• Title/Summary/Keyword: software vulnerability

Search Result 248, Processing Time 0.028 seconds

An Interpretable Log Anomaly System Using Bayesian Probability and Closed Sequence Pattern Mining (베이지안 확률 및 폐쇄 순차패턴 마이닝 방식을 이용한 설명가능한 로그 이상탐지 시스템)

  • Yun, Jiyoung;Shin, Gun-Yoon;Kim, Dong-Wook;Kim, Sang-Soo;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.2
    • /
    • pp.77-87
    • /
    • 2021
  • With the development of the Internet and personal computers, various and complex attacks begin to emerge. As the attacks become more complex, signature-based detection become difficult. It leads to the research on behavior-based log anomaly detection. Recent work utilizes deep learning to learn the order and it shows good performance. Despite its good performance, it does not provide any explanation for prediction. The lack of explanation can occur difficulty of finding contamination of data or the vulnerability of the model itself. As a result, the users lose their reliability of the model. To address this problem, this work proposes an explainable log anomaly detection system. In this study, log parsing is the first to proceed. Afterward, sequential rules are extracted by Bayesian posterior probability. As a result, the "If condition then results, post-probability" type rule set is extracted. If the sample is matched to the ruleset, it is normal, otherwise, it is an anomaly. We utilize HDFS datasets for the experiment, resulting in F1score 92.7% in test dataset.

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.

Chemical Disaster of Methyl Isocyanate Leakage (화학물질 누출에 의한 대량재해 - Methyl Isocyanate 누출을 중심으로 -)

  • Yang, Hyuk-Jun;Choi, Jung-Myung;Yoo, Dong-Jun
    • The Korean Journal of Emergency Medical Services
    • /
    • v.3 no.1
    • /
    • pp.7-19
    • /
    • 1999
  • Background : We are in the edge of some human made disasters such as hazardous materials and air pollution, for example, the world news reported that the city of Bhopal, India had serious victims related with a leaking out of the chemical materials, Methyl Isocyanate and many people in India were killed by. These situations many people who live in this world are world are worrying about are not others, but just ours and people consider about that kind of the disasters are the possible situation to happen to all the people. Therefore, we performed this basic study to recognize the risk of Methyl Isocyanate leak accident and to prepare local disaster plan with EMS system. Method : Trace 8.0, a simulation software made by the U.S. company Safer System was used as a tool to estimate the diffusion distance, area and its victims at the concentrations of 0.02ppm, 0.2ppm 5ppm respectively for an assumed B-city of 2 hundred thousands population count in which was presumed 500kg Methyl Isocyanate gas to leak out. Results : 1. During 1 hour, maximum diffusion distances of 0.02ppm 0.2ppm and 5ppm were 5.41km, 1.61km and 0.29km respectively on the plume impact. 2. Maximum population counts influenced by Methyl Isocyanate gas at the concentrations of 0.02ppm 0.2ppm and 5ppm were 40838, 4346 and 222 on the plume impact, while those were 138238, 17261 and 1588 on the vulnerability impact, respectively. 3. Therefore, 17261 persons must put on respiratory device and 138283 persons must be evacuated to safety place within 1 hour. Conclusions : Only small amount leak of Methyl Isocyanate may cause tremendous chemical disaster in urban area, so its disaster plan must be prepared with an accident simulation program and Material Safety Data Sheets(MSDS). Especially, nearby emergency center of an industrial complex must have a strong position about preparation of chemical disaster plan and perform a disaster dill of hazardous material accident annually.

  • PDF

Vulnerability Analysis for Industrial Control System Cyber Security (산업제어시스템의 사이버보안을 위한 취약점 분석)

  • Kim, Do-Yeon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.1
    • /
    • pp.137-142
    • /
    • 2014
  • Industrial control system (ICS) is a computer based system which are typically used in nation-wide critical infra-structure facilities such as electrical, gas, water, wastewater, oil and transportation. In addition, ICS is essentially used in industrial application domain to effectively monitor and control the remotely scattered systems. The highly developed information technology (IT) and related network techniques are continually adapted into domains of industrial control system. However, industrial control system is confronted significant side-effects, which ICS is exposed to prevalent cyber threats typically found in IT environments. Therefore, cyber security vulnerabilities and possibilities of cyber incidents are dramatically increased in industrial control system. The vulnerabilities that may be found in typical ICS are grouped into Policy and Procedure, Platform, and Network categories to assist in determining optimal mitigation strategies. The order of these vulnerabilities does not necessarily reflect any priority in terms of likelihood of occurrence or severity of impact. Firstly, corporate security policy can reduce vulnerabilities by mandating conduct such as password usage and maintenance or requirements for connecting modems to ICS. Secondly, platfom vulnerabilities can be mitigated through various security controls, such as OS and application patching, physical access control, and security software. Thirdly, network vulnerabilities can be eliminated or mitigated through various security controls, such as defense-in-depth network design, encrypting network communication, restricting network traffic flows, and providing physical access control for network components.

Development of Extreme Event Analysis Tool Base on Spatial Information Using Climate Change Scenarios (기후변화 시나리오를 활용한 공간정보 기반 극단적 기후사상 분석 도구(EEAT) 개발)

  • Han, Kuk-Jin;Lee, Moung-Jin
    • Korean Journal of Remote Sensing
    • /
    • v.36 no.3
    • /
    • pp.475-486
    • /
    • 2020
  • Climate change scenarios are the basis of research to cope with climate change, and consist of large-scale spatio-temporal data. From the data point of view, one scenario has a large capacity of about 83 gigabytes or more, and the data format is semi-structured, making it difficult to utilize the data through means such as search, extraction, archiving and analysis. In this study, a tool for analyzing extreme climate events based on spatial information is developed to improve the usability of large-scale, multi-period climate change scenarios. In addition, a pilot analysis is conducted on the time and space in which the heavy rain thresholds that occurred in the past can occur in the future, by applying the developed tool to the RCP8.5 climate change scenario. As a result, the days with a cumulative rainfall of more than 587.6 mm over three days would account for about 76 days in the 2080s, and localized heavy rains would occur. The developed analysis tool was designed to facilitate the entire process from the initial setting through to deriving analysis results on a single platform, and enabled the results of the analysis to be implemented in various formats without using specific commercial software: web document format (HTML), image (PNG), climate change scenario (ESR), statistics (XLS). Therefore, the utilization of this analysis tool is considered to be useful for determining future prospects for climate change or vulnerability assessment, etc., and it is expected to be used to develop an analysis tool for climate change scenarios based on climate change reports to be presented in the future.

Investigation of the Role of Training Health Volunteers in Promoting Pap Smear Test Use among Iranian Women Based on the Protection Motivation Theory

  • Ghahremani, Leila;Harami, Zahra Khiyali;Kaveh, Mohammad Hossein;Keshavarzi, Sareh
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.17 no.3
    • /
    • pp.1157-1162
    • /
    • 2016
  • Background: Cervical cancer is known as one of the most prevalent types of cancers and a major public health problem in developing countries which can be detected by Pap test, prevented, and treated. Despite the effective role of Pap test in decreasing the incidence and mortality due to cervical cancer, it is still one the most common causes of cancer-related deaths among women, especially in developing countries. Thus, this study aimed to examine the effect of educational interventions implemented by health volunteers based on protection motivation theory (PMT) on promoting Pap test use among women. Materials and Methods: This quasi-experimental study was conducted on 60 health volunteers and 420 women. The study participants were divided into an intervention and a control group. Data were collected using a valid self-reported questionnaire including demographic variables and PMT constructs which was completed by both groups before and 2 months after the intervention. Then, the data were entered into the SPSS statistical software, version 19 and were analyzed using Chi-square test, independent T-test, and descriptive statistical methods. P<0.05 was considered as statistically significant. Results: The findings of this study showed that the mean scores of PMT constructs (i.e. perceived vulnerability, perceived severity, fear, response-costs, self-efficacy, and intention) increased in the intervention group after the intervention (P<0.001). However, no significant difference was found between the two groups regarding response efficacy after the intervention (P=0.06). The rate of Pap test use also increased by about 62.9% among the study women. Conclusions: This study showed a significant positive relationship between PMT-based training and Pap test use. The results also revealed the successful contribution of health volunteers to training cervical cancer screening. Thus, training interventions based on PMT are suggested to be designed and implemented and health volunteers are recommended to be employed for educational purposes and promoting the community's, especially women's, health.

PVD Image Steganography with Locally-fixed Number of Embedding Bits (지역적 삽입 비트를 고정시킨 PVD 영상 스테가노그래피)

  • Kim, Jaeyoung;Park, Hanhoon;Park, Jong-Il
    • Journal of Broadcast Engineering
    • /
    • v.22 no.3
    • /
    • pp.350-365
    • /
    • 2017
  • Steganography is a technique for secret data communication, which is not perceived by third person between a receiver and a transmitter. It has been developed for thousands of years for the transmission of military, diplomatic or business information. The development of digital media and communication has led to the development of steganography techniques in modern times. Technic of image steganography include the LSB, which fixes the number of embedded bits into a pixel, and PVD, which exploits the difference value in the neighboring pixel pairs. In the case of PVD image steganography, a large amount of information is embedded fluidly by difference value in neighboring pixel pairs and the designed range table. However, since the secret information in order is embedded, if an error of the number of embedded bits occurs in a certain pixel pair, all subsequent information will be destroyed. In this paper, we proposes the method, which improve the vulnerability of PVD property about external attack or various noise and extract secret information. Experimental process is comparison analysis about stego-image, which embedded various noise. PVD shows that it is not possible to preserve secret information at all about noise, but it was possible to robustly extract secret information for partial noise of stego-image in case of the proposed PVD image steganography with locally-fixed number of embedding bits.

Elicitation of drought alternatives based on Water Policy Council and the role of Shared Vision Model (협의체 기반 가뭄 대응 대안 도출과 비전공유모형의 역할)

  • Kim, Gi Joo;Seo, Seung Beom;Kim, Young-Oh
    • Journal of Korea Water Resources Association
    • /
    • v.52 no.6
    • /
    • pp.429-440
    • /
    • 2019
  • The numbers of multi-year droughts due to climate change are increasing worldwide. Boryeong Dam, located in Chungcheongnam-do, South Korea, was also affected by a 4-year drought from 2014 to 2017. Since traditional unilateral decision making processes to alleviate drought damage have, until now, resulted in conflicts between many of the involved groups, the need for active participation from both stakeholders and policymakers is greater than before. This study introduced Shared Vision Planning, a collaborative decision making process that involves participation from various groups of stakeholders, by organizing Water Policy Council for Climate Change Adaptation in Chungcheongnam-do. A Shared Vision Planning Model was then developed with a system dynamics software by working together with relevant stakeholders to actively reflect their requests through three council meetings. Multiple simulations that included various future climate change scenarios were conducted, and future drought vulnerability analysis results of Boryeong Dam and districts, in terms of frequency, length, and magnitude, were arrived at. It was concluded that Boryeong Dam was more vulnerable to future droughts than the eight districts. While the total water deficit in the eight districts was not so significant, their water deficit in terms of spatial discordance was proved to be more problematic. In the future, possible alternatives to the model will be implemented so that stakeholders can use it to agree on a policy for possible conflict resolutions.