• Title/Summary/Keyword: Counterattack

Search Result 11, Processing Time 0.025 seconds

Counterattack Method against Hacked Node in CAN Bus Physical Layer (CAN 버스 물리 계층에서 해킹된 노드의 대처 기법)

  • Kang, Tae-Wook;Lee, Jong-Bae;Lee, Seongsoo
    • Journal of IKEEE
    • /
    • v.23 no.4
    • /
    • pp.1469-1472
    • /
    • 2019
  • CAN bus in automotive applications does not assign node addresses. When a node is hacked and it transmits malicious data frame, it is difficult to resolve which node is hacked. However, this CAN bus internal attack seriously threatens the safety of a car, so a prompt counterattack is necessary in the CAN bus physical layer. This paper proposes a counterattack method against malicious CAN bus internal attack. When a malicious data frame is detected, an intrusion detection system in the CAN bus increases the error counter of the malicious node. Then, the malicious node is off from the bus when its error counter exceeds its limit. A CAN controller with the proposed method is implemented in Verilog HDL, and the proposed method is proved to counterattack against malicious CAN bus internal attack.

An Effective Counterattack System for the Voice Spam (효과적인 음성스팸 역공격 시스템)

  • Park, Haeryong;Park, Sujeong;Park, Kangil;Jung, Chanwoo;KIM, Jongpyo;Choi, KeunMo;Mo, Yonghun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1267-1277
    • /
    • 2021
  • The phone number used for advertising messages and voices used as bait in the voice phishing crime access stage is being used to send out a large amount of illegal loan spam, so we want to quickly block it. In this paper, our system is designed to block the usage of the phone number by rapidly restricting the use of the voice spam phone number that conducts illegal loan spam and voice phishing, and at the same time sends continuous calls to the phone number to prevent smooth phone call connection. The proposed system is a representative collaboration model between an illegal spam reporting agency and an investigation agency. As a result of developing the system and applying it in practice, the number of reports of illegal loaned voice spam and text spam decreased by 1/3, respectively. We can prove the effectiveness of this system by confirming that.

A Critical Discourse Analysis Through Comparisons Between Editorials of The Global Times, Huánqiú Shíbào on the 2018 United States-China Trade War (미·중 무역 분쟁 관련 환구시보(環球時報) 사설 비교를 통한 비판적 담화분석 - 「용타항미원조적의지타대미무역전(用打抗美援朝的意志打對美貿易戰)」 중심으로 -)

  • Choi, Tae-hoon
    • Cross-Cultural Studies
    • /
    • v.52
    • /
    • pp.165-194
    • /
    • 2018
  • Employing Fairclough's critical discourse analysis (CDA), the purpose of this study was to analyze linguistically significant features, intertextuality, and sociocultural practice focusing on selected editorials of The Global Times, $Hu{\acute{a}}nqi{\acute{u}}$ Shíbào on the 2018 United States-China Trade War. The editorial titled "With the strong will of 'the War to Resist America and Aid Chosun,' let us go through the trade war against America" focused on the use of 'war' related vocabulary in the frame of 'war.' First, "Trade War" and "War to Resist America and Aid Chosun" are examples that reveal metaphors and a war frame. Second, "Strategy" is used positively for China but negatively towards America. Third, various war related words are used. Fourth, cases of allusion illustrate war. Intertextuality in terms of discourse practice pertains to two findings. First, The Global Times, $Hu{\acute{a}}nqi{\acute{u}}$ Shíbào repeatedly uses the phrase 'equivalent revenge.' That is because the expression enables China to justify their counterattack and such war that China may wage can be interpreted as just counterattack much like a self-defense mechanism. Second, the expression, 'the counterattack is not intended but it is not fearful' is repeated in several editorials of the newspaper. The reasons are the following: 1) it is used to appeal to the public, 2) by invoking the feeling of fear, the public should be understand why they should unite, and 3) the expression, "it is not fearful" is used to preserve China's global image and "the counterattack is not intended" is used to signal China's will to America. The whole expression is a good example of intertextuality that repetitively illustrates the intended meaning of China in nine editorials in the newspaper within three months, March 23-June 17, 2018. Finally, sociocultural practice is manipulated through the editorial for disseminating the Chinese government's hegemonic ideology. First, it is clear that the core national project, "China Manufacturing 2025" cannot be abandoned. Second, by calling for "War to Resist America and Aid Chosun" the editorial is manipulated to condemn and intimidate America, avoid dissent of the people, appeal to the people, and empower the government. Third, China somehow wants to open up the possibility of negotiation with the United Sates.

A Study on the Naming of the Hidden Gates in Namhansansung by Records (기록에 근거한 남한산성 암문의 명칭 설정에 관한 연구)

  • Lee, CheonWoo;Kim, SukHee
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.21 no.4
    • /
    • pp.53-60
    • /
    • 2019
  • The purpose of this study is to investigate the change of Hidden gates form with the times. Fortresses position is constructed on the Korea mountain ranges. Hidden gate, one of facilities to construct fortress among various factors, represents as route of supplies way, ask for rescue, or counterattack plan to come in. The shape of hidden gate changes depend on land form, function, and time period. Previous research partially based on archeology or history. This research analyze Namhan mountain Namhansansung, one of the highest hidden gates count in Korea, distributive by main fortress, Bong-am fortress, Hanbong fortress. Nahhan Mountain fortress repeatedly affected by King Injo in Joseon Dynasty. As a result, Nahhan Mountain fortress consist of hidden gates alternation depend on the time of establishment or extension which makes different shape or size.

Study of the Enhancement Performance and Security of Inbound Network (인바운드 네트워크의 성능 및 보안성 향상에 관한 연구)

  • Jeon, Jeong-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.8B
    • /
    • pp.727-734
    • /
    • 2008
  • Recently, Network technology evolve out of expansion a scale of Network and development various Service. also Hacking skill. We have applied to various Security Systems to make a counterattack on this hacking skill. and A Firewall among these security systems is very effective a defense against in the Outbound Network attack. so we need certainly a Firewall to protect a network. But this Conventional Firewall has an directly effect on reduction to the Performance and Security of Inbound Network. and have no effect on a Inner Network Attacking. In this paper, I propose to a "Functional Firewall" as a Secure Objects for the enhancement Performance and Security of Inbound Network.

Trends in Low Altitude Small Drone Identification Technology and Standardization (저고도 소형드론 식별 기술 및 표준화 동향)

  • Kang, K.M.;Park, J.C.;Choi, S.N.;Oh, J.H.;Hwang, S.H.
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.6
    • /
    • pp.164-174
    • /
    • 2019
  • This article presents low altitude small drone identification trends at home and abroad. To reduce the dysfunction caused by the proliferation of drones worldwide, there is a growing interest in remote identification technologies that can identify the basic information of the drone. First, this article introduces policy trends in major countries. US, Europe, and China have recently provided recommendations regarding technologies available for the remote identification and tracking of a drone. Next, standardization activities on identification communications and identification systems are introduced. For this, standards organizations for the small drone identification, such as the International Organization for Standardization, IEEE 802, Radio Technical Commission for Aeronautics, International Civil Aviation Organization, and $3^{rd}$ Generation Partnership Project, are investigated. Finally, drone identification technology trends are introduced. In the US and Europe, various drone identification technologies have been studied to identify a drone owner and drone registration information with a drone identifier. In South Korea, drone identification technology is still in its infancy, whereas drone detection and physical counterattack technologies are somewhat more developed. As such, major drone manufacturers are also currently studying and developing drone identification systems.

Suggestion for sustainable development of Korean traditional wooden Structure (Hanok)

  • Lee, Yunsub;Jin, Zhenhui;Seo, Nuri;Jung, Youngsoo
    • International conference on construction engineering and project management
    • /
    • 2017.10a
    • /
    • pp.159-166
    • /
    • 2017
  • Recently, the wooden structure has been revived again as an eco-friendly structure technique. It is the counterattack of the wood material, which has become more recognized as a finishing material pushed by the concrete material in the rapid growth after the Industrial Revolution. However, it is difficult to conclude that this is a tendency of the construction market in the whole country. Perhaps this is a tendency to appear more strongly in Korea. It could be seen by comparing the characteristics of the overseas construction market with Korean's and the advanced constructed case of large-scale wooden structures in overseas. National wooden buildings show own characteristics such as construction methods, materials, and member dimensions of wood structures by country, which could be seen as a result of continuously developing their own technology. However, in Korea, despite its unique wooden structure and technology (Hanok; Korean traditional housing), it has not been developed continuously and treated it only as a living building exhibit. This is evidenced by the fact that only one percent of the building is constructed with traditional wooden building technology. Therefore, there are various efforts to modernize the traditional wooden structure technology, but it still does not reach the level of advanced wooden technology abroad. The characteristics of the Korean wooden building market were analyzed in order to suggest ways to develop the Korean wood structure technology. The characteristics of Hanok construction were analyzed through quantitative criteria to define the main development tasks for Hanok development to propose the long-term development path.

  • PDF

A study on measure of North Korea's nuclear terror threat; Focusing on the guarantee of 'anticipatory self-defense' (북한 핵테러 위협 대비방안 연구; '선제적 자위권' 보장을 중심으로)

  • Kim, Yeon Jun
    • Convergence Security Journal
    • /
    • v.16 no.3_2
    • /
    • pp.13-23
    • /
    • 2016
  • North Korea had recently conducted the fourth nuclear test and ICBM tests, dared nuclear provocation targeting the Korea and the international community. It is determined based on experiments of nuclear and missile in progress in North Korea that the technical level of nuclear force reached the completion stage of standardization, lightweight, and variation. It is expected to become reality that North Korea executes the nuclear provocation targeting the Korea and the international community in the near future. Nuclear bomb is an absolute weapon that the logic of counterattack after allowing the first strike of the other party cannot be applied due to its tremendous destructive power. Therefore, as the opponent to North Korea that it decided to hold the nuclear, the exercise of anticipatory self-defense in order to guarantee a minimum of right to life is not a choice, but the only essential correspondence concept. At the moment that the North Korean nuclear provocation is expected in the near future, it shall be provided with competence to strike the origin region of provocation by forming a national consensus of preemptive strike enforcement. Also, in preparation for the fifth nuclear test of North Korea, which is anticipated, the national competence must be mobilize to be able to ensure the 'Nuclear Option' from the international community.

The Roles of Protein Degradation During Fungal-plant Interactions (단백질 분해가 식물의 진균 병 진전에 미치는 영향)

  • Ahn, Il-Pyung;Park, Sang-Ryeol;Bae, Shin-Chul
    • The Korean Journal of Mycology
    • /
    • v.38 no.2
    • /
    • pp.89-94
    • /
    • 2010
  • Plant pathogenic fungi are the most diverse and drastic causal agents of crop diseases threatening stable food production all over the world. Plant have evolved efficient innate immune system to scout and counterattack fungal invasion and pathogenic fungi also developed virulence system to nullify plant resistance machinery or signaling pathways and to propagate and dominate within their niche. A growing body of evidences suggests that post translational modifications (PTMs) and selective/nonselective degradations of proteins involved in virulence expression of plant pathogenic fungi and plant defense machinery should play pivotal roles during the compatible and incompatible interactions. This review elucidates recent investigations about the effects of PTMs and protein degradations on host defense and fungal pathogens' invasions.

An Analysis on the Optimal Level of the Maintenance Float Using Absorbing Markov Chain (흡수 마코프 체인을 활용한 적정 M/F 재고 수준에 관한 연구)

  • Kim, Yong;Yoon, Bong-Kyoo
    • Journal of the military operations research society of Korea
    • /
    • v.34 no.2
    • /
    • pp.163-174
    • /
    • 2008
  • The military is an organization where reliability and availability take much more importance than in any other organization. And, in line with a recent trend of putting emphasis on 'system readiness', not only functions but also availability of a weapon system has become one of achievement targets. In this regard, the military keeps spares for important facility and equipment, which is called as Maintenance Float (M/F), in order to enhance reliability and availability in case of an unforeseen event. The military has calculated yearly M/F requirements based on the number of equipment and utilization rate. However, this method of calculation has failed to meet the intended targets of reliability and availability due to lack of consideration on the characteristics of equipment malfunctions and maintenance unit's capability. In this research, we present an analysis model that can be used to determine an optimal M/F inventory level based on queuing and absorbed Markov chain theories. And, we applied the new analysis model to come out with an optimal volume of K-1 tank M/F for the OO division, which serves as counterattack military unit. In our view, this research is valuable because, while using more tractable methodology compared to previous research, we present a new analysis model that can describe decision making process on M/F level more satisfactorily.