• Title/Summary/Keyword: 공격 분석

Search Result 3,046, Processing Time 0.026 seconds

Analysis of Data Encryption Mechanisms for Searchable Encryption (검색가능 암호시스템을 위한 데이터 암호기법의 문제점 분석)

  • Son, Junggab;Yang, Yu-Jin;Oh, Heekuck;Kim, Sangjin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.9
    • /
    • pp.79-89
    • /
    • 2013
  • Recently, the need for outsourcing sensitive data has grown due to the wide spreading of cost-effective and flexible cloud service. However, there is a fundamental concern in using such service since users have to trust external servers. Therefore, searchable encryption can be a very valuable tool to meet the security requirements of data outsourcing. However, most of work on searchable encryption focus only on privacy preserving search function and relatively lacks research on encryption mechanism used to actually encrypt data. Without a suitable latter mechanism, searchable encryption cannot be deployed in real world cloud services. In this paper, we analyze previously used and possible data encryption mechanisms for multi-user searchable encryption system and discuss their pros and cons. Our results show that readily available tools such as broadcast encryption, attribute-based encryption, and proxy re-encryption do not provide suitable solutions. The main problem with existing tools is that they may require separate fully trusted servers and the difficulty in preventing collusion attacks between outsiders and semi-trusted servers.

A Study of the Potential Shelters in the Lunar Lava Tubes (달 동굴의 잠재적 주거환경에 관한 연구)

  • Oh, Jongwoo
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.3
    • /
    • pp.41-49
    • /
    • 2017
  • This paper will describe lunar lava tubes' five analyzed fields, such as geology, geomorphology, internal configuration, stability, communication and habitats requirements. This research gets through qualitative and qualitative data analysis as following results. A huge size and configuration differences between lunar lava tubes and earth one on geology and landform environments. Exo-genetics activities, such as meteorites, radiation, and sudden temperature bigger affect than Endo-genetic activities, such as effusion and earthquake of the lunar lava tubes. Landform and internal configuration of the lunar lava tubes due to the huge cave perilous landform that gravity difference have a technical limitation from internal approach and data obtain of the huge skylights and sinuous rilles. Stability of the lunar lava tubes deals with geology and landform. It was obvious geo-structural stability elements results generated on low rate of collapsed halls(skylights), low gravity, and relatively thick covers. In terms of the communication capability on the external and internal lunar lava tubes cordless communication techniques will overcome limitations of the sun-power generates supporting communication systems. Through this research it realized obvious differs between potential habitats possibility by accumulative theories by scholars and techniques of the lunar lava tubes. Especially, it is a favorable expectation throughout overcoming attempt on zero gravity, cosmo radiation, lunar dust of the exo-genetic limitations to the steep escarpment of skylights to approach and achieve techniques by the civil engineering, networking and GIS techniques as the endo-genetic environment treatment.

A Design Communication System for Message Protection in Next Generation Wireless Network Environment (차세대 무선 네트워크 환경에서 메시지 보호를 위한 통신 시스템 설계)

  • Min, So-Yeon;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.7
    • /
    • pp.4884-4890
    • /
    • 2015
  • These days most of people possesses an average of one to two mobile devices in the world and a wireless network market is gradually expanding. Wi-Fi preference are increasing in accordance with the use growth of mobile devices. A number of areas such as public agencies, health care, education, learning, and content, manufacturing, retail create new values based on Wi-Fi, and the global network is built and provides complex services. However, There exist some attacks and vulnerabilities like wireless radio device identifier vulnerability, illegal use of network resources through the MAC forgery, wireless authentication key cracking, unauthorized AP / devices attack in the next generation radio network environment. In addition, advanced security technology research, such as authentication Advancement and high-speed secure connection is not nearly progress. Therefore, this paper designed a secure communication system for message protection in next-generation wireless network environments by device identification and, designing content classification and storage protocols. The proposed protocol analyzed safeties with respect to the occurring vulnerability and the securities by comparing and analyzing the existing password techniques in the existing wireless network environment. It is slower 0.72 times than existing cypher system, WPA2-PSK, but enforces the stability in security side.

A Review of Use of Outer Space for Military Purposes From an International Law Perspective (우주의 군사적 이용에 관한 국제법적 검토 - 우주법의 점진적인 발전을 중심으로 -)

  • Jung, Yung-Jin
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.30 no.1
    • /
    • pp.303-325
    • /
    • 2015
  • The latest slogan put forth by the international space community is the safety, security, and sustainability of outer space activities. The security of outer space activities, in particular, would be defined as the secure state from space-based threats. The latter comprises passive threats (such as collision with other satellites and space debris) and aggressive threats (such as electromagnetic interference, arms race on the earth or in outer space, and military attacks). Has outer space been used for military purposes in practice? If so, does international law regulate the military space activities it? The use of outer space for military purposes is referred to as space militarization and space weaponisation. Satellites has been used in Gulf War, Kosovo War, and Afghan War, recently, and research and development on space weapons are under way. Since only the placement of weapons of mass destruction on orbit around the earth is prohibited in accordance with 1967 Outer Space Treaty, it may be asked whether other weapons may be placed on orbit. It will be necessary to analyze the stance of on the above question, by studying UN space-related treaties including UN Charter. New international space norms represented by PPWT, ICoC, and UN GGE Report are at the center of progressive development of international law. In conclusion, the author will signpost the various points on international norms to be codified on the use of outer space for military purposes.

Trend of standardization in the field of Industrial Security through ISO/TC 292 (ISO/TC 292에 의한 산업보안 분야 국제표준화의 동향)

  • Park, Hyeon-Ho
    • Korean Security Journal
    • /
    • no.48
    • /
    • pp.79-111
    • /
    • 2016
  • This study aims at analyzing the global trend of standardization in the field of Industrial Security through ISO/TC 292. It covers broad areas from risk management for industrial property protection and loss prevention through supply chain security, product and document fraud and counterfeiting countermeasures and control and community resilience. It also explores the historical background of the standardization in the security field, how ISO TC 292 came out as a leading group in order to standardize relevant security management systems. TC 292 deals with terminology, general security-related standards and supply chain security management. One of the major findings from this analysis is that security targets and threats are diversified and so organizations like enterprises should have proper flexibility to adapt themselves to new security environment and take appropriate resilience system to cope with the threats and incidents. Also the ISO standardization requires public or private entities to take holistic approaches in security management. Finally, it was found that South Korea has to prepare for this global trend of standardization in this field so that ISO certification market demand and the requirements for transnational trades can be well met.

  • PDF

A research on improving client based detection feature by using server log analysis in FPS games (FPS 게임 서버 로그 분석을 통한 클라이언트 단 치팅 탐지 기능 개선에 관한 연구)

  • Kim, Seon Min;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1465-1475
    • /
    • 2015
  • Cheating detection models in the online games can be divided into two parts. The one is on client based model, which is designed to detect malicious programs not to be run while playing the games. The other one is server based model, which distinguishes the difference between benign users and cheaters by the server log analysis. The client based model provides various features to prevent games from cheating, For instance, Anti-reversing, memory manipulation and so on. However, being deployed and operated on the client side is a huge weak point as cheaters can analyze and bypass the detection features. That Is why the server based model is an emerging way to detect cheating users in online games. But the simple log data such as FPS's one can be hard to find validate difference between two of them. In this paper, In order to compensate for the disadvantages of the two detection model above, We use the existing game security solution log as well as the server one to bring high performance as well as detection ratio compared to the existing detection models in the market.

Factors Affecting the Adjustment of Children from Maritally Violent Homes : An Exploratory Analysis Focusing on Children Living in Shelters for Battered Women (아내폭력가정 자녀의 적응에 영향을 미치는 요인들 : 쉼터 거주 아동을 중심으로)

  • Chang, Hee-Suk
    • Korean Journal of Social Welfare
    • /
    • v.55
    • /
    • pp.255-281
    • /
    • 2003
  • This study sought to explore factors affecting the adjustment of children living in shelters for battered women. Specifically, the impact of domestic violence on children's internal and external adjustment was examined using data from two samples: children who were exposed to marital violence and those who did not have violent experience. Likewise, this study identified the variables that distinguished the "resilient" children from the maladjusted group. The pathways by which protective factors considerably affected children's adjustment were also investigated. A total of 72 children in a women's shelter and their mothers and 76 children in nonviolent homes and their mothers were considered. ANOVA, logistic regression models, and path analysis were employed to process the data. Results revealed that children of battered women demonstrated a high frequency of aggressive and delinquent behaviors and had poor academic achievement and depressive mood compared to children coming from nonviolent homes. Likewise, children who were exposed to marital violence and were physically abused themselves were more likely show aggressive or delinquent behaviors compared to those who only witnessed marital violence. In addition, social support was found to be a protective factor in academic achievement. Predictors of delinquent behavior included the mother's education and income as well as the children's age and social support. Factors related to children's self-esteem included the social support and the mother's self-esteem. Moreover, woman battering has a direct effect on children's adjustment as well as indirect effect through children's academic achievement and self-esteem. Finally, woman battering indirectly affected children's academic achievement through the mother's depression or the child's social support. Based on these findings, practical implications of enhancing children's adjustment were discussed.

  • PDF

Analysis of Posting Preferences and Prediction of Update Probability on Blogs (블로그에서 포스팅 성향 분석과 갱신 가능성 예측)

  • Lee, Bum-Suk;Hwang, Byung-Yeon
    • Journal of KIISE:Databases
    • /
    • v.37 no.5
    • /
    • pp.258-266
    • /
    • 2010
  • In this paper, we introduce a novel method to predict next update of blogs. The number of RSS feeds registered on meta-blogs is on the order of several million. Checking for updates is very time consuming and imposes a heavy burden on network resources. Since blog search engine has limited resources, there is a fix number of blogs that it can visit on a day. Nevertheless we need to maximize chances of getting new data, and the proposed method which predicts update probability on blogs could bring better chances for it. Also this work is important to avoid distributed denial-of-service attack for the owners of blogs. Furthermore, for the internet as whole this work is important, too, because our approach could minimize traffic. In this study, we assumed that there is a specific pattern to when a blogger is actively posting, in terms of days of the week and, more specifically, hours of the day. We analyzed 15,119 blogs to determine a blogger's posting preference. This paper proposes a method to predict the update probability based on a blogger's posting history and preferred days of the week. We applied proposed method to 12,115 blogs to check the precision of our predictions. The evaluation shows that the model has a precision of 0.5 for over 93.06% of the blogs examined.

Study on Police-led National Response against CBRN Terror by Strengthening the Standing Cooperation System of the Interagencies (다부처 상설 협력체계 구축을 통한 경찰주도 국가 화생방 테러대응 발전방안)

  • Cha, Jang-Hyeon;Kang, Taeho;Kim, Daesoo;Lee, Hochan
    • Korean Security Journal
    • /
    • no.59
    • /
    • pp.217-242
    • /
    • 2019
  • Nowadays, Terrorism has become bloodier. Unlike the past, the recent terrorism has been indiscriminate in the purpose of mass- killing. Given this aspect, the threat of a CBRN attack is the biggest one to modern society. Notably, the possibility of terrorist attacks in Korea by international terrorist groups such as ISIL is higher than ever in consideration of its allusion; crusades and the devil's allied forces. To overcome these circumstances, various measures have been taken for counter terrorism at the state level including anti-terrorist legislation. Under the anti-terrorist act, police have to lead relevant inter agencies when it comes to the CBRN terror. At first glance, current countermeasures would work well. However, in order to respond quickly, the standing cooperations system of related departments need to be set up. In this sense, this article proposed a coagulatory body that could not only consider institutional-oriented organizational restructuring and response but also integrate and operate functions of various specialized institutions. It also stressed that the council should move toward a consultative body of information gathering, distribution and working- level consultation. With this cooperation system, counter-terrorism agencies can respond rapidly, stop wasting their effort and assets by about 30%. Also, they could design the atypical aspect of terrorism into standardized.

Analysis of Influencing Factors of Cyber Weapon System Core Technology Realization Period (사이버 무기체계 핵심기술 실현시기의 영향 요인 분석)

  • Lee, Ho-gyun;Lim, Jong-in;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.281-292
    • /
    • 2017
  • It is demanded to promote research and development of cyber weapons system and core technology in response to the ongoing cyber attack of North Korea. In this paper, core technologies of the future cyber weapon system are developed and the factors affecting the realization timing of core technologies were analyzed. 9 core technology groups and 36 core technologies are derived. Afterwards, these core technology groups are compared to the operation phase of the joint cyber warfare guideline and the cyber kill chain of Lockheed Martin. As a result of the comparison, it is confirmed that the core technology groups cover all phases of the aforementioned tactics. The results of regression analyses performed on the degree of influence by each factor regarding the moment of core technology realization show that the moment of core technology realization approaches more quickly as factors such as technology level of the most advanced country, technology level of South Korea, technology transfer possibility from the military sector to the non-military sector(spin-off factor), and technology transfer possibility from the non-military sector to the military sector(spin-on factor) increase. On the contrary, the moment of core technology realization is delayed as the degree at which the advanced countries keep their core technologies from transferring decrease. The results also confirm that the moment of core technology realization is not significantly correlated to the economic ripple effect factor. This study is meaningful in that it extract core technologies of cyber weapon system in accordance with revision of force development directive and join cyber warfare guideline, which incorporated cyber weapon system into formal weapon system. Furthermore, the study is significant because it indicates the influential factor of the moment of core technology realization.