• Title/Summary/Keyword: 네트워크 취약점 분석

Search Result 354, Processing Time 0.022 seconds

A Study on the Army Tactical C4I System Information Security Plan for Future Information Warfare (미래 정보전에 대비한 육군전술지휘정보체계(C4I) 정보보호대책 연구)

  • Woo, Hee-Choul
    • Journal of Digital Convergence
    • /
    • v.10 no.9
    • /
    • pp.1-13
    • /
    • 2012
  • This study aims to analyze actual conditions of the present national defense information network operation, the structure and management of the system, communication lines, security equipments for the lines, the management of network and software, stored data and transferred data and even general vulnerable factors of our army tactical C4I system. Out of them, by carrying out an extensive analysis of the army tactical C4I system, likely to be the core of future information warfare, this study suggested plans adaptive to better information security, based on the vulnerable factors provided. Firstly, by suggesting various information security factor technologies, such as VPN (virtual private network), IPDS (intrusion prevention & detection system) and firewall system against virus and malicious software as well as security operation systems and validation programs, this study provided plans to improve the network, hardware (computer security), communication lines (communication security). Secondly, to prepare against hacking warfare which has been a social issue recently, this study suggested plans to establish countermeasures to increase the efficiency of the army tactical C4I system by investigating possible threats through an analysis of hacking techniques. Thirdly, to establish a more rational and efficient national defense information security system, this study provided a foundation by suggesting several priority factors, such as information security-related institutions and regulations and organization alignment and supplementation. On the basis of the results above, this study came to the following conclusion. To establish a successful information security system, it is essential to compose and operate an efficient 'Integrated Security System' that can detect and promptly cope with intrusion behaviors in real time through various different-type security systems and sustain the component information properly by analyzing intrusion-related information.

Security Problems in Aircraft Digital Network System and Cybersecurity Strategies (항공기 디지털 네트워크 시스템 보안 문제점과 사이버 대응 전략)

  • Lim, In-Kyu;Kang, Ja-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.6
    • /
    • pp.633-637
    • /
    • 2017
  • Cyber attacks on aircraft and aeronautical networks are not much different from cyber attacks commonly found in the ground industry. Air traffic management infrastructure is being transformed into a digital infrastructure to secure air traffic. A wide variety of communication environments, information and communications, navigation, surveillance and inflight entertainment systems are increasingly threatening the threat posed by cyber terrorism threats. The emergence of unmanned aircraft systems also poses an uncontrollable risk with cyber terrorism. We have analyzed cyber security standards and response strategies in developed countries by recognizing the vulnerability of cyber threats to aircraft systems and aviation infrastructure in next generation data network systems. We discussed comprehensive measures for cybersecurity policies to consider in the domestic aviation environment, and discussed the concept of security environment and quick response strategies.

Design and Implementation of Security System for Wargame Simulation System (워게임 시뮬레이션 시스템을 위한 보안시스템 설계 및 구현)

  • Song Jong Seok;Kim Jin Soo;Shin Moon Sun;Ryu Keun Ho
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.369-378
    • /
    • 2005
  • War simulation system is a virtual space that my tactical simulation exercise is held. The data used in this system are considered sensitive and needs to be protected. But suity vulnerabilities and possible security loopholes were not considered when designing the war game simulation system. So currently the systemis highly vulnerable against hackers and data leakages. This paper proposed a security system for war game simulation system based on considering the currently vulunerabilities and possible suity leakages. The proposed security system supports security patches. In this paper, we analyze vulunerabilities of the running environment of current system and we design and implement the security system that is consisted of three components : Authentication System, Encryption System and Network Security System. The security patches are safe and there are no negative effects on the system's performance. The patches are proved to be effective and very reliable towards solving the security vulnerabilities.

Blockchain (A-PBFT) Based Authentication Method for Secure Lora Network (안전한 Lora 네트워크를 위한 블록체인(A-PBFT) 기반 인증 기법)

  • Kim, Sang-Geun
    • Journal of Industrial Convergence
    • /
    • v.20 no.10
    • /
    • pp.17-24
    • /
    • 2022
  • Lora, a non-band network technology of the long-distance wireless standard LPWAN standard, uses ABP and OTTA methods and AES-128-based encryption algorithm (shared key) for internal terminal authentication and integrity verification. Lora's recent firmware tampering vulnerability and shared-key encryption algorithm structure make it difficult to defend against MITM attacks. In this study, the consensus algorithm(PBFT) is applied to the Lora network to enhance safety. It performs authentication and PBFT block chain creation by searching for node groups using the GPS module. As a result of the performance analysis, we established a new Lora trust network and proved that the latency of the consensus algorithm was improved. This study is a 4th industry convergence study and is intended to help improve the security technology of Lora devices in the future.

Analyzing Accessibility of Emergency Shelters Based on Service Population: The Case of Outdoor Evacuation Places for Earthquake in Jung-gu, Seoul (생활인구를 고려한 대피시설 접근성 분석: 서울 중구지역 지진 옥외 대피장소를 사례로)

  • Kim, Sang-Gyoon;Shin, Sang-Young;Nam, Hyeon-Jung
    • Journal of the Society of Disaster Information
    • /
    • v.18 no.1
    • /
    • pp.51-62
    • /
    • 2022
  • Purpose: This study analyzes accessibility of outdoor evacuation places for earthquake and the accessibility improvement effects when expanding the evacuation places in accessibility-deficient areas. In order to consider real-world evacuees, the accessibility analysis is based on service population not on resident population. Method: Location-allocation model as a GIS-based spatial optimization mode is used to analyze accessibility and vulnerable areas to evacuation places. Of location-allocation problem types, 'Maximize Coverage' method is chosen to allocate as many potential evacuees as possible to evacuation places. And impedence cutoffs or evacuation distances (times) are applied to three classes: 500m (7.5 minutes), 1,000m (15 minutes), and 1,500m (22.5 minutes). Case study area is Jung-gu areas, Seoul as a high-density downtown area. Result: Results show that accessibility-deficient areas and population to evacuation places are much more in service population than in resident population. Accessibility is significantly improved when increases when expanding the evacuation places in accessibility-deficient areas. Yet, accessibility-deficient areas are still remained since available lands are insufficient in the high-density downtown area. Conclusion: The study suggests that temporary evacuation facilities like outdoor evacuation places for earthquake need to consider real potential evacuees based not only on resident population but also on service population. Also, policy measures to provide emergency shelters need to more utilize spatial optimization tools like location-allocation model.

A Study on the Detection of Malware That Extracts Account IDs and Passwords on Game Sites and Possible Countermeasures Through Analysis (게임 사이트의 계정과 비밀번호 유출 악성코드 분석을 통한 탐지 및 대응방안 연구)

  • Lee, Seung-Won;Roh, Young-Sup;Kim, Woo-Suk;Lee, Mi-Hwa;Han, Kook-Il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.283-293
    • /
    • 2012
  • A new type of malware that extracts personal and account data over an extended period of time and that apparently is resistant to detection by vaccines has been identified. Generally, a malware is installed on a computer through network-to-network connections by utilizing Web vulnerabilities that contain injection, XSS, broken authentication and session management, or insecure direct-object references, among others. After the malware executes registration of an arbitrary service and an arbitrary process on a computer, it then periodically communicates the collected confidential information to a hacker. This paper is a systematic approach to analyzing a new type of malware called "winweng," a kind of worm that frequently made appearances during the first half of 2011. The research describes how the malware came to be in circulation, how it infects computers, how its operations expose its existence and suggests improvements in responses and countermeasures. Keywords: Malware, Worm, Winweng, SNORT.

Analysis of Security Technology for Internet of things (사물인터넷 보안 기술 분석)

  • Lee, Ho-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.43-48
    • /
    • 2017
  • Today our society is approaching new intelligence information society, which has been caused by the Fourth Industrial Revolution along with the development of information and communication technology(ICT). And this has just opened a new era of Internet of Things(IoT) that connects between human and objects and between objects through network, allowing transmission and reception of information beyond the limits of space. However, many crises occurred in the existing communication environment may threaten the security of Internet of Things, by violating the three components of information security. In this paper, this study aims to analyze security technology to achieve advanced security by dividing IoT security technology for coping with security vulnerability found in different components into three groups.

Considerations for Improving National Cyber Resilience According to Changes in IT Environment (IT 환경 변화에 따른 국가 사이버 복원력 제고를 위한 고려사항)

  • Yong-Hee Choi;Sang-Hoon Choi;Ki-Woong Park
    • Annual Conference of KIPS
    • /
    • 2024.10a
    • /
    • pp.152-155
    • /
    • 2024
  • 디지털화의 가속화는 사이버 공간에 대한 의존도를 크게 증가시키고 있다. 군사, 금융, 의료, 통신 등 주요 인프라는 네트워크를 통해 상호 연결되면서 효율성을 극대화하고 있지만, 동시에 사이버 공간의 중단이 가져오는 영향성에 취약해지는 구조가 형성되어 지고 있다. 대표적으로, 2022년 발발한 러시아-우크라이나 전쟁에서 러시아는 사이버 공간과 물리적 공간을 활용한 공격 수단을 통해 우크라이나의 주요 인프라를 마비시키려는 시도를 하였다. 그러나 우크라이나는 높은 사이버 복원력(Cyber Resilience)을 바탕으로 이러한 공격에 능동적으로 대응할 수 있었고, 인프라 마비를 효과적으로 방어하였다. 이에 따라, 러시아의 일방적인 승리로 끝날 것이라는 초기 예측과 달리, 우크라이나는 물리적 전투뿐만 아니라 사이버 공격 속에서도 지속적으로 저항하며 전쟁을 이어가고 있다. 본 연구에서는 IT 환경 변화에 따른 안보 위협과 이를 극복하기 위한 국가 사이버 복원력 제고를 위한 고려사항을 분석하기 위해 우크라이나-러시아 전쟁에서의 사이버 복원력이 발휘된 사례를 분석하고, 그로부터 도출되는 시사점과 향후 연구 방향을 제시한다.

Detecting Adversarial Example Using Ensemble Method on Deep Neural Network (딥뉴럴네트워크에서의 적대적 샘플에 관한 앙상블 방어 연구)

  • Kwon, Hyun;Yoon, Joonhyeok;Kim, Junseob;Park, Sangjun;Kim, Yongchul
    • Convergence Security Journal
    • /
    • v.21 no.2
    • /
    • pp.57-66
    • /
    • 2021
  • Deep neural networks (DNNs) provide excellent performance for image, speech, and pattern recognition. However, DNNs sometimes misrecognize certain adversarial examples. An adversarial example is a sample that adds optimized noise to the original data, which makes the DNN erroneously misclassified, although there is nothing wrong with the human eye. Therefore studies on defense against adversarial example attacks are required. In this paper, we have experimentally analyzed the success rate of detection for adversarial examples by adjusting various parameters. The performance of the ensemble defense method was analyzed using fast gradient sign method, DeepFool method, Carlini & Wanger method, which are adversarial example attack methods. Moreover, we used MNIST as experimental data and Tensorflow as a machine learning library. As an experimental method, we carried out performance analysis based on three adversarial example attack methods, threshold, number of models, and random noise. As a result, when there were 7 models and a threshold of 1, the detection rate for adversarial example is 98.3%, and the accuracy of 99.2% of the original sample is maintained.

A Case Study on the Linkage of Lifelong Education between Social Enterprises and the Vulnerable (사회적기업과 취약계층의 평생교육 연계에 관한 탐색적 사례연구)

  • Lee, Hyo-Young;Han, Sang-Hun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.293-303
    • /
    • 2017
  • Thus study examined the possible the link between social enterprises and lifelong education for the underprivileged. To this end, this study searched for the definition and position of social enterprises emerging from the welfare system under the influence of neoliberalism and overcoming the problems in terms of creating social jobs and providing welfare services. In addition, the lifelong education for the underprivileged was examined according to the subjects, such as the disabled, migrant women, young and adult low-income group, and senior citizens. The plan was as follows. First, the expansion of the proportion of community-affiliated social enterprises was analyzed. Second, it provides a differentiated support and protection market for social enterprise. Third, the development and dissemination of social entrepreneur training programs was examined. The results showed that the entire society should have a sense of responsibility for the support of the underprivileged. This provides implications for the linkage of lifelong education and social enterprise in the expansion possibility to improve the quality of life and expand lifelong education for the underprivileged.