• Title/Summary/Keyword: top attack

Search Result 62, Processing Time 0.027 seconds

A study on Stage-Based Flow Graph Model for Expressing Cyber Attack Train Scenarios (사이버 공격 훈련 시나리오 표현을 위한 Stage 기반 플로우 그래프 모델 연구)

  • Kim, Moon-Sun;Lee, Man-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.1021-1030
    • /
    • 2021
  • This paper proposes S-CAFG(Stage-based Cyber Attack Flow Graph), a model for effectively describing training scenarios that simulate modern complex cyber attacks. On top of existing graph and tree models, we add a stage node to model more complex scenarios. In order to evaluate the proposed model, we create a complicated scenario and compare how the previous models and S-CAFG express the scenario. As a result, we confirm that S-CAFG can effectively describe various attack scenarios such as simultaneous attacks, additional attacks, and bypass path selection.

Network Security Visualization for Trend and Correlation of Attacks (네트워크 공격 추이 및 공격 연관 정보 시각화)

  • Chang, Beom-Hwan
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.27-34
    • /
    • 2017
  • Network security visualization technique using security alerts provide the administrator with intuitive network security situation by efficiently visualizing a large number of security alerts occurring from the security devices. However, most of these visualization techniques represent events using overlap the timelines of the alerts or Top-N analysis by their frequencies resulting in failing to provide information such as the attack trend, the relationship between attacks, the point of occurrence of attack, and the continuity of the attack. In this paper, we propose an effective visualization technique which intuitively explains the transition of the whole attack and the continuity of individual attacks by arranging the events spirally according to timeline and marking occurrence point and attack type. Furthermore, the relationship between attackers and victims is provided through a single screen view, so that it is possible to comprehensively monitor not only the entire attack situation but also attack type and attack point.

Destruction and Improper Restoration of Cheomseongdae (경주첨성대의 파손과 잘못된 복구)

  • Chang, Hwal Sik
    • Korean Journal of Heritage: History & Science
    • /
    • v.45 no.2
    • /
    • pp.72-99
    • /
    • 2012
  • Cheomseongdae, Korea's so-called "star-gazing tower" located in the former Silla Dynasty capital of Gyeongju, is generally believed to have maintained its original shape since its construction in 647. The stone structure was closely examined and measured by Gyeongju National Museum in 1962 and reexamined by Korean National Research Institute of Cultural Heritage in 2009. This research noted the following structural anomalies of Cheomseongdae. A corner of the top rectangle layer was broken diagonally in a form that can never be attributed to a natural cause. The four metal clamps under the top rectangle layer had been missing. Four grooves, with unknown usage, exist on the sides of the long rectangular stones projected out of the circular body at the second and third circular layers from the top. On the second circular layer from the top, there are three flat stones, less than a half as tall as their surrounding stones. The average height of the third circular layer from the top is only 23.5 cm, while the overall average of the entire 27 circular layers is 29.9cm. This research postulates that all these anomalies are due to prior destructions and improper restorations of the structure. The first destruction and restoration of Cheomsengdae was likely to have occurred before the mid 15th century. The damages might include a pavilion on the top of the structure and a stone with the name of the structure carved in. The Mongolian invasion in the 13th century was a most likely cause. After the restoration, the structure suffered at least another attack. The damages on the top layer and the missing iron clamps were due to the later attack. The grooves and flat stones were to house holding device that affixed certain objects to the outer surface of the circular body. The metal or stone objects might have faced upward at the four corners of Chemseongdae, bridging the gaps between the rectangle layers and circular layers. The current Chemseongdae lost at least the four affixed objects, four holding devices, and one flat stone.

A comparative study of effects using physical treatmental apparatus and diagnosis of shoulder pain on cerebrovascular attack patients (뇌졸중환자중(腦卒中患者中) 견관절동통(肩關節疼痛)에 관(關)한 진단(診斷) 및 치료기기효과(治療器機效果)에 대(對)한 비교(比較) 연구(硏究))

  • Kang, Jae-Chun;Baik, Tai-Hyun
    • The Journal of Internal Korean Medicine
    • /
    • v.20 no.1
    • /
    • pp.244-260
    • /
    • 1999
  • This study was to investigate diagnosis of shoulder pain on cerebrovascular attack patients and treatment effects by using physical treatment and orienatal diagnosis aparatus, as oriental diagnosis equipments, these were used thermography, maegzin and yangdorag machine. as physical treatment equipments, these were used Hot pack, TENS (Transcutaneous electrical nerve stimulation), ICT(Interferential current therapy) the results were followed 1. In Sex and Age distribution on cerebrovascular attack patients with shoulder pain, male(51.7%)had many than female(48.3%) and 60s were the top, next 70s 50s 40s. 2. In the reason of cerebrovascular attack and the type of motor paresis, cerebrovascular infarction(73.3%) had many than hemorrhage(26.7%) 3. In hospitalizied period of cerebrovascular attack patients with shoulder pain, the period from 11 to 60 days had almost occupied. 4. Oriental medical diagnositic propriety of shoulder pain by using maegzin and yangdorag machine were not recognized. 5. In measuring passive range of motion of pre and post treatment, improvement effect on Hot pack was not showed, but effects on TENS, ICT were showed. 6. In measuring temperature of painful shouler joint of pre and post treatment by using thermography, the effect of Hot pack was not recognized but the effects of TENS, ICT were recognized.

  • PDF

The Analysis of Bridge Deck Considering Relative Girder Deflection (거더간 상대처짐을 고려한 바닥판의 해석)

  • 유철수;강영종;최진유;양기재
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 1998.04a
    • /
    • pp.141-148
    • /
    • 1998
  • The chloride attack of the top mat of reinforcing bars is a major cause of deterioration of comcrete deck of plate girder bridges. This is caused by a current design method which requires a top mat of reinforcing bars to resist a negative bending moment in bridge decks. In recently, empirical evidence has indicated that the top transverse reinforcing bars can patially or fully be eliminated without jeopardizing the structural integrity of a deck. So, one of the most efficient way to increase durability of concrete deck of bridges is the development of new design method that reduce or eliminate the top mat reinforcing bars, mad it is possible by the exact analysis that considering the negative bending moment reducing effect which introduced by relative deflection of plate girders. In this study, we develop the new bridge deck analysis method that considered the effect of relative girder deflection by applying the principles of slope deflection method of frames, and that is fine tuned with results of finite element analysis. This new approach evaluate a bending moment in a deck based on the effect of relative girder deflection as well as the magnitude of wheel loads, the girder spacing and stiffness, deck stiffness and the span length

  • PDF

Look-Angle-Control Guidance for Missiles with Strapdown Seeker (스트랩다운 탐색기를 탑재한 유도탄의 관측각 제어 유도)

  • Kim, Dowan;Park, Woosung;Ryoo, Chang-Kyung
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.19 no.3
    • /
    • pp.275-280
    • /
    • 2013
  • Conventional proportional navigation guidance law is not adequate for missiles with a strapdown seeker, because the strapdown seeker cannot measure line-of-sight rate directly. This paper suggests a guidance loop design method, in which the look angle, measured by the strapdown seeker directly, is controlled to deliver a missile to a target. Basically, the look angle control loop is regarded as an attitude control loop. By using the proposed method, it is possible to shape the midcourse trajectory by choosing the reference look angle properly. The look angle control loop can robustly maintain target lock-on against disturbances because the target is always captured in the field of view of the seeker. The performance of the proposed method is verified via 6-DOF simulations of a true short range tactical missile model.

Selection and Ranking of Common Attack Patterns for Developing Secure Web Applications (안전한 웹 애플리케이션 개발을 위한 공통 공격패턴의 선별 및 순위화)

  • Moon, Jae-Chan;Kim, Dae-Gyeong;Cho, Seong-Je
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06b
    • /
    • pp.226-228
    • /
    • 2012
  • 최근 HTML5, AJAX(Asynchronous JavaScript XML) 등으로 구현된 웹 애플리케이션이 널리 이용됨에 따라 웹 애플리케이션에 존재하는 취약점을 악용하는 공격 사례가 증가하고 있다. 웹 애플리케이션의 안전한 개발과 유지보수를 위해, 설계/구현 단계에서의 취약점 완화를 통한 예방, 그리고 운영 단계에서의 공격 탐지 및 대응이 필요하다. 더불어, 위험한 취약점들 및 공격 패턴들을 분석하고 우선순위를 부여하여, 웹 애플리케이션 개발 단계 및 운영 단계에서 심각한 취약점과 공격들을 우선 고려해야 한다. 본 논문에서는 OWASP Top 10과 CWE(Common Weakness Enumeration)를 연동시켜 CAPEC(Common Attack Pattern Enumeration and Classification)에서 웹 관련 주요 공격 패턴을 선별하고 순위화하였다. CWE는 취약점 예방에 도움을 주며, 순위화된 공격 패턴은 웹 애플리케이션에서 주요 공격들을 효율적으로 방어할 수 있게 하여 준다.

A Deep Learning-Based Smartphone Phishing Attacks Countermeasures (딥러닝 기반 스마트폰 피싱 공격 대응 방법)

  • Lee, Jae-Kyung;Seo, Jin-Beom;Cho, Young-Bok
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.07a
    • /
    • pp.321-322
    • /
    • 2022
  • 스마트폰 사용자가 늘어남에 따라 갖춰줘야 할 보안성이 취약하여, 다양한 바이러스 및 악성코드 위험에 노출되어 있다. 안드로이드는 운영체제 중 가장 많이 사용되는 운영체제로, 개방성이 높으며 수많은 악성 앱 및 바이러스가 마켓에 존재하여 위험에 쉽게 노출된다. 2년 넘게 이어진 코로나 바이러스(Covid-19)으로 인해 꾸준히 위험도가 높아진 피싱공격(Phshing attack)은 현재 최고의 스마트폰 보안 위협 Top10에 위치한다. 본 논문에서는 딥러닝 기반 자연어처리 기술을 통해 피싱 공격 대응 방법 제안 및 실험 결과를 도출하고, 또한 향후 제안 방법을 보완하여 피싱 공격 및 다양한 모바일 보안 위협에 대응할 수 있는 앱을 설계할 것이다.

  • PDF

A Trade Study of the Top Attack Smart Tank Ammunition (상부공격 전차 지능탄에 대한 상쇄연구)

  • Hong, Jong-Tae;Choe, Sang-Gyeong;Kim, Gi-Pyo
    • 시스템엔지니어링워크숍
    • /
    • s.6
    • /
    • pp.121-125
    • /
    • 2005
  • 전차탄의 철갑기술과 전차의 방호기술의 경쟁적인 연구개발로 성능이 지속적으로 발전되면서 전차방호면에서는 피탄되기전에 탄을 인식하여 파괴하는 능동파괴장치로,대전차 기술면에서는 취약한 전차의 상부를 발사후 망각개념의 지능탄으로 타격하는 기술로 발전되고 있다. 본 논문에서는 군사선진국들이 개발중인 전차포 지능찬의 특성을 조사하고 새로운 체계모델을 설정하여 비교상쇄연구를 수행하였으며, 향후 무기체계로의 가용성을 분석하였다.

  • PDF

A Novel Trust Establishment Method for Wireless Sensor Networks

  • Ishmanov, Farruh;Kim, Sung Won
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.4
    • /
    • pp.1529-1547
    • /
    • 2015
  • Establishment of trust is important in wireless sensor networks for security enhancement and successful collaboration. Basically, a node establishes trust with other nodes by estimating a trust value based on monitored behavior of the other nodes. Since a malicious/misbehaving node might launch different attack strategies and might demonstrate random misbehavior, a trust estimation method should be robust against such attacks and misbehavior. Otherwise, the operation of trust establishment will be meaningless, and performance of an application that runs on top of trust establishment will degrade. In this paper, we propose a robust and novel trust estimation method. Unlike traditional trust estimation methods, we consider not only the weight of misbehavior but also the frequency of misbehavior. The frequency-of-misbehavior component explicitly demonstrates how frequently a node misbehaves during a certain observed time period, and it tracks the behavior of nodes more efficiently, which is a main factor in deriving an accurate trust value. In addition, the weight of misbehavior is comprehensively measured to mitigate the effect of an on-off attack. Frequency and weight of misbehavior are comprehensively combined to obtain the trust value. Evaluation results show that the proposed method outperforms other trust estimation methods under different attacks and types of misbehavior.