• Title/Summary/Keyword: ATTACK SUCCESS

Search Result 94, Processing Time 0.036 seconds

A Study on Cyber Operational Elements Classification and COA Evaluation Method for Cyber Command & Control Decision Making Support (사이버 지휘통제 의사결정 지원을 위한 사이버 작전요소 분류 및 방책 평가 방안 연구)

  • Lee, Dong-hwan;Yoon, Suk-joon;Kim, Kook-jin;Oh, Haeng-rok;Han, In-sung;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.99-113
    • /
    • 2021
  • In these days, as cyberspace has been recognized as the fifth battlefield area following the land, sea, air, and space, attention has been focused on activities that view cyberspace as an operational and mission domain in earnest. Also, in the 21st century, cyber operations based on cyberspace are being developed as a 4th generation warfare method. In such an environment, the success of the operation is determined by the commander's decision. Therefore, in order to increase the rationality and objectivity of such decision-making, it is necessary to systematically establish and select a course of action (COA). In this study, COA is established by using the method of classifying operational elements necessary for cyber operation, and it is intended to suggest a direction for quantitative evaluation of COA. To this end, we propose a method of composing the COES (Cyber Operational Elements Set), which becomes the COA of operation, and classifying the cyber operational elements identified in the target development process based on the 5W1H Method. In addition, by applying the proposed classification method to the cyber operation elements used in the STUXNET attack case, the COES is formed to establish the attack COAs. Finally, after prioritizing the established COA, quantitative evaluation of the policy was performed to select the optimal COA.

A Reanalysis and Evaluation of the Chuncheon District Battle In the Early Part of the Korean War (6·25전쟁 초기 춘천지구 전투의 재분석과 평가)

  • LEE, SUNG CHOON
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.127-139
    • /
    • 2015
  • The purpose of this research is to reevaluate the success factors and significance of the battle through the analysis of the only successful Chuncheon district battle during the defense combat in the early part of the Korean War on June 25, 1950. The research results are the matters that are analyzed from the viewpoint of the armed forces of the Republic of Korea, focusing intensively on the successful aspect of the early defense combat against North Korean army's surprise invasion of the South and on the battle that thwarted the North Korean army's intensive surprise attack intention. This research attempts to reanalyze the Chuncheon District Battle in connection with the Kim Il-sung's strategic course of action in consideration of the operation plan of North Korean invasion of the South. In other words, it is to reanalyze the enemy tactics in connection with North Korean army's plan of invasion of the South. The fact that the 6th Division of the armed forces of the Republic of Korea destroyed the North Korean army's operations plans that were in accordance with Kim Il-sung's strategic plans has more significance than a simple tactical success. The Chuncheon District Battle should be reevaluated as the "decisive battle" which went beyond a successful early defense combat in a Chuncheon region, and which fundamentally defeated North Korean army's war plan itself by thwarting the Kim Il-sung's strategic plan.

A Storage and Computation Efficient RFID Distance Bounding Protocol (저장 공간 및 연산 효율적인 RFID 경계 결정 프로토콜)

  • Ahn, Hae-Soon;Yoon, Eun-Jun;Bu, Ki-Dong;Nam, In-Gil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9B
    • /
    • pp.1350-1359
    • /
    • 2010
  • Recently many researchers have been proved that general RFID system for proximity authentication is vulnerable to various location-based relay attacks such as distance fraud, mafia fraud and terrorist fraud attacks. The distance-bounding protocol is used to prevent the relay attacks by measuring the round trip time of single challenge-response bit. In 2008, Munilla and Peinado proposed an improved distance-bounding protocol applying void-challenge technique based on Hancke-Kuhn's protocol. Compare with Hancke-Kuhn's protocol, Munilla and Peinado's protocol is more secure because the success probability of an adversary has (5/8)n. However, Munilla and Peinado's protocol is inefficient for low-cost passive RFID tags because it requires large storage space and many hash function computations. Thus, this paper proposes a new RFID distance-bounding protocol for low-cost passive RFID tags that can be reduced the storage space and hash function computations. As a result, the proposed distance-bounding protocol not only can provide both storage space efficiency and computational efficiency, but also can provide strong security against the relay attacks because the adversary's success probability can be reduced by $(5/8)^n$.

Long-Term Outcomes of Stenting on Non-Acute Phase Extracranial Supra-Aortic Dissections

  • Jiang, Yeqing;Di, Ruoyu;Lu, Gang;Huang, Lei;Wan, Hailin;Ge, Liang;Zhang, Xiaolong
    • Journal of Korean Neurosurgical Society
    • /
    • v.65 no.3
    • /
    • pp.422-429
    • /
    • 2022
  • Objective : Extracranial supra-aortic dissections (ESADs) with severe stenosis, occlusion and/or pseudoaneurysm presents potential risk of stroke. Endovascular stenting to reconstruct non acute phase ESADs (NAP-ESADs) is an alternative to anticoagulant or antiplatelet therapy. However, its feasibility, safety and efficacy of stenting in NAP-ESADs is unclear. This study aims to investigate the long-term outcomes of the feasibility, safety and efficacy of stenting in NAP-ESADs. Methods : Seventy-four patients with 91 NAP-ESAD vessels with severe stenosis, occlusion and/or pseudoaneurysm presents potential risk of stroke who underwent stent remodeling were enrolled into this respective study from December 2008 to March 2020. Technical success rate, complications, clinical and angiographic results were harvested and analyzed. Results : Success rate of stent deployment was 99% (90/91) with no procedural mortality or morbidity. Transient ischemic attack occurred in three patients during operation (4.1%, 3/74). Asymptomatic embolisms of distal intracranial vessels were found in two patients (2.7%, 2/74). One hundred and forty-two stents deployed at 85 carotid (135 stents) and six vertebral (seven stents) vessels. Six stent types (Wingspan, 28/135, 20.7%; Solitaire, 10/135, 7.4%; Neuroform, 8/135, 5.9%; LVIS, 2/135, 1.5%; Precise, 75/135, 55.6%; Acculink, 12/135, 8.9%) were deployed at carotid arterial dissection while two types (Wingspan, 5/7, 71.4%; Solitaire 2/7, 28.6%) at vertebral arterial dissection. Digital subtracted angiography (56%, 51/91), computational tomography angiography (41.8%, 38/91) and high resolution magnetic resonance imaging (2.2%, 2/91) were adopted for follow up, with a mean time of 17.2±15.4 months (5-77). All patient modified Rankin Scale scores showed no increase at discharge or follow-up. Angiographically, dissections in 86 vessels in 69 patients (94.5%, 86/91) were completely reconstructed with only minor remnant dissections in four vessels in four patients (4.4%, 4/91). Severe re-stenosis in the stented segment required re-stenting in one patient (1.1%, 1/91). Conclusion : Stent remodeling technique provides feasible, safe and efficacious treatment of ESADs patients with severe stenosis, occlusion and/or pseudoaneurysm.

Construction of Glomerular Epithelial Cells Expressing Both Immune Tolerance and GFP Genes and Application to Cell Therapy by Cell Transplantation

  • Ohga, Masahiro;Ogura, Mariko;Matsumura, Mastoshi;Wang, Pi-Chao
    • Biotechnology and Bioprocess Engineering:BBE
    • /
    • v.7 no.5
    • /
    • pp.303-310
    • /
    • 2002
  • Cell therapy applied to wound healing or tissue regeneration presents a revolutionary realm to which principles of gene engineering and delivery may be applied. One promising application is the transplantation of cells into the wounded tissue to help the tissue repair. However, when cells are transplanted from in vitro to in vivo, immune rejection occurs due to the immune response triggered by the activation of T-cell, and the transplanted cells are destroyed by the attack of activated T-cell and lose their function. Immune suppressant such as FK506 is commonly used to suppress immune rejection during transplantation. However, such kind of immune suppressants not only suppresses immune rejection in the periphery of transplanted cells but also suppresses whole immune response system against pathogenic infection. In order to solve this problem, we developed a method to protect the desired cells from immune rejection without impairing whole immune system during cell transplantation. Previously, we reported the success of constructing glomerular epithelial cells for removal of immune complex, in which complement receptor of type 1 (CR1) was over-expressed on the membrane of renal glomerular epithelial cells and could bind immune complex of DNA/anti-DNA-antibody to remove immune complex through phagocy-tosis [1]. Attempting to apply the CR1-expressing cells to cell therapy and evade immune rejection during cell transplantation, we constructed three plasmids containing genes encoding a soluble fusion protein of cytolytic T lymphocyte associated antigen-4 (CTLA4Ig) and an enhanced green fluorescent protein (EGFP). The plasmids were transfected to the above-mentioned glomerular epithelial cells to express both genes simultaneously. Using the clone cells for cell transplantation showed that mice with autoimmune disease prolonged their life significantly as compared with the control mice, and two injections of the cells at the beginning of two weeks resulted in remarkable survivability, whereas it requires half a year and 50 administrations of proteins purified from the same amount of cells to achieve the same effect.

Contents Error and Security Analysis of 'Security Analysis and Improvements of a Biometrics-based User Authentication Scheme Using Smart Cards' ('스마트카드를 이용한 생체인식기반 사용자 인증스킴의 분석 및 개선'의 내용 오류와 안전성 분석)

  • Park, Mi-Og;Oh, Gi-Oug
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.10
    • /
    • pp.99-106
    • /
    • 2014
  • In this paper, we analyze weaknesses of the biometrics-based user authentication scheme proposed by An. The result of analysis An's authentication scheme by the login success scenario proposed in this paper, if the attacker successes to get user's random number, he/she can pass user authentication phase of the legal server. Also the biometrics guessing scenario proposed in this paper shows the legal user's the biometric information is revealed in lost smart card. Since An's authentication scheme submit user ID and biometrics in plain text to the server, it is very vulnerable to inner attack and it is not provide the user anonymity to the server as well as the one to the third by user ID in plain text. Besides An's authentication scheme is contextual error too, due to this, it has weakness and so on that it did not check the validity of the smart card holder.

CGRA Compilation Boost up for Acceleration of Graphics (영상처리 가속을 위한 CGRA compilation 속도 향상)

  • Kim, Wonsub;Choi, Yoonseo;Kim, Jaehyun
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2014.06a
    • /
    • pp.166-168
    • /
    • 2014
  • Coarse-grained reconfigurable architectures (CGRAs) present a potential of high compute throughput with energy efficiency. A CGRA consists of an array of functional units (FU), which communicate with each other through an interconnect network containing transmission nodes and register files. To achieve high performance from the software solutions mapped onto CGRAs, modulo scheduling of loops is generally employed. One of the key challenges in modulo scheduling for CGRAs is to explicitly handle routings of operands from a source to a destination operations through various routing resources. Existing modulo schedulers for CGRAs are slow because finding a valid routing is generally a searching problem over a large space, even with the guidance of well-defined cost metrics. Applications in traditional embedded multimedia domains are regarded relatively tolerant to a slow compile time in exchange of a high quality solution. However, many rapidly growing domains of applications, such as 3D graphics, require a fast compilation. Entrances of CGRAs to these domains have been blocked mainly due to its long compile time. We attack this problem by utilizing patternized routes, for which resources and time slots for a success can be estimated in advance when a source operation is placed. By conservatively reserving predefined resources at predefined time slots, future routings originated from the source operation are guaranteed. Experiments on a real-world 3D graphics benchmark suite show that our scheduler improves the compile time up to 6000 times while achieving average 70% throughputs of the state-of-art CGRA modulo scheduler, edge-centric modulo scheduler (EMS).

  • PDF

An Email Vaccine Cloud System for Detecting Malcode-Bearing Documents (악성코드 은닉 문서파일 탐지를 위한 이메일 백신 클라우드 시스템)

  • Park, Choon-Sik
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.5
    • /
    • pp.754-762
    • /
    • 2010
  • Nowadays, email-based targeted attacks using malcode-bearing documents have been steadily increased. To improve the success rate of the attack and avoid anti-viruses, attackers mainly employ zero-day exploits and relevant social engineering techniques. In this paper, we propose an architecture of the email vaccine cloud system to prevent targeted attacks using malcode-bearing documents. The system extracts attached document files from email messages, performs behavior analysis as well as signature-based detection in the virtual machine environment, and completely removes malicious documents from the messages. In the process of behavior analysis, the documents are regarded as malicious ones in cases of creating executable files, launching new processes, accessing critical registry entries, connecting to the Internet. The email vaccine cloud system will help prevent various cyber terrors such as information leakages by preventing email based targeted attacks.

An Improved Reconstruction Algorithm of Convolutional Codes Based on Channel Error Rate Estimation (채널 오류율 추정에 기반을 둔 길쌈부호의 개선된 재구성 알고리즘)

  • Seong, Jinwoo;Chung, Habong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.5
    • /
    • pp.951-958
    • /
    • 2017
  • In an attack context, the adversary wants to retrieve the message from the intercepted noisy bit stream without any prior knowledge of the channel codes used. The process of finding out the code parameters such as code length, dimension, and generator, for this purpose, is called the blind recognition of channel codes or the reconstruction of channel codes. In this paper, we suggest an improved algorithm of the blind recovery of rate k/n convolutional encoders in a noisy environment. The suggested algorithm improves the existing algorithm by Marazin, et. al. by evaluating the threshold value through the estimation of the channel error probability of the BSC. By applying the soft decision method by Shaojing, et. al., we considerably enhance the success rate of the channel reconstruction.

A Study of User Behavior Recognition-Based PIN Entry Using Machine Learning Technique (머신러닝을 이용한 사용자 행동 인식 기반의 PIN 입력 기법 연구)

  • Jung, Changhun;Dagvatur, Zayabaatar;Jang, RhongHo;Nyang, DaeHun;Lee, KyungHee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.5
    • /
    • pp.127-136
    • /
    • 2018
  • In this paper, we propose a PIN entry method that combines with machine learning technique on smartphone. We use not only a PIN but also touch time intervals and locations as factors to identify whether the user is correct or not. In the user registration phase, a remote server was used to train/create a machine learning model using data that collected from end-user device (i.e. smartphone). In the user authentication phase, the pre-trained model and the saved PIN was used to decide the authentication success or failure. We examined that there is no big inconvenience to use this technique (FRR: 0%) and more secure than the previous PIN entry techniques (FAR : 0%), through usability and security experiments, as a result we could confirm that this technique can be used sufficiently. In addition, we examined that a security incident is unlikely to occur (FAR: 5%) even if the PIN is leaked through the shoulder surfing attack experiments.