• Title/Summary/Keyword: network threat

Search Result 444, Processing Time 0.028 seconds

Security Information and Event Management System for Ship Cyber Security (해사 사이버 보안 대응을 위한 선박용 보안 정보와 이벤트 관리 시스템)

  • Nam-seon Kang;Chang-sik Lee;Seong-sang Yu;Jong-min Lee;Gum-jun Son
    • Journal of Advanced Navigation Technology
    • /
    • v.28 no.4
    • /
    • pp.497-506
    • /
    • 2024
  • In this study, we proposed security information and event management for ship as a technology to respond to maritime cybersecurity regulations and evolving cyber threats. We analyze the main technologies of network management system and security information and event management, which are representative technologies for responding to ship cyber security, and propose SIEM for ships based on this. Optimized for ships based on the International Maritime Organization's Maritime Cyber Threat Management Guidelines, IACS UR E26, 27, etc. Derive the main functions of the SIEM for ship, linkage and normalization plan for the ship's heterogeneous equipment, ship's cyber threat and ship detection policy to identify ship's cyber security threats, and ship's operating environment and operating personnel.

PMIP-based Distributed Mobility Management for Tactical Network (전술 기동망의 이동성 지원을 위한 PMIP기반 분산 이동성 관리 적용방안)

  • Sun, Kyoungjae;Kim, Younghan;Noh, Hongjun;Park, Hyungwon;Han, Myounghun;Kwon, Daehoon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.22 no.5
    • /
    • pp.654-666
    • /
    • 2019
  • The tactical network has several different characteristics compared with commercial internet network such as hierarchical topology, dynamic topology changing and wireless link based connectivity. For considering IP mobility management in the tactical network, current mobility management using Mobile IP(MIP) is not suitable with some reasons such as non-optimal routing paths and single point of failure. Proxy Mobile IP(PMIP) which supporting network-based mobility in hierarchical manner can provide optimal routing path in the tactical network environment, but centralized anchor is still remained a threat to the stability of the tactical network which changes its topology dynamically. In this paper, we propose PMIP-based distributed mobility management for the tactical network environment. From our design, routing paths are always configured in optimized way, as well as path is recovered quickly when the mobility anchor of user is failed. From numerical analysis, comparing to other mobility scheme, result shows that the proposed scheme can reduce packet transmission cost and latency in tactical network model.

Determination of the Shortest Transportation Path in Wartime (전시 최단수송경로 선정)

  • Yun Jong-Ok;Ha Seok-Tae
    • Journal of the military operations research society of Korea
    • /
    • v.17 no.2
    • /
    • pp.72-89
    • /
    • 1991
  • In transportation network problems, it is often desirable to select multiple number of the shortect paths. On problems of finding these paths, algorithms have been developed to choose single shortest path, k-shortest paths and k-shortest paths via p-specified nodes in a network. These problems consider the time as the main factor. In wartime, we must consider availability as well as time to determine the shortest transportation path, since we must take into account enemy's threat. Therefore, this paper addresses the problem of finding the shortest transportation path considering both time and availability. To accomplish the objective of this study, values of k-shortest paths are computed using the algorithm for finding the k-shortest paths. Then availabilties of those paths are computed through simulation considering factors such as rates of suffering attack, damage and repair rates of the paths. An optimal path is selected using any one of the four decision rules that combine the value and availability of a path.

  • PDF

A Study on the Algorithm for Fault Discrimination in Transmission Lines using Neural Network and the Variation of Fault Currents (신경회로망과 고장전류의 변화를 이용한 고장판별 알고리즘에 관한 연구)

  • Yeo, Sang-Min;Kim, Cheol-Hwan
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.49 no.8
    • /
    • pp.405-411
    • /
    • 2000
  • When faults occur in transmission lines, the classification of faults is very important. If the fault is HIF(High Impedance Fault), it cannot be detected or removed by conventional overcurrent relays (OCRs), and results in fire hazards and causes damages in electrical equipment or personal threat. The fast discrimination of fault needs to effective protection and treatment and is important problem for power system protection. This paper propolsed the fault detection and discrimination algorithm for LIFs(Low Impedance Faults) and HIFs(High Impedance Faults). This algorithm uses artificial neural networks and variation of 3-phase maximum currents per period while faults. A double lines-to-ground and line-to-line faults can be detected using Neural Network. Also, the other faults can be detected using the value of variation of maximum current. Test results show that the proposed algorithms discriminate LIFs and HIFs accurately within a half cycle.

  • PDF

Study on Structural and Systematic Security Threats of Vehicle Black Box as Embedded System

  • Park, Jaehyun;Choi, WoongChul
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.9 no.3
    • /
    • pp.9-16
    • /
    • 2017
  • Recently, more users have been using IoT embedded systems. Since the wireless network function is a basic and core function in most embedded systems, new security threats and weaknesses are expected to occur. In order to resolve these threats, it is necessary to investigate the security issues in the development stages according to the Security Development Lifecycle (SDL). This study analyzes the vulnerabilities of the embedded systems equipped with the wireless network function, and derives possible security threats and how dangerous such threats are. We present security risks including bypassing the authentication stage required for accessing to the embedded system.

A Security Threats in Wireless Charger Systems in M2M (M2M에서 무선충전 시스템의 보안 위협)

  • Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.4 no.1
    • /
    • pp.27-31
    • /
    • 2013
  • The fast-paced development in the field of wireless charger based on M2M, which is available anytime and anywhere, is being underway in accordance with the development of IT technology. Wireless charger technology in M2M has various security threats because it is based on wireless network. The purpose of this paper is to examine the threats of authentication and payment attacks based on wireless network attacks, and to propose the response technique that fit the situation of the wireless charger service by modifying the existing detecting authentication and payment through wireless charger.

Analysis and Countermeasure of Malicious Code in Small Businesses (중소기업 환경에서 악성코드 유형 분석과 대응 방안)

  • Hong, Jun Suk;Kim, Young hee;Park, Won Hyung;Kook, Kwang Ho
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.55-62
    • /
    • 2015
  • Due to the development of various information systems and PC, usage of Internet has rapidly increaced which lead to malicious codes rapidly spreading throughout the Internet. By the increasing use of the Internet, the threat by malicious codes has become a serious problem. In particular, Small businesses which lack investments in security personnels makes it impossible to verify and measure the servers and PC infected with malicious codes. We have analized malware infection types by using malicious code detection technology of security monitoring service and proposed countermeasures in small businesses.

A Method of Defense and Security Threats in U-Healthcare Service (U-Healthcare서비스의 보안 위협과 대응 방법)

  • Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.3 no.4
    • /
    • pp.1-5
    • /
    • 2012
  • The fast-paced development in the field of U-Healthcare, which is available anytime and anywhere, is being underway in accordance with the development of IT technology. U-Healthcare technology has various security threats because it is based on network. The purpose of this paper is to examine the threats of DOS / DDOS attacks based on network attacks, and to propose the response technique that fit the situation of the U-Healthcare service by modifying the existing Detecting Early DOS / DDOS attacks through Packet Counting.

A Study on the Insider Behavior Analysis Using Machine Learning for Detecting Information Leakage (정보 유출 탐지를 위한 머신 러닝 기반 내부자 행위 분석 연구)

  • Kauh, Janghyuk;Lee, Dongho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.2
    • /
    • pp.1-11
    • /
    • 2017
  • In this paper, we design and implement PADIL(Prediction And Detection of Information Leakage) system that predicts and detect information leakage behavior of insider by analyzing network traffic and applying a variety of machine learning methods. we defined the five-level information leakage model(Reconnaissance, Scanning, Access and Escalation, Exfiltration, Obfuscation) by referring to the cyber kill-chain model. In order to perform the machine learning for detecting information leakage, PADIL system extracts various features by analyzing the network traffic and extracts the behavioral features by comparing it with the personal profile information and extracts information leakage level features. We tested various machine learning methods and as a result, the DecisionTree algorithm showed excellent performance in information leakage detection and we showed that performance can be further improved by fine feature selection.

State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents

  • Kryshtanovych, Myroslav;Britchenko, Igor;Losonczi, Peter;Baranovska, Tetiana;Lukashevska, Ulyana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.33-38
    • /
    • 2022
  • The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to the national security of any state. As a result of the study, key elements of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents were identified.