Risk

  • Young-Ryul Choi;Nam-Kyun Baik
    • Journal of information and communication convergence engineering
    • /
    • v.21 no.3
    • /
    • pp.192-197
    • /
    • 2023
  • A Distributed reflection denial of service (DRDoS) is a variant of DDoS attacks that threatens the availability of services to legitimate users. In response to this evolving threat landscape, the cybersecurity industry and service providers have intensified their efforts to develop effective countermeasures. Despite these efforts, attackers continue to innovate, developing new strategies and tools while becoming more sophisticated. Consequently, DRDoS attacks continue to be harmful. Therefore, ongoing research and development is essential to improve defense against DRDoS attacks. To advance our understanding and analysis of DRDoS attacks, this study examines the unique characteristics of DRDoS attacks and quantifies the risks involved. Additionally, it adopts a quantitative rather than traditional qualitative methods to derive and apply risk, particularly the probability of loss that can be caused by DRDoS attacks.