• Title/Summary/Keyword: 공격전략

Search Result 277, Processing Time 0.023 seconds

해외 정보 - 상존하는 원전 사이버 공격 가능성

  • 한국원자력산업회의
    • Nuclear industry
    • /
    • v.36 no.11
    • /
    • pp.45-52
    • /
    • 2016
  • 사이버 공격으로부터 원자력 시설을 보호하기 위해 동원되는 갖가지 안전 대책을 다루고 있는 문건은 상당히 많다. 스파이 소설에 나오는 것 같은 사이버 보안상의 공격과 그 방어 전략에 대한 관련 기관들의 검토도 끊임없이 지속되고 있다. 그러나 이제는 원전사업체들도 발생이 가능한 모든 복합적인 위협은 물론 직접적인 사이버 공격을 고려해서 자체적인 대비책을 강구할 필요가 있다.

  • PDF

Development of Attack Intention Extractor for Soccer Robot system (축구 로봇의 공격 의도 추출기 설계)

  • 박해리;정진우;변증남
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.40 no.4
    • /
    • pp.193-205
    • /
    • 2003
  • There has been so many research activities about robot soccer system in the many research fields, for example, intelligent control, communication, computer technology, sensor technology, image processing, mechatronics. Especially researchers research strategy for attacking in the field of strategy, and develop intelligent strategy. Then, soccer robots cannot defense completely and efficiently by using simple defense strategy. Therefore, intention extraction of attacker is needed for efficient defense. In this thesis, intention extractor of soccer robots is designed and developed based on FMMNN(Fuzzy Min-Max Neural networks ). First, intention for soccer robot system is defined, and intention extraction for soccer robot system is explained.. Next, FMMNN based intention extractor for soccer robot system is determined. FMMNN is one of the pattern classification method and have several advantages: on-line adaptation, short training time, soft decision. Therefore, FMMNN is suitable for soccer robot system having dynamic environment. Observer extracts attack intention of opponents by using this intention exactor, and this intention extractor is also used for analyzing strategy of opponent team. The capability of developed intention extractor is verified by simulation of 3 vs. 3 robot succor simulator. It was confirmed that the rates of intention extraction each experiment increase.

Power Process: The Interrelationships of Marital Power, Influence Strategies, and Negative Conflict Resolution Styles(Attack vs. Avoidance) (권력의 과정: 부부권력, 영향력전략, 부정적 갈등해결방식(공격 vs. 회피)의 관계)

  • Lee, Myung Shin;Yang, Nan Mee
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.4
    • /
    • pp.262-277
    • /
    • 2021
  • In order to explore the power process, a hypothetical model which explains the interrelationships among 3 marital power(traditional, egalitarian, personal), 3 influence strategies(reward, coercion, emotional), and 2 negative conflict resolution styles(attack vs. avoidance) was developed. In order to examine the gender differences, male model and female model were developed separately and compared. Using the data collected from 182 males and 196 females, the hypothetical model was tested. For data analysis, SEM was used. As a result, 3 common paths were found: Greater use of emotional influence strategy increased attack as well as avoidance. Greater egalitarian power increased reward. Egalitalian power affected the use of coercion, but the direction was opposed: male's egalitarian power decreased coercion, while female's egalitarian power increased it. Except these, the analyses revealed the substantial differences between male and female. Based on the findings, the ways to reduce attack and avoidance, and theoretical implications were discussed.

The convergence study of beliefs supporting aggression and aggression in elementary students: Focusing on mediating effects of self-esteem (초등학생의 공격신념과 공격성에 대한 융합 연구: 자아존중감의 매개효과를 중심으로)

  • Yoo, Sun-Yee
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.8
    • /
    • pp.327-334
    • /
    • 2019
  • This study was conducted to understand the relationship between elementary students' beliefs supporting aggression, aggression and self-esteem. In addition, we aimed to provide basic data for controlling the aggression of children and developing effective coping strategies. This study population consisted of 184 elementary school students. Data were analyzed using SPSS 24.0 program. As a result, the aggression of elementary school students showed a significant positive correlation with beliefs supporting aggression(r=.39, p<.001) and a significant negative correlation with self-esteem(r=-.46, p<.001). In addition, Results of the hierarchical regression analysis revealed that self-esteem has the mediating effect on the relationship between beliefs supporting aggression and aggression(${\beta}=.26$, p<.001). In other words, the higher the beliefs supporting aggression, the higher the aggression, and self-esteem means to act as a mediating effect in the relationship between them. Therefore, when arranging an intervention plan to control the aggression of elementary school students, it is necessary to find strategies to control the beliefs spporting aggression and increase self-esteem.

Social Engineering Attack Characteristics and Countermeasure Strategies of Major Threat Countries (주요 위협국의 사회공학 공격특징과 대응전략)

  • Jeewon Kim
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.165-172
    • /
    • 2023
  • Nation-state social engineering attacks are steadily being carried out as they are highly effective attacks, primarily to gain an advantage over secret information, diplomatic negotiations or future policy changes. As The Ukraine-Russia war prolongs, the activities of global hacking organizations are steadily increasing, and large-scale cyberattack attempts against major infrastructure or global companies continue, so a countermeasure strategy is needed. To this end, we determined that the social engineering attack cycle excluding physical contact among various social engineering models is the most suitable model, and analyzed the preferred social engineering attack method by comparing it with geopolitical tactics through case analysis. AS a result China favors phishing attacks, which prefer quantity over quality, such as man-made tactics, Russia prefers covert and complex spear phishing reminiscent of espionage warfare, and North Korea uses geopolitical tactics such as spear phishing and watering holes for attacks on the US and South Korea Most of the other countries aimed to secure funds with ransomware. Accordingly, a Clean Pass policy for China, periodic compulsory education in Russia, and international sanctions against North Korea were presented as countermeasure strategies.

네트워크 포렌식을 통한 분산서비스거부공격 비교분석

  • Kim, Hyuk-Joon;Lee, Sang-Jin
    • Review of KIISC
    • /
    • v.21 no.4
    • /
    • pp.69-74
    • /
    • 2011
  • 2011년 3월 4일 발생한 DDoS 공격은 악성코드 제작, 봇넷 구성 및 공격전개 방식에서 지난 2009년 발생한 7.7 DDoS 공격과 많은 유사점이 있다. 그러나 공격 전략과 공격 수행 방법 측면에서 좀 더 자세히 분석해보면 상호간의 유사점보다는 차이점이 더 많음을 알 수 있다. 7.7 DDoS 공격의 경우 공격자는 공격 전개를 위해 종 더 많은 시간을 투자하였으며 당시 국내 DDoS 방어수준에 대한 정확한 이해를 바탕으로 매우 효과적인 공격을 수행하였다. 그러나 3.4 DDoS 공격의 경우 공격자는 공격 망 구성을 위해 충분한 시간을 투자하지 않았으며, 비록 악성코드 전개에 있어 진일보한 모습을 보였으나 DDoS 방어수준에 대한 충분한 이해가 부족하였던 것으로 나다났다. 본 고에서는 2011년 3.4일 발생한 DDoS 공격을 네트워크 수준에서 양 공격의 유사점과 차이점을 분석 비교한다.

Study On Identifying Cyber Attack Classification Through The Analysis of Cyber Attack Intention (사이버공격 의도분석을 통한 공격유형 분류에 관한 연구 - 사이버공격의 정치·경제적 피해분석을 중심으로 -)

  • Park, Sang-min;Lim, Jong-in
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.103-113
    • /
    • 2017
  • Cyber attacks can be classified by type of cyber war, terrorism and crime etc., depending on the purpose and intent. Those are mobilized the various means and tactics which are like hacking, DDoS, propaganda. The damage caused by cyber attacks can be calculated by a variety of categories. We may identify cyber attackers to pursue trace-back based facts including digital forensics etc. However, recent cyber attacks are trying to induce confusion and deception through the manipulation of digital information or even conceal the attack. Therefore, we need to do the harm-based analysis. In this paper, we analyze the damage caused during cyber attacks from economic and political point of view and by inferring the attack intent could classify types of cyber attacks.