• Title/Summary/Keyword: 전력분석공격

Search Result 221, Processing Time 0.025 seconds

Digital Evidence Acquisition Scheme using the Trusted Third Party in Smart Grid Infrastructure (스마트그리드 환경에서 공증기관을 이용한 디지털 증거 수집 기법)

  • Cho, Youngjun;Choi, Jaeduck;Kim, Sinkyu;Seo, Jungtaek
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.319-328
    • /
    • 2013
  • Considerable number of major countries have put great efforts to leverage the efficiency of power consumption using Smart Grid in order to resolve the critical issues with drastical growing demands regarding electricity, the crisis of environmental pollution and so on. There has been increasing number of researches to construct Smart Grid in Korea as well. The threats of cyber terror attacks which might cause national crisises in terms of economy and society have been climbing up because of the fact that Smart Grid employs bi-directional communications embedding the cyber threats from existing/legacy communication networks. Consequently, it is required to build concrete response processes including investigation and analysis on cyber breaches into Smart Grid. However, the digital evidence acquisition techniques do not suffice to be deployed in Smart Grid systems despite of the fact that the techniques, against cyber breaches into well-known networks, have been studied in plenty of time. This work proposes a novel digital evidence acquisition scheme appropriate to Smart Grid systems through intensive investigation of the evidence acquisition requirements in Smart Grid and the historical evidence acquisition methods.

Oversea IP Ranges Blocking for Security Enhancement of Critical Infrastructures with Cyber Threats Analysis in Electric Industry (전력분야 사이버 위협 분석 및 기반시설 보안 강화를 위한 해외 IP 대역 차단 방안 연구)

  • Han, Choong-Hee;Park, Soon-Tai;Lee, Sang-Joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.401-415
    • /
    • 2019
  • Recently, there has been a lot of studies and efforts to strengthen the stability of critical infrastructures against increasing cyber attacks to critical infrastructures. In this thesis, I defined what cyber threats are, after showing you various definitions about what cyber threats are and what the types are. After studying about significant cyber threats from China, I showed you the realities of cyber threats with the analysis about starting points, types of cyber threats, ratios of attacks and so on. At last, I defined guidelines about unnecessary oversea IP range blocking. Also, I proposed unnecessary oversea IP range blocking methodologies with per information system and per network system. Furthermore, I proposed blocking characteristics per security equipment and security operation improvement and blocking effects and service process to normal oversea users.

Masking Exponential-Based Neural Network via Approximated Activation Function (활성화 함수 근사를 통한 지수함수 기반 신경망 마스킹 기법)

  • Joonsup Kim;GyuSang Kim;Dongjun Park;Sujin Park;HeeSeok Kim;Seokhie Hong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.761-773
    • /
    • 2023
  • This paper proposes a method to increase the power-analysis resistance of the neural network model's feedforward process by replacing the exponential-based activation function, used in the deep-learning field, with an approximated function especially at the multi-layer perceptron model. Due to its nature, the feedforward process of neural networks calculates secret weight and bias, which already trained, so it has risk of exposure of internal information by side-channel attacks. However, various functions are used as the activation function in neural network, so it's difficult to apply conventional side-channel countermeasure techniques, such as masking, to activation function(especially, to exponential-based activation functions). Therefore, this paper shows that even if an exponential-based activation function is replaced with approximated function of simple form, there is no fatal performance degradation of the model, and than suggests a power-analysis resistant feedforward neural network with exponential-based activation function, by masking approximated function and whole network.

Analysis and implications of North Korea's new strategic drones 'Satbyol-4', 'Satbyol-9' (북한의 신형 전략 무인기 '샛별-4형', '샛별-9형' 분석과 시사점)

  • Kang-Il Seo;Jong-Hoon Kim;Man-Hee Won;Dong-Min Lee;Jae-Hyung Bae;Sang-Hyuk Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.167-172
    • /
    • 2024
  • In major wars of the 21st century, drones are expanding beyond surveillance and reconnaissance to include land and air as well as sea and underwater for purposes such as precision strikes, suicide attacks, and cognitive warfare. These drones will perform multi-domain operations, and to this end, they will continue to develop by improving the level of autonomy and strengthening scalability based on the High-Low Mix concept. Recently, drones have been used as a major means in major wars around the world, and there seems to be a good chance that they will evolve into game changers in the future. North Korea has also been making significant efforts to operate reconnaissance and attack drones for a long time. North Korea has recently continued to engage in provocations using drones, and its capabilities are gradually becoming more sophisticated. In addition, with the recent emergence of new strategic Drones, wartime and peacetime threats such as North Korea's use of these to secure surveillance, reconnaissance and early warning capabilities against South Korea and new types of provocations are expected to be strengthened. Through this study, we hope to provide implications by analyzing the capabilities of North Korea's strategic Drones, predicting their operation patterns, and conducting active follow-up research on the establishment of a comprehensive strategy, such as our military's drone deployment and counter-drone system solutions.

BlueTooth Snarfing attacks and security aspects (BlueTooth Snarfing 공격 및 보안측면)

  • Park, Hyun Uk;Kim, Hyun Soo;Kim, Ki Hawn;Lee, Hoon-jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.811-814
    • /
    • 2015
  • There are many modern societies use the digital products in everyday life in the Middle, convenience, give him plenty of Bluetooth is one of the users. Bluetooth (IEEE 802.15.1) means equipment in the close range between the low-power wireless communication standard for the connection to use the technology. Currently, Bluetooth earphone, Bluetooth speaker, wearable mounted devices also used a lot because it takes people to exploit the benefits had been lifted and thereby increases your damage. So, reducing the damage the user's further research about the security technique that can stop completely. I am sure that many Bluetooth hacking techniques, a Bluetooth device firmware vulnerability within the stored data to allow the approach to attacking the BlueTooth Snarfing and want to analyze.

  • PDF

A Plan for Strengthening Cyber Security Capability toward North Korea: focusing on the Preparation of Cyber Warfare (대북 사이버 안보역량 강화를 위한 방안: 사이버전 대비를 중심으로)

  • Kim, Ho Jung;Kim, Jong-ha
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.123-132
    • /
    • 2018
  • North Korea's cyber warfare capability is becoming a serious security threat to Korea because most of the operational systems of social infrastructure and advanced weapons system are all networked. Therefore, the purpose of this article is to examine what the Korean government should do to strengthen cyber security capabilities toward North Korea. For this purpose, this article analyzed North Korea's cyber attack cases against Korea by categorizing according to threat type and purpose. The research findings are as follows. It is necessary first, to have aggressive cyber protection and attack capabilities; second, to establish an integrated cyber security control tower that can be overseen by the national government; third, to need to legislate domestic cyber- related laws; fourth, to build a multilateral & regional cyber cooperation system. The implication of these findings are that it needs to be strengthened the cyber security capability from the cyber threats of North Korea by minimizing the damage during the peacetime period and for the complete warfare in case of emergency.

  • PDF

Contemporary Application of General Foch's Military Thought (1차대전 연합군 총사령관 포슈 장군 군사사상의 현대적 함의)

  • Lim, Jong-Wha
    • Industry Promotion Research
    • /
    • v.5 no.2
    • /
    • pp.83-91
    • /
    • 2020
  • The purpose of this article is to analyse the military thought of Ferdinand Foch and to present its contemporary meanings. 1.Foch's life: Since 1871 to end of World War I, he acted as a military philosopher, battle field commander, and Supreme Commender of the Unified Forces so as to be judged as Clausewitz of the 20th century. 2. Historical Background of Foch's Activity Period : The series of the domestic revolutions after Napoleon's downfall were extended to Europe for independence, unification and overseas colonial wars. Thus Foch's growing and acting period was in totally imminent danger at all fields. 3. Foch's Military Thought : Through his three books, he argued cleary the absolute importance of the immaterial power including the technical esteem and the offensive fighting will for the victory. 4. The Contemporary Application of Foch's Thought : Though the operation plan based on Foch's strategic thought was defeated at the early stage of the World War I, its offensive-oriented immaterial spirit power should be remembered. 5. Conclusion : Foch's thought which develops the penetration through the war history and emphasizes the importance of the immaterial power should be highly appraised. Thus it should be also reinterpreted and redeveloped into a modern contemporary meaning.

mNPKI for Mobile Government in Developing Countries (개발도상국의 모바일 정부를 위한 mNPKI)

  • Kim, Hyunsung
    • Journal of Digital Convergence
    • /
    • v.17 no.9
    • /
    • pp.161-171
    • /
    • 2019
  • Government transactions over wireless electronic devices are not safe and hence the messages are prone to attack. Thereby, devices supporting wireless Internet must assure the same level of security and privacy as the wired network. National public key infrastructure (NPKI) for electronic government used in the wired environment is not suitable for wireless environment for mobile government (mGovernment) because of the limitations of computing power, memory capacity and restricted battery power. This requires the development of a new NPKI for mGovernment, denoted as mNPKI, to developing countries, which provides the same security level as the wired NPKI. For the wireless environment requirements, mNPKI is based on short lived certificates. Analysis shows that mNPKI is well suited to wireless Internet and provides the same security requirement from the wired NPKI.

SPA-Resistant Signed Left-to-Right Receding Method (단순전력분석에 안전한 Signed Left-to-Right 리코딩 방법)

  • Han, Dong-Guk;Kim, Tae-Hyun;Kim, Ho-Won;Lim, Jong-In;Kim, Sung-Kyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.127-132
    • /
    • 2007
  • This paper proposed receding methods for a radix-${\gamma}$ representation of the secret scalar which are resistant to SPA. Unlike existing receding method, these receding methods are left-to-right so they can be interleaved with a left-to-right scalar multiplication, removing the need to store both the scalar and its receding. Hence, these left-to-right methods are suitable for implementing on memory limited devices such as smart cards and sensor nodes

Estimation of Damage in Electric Power Networks due to High Power Electromagnetic Pulse (고출력 전자기파에 대한 전력망 피해 비용 산출)

  • Hyun, Se-Young;Du, Jin-Kyoung;Kim, Wooju;Yook, Jong-Gwan
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.25 no.7
    • /
    • pp.757-766
    • /
    • 2014
  • In this paper, economic loss due to high power electromagnetic pulse is estimated and the methodology used for calculating its impacts is suggested using a macro approach. In order to investigate the most critical infrastructure for the high power electromagnetic pulse assault, the vulnerability assessment that provides information on the threats of concern is conducted. As a result, this study concentrates on the electric power networks. The presented assessment model is considered with gross domestic product (GDP) and energy consumption when the electric power networks are damaged due to high power electromagnetic pulse. In addition, economic losses are calculated by the extent of damages considering different types of the high power electromagnetic pulse assault generated by nuclear and man-made weapon. Through the estimation of these damages, the resulted economic loss will be compared with the protection cost. Consequently, protection of the vulnerable infrastructures can be prepared against electromagnetic pulse attack.