• Title/Summary/Keyword: 사이버 공격 기술

Search Result 443, Processing Time 0.073 seconds

GPS 재밍을 고려한 해상교통관제 시스템 설계

  • Lee, Byeong-Gil;Kim, Byeong-Du;Na, Jung-Chan;Jo, Hyeon-Suk
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2013.06a
    • /
    • pp.337-339
    • /
    • 2013
  • 최근 국내에서는 북한의 사이버 테러로 추정되는 전산망 해킹(APT공격)사건과 더불어 하나의 전자전으로서 GPS 재밍 사건들이 인천 등 서해에서 다수 발생되어 왔다. 즉, 이러한 GPS 재머는 러시아 등에서 유출되는 간단한 장비에서부터 치명적인 대규모 전파공격까지 다양한 형태가 발생될 수 있다. 특히 GPS 정보를 사용하는 선박의 AIS 정보는 다수의 선박으로부터 전송되는 정보로서 재밍 대응 가능한 고가의 장비를 선박측에서 탑재하기 어려우며, 송신지가 인근 북한의 경우 국내에서 근원지를 탐지하더라도 대응이 어려운 실정이다. 따라서 본 논문에서는 GPS 교란의 지능화된 여러 공격 형태를 파악하고, 해상교통관제 시스템에서 자체적으로 실시간 대응할 수 있는 방안을 검토하여 시스템 설계에 반영 하고, 관제사의 실시간 인지를 통한 혼란을 방지하며, 선박에 해당 교란 정보를 제공함으로서 능동적인 관제 방안을 제시한다. 실제적으로 재밍에 대응하는 시스템 설계가 관제에 효율적인 방안인지 확인되어야 하며, 국가적으로도 VTS 서비스의 안전성을 보장하는 기술개발로 진화가 고려되어야 한다.

  • PDF

A study on national cybersecurity policy agenda in Korea using national cyber capability assessment model (국가 사이버 역량평가 모델을 활용한 국내 사이버안보 정책 의제 도출 연구)

  • Song, Minkyoung;Bae, Sunha;Kim, So-Jeong
    • Journal of Digital Convergence
    • /
    • v.19 no.8
    • /
    • pp.89-100
    • /
    • 2021
  • The National Cyber Capability Assessment(NCCA) could be used as meaningful information for improving national cyber security policy because it provides information on the elements necessary for strengthening national cyber capabilities and the level of each country. However, there were few studies on improving cyber capabilities using the NCCA result in Korea. Therefore, we analyzed the result of National Cyber Power Index(NCPI) conducted by Belfer Center of Harvard Univ. by applying modified-IPA method to derive cybersecurity policy agendas for Korea. As a result, the need to set agendas on surveillance and offensive cyber capability and improve the effectiveness of policy implementation for intelligence and defense was drawn. Moreover, we suggested need for in-depth study of each policy agenda deduced from preceding research data as a future tasks. And it is expected to increase practical use of NCCA for domestic policy analysis by developing and using our own NCCA model which considered analysis framework proposed in this study.

AI-based Cybersecurity Solution for Industrial Control System (산업제어시스템을 위한 인공지능 보안 기술)

  • Jo, Bu-Seong;Kim, Mun-Suk
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.97-105
    • /
    • 2022
  • This paper explains trends in security technologies for ICS. Since ICS is usually applied to large-scale national main infrastructures and industry fields, minor errors caused by cyberattack could generate enormous economic cost. ICS has different characteristic with commonly used IT systems, so considering security threats of ICS separately with IT is needed for developing modern security technology. This paper introduce framework for ICS that analyzes recent cyberattack tactics & techniques and find out trends in Intrusion Detection System (IDS) which is representative technology for ICS security, and analyzes AI technologies used for IDS. Specifically, this paper explains data collection and analysis for applying AI techniques, AI models, techniques for evaluating AI Model.

Research on Core Technology for Information Security Based on Artificial Intelligence (인공지능 기반 정보보호핵심원천기술 연구)

  • Sang-Jun Lee;MIN KYUNG IL;Nam Sang Do;LIM JOON SUNG;Keunhee Han;Hyun Wook Han
    • The Journal of Bigdata
    • /
    • v.6 no.2
    • /
    • pp.99-108
    • /
    • 2021
  • Recently, unexpected and more advanced cyber medical treat attacks are on the rise. However, in responding to various patterns of cyber medical threat attack, rule-based security methodologies such as physical blocking and replacement of medical devices have the limitations such as lack of the man-power and high cost. As a way to solve the problems, the medical community is also paying attention to artificial intelligence technology that enables security threat detection and prediction by self-learning the past abnormal behaviors. In this study, there has collecting and learning the medical information data from integrated Medical-Information-Systems of the medical center and introduce the research methodology which is to develop the AI-based Net-Working Behavior Adaptive Information data. By doing this study, we will introduce all technological matters of rule-based security programs and discuss strategies to activate artificial intelligence technology in the medical information business with the various restrictions.

Digital Asset Analysis Methodology against Cyber Threat to Instrumentation and Control System in Nuclear Power Plants (원자력발전소의 디지털계측제어시스템의 사이버보안을 위한 디지털 자산분석 방법)

  • Koo, In-Soo;Kim, Kwan-Woong;Hong, Seok-Boong;Park, Geun-Ok;Park, Jae-Yoon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.6
    • /
    • pp.839-847
    • /
    • 2011
  • Instrumentation & Control(I&C) System in NPP(Nuclear Power Plant) plays a important role as the brain of human being, it performs protecting, controling and monitoring safety operation of NPP. Recently, the I&C system is digitalized as digital technology such as PLC, DSP, FPGA. The different aspect of digital system which use digital communication to analog system is that it has potential vulnerability to cyber threat in nature. Possibility that digital I&C system is defected by cyber attack is increasing day by day. The result of cyber attack can be adverse effect to safety function in NPP. Therefore, I&C system required cyber security counter-measures that protect themselves from cyber threat efficiently and also cyber security design should be taken into consideration at concept stage in I&C system development process. In this study, we proposed the digital asset analysis method for cyber security assessment of I&C system design in NPP and we performed digital asset analysis of I&C system by using the proposed method.

A Study on the Operation Concept of Cyber Warfare Execution Procedures (사이버전 수행절차 운영개념에 관한 연구)

  • Kim, Sung-Joong;Yoo, JiHoon;Oh, HaengRok;Shin, Dongil;Shin, DongKyoo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.73-80
    • /
    • 2020
  • Due to the expansion of cyber space, war patterns are also changing from traditional warfare to cyber warfare. Cyber warfare is the use of computer technology to disrupt the activities of nations and organizations, especially in the defense sector. However, the defense against effective cyber threat environment is inadequate. To complement this, a new cyber warfare operation concept is needed. In this paper, we study the concepts of cyber intelligence surveillance reconnaissance, active defense and response, combat damage assessment, and command control in order to carry out cyber operations effectively. In addition, this paper proposes the concept of cyber warfare operation that can achieve a continuous strategic advantage in cyber battlefield.

A Study on Cloud Network and Security System Analysis for Enhanced Security of Legislative Authority (입법기관의 보안강화를 위한 Cloud 네트워크 분석 및 보안 시스템 연구)

  • Nam, Won-Hee;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.6
    • /
    • pp.1320-1326
    • /
    • 2011
  • National institutions on the importance of information security is being recognized, information security laws are being discussed in Congress 3.4 DDoS incident and Nonghyup hacking, etc. However, National Assembly Secretariat when the results of the Information Security Consulting has been assessed very low 61.2 points, evaluation of hardware and software in secure areas were vulnerable. This paper, the legislative support agencies National Assembly and National Assembly Secretariat on the network and computer systems, and managerial, technical and physical security elements are analyzed for the status. And network should have the legislative support agencies and system for the physical network separation, DDoS attack response, Virus attack response, hacking attacks response, and Cyber Emergency Response Team/Coordination Center for Cyber infringing design and research through the confidentiality, integrity, availability, access control, authentication and security analysis is based on the evaluation criteria. Through this study, the legislative support agencies to strengthen the security of data and security laws enacted to provide the basis for.

자율주행자동차 보안 동향

  • Seo, Hwajeong;Kwon, YongBeen;Kwon, HyeokDong;An, Kyuhwang
    • Review of KIISC
    • /
    • v.28 no.5
    • /
    • pp.9-14
    • /
    • 2018
  • 운전자의 도움 없이 자동으로 운행하는 자율주행자동차는 차세대 IT 플랫폼으로써 그 중요도가 증가하고 있다. 현재 자동차 회사는 물론이거니와 대표적인 IT 기업들에서도 자율주행차량을 상용화하기 위한 노력을 기울이고 있다. 자율주행자동차는 주행과 관련된 기술적인 완성도도 중요하지만 이와 더불어 사소한 보안 취약점이 차량 탑승자의 생명을 위협할 수 있는 만큼 단 한차례의 사이버 공격도 허용할 수 없는 기술적 특징을 가진다. 본 논문에서는 자율주행자동차의 기술 발전 동향과 더불어 보안 취약점에 관련된 내용을 함께 확인해 보도록 한다.

차세대 지능형 교통시스템(C-ITS) 국내외 현황 및 주요 보안 표준화 동향

  • Park, Su-Min;Kwak, Jin
    • Review of KIISC
    • /
    • v.25 no.5
    • /
    • pp.53-59
    • /
    • 2015
  • 지능형 교통시스템은 기존 교통체계에 정보통신, 제어, 전자 등의 기술을 접목시킨 차세대 교통시스템으로써 단순히 빠르게 이동하는 환경에서 안전하고 쾌적하게 이동할 수 있는 환경으로 발전하고 있다. 그러나 IT 기술과의 융합으로 사이버 공격 등과 같은 보안 위협의 가능성이 높아졌으며, 이에 따른 C-ITS에 대한 보안 연구가 전 세계적으로 활발히 진행되고 있다. 따라서 본 고에서는 현재 차세대 지능형 교통시스템의 국내외 현황 및 주요 보안 표준화 동향을 분석한다.

A Study on Efficient DDoS Protection Techniques using Anycast and BGP ECMP (Anycast 구조와 BGP ECMP를 활용한 효율적인 DDoS 공격 방어 기법에 대한 연구)

  • Hong, Yun Seok;Han, Wooyoung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.125-128
    • /
    • 2022
  • As the number of online systems based on the internet gradually increases, cyber-scale attacks that interfere with the normal operation of web services are also on the rise. In particular, distributed denial-of-service attacks (DDoS) that interfere with normal web service operations are also increasing. Therefore, this paper presents an efficient DDoS attack defense technique utilizing Equal Cost Multi-Path (BGP ECMP) routing techniques in networks of Anycast type by operating PoP basis of major attack sources and describes how high-availability web services can be operated.

  • PDF