• Title/Summary/Keyword: Cyber Defense

Search Result 262, Processing Time 0.031 seconds

Attack Detection and Classification Method Using PCA and LightGBM in MQTT-based IoT Environment (MQTT 기반 IoT 환경에서의 PCA와 LightGBM을 이용한 공격 탐지 및 분류 방안)

  • Lee Ji Gu;Lee Soo Jin;Kim Young Won
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.17-24
    • /
    • 2022
  • Recently, machine learning-based cyber attack detection and classification research has been actively conducted, achieving a high level of detection accuracy. However, low-spec IoT devices and large-scale network traffic make it difficult to apply machine learning-based detection models in IoT environment. Therefore, In this paper, we propose an efficient IoT attack detection and classification method through PCA(Principal Component Analysis) and LightGBM(Light Gradient Boosting Model) using datasets collected in a MQTT(Message Queuing Telementry Transport) IoT protocol environment that is also used in the defense field. As a result of the experiment, even though the original dataset was reduced to about 15%, the performance was almost similar to that of the original. It also showed the best performance in comparative evaluation with the four dimensional reduction techniques selected in this paper.

A Study on the Generation and Transmission of Drone Jamming Signals Based on the MAVLink Protocol (MAVLink 프로토콜 기반 드론 교란 신호 생성 및 송출에 관한 연구)

  • Woojin Lee;Changhan Lim;Jaeyeon Lee
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.75-84
    • /
    • 2023
  • Recently, as the use of drones for military purposes is increasing, such as the Russia-Ukraine War, North Korea's reconnaissance against South Korea, and Army Tiger 4.0's dronebot system, anti-drone technology is developing a lot in each country. However, traditional anti-drone technologies in the form of using conventional weapons or electronic warfare weapons have the disadvantage of being expensive, so anti-drone technologies that can be performed at low cost are currently being newly researched. Therfore, in response to these anti-drone technologies, many efforts are being made to increase the survivability of our allies. In line with this trend, this study assumes a virtual anti-drone system applied with cyber domain and electronic warfare domain technologies that can be performed at low cost, rather than a technique using expensive conventional weapons or electronic warfare weapons among various anti-drone technologies. In response to this, we would like to present a plan to increase the survivability of friendly drones.

A Study on the Concept of Military Robotic Combat Using the 4th Industrial Revolution Technology (4차 산업혁명 기술을 활용한 군사로봇 전투개념 연구)

  • Sang-Hyuk Park;Seung-Pil Namgung;Sung-Kwon Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.397-401
    • /
    • 2023
  • The study presents milestones for the Korean military to win the future battlefield based on the 4th Industrial Revolution. Chapter 1 deals with the necessity of research on how advanced countries operate industrial technology in the defense sector based on the 4th Industrial Revolution. Chapter 2 examines the current technology status of the 4th Industrial Revolution in Korea and the concept of Korean combat. Chapter 3 analyzes the military robotic technology of advanced military countries through examples of unmanned combat robots in the United States, Israel, and Germany. In the end, in future battles, it will be possible to dominate the battlefield only by taking a leap into a super-connected and super-intelligent military based on a high-tech platform. Our military should also research and develop military robotics in accordance with the characteristics of each combat system, and further expand and develop the concept of combat performance to protect our core capabilities and centers from enemy cyber, electronic warfare, and space attacks.

Efforts against Cybersecurity Attack of Space Systems

  • Jin-Keun Hong
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.4
    • /
    • pp.437-445
    • /
    • 2023
  • A space system refers to a network of sensors, ground systems, and space-craft operating in space. The security of space systems relies on information systems and networks that support the design, launch, and operation of space missions. Characteristics of space operations, including command and control (C2) between space-craft (including satellites) and ground communication, also depend on wireless frequency and communication channels. Attackers can potentially engage in malicious activities such as destruction, disruption, and degradation of systems, networks, communication channels, and space operations. These malicious cyber activities include sensor spoofing, system damage, denial of service attacks, jamming of unauthorized commands, and injection of malicious code. Such activities ultimately lead to a decrease in the lifespan and functionality of space systems, and may result in damage to space-craft and, lead to loss of control. The Cybersecurity Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) matrix, proposed by Massachusetts Institute of Technology Research and Engineering (MITRE), consists of the following stages: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command & Control, Exfiltration, and Impact. This paper identifies cybersecurity activities in space systems and satellite navigation systems through the National Institute of Standards and Technology (NIST)'s standard documents, former U.S. President Trump's executive orders, and presents risk management activities. This paper also explores cybersecurity's tactics attack techniques within the context of space systems (space-craft) by referencing the Sparta ATT&CK Matrix. In this paper, security threats in space systems analyzed, focusing on the cybersecurity attack tactics, techniques, and countermeasures of space-craft presented by Space Attack Research and Tactic Analysis (SPARTA). Through this study, cybersecurity attack tactics, techniques, and countermeasures existing in space-craft are identified, and an understanding of the direction of application in the design and implementation of safe small satellites is provided.

A Study of the Safety & Effect of Products Containing Ceramide, Glucan for Atopic Dermatitis (아토피 피부염 환자에 적용한 글루칸과 세라마이드 제제의 유효성 및 안전성에 대한 연구)

  • Yu Chang-Seon;Kim Seon-Hee;Kim Ju-Duck
    • Journal of the Society of Cosmetic Scientists of Korea
    • /
    • v.30 no.4 s.48
    • /
    • pp.533-541
    • /
    • 2004
  • Atopic dermatitis, also called congenital fever, is a allergic eczema of chronic itching disease. It is a recurrent and familial disease and appears on a wide age group from infant to adult. It is very common, and the ratio of occurrence is about $9{\~}l2\%$ of a child. However. it is showing trend of continuous increase by social and natural environment, food culture, and life style, recently. The human skin plays a barrier role against a physical and chemical stimulus from external environment. According to the latest study, the decreased amount of ceramide in horny layer impairs the bier function and moisture-maintaining function of skin in atopic dematitis patient. Ceramide is a kind of the sphingolipid in which a fatty acid is connected to sphingosin. Ceramide constitutes about $40\%$ of total lipid between keratinocytes and has the function of defense wall and building regular structure to suppress moisture vaporization in horny layer. In horny layer of skin a comified cell is composed of multi-layer structure of a brick shape, and, as for this cornified cell, it is strongly connected by ceramide, cholesterol, and free fatty acid. Here, we described the effects of a cream containing ceramide on the recovery of skin harrier function of atopic dermatitis patient. The safety and efficacy of latex and liquid formula were evaluated as cosmetics for atopic dermatitis. The latex products was composed of intercellular lipid components-ceramide, cholesterol, and free fatty acid-to restore skin barrier function in atopic dermatitis patients. The liquid one contained beta-glucan, magnolia extracts, and licolice extracts, which have skin immunomodulatory and anti-inflammatory effects. It is also confirmed that their possibility on new cosmetic market of atopic dermatitis.

Technology Analysis on Automatic Detection and Defense of SW Vulnerabilities (SW 보안 취약점 자동 탐색 및 대응 기술 분석)

  • Oh, Sang-Hwan;Kim, Tae-Eun;Kim, HwanKuk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.11
    • /
    • pp.94-103
    • /
    • 2017
  • As automatic hacking tools and techniques have been improved, the number of new vulnerabilities has increased. The CVE registered from 2010 to 2015 numbered about 80,000, and it is expected that more vulnerabilities will be reported. In most cases, patching a vulnerability depends on the developers' capability, and most patching techniques are based on manual analysis, which requires nine months, on average. The techniques are composed of finding the vulnerability, conducting the analysis based on the source code, and writing new code for the patch. Zero-day is critical because the time gap between the first discovery and taking action is too long, as mentioned. To solve the problem, techniques for automatically detecting and analyzing software (SW) vulnerabilities have been proposed recently. Cyber Grand Challenge (CGC) held in 2016 was the first competition to create automatic defensive systems capable of reasoning over flaws in binary and formulating patches without experts' direct analysis. Darktrace and Cylance are similar projects for managing SW automatically with artificial intelligence and machine learning. Though many foreign commercial institutions and academies run their projects for automatic binary analysis, the domestic level of technology is much lower. This paper is to study developing automatic detection of SW vulnerabilities and defenses against them. We analyzed and compared relative works and tools as additional elements, and optimal techniques for automatic analysis are suggested.

The Effects of Professional Soldiers' Family Healthiness on Organizational Effectiveness - Mediated effect of empowerment and multi-group analysis according to whether they are living with their families or not - (직업군인의 가족건강성이 조직효과성에 미치는 영향 -임파워먼트 매개효과와 가족동거 여부별 다집단 분석-)

  • Kim, Jung-Eun;Chae, Hyun-Tak
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.12
    • /
    • pp.146-152
    • /
    • 2016
  • The purposes of this study were to investigate the effects of professional soldiers' family healthiness on the organizational effectiveness of the military and test for any differences in the structural modeling path caused by the mediating effects of empowerment depending on whether they lived with their families or not. Data were collected with a self-administered survey distributed to 480 professional soldiers after the approval of the Ministry of National Defense. The data collected were then analyzed using descriptive statistics, structural equation modeling, and multi-group analysis. The analysis results show that the family healthiness of all of the professional soldiers had direct or indirect effects on their organizational effectiveness via empowerment and that family healthiness was a variable with a very large explanatory power for organizational effectiveness. Both family healthiness and empowerment had effects on the organizational effectiveness of the solders that were living with their families and those who lived separately from their families. The levels of family healthiness, empowerment, and organizational effectiveness were all high among the professional soldiers that were living with their families and all low among those who were not. Increasing the family healthiness and empowerment was found to enhance the organizational effectiveness in all of the models, and a higher organizational effectiveness would be expected from professional soldiers living with their families. These findings led to a proposal that various plans should be prepared to help professional soldiers live with their families and provide them with family welfare support.

An Analysis of Relationship between Industry Security Education and Capability: Case Centric on Insider Leakage (보안교육과 보안관리 역량의 상관관계 분석: 인가된 내부자 기밀유출사례를 중심으로)

  • Lee, Chi-Seok;Kim, Yanghoon
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.2
    • /
    • pp.27-36
    • /
    • 2015
  • Current leakage of industrial technologies with revealing state secret against nation is gradually increasing and scope of the spill is diversified from technology-oriented leakage to new economic security sector like information and communication, electrical and electronic, defense industry, illegal export of strategic material, economic order disturbance by foreign country, infringement of intellectual property, etc. So the spill damage can affect not only leaked company but also national interests and entire domestic industry. According to statistics from National Industrial Security Center of National Intelligence Service, a major cause of technology leakage is not only by external things about hacking and malignant code, but internal leakage of former and current employees account for about 80%. And technology leakage due to temptation of money and personal interests followed by technology leakage of subcontractor is steadily increased. Most studies in the field of security have tended to focus on measuring security capability of company in order to prevent leakage core assets or developing measurement Indicators for management rather than security activities of the company members that is most important. Therefore, this study analyzes the effect of most underlying security education in security activities on security capabilities of enterprise. As a result, it indicates that security education have a positive(+) correlation with security capabilities.

Human Gait-Phase Classification to Control a Lower Extremity Exoskeleton Robot (하지근력증강로봇 제어를 위한 착용자의 보행단계구분)

  • Kim, Hee-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.7
    • /
    • pp.479-490
    • /
    • 2014
  • A lower extremity exoskeleton is a robot device that attaches to the lower limbs of the human body to augment or assist with the walking ability of the wearer. In order to improve the wearer's walking ability, the robot senses the wearer's walking locomotion and classifies it into a gait-phase state, after which it drives the appropriate robot motions for each state using its actuators. This paper presents a method by which the robot senses the wearer's locomotion along with a novel classification algorithm which classifies the sensed data as a gait-phase state. The robot determines its control mode using this gait-phase information. If erroneous information is delivered, the robot will fail to improve the walking ability or will bring some discomfort to the wearer. Therefore, it is necessary for the algorithm constantly to classify the correct gait-phase information. However, our device for sensing a human's locomotion has very sensitive characteristics sufficient for it to detect small movements. With only simple logic like a threshold-based classification, it is difficult to deliver the correct information continually. In order to overcome this and provide correct information in a timely manner, a probabilistic gait-phase classification algorithm is proposed. Experimental results demonstrate that the proposed algorithm offers excellent accuracy.

A Study on the Effect of Organizational Culture on Security Performance (조직문화가 보안성과에 미치는 영향 연구 - 군인 가치관의 매개효과를 중심으로 -)

  • Park, Jaegon
    • Korean Security Journal
    • /
    • no.58
    • /
    • pp.215-241
    • /
    • 2019
  • This study approached the military security problem from the viewpoint of social psychology in view of the fact that the military security problem has been focused on the technical field such as cyber security along with the development of defense science and technology. In this background, we examined the causal relationship between variables after extracting variables affecting the security problem of the military through previous research. The significance of the study results is as follows. First, the military culture has a direct and indirect influence on improving the willingness to adhere to security and the security level of military organizations, as well as contributing to the establishment of military values. This indicates that the overall organizational culture of the current military is influencing the security consciousness of the soldiers and the achievement of organizational security, while at the same time showing the need for effort to create the right organizational culture. Second, the values of soldiers had a positive effect on the willingness of the individual to obey the security and the security performance. Values begin with an understanding of organizational culture and indicate that efforts can be made to establish an organizational security posture when the right values are formed. Third, we have improved the completeness of the study by verifying the causal relationship by extracting variables that correspond to the context of the ROK military.