• Title/Summary/Keyword: 단계적 대응 프레임워크

Search Result 37, Processing Time 0.029 seconds

Malicious Traffic Protection through MSPI Designing (MSPI설계를 통한 유해 트래픽 차단)

  • Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.6 no.2
    • /
    • pp.31-42
    • /
    • 2006
  • In this paper, we proposed an integrated infrastructure for optimal information security to resolve these kinds of problems and to implement more powerful protection. The proposed infrastructure presents a security framework, provides a functional mechanism, and implements a scheme for information security based on the design concept of integrated structures. In order to ensure effective malicious traffic blocking, this paper emphasizes that a comprehensive approach through infrastructure improvement and combination of scanning tool is the only measure for preparing against today's environment of virus infiltration. The proposed model is a measure developed at a time when a permanent technological solution to virus is yet to be developed. A performance analysis model is developed and the performance is evaluated through the case studies for the proposed methodology. The effectiveness of the infrastructure for optimal information security needs the continuous diagnostic evaluation and tuning through the users or the organizations.

  • PDF

A Study on Defense and Attack Model for Cyber Command Control System based Cyber Kill Chain (사이버 킬체인 기반 사이버 지휘통제체계 방어 및 공격 모델 연구)

  • Lee, Jung-Sik;Cho, Sung-Young;Oh, Heang-Rok;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.1
    • /
    • pp.41-50
    • /
    • 2021
  • Cyber Kill Chain is derived from Kill chain of traditional military terms. Kill chain means "a continuous and cyclical process from detection to destruction of military targets requiring destruction, or dividing it into several distinct actions." The kill chain has evolved the existing operational procedures to effectively deal with time-limited emergency targets that require immediate response due to changes in location and increased risk, such as nuclear weapons and missiles. It began with the military concept of incapacitating the attacker's intended purpose by preventing it from functioning at any one stage of the process of reaching it. Thus the basic concept of the cyber kill chain is that the attack performed by a cyber attacker consists of each stage, and the cyber attacker can achieve the attack goal only when each stage is successfully performed, and from a defense point of view, each stage is detailed. It is believed that if a response procedure is prepared and responded, the chain of attacks is broken, and the attack of the attacker can be neutralized or delayed. Also, from the point of view of an attack, if a specific response procedure is prepared at each stage, the chain of attacks can be successful and the target of the attack can be neutralized. The cyber command and control system is a system that is applied to both defense and attack, and should present defensive countermeasures and offensive countermeasures to neutralize the enemy's kill chain during defense, and each step-by-step procedure to neutralize the enemy when attacking. Therefore, thist paper proposed a cyber kill chain model from the perspective of defense and attack of the cyber command and control system, and also researched and presented the threat classification/analysis/prediction framework of the cyber command and control system from the defense aspect

Design and Implementation of Anomaly Traffic Control framework based on Linux Netfilter System and CBQ Routing Mechanisms (리눅스 Netfilter시스템과 CBQ 라우팅 기능을 이용한 비정상 트래픽 제어 프레임워크 설계 및 구현)

  • 조은경;고광선;이태근;강용혁;엄영익
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.129-140
    • /
    • 2003
  • Recently viruses and various hacking tools that threat hosts on a network becomes more intelligent and cleverer, and so the various security mechanisms against them have ken developed during last decades. To detect these network attacks, many NIPSs(Network-based Intrusion Prevention Systems) that are more functional than traditional NIDSs are developed by several companies and organizations. But, many previous NIPSS are hewn to have some weakness in protecting important hosts from network attacks because of its incorrectness and post-management aspects. The aspect of incorrectness means that many NIPSs incorrectly discriminate between normal and attack network traffic in real time. The aspect of post-management means that they generally respond to attacks after the intrusions are already performed to a large extent. Therefore, to detect network attacks in realtime and to increase the capability of analyzing packets, faster and more active responding capabilities are required for NIPS frameworks. In this paper, we propose a framework for real-time intrusion prevention. This framework consists of packet filtering component that works on netfilter in Linux kernel and traffic control component that have a capability of step-by-step control over abnormal network traffic with the CBQ mechanism.

A Study on the Establishment and Operation of a Regulatory Response Framework in connection with the Regulatory Strength of the Licensing Policy for New Medical Devices -Focusing on the Application of FMEA- (의료기기 신제품의 인허가정책 규제강도에 연계한 규제대응 프레임워크 수립 및 운영에 관한 연구 - FMEA 적용을 중심으로 -)

  • Kim, Gyosu;Ru, Gyuha;Kim, Yeonhee
    • Journal of Technology Innovation
    • /
    • v.28 no.4
    • /
    • pp.1-26
    • /
    • 2020
  • Due to the spread of Corona 19 around the world, Infectious Disease Medicine and New Medical Devices such as Diagnostic Agent are being rapidly developed and launched, and for the fast supply and demand of these, each country has eased import regulations or has implemented policies for fast approval(NIDS, 2020). On the other hand, New Developed Medical Devices that are not related to New Infectious Diseases, they are still entering the market through strict licensing and licensing regulations, such as delay and cancellation in the test inspection process, etc. Therefore, This Study specialized in the government-managed laws encountered when New Medical Devices enter the market, derive Factors influencing the Strength of Regulations, analyzes the Strength of Regulations, and proposes a Regulatory Response Framework. The Research Method was conducted by Literature Research, was applied by Failure Mode and Effects Analysis(FMEA) Method, Expert Interview(1st): Idea Collection, Expert Interview(2nd): Validation, and Priority through the Application Process of FMEA Method. A Method of Quantifying the Intensity of Regulation was proposed by multiplying the Impact of the Influencing Factors for each stage of regulation and the Burden Impact for each type of Regulatory Affairs to find the Importance of the Regulatory Factors and multiplying the Severity of the Regulatory Impact. The Implications are that major overseas countries and the Korean government are actively responding with Special Regulatory Policies and Mitigation Policies for fast licensing of New Developed Medical Devices in accordance with Corona 19. It is expected that the direction for improvement of regulations and measures to respond to regulations will be implemented so that a more proactive and preemptive response to the regulatory process of the licensing policy for New Devices can be achieved.

Development of a Framework of Emergency Action Plan for Domestic Water Front Critical Infrastructure (국내 주요 수변시설물 EAP 프레임워크 개발)

  • Park, Su-Yeul;Choi, Soo-Young;Oh, Eun-Ho;Kim, Jin-Man
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.125-134
    • /
    • 2017
  • Unusual precipitation caused by typhoons and severe rain stormscan threaten human life and property. Thus, various organizations prepare emergency action plans (EAPs) to provide proper guidelines for operators, experts, and emergency response personnel to protect and enhance critical infrastructure. For example, FEMA and DHS have various types of EAPs for dams, levees, and other structures to protect people and property. FEMA defines EAPs as official documents to decrease the damage and impact in emergency situations and to reduce casualties. These documents should consider all possible situations in an emergency and can reduce problems in facility management. This study analyzes EAPs for infrastructure from the USA, Japan, and Korea in order to suggest an ideal EAP framework. EAPcontent can include how to guide experts and operators in disaster stages (mitigation, preparedness, response, and recovery), how to operate emergency equipment, and how to protect critical infrastructure and life. The suggested EAP framework performed very well in a test location. It can therefore be used for infrastructure organizations in Korea and to inform of the appropriate processes and methods for risk reduction in flood disasters.

A Case Study on SK Telecom's Next Generation Marketing System Development (SK텔레콤의 차세대 마케팅 시스템 개발사례 연구)

  • Lee, Sang-Goo;Jang, Si-Young;Yang, Jung-Yeon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.2
    • /
    • pp.158-170
    • /
    • 2008
  • In response to the changing demands of ever competitive market, SK Telecom has built a new marketing system that can support dynamic marketing campaigns and, at the same time, scale up to the large volumes of data and transactions for the next decade. The system which employs Unix-based client-server (using Web browser interfaces) architecture will replace the current mainframe-based COIS system. The project, named NGM (Next Generation Marketing ), is unprecedentedly large in scale. However, both managerial and technical problems led the project into a crisis. The application framework that depended on a software solution from a major global vendor could not support the dynamic functionalities required for the new system. In March 2005, SK telecom declared the suspension of the NGM project. The second phase of the project started in May 2005 following a comprehensive replanning. It was decided that no single existing solution could cope with the complexity of the new system and hence the new system would be custom-built. As such. a number of technical challenges emerged. In this paper, we report on the three key dimensions of technical challenges - middleware and application framework, database architecture and tuning, and system performance. The processes and approaches, adopted in building NGM system, may be viewed as "best practices" in the telecom industry. The completed NGM system, now called "U.key System," successfully came into operation on the ninth of October, 2006. This new infrastructure is expected to give birth to a series of innovative, fruitful, and customer-oriented applications in the near future.

Development of the Regulatory Impact Analysis Framework for the Convergence Industry: Case Study on Regulatory Issues by Emerging Industry (융합산업 규제영향분석 프레임워크 개발: 신산업 분야별 규제이슈 사례 연구)

  • Song, Hye-Lim;Seo, Bong-Goon;Cho, Sung-Min
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.3
    • /
    • pp.199-230
    • /
    • 2021
  • Innovative new products and services are being launched through the convergence between heterogeneous industries, and social interest and investment in convergence industries such as AI, big data-based future cars, and robots are continuously increasing. However, in the process of commercialization of convergence new products and services, there are many cases where they do not conform to the existing regulatory and legal system, which causes many difficulties in companies launching their products and services into the market. In response to these industrial changes, the current government is promoting the improvement of existing regulatory mechanisms applied to the relevant industry along with the expansion of investment in new industries. This study, in these convergence industry trends, aimed to analysis the existing regulatory system that is an obstacle to market entry of innovative new products and services in order to preemptively predict regulatory issues that will arise in emerging industries. In addition, it was intended to establish a regulatory impact analysis system to evaluate adequacy and prepare improvement measures. The flow of this study is divided into three parts. In the first part, previous studies on regulatory impact analysis and evaluation systems are investigated. This was used as basic data for the development direction of the regulatory impact framework, indicators and items. In the second regulatory impact analysis framework development part, indicators and items are developed based on the previously investigated data, and these are applied to each stage of the framework. In the last part, a case study was presented to solve the regulatory issues faced by actual companies by applying the developed regulatory impact analysis framework. The case study included the autonomous/electric vehicle industry and the Internet of Things (IoT) industry, because it is one of the emerging industries that the Korean government is most interested in recently, and is judged to be most relevant to the realization of an intelligent information society. Specifically, the regulatory impact analysis framework proposed in this study consists of a total of five steps. The first step is to identify the industrial size of the target products and services, related policies, and regulatory issues. In the second stage, regulatory issues are discovered through review of regulatory improvement items for each stage of commercialization (planning, production, commercialization). In the next step, factors related to regulatory compliance costs are derived and costs incurred for existing regulatory compliance are calculated. In the fourth stage, an alternative is prepared by gathering opinions of the relevant industry and experts in the field, and the necessity, validity, and adequacy of the alternative are reviewed. Finally, in the final stage, the adopted alternatives are formulated so that they can be applied to the legislation, and the alternatives are reviewed by legal experts. The implications of this study are summarized as follows. From a theoretical point of view, it is meaningful in that it clearly presents a series of procedures for regulatory impact analysis as a framework. Although previous studies mainly discussed the importance and necessity of regulatory impact analysis, this study presented a systematic framework in consideration of the various factors required for regulatory impact analysis suggested by prior studies. From a practical point of view, this study has significance in that it was applied to actual regulatory issues based on the regulatory impact analysis framework proposed above. The results of this study show that proposals related to regulatory issues were submitted to government departments and finally the current law was revised, suggesting that the framework proposed in this study can be an effective way to resolve regulatory issues. It is expected that the regulatory impact analysis framework proposed in this study will be a meaningful guideline for technology policy researchers and policy makers in the future.

Drought states visualization considering water use sectors (물이용 특성을 고려한 가뭄상황 표출 방안)

  • Kang, Jaewon;Park, Jisung;Seo, Aesook;Cho, Younghyun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2017.05a
    • /
    • pp.363-363
    • /
    • 2017
  • 각 기관에서는 가뭄상황을 모니터링하기 위해서 기관의 역할에 맞는 방식으로 가뭄지수를 산정하여 표출하고 있다. 국민안전처에서는 2016년 3월부터 부처간 협동으로 우리나라의 가뭄 상황을 기상학적 가뭄, 농업적 가뭄, 수문학적 가뭄으로 구분하여 행정구역단위로 주의, 심각, 매우심각의 3단계로 표출하여 활용하고 있다. 저류시설 등을 고려하여 가뭄지수를 도출하고 가뭄을 세가지 속성으로 나누어서 표출하는 것은 타당하지만, 동일한 행정구역 상에서 각 가뭄속성을 표현하는 것은 실제적인 가뭄상황의 판단과 적절한 전략적 대응을 위해서는 개선될 필요가 있다. 본 연구에서는 토지이용도를 기반으로 용수 이용 상황과 용수공급을 위한 사회기반시설을 고려해서 가뭄상황의 표현을 위한 구역의 재설정과 각 구역별로 적절한 가뭄지수의 적용 및 상황파악에 도움을 줄 수 있는 통계적 지표를 동시에 제공할 수 있는 프레임워크를 설계하고 이를 테스트베드를 대상으로 시범적으로 구현하였다. 산림이나 초지 지역, 관개시설에 의한 용수공급을 받는 논지역, 강수의존형 논지역과 밭지역, 광역상수도나 지방상수도에 의한 공급지역, 기타 생공용수 공급지역 등으로 구분하여 기상학적 가뭄, 농업적 가뭄, 수문학적 가뭄 상황이 동일 행정구역내에서도 서로 다른 값을 가질 수 있도록 하였다.

  • PDF

Adaptive Evolution of Behavioral Memory Circuits in Evolution of Artificial Individuals (인공개체 진화에서 행위기억회로의 적응적 진화)

  • Jung, Bo-Sun;Jung, Sung Hoon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.3
    • /
    • pp.67-75
    • /
    • 2016
  • This paper investigates how artificial individuals with behavioral memory circuits adaptively evolve with respect to given environments on a cell-level simulation framework simulating artificial individuals. This makes it possible for us to analyse the advantages of artificial individuals with behavioral memory circuits against the simple artificial individuals that can do only simple reactions with respect to the environments and to know which advanced reactions are possible. In order to do this analysis, we experimented various tests on a specific prey pattern and examined the results. As a first experiment, we tested that artificial individuals with four memory steps competed against from those without memory step to those with three memory steps. Experimental results showed that the artificial individuals with four memory steps were superior to most others. However, artificial individuals with two memory steps were better than those with four memory steps. This was caused that the artificial individuals with two memory steps could evolve faster than those of four memory steps. In a second experiment that all types of artificial individuals are simultaneously evolved, the artificial individuals with two memory steps also showed the best result in the experiment. We could conclude that the artificial individuals with memory was better than those without memory and the best memory steps of artificial individuals were depended on the complexity of prey patterns.

Study on Method to Develop Case-based Security Threat Scenario for Cybersecurity Training in ICS Environment (ICS 환경에서의 사이버보안 훈련을 위한 사례 기반 보안 위협 시나리오 개발 방법론 연구)

  • GyuHyun Jeon;Kwangsoo Kim;Jaesik Kang;Seungwoon Lee;Jung Taek Seo
    • Journal of Platform Technology
    • /
    • v.12 no.1
    • /
    • pp.91-105
    • /
    • 2024
  • As the number of cases of applying IT systems to the existing isolated ICS (Industrial Control System) network environment continues to increase, security threats in the ICS environment have rapidly increased. Security threat scenarios help to design security strategies in cybersecurity training, including analysis, prediction, and response to cyberattacks. For successful cybersecurity training, research is needed to develop valid and reliable security threat scenarios for meaningful training. Therefore, this paper proposes a case-based security threat scenario development methodology for cybersecurity training in the ICS environment. To this end, we develop a methodology consisting of five steps based on analyzing actual cybersecurity incident cases targeting ICS. Threat techniques are standardized in the same form using objective data based on the MITER ATT&CK framework, and then a list of CVEs and CWEs corresponding to the threat technique is identified. Additionally, it analyzes and identifies vulnerable functions in programming used in CWE and ICS assets. Based on the data generated up to the previous stage, develop security threat scenarios for cybersecurity training for new ICS. As a result of verification through a comparative analysis between the proposed methodology and existing research confirmed that the proposed method was more effective than the existing method regarding scenario validity, appropriateness of evidence, and development of various scenarios.

  • PDF