• Title/Summary/Keyword: virus attack

Search Result 98, Processing Time 0.025 seconds

Analysis and prospect of North Korea's Cyber threat (북한의 사이버전 위협에 대한 분석과 전망)

  • Lee, Dae Sung;Ahn, Young Kyu;Kim, Minsu
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.11-16
    • /
    • 2016
  • In modern society, the development of Information and Communication Technology has given people a lot of opportunities. But on the other side cyber attack also gives enormous damage to people. Recently Korea has become the target of cyber attack. The threat of it is growing. Especially North Korea has committed hostile actions against South Korea. North Korea has recently attacked the computer networks of South Korea's important national facilities. The types of North Korea's cyber attacks include the followings. First, if we see it with the viewpoint of software, it tries to destroy or control the Internet, infects the networks with viruses, worms, Trojan Horse and Distributed Denial of Service. I suggest the following to solve the problem. First, South Korea should unify the organizations to respond to the attacks of North Korea, as North Korea has a unified organization for the cyber attack. Second, they should think about the establishment of "Cyber Terrorism Prevention Act" to systematically respond to the software attacks.

Immune Responses to Viral Infection (바이러스 감염에 대한 면역반응)

  • Hwang, Eung-Soo;Park, Chung-Gyu;Cha, Chang-Yong
    • IMMUNE NETWORK
    • /
    • v.4 no.2
    • /
    • pp.73-80
    • /
    • 2004
  • Viruses are obligate intracellular parasites which cause infection by invading and replicating within cells. The immune system has mechanisms which can attack the virus in extracellular and intracellular phase of life cycle, and which involve both non-specific and specific effectors. The survival of viruses depends on the survival of their hosts, and therefore the immune system and viruses have evolved together. Immune responses to viral infection may be variable depending on the site of infection, the mechanism of cell-to-cell spread of virus, physiology of the host, host genetic variation, and environmental condition. Viral infection of cells directly stimulates the production of interferons and they induce antiviral state in the surrounding cells. Complement system is also involved in the elimination of viruses and establishes the first line of defence with other non-specific immunity. During the course of viral infection, antibody is most effective at an early stage, especially before the virus enters its target cells. The virus- specific cytotoxic T lymphocytes are the principal effector cells in clearing established viral infections. But many viruses have resistant mechanism to host immune responses in every step of viral infection to cells. Some viruses have immune evasion mechanism and establish latency or persistency indefinitely. Furthermore antibodies to some viruses can enhance the disease by the second infection. Immune responses to viral infection are very different from those to bacterial infection.

Development of S-SLA based on the Analyses of Security Functions for Anti-virus System (안티바이러스 시스템 보안기능 분석을 통한 보안SLA 등급화 지표 개발)

  • Yi, Wan-Suck;Lee, Dong-Bum;Won, Dong-Ho;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.237-249
    • /
    • 2010
  • If one analyzes recent cyber incidents including personal information infringement cases, it seems like actual attack is targeting Internet service providers but actually they are targeting Internet service users. For many users, all the services were not provided to them as they have signed for in the contract or personal informations, which users have provided to service providers when signing contracts, were disclosed to public without users' consent causing aftereffect. As a result, importance of S-SLA indexes, which is to be included in the SLA to be signed between a user and a service provider, is ever more increasing. Especially, if there is a S-SLA indexes for anti-virus services, service providers have to provide a high quality of service as they have signed in the SLA. However, there wasn't any researches in the S-SLA area domestically and there are only limited SLA indexes related to system or service maintenances at the moment. Therefore, this paper analyses security functions in anti-virus services and proposes S-SLA indexes for different security level.

ELPA: Emulation-Based Linked Page Map Analysis for the Detection of Drive-by Download Attacks

  • Choi, Sang-Yong;Kim, Daehyeok;Kim, Yong-Min
    • Journal of Information Processing Systems
    • /
    • v.12 no.3
    • /
    • pp.422-435
    • /
    • 2016
  • Despite the convenience brought by the advances in web and Internet technology, users are increasingly being exposed to the danger of various types of cyber attacks. In particular, recent studies have shown that today's cyber attacks usually occur on the web via malware distribution and the stealing of personal information. A drive-by download is a kind of web-based attack for malware distribution. Researchers have proposed various methods for detecting a drive-by download attack effectively. However, existing methods have limitations against recent evasion techniques, including JavaScript obfuscation, hiding, and dynamic code evaluation. In this paper, we propose an emulation-based malicious webpage detection method. Based on our study on the limitations of the existing methods and the state-of-the-art evasion techniques, we will introduce four features that can detect malware distribution networks and we applied them to the proposed method. Our performance evaluation using a URL scan engine provided by VirusTotal shows that the proposed method detects malicious webpages more precisely than existing solutions.

A Study for PKI Based Home Network System Authentication and Access Control Protocol (PKI 기반 홈 네트워크 시스템 인증 및 접근제어 프로토콜에 관한 연구)

  • Lee, Young-Gu;Kim, Jung-Jae;Kim, Hyun-Chul;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4B
    • /
    • pp.592-598
    • /
    • 2010
  • A home network system is made up of subject of cyber attack from a variety factors of threatening, but also have security weakness in cases of hacking, vicious code, worm virus, DoS attack, tapping of communication network, and more. So, the necessity for a security protocol to protect user asset and personal information within a home network is gradually increasing. Thus, this paper designs and suggests a home network security protocol using user authentication and approach-control technology to prevent the threat by unauthorized users towards personal information and user asset in advance by providing the gradual authority to corresponding devices based on authorized information, after authorizing the users with a Public Key Certificate.

Mathematical Modelling for the Transmission Dynamics of HIV infection and AIDS (HIV감염과 AIDS의 전파특성에 관한 수학적 모델화)

  • Chung, Hyeng-Hwan;Joo, Seok-Min;Chung, Mun-Gyu;Lee, Kwang-Woo
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.48 no.2
    • /
    • pp.89-95
    • /
    • 1999
  • This study investigates the population model of the spread of HIV/AIDS which the infection is generated by an infectious individual in a population of susceptible. A mathematical model is presented for the transmission dynamics of HIV infection within the communities of homosexual males. The pattern on the epidemic character of HIV, the causative agent of AIDS, was analysed by the mathematical model of AIDS system which is derived according to the ecological relationship between five epidemilogic states of individuals. The computer simulation was performed using real data and the following conclusions are drawn on the basis of the simulations. 1. The model structure and the algorithm described n the thesis is good. 2. In proportion to increase Ro, the population of AIDS patient increases and the time of its widespread reaches earlier. 3. The AIDS patients will be maximum between 7 and 21 years after an attack of AIDS and widespread between 10 and 20 years. 4. Considering the properties of the incubation periods, the maximum number of infected person is increased, and the attack rate is decreased.

  • PDF

Countermeasure for Preventing a Secondary Damage of Information Leakage using Financial ISAC (금융 ISAC을 활용한 정보유출 2차피해 방지 방안)

  • Jeong, Gi Seog
    • Convergence Security Journal
    • /
    • v.14 no.5
    • /
    • pp.31-36
    • /
    • 2014
  • As security management center of financial area, financial ISAC monitors financial corporations and provides security services. Financial ISAC minimizes damage by responding quickly to external attack such as hacking, virus but it is poor at handling internal attack. For the efficient management and stable operation of information source, also to respond jointly to online hacking, the necessity of information sharing system increases day by day in and outside country. This paper proposes financial ISAC that can prevent a secondary damage of leakage information as well as providing security services. The proposed financial ISAC provides new password to financial corporation in which the same ID and password as leakage information are used and in case of financial information leakage it warns customers against phishing etc.

담배의 바이러스 병엽과 건전엽에 있어서의 유이아미노산에 관한 정량적 연구(예보)

  • 이광업
    • Journal of Plant Biology
    • /
    • v.7 no.1
    • /
    • pp.1-4
    • /
    • 1964
  • A comparative study of free amino acid content in healthy and virus diseased tobacco leaves was carried out by author throughout the gorwing season from June to November of 1963. The methods of qualitative analysis of free amino acids applied in this experiment is followed by Moore and Stein. 1,2 Free amino acids determined in this experiment are shown in Fig. Ⅰ, Ⅱ and Table Ⅰ. As the figure and the table are shown, four more amino acids such as a spartic acid, glutamic acid, tyrosine and phenylalanine are detected in the healthy leaves; these four additional amino acids in the healthy leaves are conspicuous. More quantities of asparagine and alanine are detected in the diseased leaves than the healthy leaves and more quantities of tryptophan is detected in the healthy leaves. It is presumed that such amino acids as tyrosine and phenyllanine are decreased by the incooperation of free amino acid to TMV protein in the process of the process of the leaf protein metabolism which is caused by TMV-RNA trapping action in the diseased leaf protoplasm. It is thought that the decrease of asparagine and the increase of asparic acid in the healthy leaves are the results of in incooperaton of NH2, produced by the protein dissimilation in the diseased leaves, to aspartic acid; it's reaction is caused by the respiration of the diseased leaves accelerated by TMV attack. It is presumed, consequently, that the check of the diseased tobacco leave growth is influenced by the reduction of such amino acids as tryptophane and glutamic acid, which reduction may be due to the abnormal protein metabolism and the action of certain enzyme caused by TMV attack on host protoplast.

  • PDF

Preprocessor Implementation of Open IDS Snort for Smart Manufacturing Industry Network (스마트 제조 산업용 네트워크에 적합한 Snort IDS에서의 전처리기 구현)

  • Ha, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1313-1322
    • /
    • 2016
  • Recently, many virus and hacking attacks on public organizations and financial institutions by internet are becoming increasingly intelligent and sophisticated. The Advanced Persistent Threat has been considered as an important cyber risk. This attack is basically accomplished by spreading malicious codes through complex networks. To detect and extract PE files in smart manufacturing industry networks, an efficient processing method which is performed before analysis procedure on malicious codes is proposed. We implement a preprocessor of open intrusion detection system Snort for fast extraction of PE files and install on a hardware sensor equipment. As a result of practical experiment, we verify that the network sensor can extract the PE files which are often suspected as a malware.

BMT Derivation of Evaluation Item about Anti-DDoS SW (Anti-DDoS SW BMT 평가항목 도출)

  • Shin, Suk-Jo;Lee, Jae-Guen;Jo, In-June;Shin, Seok Kyoo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.375-378
    • /
    • 2009
  • DDoS attacks make people can't using normal internet service, because DDoS attacks cause exhaustion of network bandwidth or exhaustion of computer system resources by using many personal computers or servers which already infected computer virus from hackers. Recent DDoS attacks attack government brach, financial institution, even IT security company. IT security companies make Anti-DDoS product for defense from DDoS attack. But, There is no standard for BMT of Anti-DDoS product. In this dissertation, Anti-DDoS product quality characteristics of the survey analysis to evaluate them by comparing the assessment items were derived.

  • PDF