• 제목/요약/키워드: 공격 모델

Search Result 857, Processing Time 0.021 seconds

A review of researches of the impact of computer game and children's and adolescent's development (컴퓨터 게임과 아동, 청소년 발달과의 관련성 연구 개관)

  • Keumjoo Kwak
    • Korean Journal of Culture and Social Issue
    • /
    • v.10 no.spc
    • /
    • pp.147-175
    • /
    • 2004
  • In recent years, electronic games, home computers, and the internet have assumed an important place in our lives. This paper presents a review of the researches on the relation of computer game and children's and adolescent's development. Researches on the impact of computer game on perceptual and cognitive development including attention, spatial perception, numerical ability, problem solving are reviewed. The relation of computer game use and emotional, social and personality development and aggressive development, especially General Aggressive Model(GAM) are also explained. On the basis of this reviews, the future directions of research are discussed.

  • PDF

Design and Implementation of Efficient Mitigation against Return-oriented Programming (반환 지향 프로그래밍 공격에 대한 효율적인 방어 기법 설계 및 구현)

  • Kim, Jeehong;Kim, Inhyeok;Min, Changwoo;Eom, Young Ik
    • Journal of KIISE
    • /
    • v.41 no.12
    • /
    • pp.1018-1025
    • /
    • 2014
  • An ROP attack creates gadget sequences which consist of existing code snippets in a program, and hijacks the control flow of a program by chaining and executing gadget sequences consecutively. Existing defense schemes have limitations in that they cause high execution overhead, an increase in the binary size overhead, and a low applicability. In this paper, we solve these problems by introducing zero-sum defender, which is a fast and space-efficient mitigation scheme against ROP attacks. We find a fundamental property of gadget execution in which control flow starts in the middle of a function without a call instruction and ends with a return instruction. So, we exploit this property by monitoring whether the execution is abused by ROP attacks. We achieve a very low runtime overhead with a very small increase in the binary size. In our experimental results, we verified that our defense scheme prevents real world ROP attacks, and we showed that there is only a 2% performance overhead and a 1% binary size increase overhead in several benchmarks.

A Development of Novel Attack Detection Methods using Virtual Honeynet (Virtual Honeynet을 이용한 신종공격 탐지기술 개발)

  • Kang, Dae-Kwon;Euom, Ieck-Chae;Kim, Chun-Suk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.4
    • /
    • pp.406-411
    • /
    • 2010
  • A honeynet is a closely monitored computing resource that we want to be probed, attacked or compromised. More precisely, a honeypot is "an information system resource whose value lies in unauthorized or illicit use of that resource The value of honeynet is weighed by the information that can be obtained from it. but It's very difficult to deploy Honeynet in Real World, So I focused on Virtual Honeynet. The strength of virtual honeynet is scalability and ease of maintenance. It is inexpensive to deploy and accessible to almost everyone. Compared with physical honeypots, this approach is more lightweight. Instead of deploying a physical computer system that acts as a honeypot, we can also deploy one physical computer that hosts several virtual machines that act as honeypots.

Information Protection against The Hacker's Attack of Ubiquitous Home Networks (해커의 유비쿼터스 홈 네트워크 공격에 대한 정보보호 기술)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.5
    • /
    • pp.145-154
    • /
    • 2007
  • Analyzed about a matter and requirements to intimidate security of ubiquitous and home network threatening various security for personal information protection in ubiquitous home networks at this paper, and studied. Got authentication procedures and verification procedures acid user approach to be reasonable through designs to the home security gateway which strengthened a security function in the outsides, and strengthened protection of a home network. Also, execute a DoS. DDoS, IP Spoofing attack protective at home network security gateways proved, and security regarding against the Hacker's attack was performed, and confirmed. Strengthen appliances and security regarding a user, and confirm a defense regarding an external attack and present a home network security model of this paper to the plans that can strengthen personal information protection in ubiquitous home networks in ubiquitous home networks through experiment.

  • PDF

Convergence Performance Evaluation Model for Intrusion Protection System based on CC and ISO Standard (CC와 ISO 표준에 따른 침입방지시스템의 융합 성능평가 모델)

  • Lee, Ha-Yong;Yang, Hyo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.251-257
    • /
    • 2015
  • Intrusion protection system is a security system that stop abnormal traffics through automatic activity by finding out attack signatures in network. Unlike firewall or intrusion detection system that defends passively, it is a solution that stop the intrusion before intrusion warning. The security performance of intrusion protection system is influenced by security auditability, user data protection, security athentication, etc., and performance is influenced by detection time, throughput, attack prevention performance, etc. In this paper, we constructed a convergence performance evaluation model about software product evaluation to construct the model for security performance evaluation of intrusion protection system based on CC(Common Criteria : ISO/IEC 15408) and ISO international standard about software product evaluation.

A Study of Effectiveness of the Improved Security Operation Model Based on Vulnerability Database (취약점 데이터베이스 기반 개선된 보안관제 모델의 효과성 연구)

  • Hyun, Suk-woo;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1167-1177
    • /
    • 2019
  • In this paper, the improved security operation model based on the vulnerability database is studied. The proposed model consists of information protection equipment, vulnerability database, and a dashboard that visualizes and provides the results of interworking with detected logs. The evaluation of the model is analyzed by setting up a simulated attack scenario in a virtual infrastructure. In contrast to the traditional method, it is possible to respond quickly to threats of attacks specific to the security vulnerabilities that the asset has, and to find redundancy between detection rules with a secure agent, thereby creating an optimal detection rule.

Security Vulnerability Verification for Open Deep Learning Libraries (공개 딥러닝 라이브러리에 대한 보안 취약성 검증)

  • Jeong, JaeHan;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.117-125
    • /
    • 2019
  • Deep Learning, which is being used in various fields recently, is being threatened with Adversarial Attack. In this paper, we experimentally verify that the classification accuracy is lowered by adversarial samples generated by malicious attackers in image classification models. We used MNIST dataset and measured the detection accuracy by injecting adversarial samples into the Autoencoder classification model and the CNN (Convolution neural network) classification model, which are created using the Tensorflow library and the Pytorch library. Adversarial samples were generated by transforming MNIST test dataset with JSMA(Jacobian-based Saliency Map Attack) and FGSM(Fast Gradient Sign Method). When injected into the classification model, detection accuracy decreased by at least 21.82% up to 39.08%.

논리적인 것과 논리-외적인 것

  • Park, Woo-Seok
    • Korean Journal of Logic
    • /
    • v.2
    • /
    • pp.7-33
    • /
    • 1998
  • 최근 에체멘디는 초과생성과 미달생성의 문제를 들어 타르스키의 모델이론적 논리적 귀결의 정의의 외연적 적합성을 공격하였다. 그러한 공격의 기저에는 우연성 문제가 도사리고 있다고 보이고, 실질적으로 타르스키류의 정의를 적용함에 있이 무만 공리를 통해 논리외적 요소기 개입할 위험이 있다는 것이 그의 근본적 가정이라 생각된다. 이 글에서는 무한 공리가 논리적 진리일 기능성을 조심스레 타진이고, 논리상항과 비논리상항을 기리는 문제가 에체멘디가 생각하듯 신화가 아니라 논리적인 것과 논리외적인 것을 구별하는 문제와 동일한, 진정한 철학적 문제임을 보이는 데 노력한다.

  • PDF

'종합침해사고대응시스템'에서의 블랙리스트 추출방법과 관리방안 연구

  • 박광철;최운호;윤덕상;임종인
    • Review of KIISC
    • /
    • v.15 no.1
    • /
    • pp.41-49
    • /
    • 2005
  • 정보화에 대한 의존도가 심화됨에 따라 사이버상의 테러는 기업과 국가안보를 위협하는 단계에까지 이르렀으나 아직까지 이를 방어하기 위한 정보보호시스템은 침해사고에 대한 정보가 공유되지 못하고 독립되어 운영되고 있는 실정이다. 이에 기업과 국가는 물론 전세계에서 발생되는 실시간 위협 상황에 대해 조기분석과 대응을 위한 정보공유의 필요성이 무엇보다 강조되고 있다. 본 논문에서는 종합침해사고대응시스템에서 침해사고에 대한 실시간 분석 및 대응을 위한 중요자인인 블랙리스트 DB 구축방법과 관리방안을 제시하였다. 인터넷상에서 광범위하고 지속적인 공격을 시도하는 공격 IP정보를 효율적으로 판별하고 추출한 IP를 실시간으로 자동대응할 수 있는 모델을 제안하였으며 사고 시나리오를 통해 통해 검증하였다.

ID 기반의 그룹 키 교환 기법에 대한 연구 동향

  • Choi, Jae-Tark;Lee, Dong-Hoon
    • Review of KIISC
    • /
    • v.19 no.4
    • /
    • pp.36-43
    • /
    • 2009
  • 키 교환은 이미 오래전부터 많이 연구되어 왔으나 끊임없이 변화하는 통신 환경과 그에 따른 새로운 위협에 따라 안전한 키 교환이 필요하게 되었다. 특히 키 교환을 수행하는 개체의 비밀키가 노출되었을 경우에도 안전한 키 교환 프로토콜이 필요하다. 또한 그룹의 구성원 수와 상관없이 상수 라운드를 가지는 효율적인 키 교환 프로토콜이 요구된다. 본 논문에서는 ID 기반의 그룹 키 교환 기법에 대한 기술 동향을 분석하고, 그룹 키 교환 환경에서의 다양한 공격 환경 및 공격자에 따른 안전성 모델에 대한 안전성을 분석한다.