• Title/Summary/Keyword: 방어행위

Search Result 119, Processing Time 0.027 seconds

Dynamic Simulation on a Network Security Simulator using SSFNet (SSFNet을 이용한 네트워크 보안 시뮬레이터에서 동적 시뮬레이션 방법)

  • 박응기;윤주범;임을규
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.101-106
    • /
    • 2004
  • Recently, a network defense simulator becomes essential in studying cyber incidents because the cyber terror become more and more interesting. The network defense simulator is a tool to estimate damages and an effectiveness of a defense mechanism by modeling network intrusions and defense mechanisms. Using this tool, users can find efficient ways of preventing a cyber terror and recovering from the damage. Previous simulators start the simulation after entire scenario has made and been loaded to simulation engine. However, in this way it can't model human judgement and behavior, and it can't simulate the real cyber terror very well. In this paper, we have added a dynamic simulation component to our previous network security simulator. This component improved accurate modeling of network intrusions and defense behaviors. We have also proposed new modified architecture of the simulation system. Finally we have verified correct simulation results from stammer worn simulation.

Policy Based DDoS Attack Mitigation Methodology (정책기반의 분산서비스거부공격 대응방안 연구)

  • Kim, Hyuk Joon;Lee, Dong Hwan;Kim, Dong Hwa;Ahn, Myung Kil;Kim, Yong Hyun
    • Journal of KIISE
    • /
    • v.43 no.5
    • /
    • pp.596-605
    • /
    • 2016
  • Since the Denial of Service Attack against multiple targets in the Korean network in private and public sectors in 2009, Korea has spent a great amount of its budget to build strong Internet infrastructure against DDoS attacks. As a result of the investments, many major governments and corporations installed dedicated DDoS defense systems. However, even organizations equipped with the product based defense system often showed incompetency in dealing with DDoS attacks with little variations from known attack types. In contrast, by following a capacity centric DDoS detection method, defense personnel can identify various types of DDoS attacks and abnormality of the system through checking availability of service resources, regardless of the types of specific attack techniques. Thus, the defense personnel can easily derive proper response methods according to the attacks. Deviating from the existing DDoS defense framework, this research study introduces a capacity centric DDoS detection methodology and provides methods to mitigate DDoS attacks by applying the methodology.

The Statute of the International Criminal Court of the Control Crime Due to the Regulation Coat Investigators of ICC (ICC규정상 ICC수사관에 의한 단속범죄의 한계)

  • Yoo In-Chang
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.1
    • /
    • pp.85-92
    • /
    • 2006
  • It seems extremely incongruous that genocide, crimes against humanity and war crimes could ever be justified or excused by 'defensive force'- self-defence, defence of others and defence of property. Nonetheless, art 31(1)(c) of the Rome Statute of the International Criminal Court codifies defensive force as a ground for excluding criminal responsibility. This provision was controversial and extremely difficult to negotiate at the Rome Conference of 1998, largely due to the conceptual differences that exist in respect of criminal defences between the various domestic legal systems of the world. This paper analyses the drafting history and wording of art 31(1)(c) in order to clarify the precise scope of defensive force under the Rome Statute. It then seeks to ascertain the applicability of the provision to genocide, crimes against humanity and war crimes, and to thereby explore the nature of these crimes and the intended prosecutorial strategy of the International Criminal Court.

  • PDF

침입 감지 모델 설정과 시스템의 분석

  • 신종태;이대기
    • Review of KIISC
    • /
    • v.3 no.3
    • /
    • pp.23-30
    • /
    • 1993
  • 이 논문에서는 고도의 정보보호를 필요로 하는 문서나 시스템에 대한 불법 행위를 막을 수 있는 침입 감지 시스템을 설계함에 있어 필요한 시스템 모델의 구성요소를 분석하였다. 또한 외국에서 개발되었거나 개발 중인 침입 감지 시스템들을 소개하였다. 전산망이나 컴퓨터 시스템에 있어 신분확인과 외부의 침입을 막기 위한 1차적인 방어 수단이 되지만 이러한 것들이 타협이나 공모에 의해 파괴되었을 때 이러한 침입 감지 시스템은 큰 역할을 수행하게 된다. 앞으로 다양한 형태의 내부적/외부적 침입 행위와 컴퓨터 시스템을 악용하려는 모든 행위를 즉각적으로 감지하는 기능을 수행하는 실시간 ㅣㅁ입 감지 시스템에 대한 연구가 절실히 요구될 것이다.

  • PDF

Damage and Defense of Online game private servers. (온라인 게임의 사설서버 피해와 방어)

  • Bae, Jung-Il;Oh, Sang-Seok;Min, Sung-Gi
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.1456-1459
    • /
    • 2012
  • 사설서버는 개발사의 동의 없이 게임 서버를 제작 및 운영 하여 게임에 대한 저작권 침해와 서비스의 권리 없이 영리나 비영리 목적으로 단체 또는 개인이 온라인 게임을 즐길 수 있도록 서비스 하는 행위 또는 서버 자체를 뜻한다. 본 논문에서는 이러한 사설서버에 대한 기술적인 대응 방법인 사설서버 방어코드에 대해서 제안 한다. 본 연구는 사설서버로 인한 게임 개발사의 피해와 사설서버에 대한 방어 방법, 그리고 실제 온라인 게임에 사설서버 방어 기술을 도입한 후 사설서버 방어의 효과에 대해서 조사를 한다.

Damage and Defense of Online game private servers. (온라인 게임의 사설서버 피해와 방어)

  • Bae, Jung-Il;Oh, Sang-Seok;Min, Sung-Gi
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.917-920
    • /
    • 2013
  • 사설서버는 개발사의 동의 없이 게임 서버를 제작 및 운영 하여 게임에 대한 저작권 침해와 서비스의 권리 없이 영리나 비영리 목적으로 단체 또는 개인이 온라인 게임을 즐길 수 있도록 서비스 하는 행위 또는 서버 자체를 뜻한다. 본 논문에서는 이러한 사설서버에 대한 기술적인 대응 방법인 사설서버 방어코드에 대해서 제안 한다. 본 연구는 사설서버로 인한 게임 개발사의 피해와 사설서버에 대한 방어 방법, 그리고 실제 온라인 게임에 사설서버 방어 기술을 도입한 후 사설서버 방어의 효과에 대해서 조사를 한다.

The Effects on Juvenile Response about Fear of School Violence (학교폭력으로 인한 두려움이 청소년의 반응에 미치는 영향 -대구지역 일반 고등학생을 대상으로-)

  • Kim, Sang Woon
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.8
    • /
    • pp.152-159
    • /
    • 2013
  • Delinquency young people committed society as evolves is also increasing rapidly. Juvenile delinquency that occurred recently is serious. As a result, young people are feeling fear of delinquency. Fear of delinquency young people feel, a major impact on the personality development of the youth of the period of growth. In particular, the violent delinquency, to give a physical impact, damage youth receives is large. As well as physical damage to people in and around the juvenile victims, given the damage mental serious form, fear violent delinquency has been shown in many previous studies. Therefore, in this study you have the purpose to study the effects on the reaction of juvenile victims for fear of delinquency caused by the delinquency of violence. Set randomly on campus and external experience and damage directly or indirectly, are classified into action evasive action defensive reaction of fear by delinquency, factors that affect the risk caused by violent delinquency, Daegu after conducting a survey of high school students in general in the areas in which we tested the hypothesis. As a result of the verification, exerting a significant influence in order to act defensive becomes clear, experience of direct damage and experience of damage indirect fear of delinquency, avoided experience of direct damage it was found to exert a significant effect on to the action manner.

Analysis of Radiology Students' Behavior in Wearing Radiation Protection Equipment - based on the Theory of Planned Behavior (계획된 행위이론을 적용한 방사선학과 대학생들의 방사선 방어용 보호장구 착용에 대한 분석)

  • Noh, Ji-Sook;Lee, Byung-Hoon;Bea, Sang-Yul;Park, Hyung-Su;Ryu, So-Yen;Park, Jong
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.9
    • /
    • pp.443-452
    • /
    • 2011
  • This research aims at investigating the factors that affects the wearing of the nuclear protection equipment by radiology students. We measured the factors related to the wearing of the nuclear protection equipment based on the theory of planned behavior (TPB). We collected 192 survey records from 230 radiology students in Kwang-ju and Chun-nam providence who finished the clinical training. Based on Logistic Regression analysis, we found that the wearing of the nuclear protection equipment is statistically more probable as the level of study is lower, the scale of practicing hospital is smaller, the attitude rating is lower, and the rating of perceived behavioral control is higher. We argue that the development of educational program considering factors like the perceived behavioral control is required to enhance the degree of wearing the nuclear protection equipment in the clinical training of college students.

Factors Affecting Radiation Protective Behaviors in Perioperative Nurses Applying the Theory of Planned Behavior: Path Analysis (계획된 행위이론을 적용한 수술실 간호사의 방사선 방어행위에 대한 영향요인: 경로분석)

  • Jang, Se Young;Kim, Hee Sun;Jeong, Seok Hee;Kim, Young Man
    • Journal of Korean Academy of Nursing
    • /
    • v.53 no.2
    • /
    • pp.222-235
    • /
    • 2023
  • Purpose: The aim of this study was to identify the factors explaining protective behaviors against radiation exposure in perioperative nurses based on the theory of planned behavior. Methods: This was a cross-sectional study. A total of 229 perioperative nurses participated between October 3 and October 20, 2021. Data were analyzed using SPSS/WIN 23.0 and AMOS 23.0 software. The three exogenous variables (attitude toward radiation protective behaviors, subjective norm, and perceived behavioral control) and two endogenous variables (radiation protective intention and radiation protective behaviors) were surveyed. Results: The hypothetical model fit the data (χ2/df = 1.18, SRMR = .02, TLI = .98, CFI = .99, RMSEA = .03). Radiation protective intention (β = .24, p = .001) and attitude toward radiation protective behaviors (β = .32, p = .002) had direct effects on radiation protective behaviors. Subjective norm (β = .43, p = .002) and perceived behavior control (β = .24, p = .003) had direct effects on radiation protective intention, which explained 38.0% of the variance. Subjective norm (β = .10, p = .001) and perceived behavior control (β = .06, p = .002) had indirect effects via radiation protective intention on radiation protective behaviors. Attitude toward radiation protective behaviors, subjective norm, and perceived behavioral control were the significant factors explaining 49.0% of the variance in radiation protective behaviors. Conclusion: This study shows that the theory of planned behavior can be used to effectively predict radiation protective behaviors in perioperative nurses. Radiation safety guidelines or education programs to enhance perioperative nurses' protective behaviors should focus on radiation protective intention, attitude toward radiation protective behaviors, subjective norm, and perceived behavioral control.

A Host-based Intrusion Detection Data Analysis Comparison (호스트 기반 침입 탐지 데이터 분석 비교)

  • Park, DaeKyeong;Shin, Dongkyoo;Shin, Dongil
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.05a
    • /
    • pp.490-493
    • /
    • 2020
  • 오늘날 정보통신 기술이 급격하게 발달하면서 IT 인프라에서 보안의 중요성이 높아졌고 동시에 APT(Advanced Persistent threat)처럼 고도화되고 다양한 형태의 공격이 증가하고 있다. 점점 더 고도화되는 공격을 조기에 방어하거나 예측하는 것은 매우 중요한 문제이며, NIDS(Network-based Intrusion Detection System) 관련 데이터 분석만으로는 빠르게 변형하는 공격을 방어하지 못하는 경우가 많이 보고되고 있다. 따라서 HIDS(Host-based Intrusion Detection System) 데이터 분석을 통해서 위와 같은 공격을 방어하는데 현재는 침입탐지 시스템에서 생성된 데이터가 주로 사용된다. 하지만 데이터가 많이 부족하여 과거에 생성된 DARPA(Defense Advanced Research Projects Agency) 침입 탐지 평가 데이터 세트인 KDD(Knowledge Discovery and Data Mining) 같은 데이터로 연구를 하고 있어 현대 컴퓨터 시스템 특정을 반영한 데이터의 비정상행위 탐지에 대한 연구가 많이 부족하다. 본 논문에서는 기존에 사용되었던 데이터 세트에서 결여된 스레드 정보, 메타 데이터 및 버퍼 데이터를 포함하고 있으면서 최근에 생성된 LID-DS(Leipzig Intrusion Detection-Data Set) 데이터를 이용한 분석 비교 연구를 통해 앞으로 호스트 기반 침입 탐지 데이터 시스템의 나아갈 새로운 연구 방향을 제시한다.