• Title/Summary/Keyword: 테러공격

Search Result 199, Processing Time 0.035 seconds

A study on possibility of soft target terrorism by ISIS in South Korea (자국내 IS테러단체에 의한 소프트타깃 테러발생 가능성에 대한 연구)

  • Oh, Sei-Youen;Yun, Gyeong-Hui
    • Korean Security Journal
    • /
    • no.47
    • /
    • pp.85-117
    • /
    • 2016
  • These days, ISIS terrorists have been expanding not only to european countries, but also to asian countries so South Korea is no longer safe from terrorists' attacks. Especially, 'soft target terrorism' makes many people maximizing fear of terrorism because it is caused by small groups - those who are armed with small arms and light weapons - and they are able to carry out hit and run attacks on civilian targets. It poses even more dangerous to kill massively. That is why November 2015 Paris attacks and January 2016 Jakarta attacks killed and injured many people because of 'soft target terrorism.' Therefore, the South Korea has also recognized the seriousness of terrorism by ISIS. The study has shown the precautionary measures about 'soft target terrorism' and how to defend against 'soft target terrorism' by looking through overseas examples. It is for the possibilities of 'soft terrorism' in South Korea because of the expansion of ISIS. As a result, 'soft target terrorism', caused by ISIS, could happen in South Korea. The counterplan is as in the following. First of all, 'soft target terrorism', which is collaborated with ISIS and domestic terrorists, could be caused by negative awareness of foreign residents and xenophobia so the public should change stereotypes about the foreign residents and there should be legislation about racial discrimination enacted by parliament and the government must practice the law. Second, the Korean anti-terrorism laws should be modified to minimize violations of human rights, related to the Korean citizens' personal information, and to stop the concentration of power into the hands of one law enforcement. Third, the government has to develop and to initiate the refuge&evacuation simulation, which prepares for 'soft target terrorism' and minimizes the damages if terrorists attack hot spots like central commercial areas or event halls.

  • PDF

A quantitative study on patterns of terrorist bombing incidents (계량분석을 통한 폭탄테러사건의 패턴분석)

  • Yun, Min-Woo
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.317-347
    • /
    • 2013
  • This study focuses on the characteristics of terrorist bombing incidents and causal factors on terrorist bombing incidents and number of casualty per incident in Afghanistan though statistical quantitative analysis. For doing so, the bombing data from GTD(Global Terrorism Database) of START program occurred from January 1st 2002 until December 31st 2011 was used. By using descriptive analysis, chi-square, and logistic regression analysis, characteristics of bombing incidents and causal factors on the frequency of incidents and the number of casualty were identified. According to the analysis results, a clear pattern was appeared in terrorist bombing incidents. This result suggests that terrorists rationally and strategically calculate bombing operations and therefore terrorist bombing incidents and number of casualty per incident are conditioned or affected by time, season, Pashtun tribal entity, production level of drugs, the characteristics of targets.

  • PDF

A Study on the Countermeasure of Traffic Terror (대중교통테러의 대응방안)

  • Kim, Jin-Hyeok
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.109-123
    • /
    • 2007
  • Traffic terror is one of the terror types subject on transportation means. However, unlike the aircraft or ship, there is no case of negotiating with passengers as hostage but to unconditionally attack that the human casualty would be much greater. In act, the terror on subway or bus would have much bigger damage than the terror on aircraft or ship. Because of such fact, there is a need for full preparation thereto, however, there is no preparation of advance preventive measure, particularly, when comparing to the cases involving aircraft. In addition, the passengers who use railway and others in the position of citizens do not have any defense mechanism against any terror activity to make the problem even more serious. Therefore, in order to prevent traffic terror, the first thing is to implement the identity confirmation of passengers, followed by the through search of cargos of the passengers, supplement the capability against the terror by the security team members, strengthen the responsive capability of citizens, thorough check on facilities, expansion of social security network and others. All terrors are within the reach of our neighborhood at the time when we neglect it, and the most secured and safe way to prevent the terror is to check and prepare at all times beginning from our familiar facilities or means.

  • PDF

IP spoofing based DoS Attack Countermeasures and Consideration (IP 스푸핑 기반 DoS 공격의 대응 방안 및 고찰)

  • Cha, Jeong Hun;Kwon, Byoung Wook;Park, Jong Hyuk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.05a
    • /
    • pp.156-159
    • /
    • 2019
  • 서비스 거부 공격 (Denial of Service: DoS)은 매년 사이버 테러 이슈로 떠오르고 있는 대표적인 공격 양상 중의 하나이다. DoS 공격은 오래된 공격 유형으로 이에 대응하기 위한 연구가 많이 진행되고 있지만, IP(Internet Protocol) 주소를 변조할 수 있는 프로토콜 취약점 때문에 공격 발신지 역추적에 어려움이 있으며 DoS 공격의 다양한 성장으로 이어지고 있다. 현재 대부분의 변형된 DoS 공격들은 IP 주소를 변조하는 IP 스푸핑에 기반하고 있다. 이 때문에 익명성을 이용하여 공격 시도가 지속적으로 발생하고 있으며 정상적인 사용자와 공격자 간의 구분이 불분명하여 방어하기가 어렵다. 그렇기 때문에 본 논문에서는 여러 변형된 DoS 공격 유형 및 IP 스푸핑을 방지하기 위한 연구들을 분석함으로써 향후 공격자의 역추적을 돕고 DoS 공격을 차단하기 위해 필요한 정보를 제공한다.

A Study on the Worm.Virus Attack Technique of Cyber Warfare (사이버 정보전 웜.바이러스 공격 기술 연구)

  • 김환국;서동일;이상호
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.776-779
    • /
    • 2004
  • With the rapid progress of information technique, it is getting more difficult to protect information systems from cyber terrorism, because of bugs and vulnerabilities of software and the properties of cyberspace such as anonymity. furthermore cyber terror techniques are highly developed and complicated and their use for a malicious intent and a military purpose are increasing recently. Therefore a study of warfare attack technology on the cyber space is necessary for establishing trusted society and further national security. Specially, worms/viruses are becoming a more common occurrence on the cyber space. Also, The worm caused a great deal of damage to the large number of networks around the world in a very short period of time. Therefore, we will describe worms/viruses in the warfare attack technique in this paper.

  • PDF

DYNAMICS OF PAKISTAN'S POST 9/11 CRISIS FOREIGN POLICY DECISION-MAKING PROCESS

  • Hussain, Mehmood
    • Korea and Global Affairs
    • /
    • v.2 no.2
    • /
    • pp.157-184
    • /
    • 2018
  • The study has applied the four stage "Model of State Behavior in Crisis" to trace the post 9/11 crisis foreign policy decision making process in Pakistan. It argues that ominous attacks on the United States by al-Qaeda and subsequent declaration of President Bush to fight against terrorism transformed the global and regional politico-security dimensions at t1 stage. Being a neighboring country, Pakistan's support was inevitable in the war on terror and Washington applied coercive diplomacy to win the cooperation from Islamabad. Consequently, in case of decline to accept American demands, Pakistan perceived threat to basic values/objectives of the country and simultaneous time pressure amplified the psychological stress in decision makers at t2 stage. Therefore, the decisional forum was setup at t3 stage and Pakistan decided to join the United States at t4 stage, which defused the foreign policy crisis.

The Trend of Aviation Terrorism in the 4th Industrial Revolution Period and the Development Direction for Domestic Counter Terrorism of Aviation (제4차 산업혁명 시대의 항공 테러리즘 양상 및 국내 항공테러 대응체계 발전방향)

  • Hwang, Ho-Won;Kim, Seung-Woo
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.32 no.2
    • /
    • pp.155-188
    • /
    • 2017
  • On the one hand, the 4th Industrial Revolution provides a positive opportunity to build a new civilization paradigm for mankind. However, on the other hand, due to the 4th Industrial Revolution, artificial intelligence such as 'Goggle Alpha Go' revolutionized and even the human ability was replaced with a 'Silicon Chip' as the opportunity to communicate decreases, the existence of human beings is weakened. And there is a growing concern that the number of violent crimes, such as psychopath, which hunts humans as games, will increase. Moreover, recent international terrorism is being developed in a form similar to 'Psychopathic Violent-Crime' that indiscriminately attacks innocent people. So, the probability that terrorist organizations abuse the positive effects provided by the Fourth Industrial Revolution as means of terrorism is increasing. Therefore, the paradigm of aviation terrorism is expected to change in a way that attacks airport facilities and users rather than aircraft. Because airport facilities are crowded, and psychopathic terrorists are easily accessible. From this point of view, our counter terrorism system of aviation has many weak points in various aspects such as: (1) limitations of counter-terrorism center (2) inefficient on-site command and control system (3) separated organization for aviation security consultation (4) dispersed information collection function in government (5) vulnerable to cyber attack (6) lack of international cooperation network for aviation terrorism. Consequently, it is necessary to improve the domestic counter terrorism system of aviation so as to preemptively respond to the international terrorism. This study propose the following measures to improve the aviation security system by (1) create 'Aviation Special Judicial Police' (2) revise the anti-terrorism law and aviation security law (3) Strengthening the ability respond to terrorism in cyberspace (4) building an international cooperation network for aviation terrorism.

  • PDF

TCP/IP 네트워크 프로토콜의 DoS 공격 취약점 및 DoS 공격사례 분석

  • Cho, Sunghyun;Lee, Taek Kyu;Yi, Seonwoo
    • Review of KIISC
    • /
    • v.24 no.1
    • /
    • pp.45-52
    • /
    • 2014
  • 서비스 거부 공격 (Denial of Service Attack)은 현재 사이버테러와 맞물려 중요한 이슈로 자리 잡고 있다. 응용계층에서부터 네트워크계층에 이르기까지 다양한 프로토콜들의 취약점을 이용하는 DoS 공격은 공격대상을 서비스 불가능 상태에 빠뜨려 작게는 서버다운에서 크게는 국가적인 보안위험을 야기 시키고 있다. 본 논문은 TCP/IP 기반 네트워크에서 DoS 공격에 대하여 취약점이 있는 응용계층, 전송계층, 및 네트워크 계층 프로토콜들의 보안 취약점을 분석한다. 또한 다양한 프로토콜 취약점들을 활용한 기존 서비스 거부 공격 사례를 분석함으로써 궁극적으로는 DoS 공격을 예측하고 공격 발생 시 신속한 대응책을 마련에 활용될 수 있는 정보를 제공하고자 한다.

Limiting user process method based on PAM against DoS attacks (DoS 공격에 대비한 PAM 기반 사용자 프로세스 제한 기법)

  • Lee, Jae-Ung;Jung, Sung-Jae;Bae, Yu-Mi;Jang, Rae-Young;Soh, Woo-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.309-312
    • /
    • 2016
  • Considering that interkorean relations got worse and worse recently, cyber terror of North Korea has seriously become a possibility. Therefore, DoS(Denial of Service), a typical way of cyber terror, is becoming a big issue. Consequently, people are growing more and more interested in information security. Internal DoS attacks, out of a variety of ways of Dos attacks, include disks and memories and shortages of process resources. PAM(Pluggable Authentication Module) is one of the ways of preventing internal DoS attacks in Linux system. This paper provides with a method to internally respond to dos attacks and efficiently prevent shortages of resources by utilizing PAM.

  • PDF

A Study on the Realtime Integrated Management System for the Detection Malware (악성코드 탐지를 위한 실시간 통합관리 시스템에 관한 연구)

  • Kim, Hyo-Nam
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2013.07a
    • /
    • pp.317-318
    • /
    • 2013
  • 최근에 발생한 3.20 사이버테러와 6.25 사이버테러와 같이 특정 방송사와 금융권 전산망을 마비시키고 임직원 시스템을 망가뜨려 못쓰게 만드는 피해 유형이 발생되고 있다. 이런 사이버 공격에 사용되는 악성코드에 대해서 탐지에서 분석 그리고 검증 단계를 통합적으로 모니터링하고 필터를 통해 악성코드를 추출하고 차단하는 시스템 개발이 필요하다. 본 논문에서는 실시간으로 악성코드를 탐지하는 엔진들의 분석 및 검증 현황을 확인하고 실시간 통계 모듈에서 수집한 자료들을 바탕으로 향후 보안 정책 방향 및 미래 예측을 계획할 수 있는 실시간 악성코드 분석 통합 관리 시스템을 제안한다.

  • PDF