• Title/Summary/Keyword: 불법방해

Search Result 47, Processing Time 0.032 seconds

무선 Ad Hoc 네트워크에서의 안전한 라우팅 프로토콜에 관한 연구

  • 박영호;이경근;이상곤;문상재
    • Review of KIISC
    • /
    • v.15 no.3
    • /
    • pp.76-81
    • /
    • 2005
  • 무선 ad hoc 네트워크는 고정된 기반 망의 도움없이 이동 단말만으로 구성된 자율적이고 독립적인 네트워크로 최근 다양한 분야에서의 활용이 논의되고 있다. 그러나, ad hoc 네트워크는 구성이 변하기 쉬운 환경이므로 불법 노드가 네트워크 자원소비 및 경로방해 등의 동작이 용이하므로 라우팅 프로토콜 보호가 필요하다. 따라서, 본 논문에서는 무선 ad hoc 네트워크에서의 대표적인 안전한 라우팅 프로토콜인 Ariadne 프로토콜, ARAN 프로토콜 그리고 SAODV 프로토콜에 관하여 기술하고자 한다.

A Study on the Revised Draft of Rome Convention on Compensation for Damage Caused by Aircraft to Third Parties - With Respect to the Draft Unlawful Interference Compensation Convention and the Draft General Risks Convention - (항공기에 의하여 발생된 제3자 손해배상에 관한 로마협약 개정안에 대한 고찰 - 불법방해배상협약안과 일반위험협약안을 중심으로 -)

  • Lee, Kang-Bin
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.22 no.2
    • /
    • pp.27-51
    • /
    • 2007
  • The cumulative result of the work by the ICAO Secretariat, the Secretariat Study Group and the Council Special Group on the Modernization of the Rome Convention of 1952 are two draft Conventions, namely: "Draft Convention on Compensation for Damage Caused by Aircraft to Third Parties, in case of Unlawful Interference", and "Draft Convention on Compensation for Damage Caused by Aircraft to Third Parties" The core provisions of the former draft Convention are as follows: The liability of the operator is strict, that is, without the necessity of proof of fault. It would be liable for damage sustained by third parties on condition only that the damage was caused by an aircraft in flight(Article 3). However, such liability is caped based on the weight of the aircraft(Article 4). It is envisaged to create an independent organization called the Supplementary Compensation Mechanism, with the principle purpose to pay compensation to persons suffering damage in the territory of a State Party, and to provide financial support(Article 8). Compensation shall be paid by the SCM to the extent that the total amount of damages exceeds the Article 4 limits(Article 19). The main issues on the farmer draft Convention are relating to breaking away from Montreal Convention 1999, no limits on individual claims but a global limitation on air carrier liability, insurance coverage, cap of operators' strict liability, and Supplementary Compensation Mechanism. The core provisions of the latter draft Convention are as follows: the liability of the operator is strict, up to a certain threshold tentatively set at 250,000 to 500,000 SDRs. Beyond that, the operator is liable for all damages unless it proves that such damage were not due to its negligence or that the damages were solely due to the negligence of another person(Article 3). The provisions relating to the SCM and compensation thereunder do not operate under this Convention, as the operator is potentially for the full amount of damages caused. The main issues on the latter draft Convention are relating to liability limit of operator, and definition of general risks. In conclusion, we urge ICAO to move forward expeditiously on the draft Convention to establish a third party liability and compensation system that can stand ready to protect both third party victims and the aviation industry before another 9/11-scale event occurs.

  • PDF

Distributed Intrusion Detection System for Safe E-Business Model (안전한 E-Business 모델을 위한 분산 침입 탐지 시스템)

  • 이기준;정채영
    • Journal of Internet Computing and Services
    • /
    • v.2 no.4
    • /
    • pp.41-53
    • /
    • 2001
  • Multi-distributed web cluster model built for high availability E-Business model exposes internal system nodes on its structural characteristics and has a potential that normal job performance is impossible due to the intentional prevention and attack by an illegal third party. Therefore, the security system which protects the structured system nodes and can correspond to the outflow of information from illegal users and unfair service requirements effectively is needed. Therefore the suggested distributed invasion detection system is the technology which detects the illegal requirement or resource access of system node distributed on open network through organic control between SC-Agents based on the shared memory of SC-Server. Distributed invasion detection system performs the examination of job requirement packet using Detection Agent primarily for detecting illegal invasion, observes the job process through monitoring agent when job is progressed and then judges the invasion through close cooperative works with other system nodes when there is access or demand of resource not permitted.

  • PDF

A Study on the Response to Acts of Unlawful Interference by Insider Threat in Aviation Security (항공보안 내부자 위협에 의한 불법방해행위의 대응을 위한 연구)

  • Sang-hoon Lim;Baek-yong Heo;Ho-won Hwang
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.1
    • /
    • pp.16-22
    • /
    • 2023
  • Terrorists have been attacking in the vulnerable points of aviation sector with the diverse methods of attacks. Recently, Vulnerability is increasing because the Modus Operandi of Terrorism is carried out by exploitation of people in the form of employee working in aviation sector whose role provides them with privileged access to secured locations, secured items or security sensitive information. Furthermore, cases of insider threat are rising across the world with the phenomenon of personal radicalization through internet and social network service. The government of ROK must respond to insider threat could exploit to acts of unlawful interference and the security regulations should be established to prevent from insider threat in advance refer to the acts of unlawful interference carried out in foreign countries and the recommendations by USA, UK and ICAO.

The Characteristic of the Carrier's Liability Due to the Illegal Act of the Crew during International Air Transportation (국제항공운송 과정에서의 기장 등의 직무상 불법행위에 기한 운송인의 손해배상책임이 가지는 특수성)

  • Kim, Min-Seok
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.35 no.3
    • /
    • pp.3-37
    • /
    • 2020
  • The aircraft crew operating on international routes performs almost identical tasks as police officials in terms of dealing with the unlawful interference in the aircraft. This means that the liability question which is related to the law enforcement by the police officer may arise regarding the crew's performance of his or her duties. With regard to the carrier's liability due to the crew's unlawful action, there are distinctive characteristics from the liability due to police officers' unlawful action. In case of the claim for damages by the crew's unlawful action, the first question should be whether such action complies with the requirements under the Tokyo Convention 1963. If such action does not conform with the Tokyo Convention 1963, we should examine that claim under the State Compensation Act, the Montreal Convention 1999, and the Civil Act of Korea. The examination under the Tokyo Convention 1963 is not so different from the Korean Court's precedents. However, the court should consider the characteristics of the environment surrounding the crew. The action which is not indemnified under the Tokyo Convention 1963 should be examined under the tort laws. Because the aircraft crew is private persons entrusted with public duties under Korean Law, the State Compensation Act may apply. However, further studies regarding the harmonious interpretation with the Montreal Convention 1999 is needed. With regard to the carrier's liability, the Montreal Convention of 1999 should be applied to the crew's unlawful actions onboard. This is because the Montreal Convention of 1999 preempts the national law for the events that occurred during transportation, and there is no provision which excludes such unlawful actions from the scope of its application. On the other hand, the national law, such as the Civil Act of Korea, applies to unlawful actions taken after transportation. This is because the interpretation that infinitely expands the scope of the Montreal Convention 1999 should not be allowed. Given the foregoing, the standard of the claim for damages due to the crew's unlawful action varies depending on the place where the specific action was taken. As a result, the type of damage recoverable and the burden of proof also varies accordingly. Carriers and crew members must perform their duties with this in mind, but in particular, they should observe the proportionality, and when interpreting the law, it is necessary for the court or lawyer to consider the special characteristics of the work environment.

A Study on the 3rd Party Liability for the Damages Caused by the Aircraft - With respect to the 2009 Montreal Conventions (New Rome Convention) - (항공기에 의한 제3자 피해보상에 관한 고찰 - 2009 몬트리올 신로마협약을 중심으로 -)

  • Hong, Soon-Kil
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.24 no.2
    • /
    • pp.3-17
    • /
    • 2009
  • The Rome Convention System (1933, 1952, 1978) which deal the third party lability relating to damage caused by aircraft to third parties on the surface have not been so effective and successful like the Warsaw Convention System. This paper briefs the development of the Rome Convention System and the reasons of their failure which are the low level of the limit of liability and non-parties of major civil aviation states such as the United States, the United Kingdom, Japan, Germany and etc. The Diplomatic Conference hosted by ICAO at Montreal during April 20 to May 2 has successfully produced two Conventions; One is Convention on Compensation for Damage Caused by Aircraft to Third Parties (General Risk Convention), the other is Convention on Compensation for Damage to Third Parties, Resulting from Acts of Unlawful Interference involving Aircraft (Unlawful Interference Convention). The major contents and some problems of these two Conventions are reviewed in comparison with the exisiting Rome Convention System and other legal system. Particularly, the entrance into force of the Unlawful Interference Convention may take some time, at least more than 5 years, due to the realistic problems arising from the operation of International Civil Aviation Fund.

  • PDF

Design and Implementation of a Real Time Access Log for IP Fragmentation Attack Detection (IP Fragmentation 공격 탐지를 위한 실시간 접근 로그 설계 및 구현)

  • Guk, Gyeong-Hwan;Lee, Sang-Hun
    • The KIPS Transactions:PartA
    • /
    • v.8A no.4
    • /
    • pp.331-338
    • /
    • 2001
  • With the general use of network, cyber terror rages throughout the world. However, IP Fragmentation isn\`t free from its security problem yet, even though it guarantees effective transmission of the IP package in its network environment. Illegal invasion could happen or disturb operation of the system by using attack mechanism such as IP Spoofing, Ping of Death, or ICMP taking advantage of defectiveness, if any, which IP Fragmentation needs improving. Recently, apart from service refusal attack using IP Fragmentation, there arises a problem that it is possible to detour packet filtering equipment or network-based attack detection system using IP Fragmentation. In the paper, we generate the real time access log file to make the system manager help decision support and to make the system manage itself in case that some routers or network-based attack detection systems without packet reassembling function could not detect or suspend illegal invasion with divided datagrams of the packet. Through the implementation of the self-managing system we verify its validity and show its future effect.

  • PDF

Profile based Malicious Loader Attack Detection and Filtering Method (프로파일 기반 악성 로더 공격탐지 및 필터링 기법)

  • Yoon, E-Joong;Kim, Yo-Sik
    • Convergence Security Journal
    • /
    • v.6 no.2
    • /
    • pp.21-29
    • /
    • 2006
  • Recently, illegal manipulation and forgery threats on computer softwares are increasing. Specially, forge the code of program and disrupt normal operation using a malicious loader program against the Internet application client. In this paper, we first analyze and generate signatures of malicious loader detection. And, we propose a method to secure the application client based on profiling which can detect and filter out abnormal malicious loader requests.

  • PDF

A New Route Discovery Protocol for Ad Hoc Network (Ad Hoc 네트워크를 위한 새로운 경로발견 프로토콜)

  • Sin Jin-Seob;Park Young-Ho
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2006.05a
    • /
    • pp.137-142
    • /
    • 2006
  • Ad hoc 네트워크는 고정된 기반 망의 도움없이 이동 단말만으로 구성된 자율적이고 독립적인 네트워크로 최근 다양한 분야에서의 활용이 논의되고 있다 그러나, ad hoc 네트워크는 구성이 변하기 쉬운 환경이므로 불법 노드가 네트워크 자원소비 및 경로방해 등의 동작이 용이하므로 라우팅 프로토콜 보호가 필요하다. 따라서, 해쉬함수 및 공개키 암호화 방식을 이용한 경로발견 프로토콜을 제안한다. 제안한 프로토콜은 경로요구 시는 해쉬함수만을 이용하며 경로응답 시 경로의 각 홉에서 공개키 방식으로 암호화를 하여 시작노드에서 각 홉에 대한 인증 및 홉을 가장한 active 공격에 강하다.

  • PDF

A Proposal of Secure Route Discovery Protocol for Ad Hoc Network using Symmetric Key Cryptography (대칭키 암호화를 이용한 Ad Hoc 네트워크에서의 안전한 경로발견 프로토콜 제안)

  • Park, Young-Ho;Lee, Sang-Gon;Moon, Sang-Jae
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.1
    • /
    • pp.68-75
    • /
    • 2008
  • Because ad hoc network is vulnerable to attacks such as routing disruption and resource consumption, it is in need of routing protocol security. In this paper, we propose an efficient and secure route discovery protocol for ad hoc network using symmetric key cryptography. This protocol has small computation loads at each hop using symmetric key cryptography. In the Route Reply, encryption/decrytion are used to guard against active attackers disguising a hop on the network.

  • PDF