• Title/Summary/Keyword: 공격 모델

Search Result 857, Processing Time 0.025 seconds

A Study on the Model for Preemptive Intrusion Response in the era of the Fourth Industrial Revolution (4차 산업혁명 시대의 선제적 위협 대응 모델 연구)

  • Hyang-Chang Choi
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.27-42
    • /
    • 2022
  • In the era of the Fourth Industrial Revolution, digital transformation to increase the effectiveness of industry is becoming more important to achieving the goal of industrial innovation. The digital new deal and smart defense are required for digital transformation and utilize artificial intelligence, big data analysis technology, and the Internet of Things. These changes can innovate the industrial fields of national defense, society, and health with new intelligent services by continuously expanding cyberspace. As a result, work productivity, efficiency, convenience, and industrial safety will be strengthened. However, the threat of cyber-attack will also continue to increase due to expansion of the new domain of digital transformation. This paper presents the risk scenarios of cyber-attack threats in the Fourth Industrial Revolution. Further, we propose a preemptive intrusion response model to bolster the complex security environment of the future, which is one of the fundamental alternatives to solving problems relating to cyber-attack. The proposed model can be used as prior research on cyber security strategy and technology development for preemptive response to cyber threats in the future society.

Study on Evaluation Method of Task-Specific Adaptive Differential Privacy Mechanism in Federated Learning Environment (연합 학습 환경에서의 Task-Specific Adaptive Differential Privacy 메커니즘 평가 방안 연구)

  • Assem Utaliyeva;Yoon-Ho Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.143-156
    • /
    • 2024
  • Federated Learning (FL) has emerged as a potent methodology for decentralized model training across multiple collaborators, eliminating the need for data sharing. Although FL is lauded for its capacity to preserve data privacy, it is not impervious to various types of privacy attacks. Differential Privacy (DP), recognized as the golden standard in privacy-preservation techniques, is widely employed to counteract these vulnerabilities. This paper makes a specific contribution by applying an existing, task-specific adaptive DP mechanism to the FL environment. Our comprehensive analysis evaluates the impact of this mechanism on the performance of a shared global model, with particular attention to varying data distribution and partitioning schemes. This study deepens the understanding of the complex interplay between privacy and utility in FL, providing a validated methodology for securing data without compromising performance.

A Study on State Estimation Based Intrusion Detection in Power Control Systems Using DNP3 over TCP/IP (DNP3 over TCP/IP 환경 전력 제어시스템에서의 상태추정 기반 침입 탐지 연구)

  • Hyeonho Choi;Junghee Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.615-627
    • /
    • 2024
  • With the evolution of power systems and advancements in IT technology, there is an increasing demand to shift from serial-based communication to TCP/IP-based communication. However, TCP/IP communication entails various security threats, necessitating extensive consideration from an information security perspective. Security measures such as authentication and encryption cannot be rapidly implemented due to issues like the replacement of Remote Terminal Units (RTUs) and the performance requirements of encryption algorithms. This paper proposes a state estimation-based intrusion detection model to identify and effectively detect threats to power control systems in such a context. The proposed model, in addition to signature detection methods, verifies the validity of acquired data, enabling it to detect attacks that are difficult to identify using traditional methods, such as data tampering.

Design and Implementation of Wireless LAN Information Sharing Based on SNS (SNS 기반 무선랜 정보 공유 시스템 설계 및 구현)

  • Woo, Yeon-Kyung;Choi, Jun-Hyuk;Park, Jong-Tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.9
    • /
    • pp.821-828
    • /
    • 2012
  • Recently, in order to provide the mobile multimedia service cost-effectively, the user's demand has been greatly increasing to use wireless LAN (WLAN). But existing WLAN (Wireless LAN) is vulnerable to attack of outside, as users are connecting AP using Open Authentication. In this article, we have designed and implemented WLAN Information Sharing System using social network service (SNS) which is efficiently managing. WLAN secure key. A proposed WLAN Information Sharing System model has been proposed in which the social trust strength between people is employed for WLAN access control.

Aerodynamic characteristics of KSR-Ⅲ and jet impingement on a deflector during launch (KSR-Ⅲ 공력특성 및 발사화염 충돌유동에 대한 연구)

  • Kim, In-Seon;Ra, Seung-Ho;Ok, Ho-Nam;Choe, Seong-Uk
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.30 no.2
    • /
    • pp.98-107
    • /
    • 2002
  • An experimental and numerical study of aerodynamic charateristics of KSR-III and jet impingement on a deflector during launch has been conducted. To investigate aerodynamic characteristics of KSR-III configuration, wind tunnel tests using 6.4% scale model were performed by 4x4 feet ADD trisonic wind tunnel on the Mach number range of 0.4~3.8. Solutions of Three dimensional Euler equations were also obtained and compared with test result. For the study of KSR-III jet impingement flowfield on a deflector during launch operation, unsteady computation using CFD-FASTRAN was performed.

A Probe Prevention Model for Detection of Denial of Service Attack on TCP Protocol (TCP 프로토콜을 사용하는 서비스거부공격 탐지를 위한 침입시도 방지 모델)

  • Lee, Se-Yul;Kim, Yong-Soo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.13 no.4
    • /
    • pp.491-498
    • /
    • 2003
  • The advanced computer network technology enables connectivity of computers through an open network environment. There has been growing numbers of security threat to the networks. Therefore, it requires intrusion detection and prevention technologies. In this paper, we propose a network based intrusion detection model using FCM(Fuzzy Cognitive Maps) that can detect intrusion by the DoS attack detection method adopting the packet analyses. A DoS attack appears in the form of the Probe and Syn Flooding attack which is a typical example. The SPuF(Syn flooding Preventer using Fussy cognitive maps) model captures and analyzes the packet informations to detect Syn flooding attack. Using the result of analysis of decision module, which utilized FCM, the decision module measures the degree of danger of the DoS and trains the response module to deal with attacks. For the performance comparison, the "KDD′99 Competition Data Set" made by MIT Lincoln Labs was used. The result of simulating the "KDD′99 Competition Data Set" in the SPuF model shows that the probe detection rates were over 97 percentages.

무선랜의 데이터 프라이버시 알고리즘 구조 분석

  • 박미애;김용희;김창범;이옥연
    • Proceedings of the Korean Society of Computational and Applied Mathematics Conference
    • /
    • 2003.09a
    • /
    • pp.2.1-2
    • /
    • 2003
  • WLAN의 매체 특성상 AP beacon영역 내의 모든 STA들은 다른 STA의 송수신 데이터 내용에 접근할 수 있다. 따라서 상호 또는 그룹 간의 데이터프라이버시와 상호인증 서비스는 무선 랜의 중요한 이슈중의 하나이다. 무선랜을 통한 네트워크 접속 보안으로는 사용자와 AP 사이의 무선 접속구간 보안과 AP와 AS사이의 유선 구간 보안으로 정의되며, 상대적으로 취약한 무선 구간 보안이 초점이 된다. 현재 무선 구간 보안에는 WEP이 사용된다. 그러나 WEP 방식은 WEP 키와 IV 크기가 작고, 노출된 공유키를 사용하며, 암호 알고리즘(RC4)와 무결성 알고리즘(CRC-32)이 근본적으로 취약하다. 이러한 문제에 대한 해결 방법으로 IEEE 802.11i는 두 가지 접근 방식을 채택하였다. 하나는 WEP의 보안 문제점을 소프트웨어적으로 개선한 TKIP이고 다른 하나는 기존의 WEP과는 하드웨어적으로 상이한 AES을 기반으로 한 CCMP이다. 이 논문에서는 각 알고리즘에 대한 키의 흐름 및 그 안전성을 분석하였다. 이러한 방법을 통해 WEP 구조의 보안상의 취약점을 확인하고, TKIP이 WEP을 대체할 수 있을 만큼의 안전성을 갖는지를 검증한다. 또한 고려될 수 있는 공격 모델을 제시하고, 이에 대하여 알고리즘에 부가적으로 요구되는 보완점에 대해 논한다.

  • PDF

Control of Multiple UAV's based on Swarm Intelligence (무리지능을 이용한 복수 무인기 제어)

  • Oh, Soo-Hun
    • Current Industrial and Technological Trends in Aerospace
    • /
    • v.7 no.1
    • /
    • pp.141-152
    • /
    • 2009
  • The simultaneous operation of multiple UAV's makes it possible for us to raise the mission accomplishment and cost efficiency. For this we need an easily scalable control algorithm, and swarm intelligence having the characteristics such as flexibility, robustness, decentralized control and self-organization comes into the spotlight as a practical substitute. In this paper the features of swarm intelligence are described, and various research results are introduced which show that the application of swarm intelligence to the control of multiple UAV's enables the missions of surveillance, path planning, target tracking and attack to be accomplished efficiently by simulations and tests.

  • PDF

Mechanism of antiulceric effect of eupatilin, a biological active component of Arternisia extract

  • Miwon Son;Oh, Tae-Young;Ryu, Byung-Kweon;Moohi Yoo;Kim, Won-Bae;Junnick Yang;Lee, Eun-Bang
    • Proceedings of the Korean Society of Applied Pharmacology
    • /
    • 1996.04a
    • /
    • pp.198-198
    • /
    • 1996
  • Eupatilin은 급성위궤양 모델인 HCl-EtOH model에서 0.3mg/kg에서 50% 억제하였으며 10mg/kg에서 95% 최대효과를 나타내었고, indomethacin model에서는 0.8mg/kg에서 50% 억제하였으며, 10mg/kg에서 97% 최대억제효과를 나타내었다. Cyclooxygenase-1의 활성은 1.7, 5.8$\mu\textrm{g}$/$m\ell$에서 prostaglandin E$_2$와 prostacyclin의 생성을 각각 2배 촉진시켰으나, cyclooxygenase-2에 대한 활성에는 영향을 주지 않았다. FMLP로 활성화시킨 호중구에 대한 활성은 0.6$\mu\textrm{g}$/kg에서 50% 억제하여 oxygen free radical 소거활성을 나타내었고, 반면 xanthine oxidase 및 iron-dependant lipid peroxidation 활성에 대해서는 78.8, 26.9$\mu\textrm{g}$/$m\ell$에서50% 억제를 보였다. 5-lipooxygenase 활성은 2.1$\mu\textrm{g}$/$m\ell$ 에서 염증매개인자인 leukotriene B$_4$ 생성을 50% 억제하였다. 이상의 결과로부터 애엽추출의 항궤양 효과는 prostaglandin의 생성촉진 및 oxygen free radical 과 leukotriene B4와 같은 공격인자의 생성억제 등의 복합적인 작용에 기인하는 것으로 생각된다.

  • PDF

Certificateless Proxy Re-Encryption Scheme and Its Extension to Multiple KGC Environment (무인증서기반 프락시 재암호화 기법 및 다중 KGC 환경으로의 확장)

  • Sur, Chul;Jung, Chae-Duk;Park, Young-Ho;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.4
    • /
    • pp.530-539
    • /
    • 2009
  • In this paper we introduce the notion of certificateless proxy re-encryption which enjoys the advantages of certificateless cryptography while providing the functionalities of proxy re-encryption. We give precise definitions for secure certificateless proxy re-encryption schemes and also present a concrete scheme from bilinear pairing. Our scheme is unidirectional and compatible with current certificateless encryption deployments, In addition, we show that our scheme has chosen ciphertext security in the random oracle model. Finally, we extend the proposed scheme for appling multiple KGC environment.

  • PDF