• Title/Summary/Keyword: Cyber Operation

Search Result 253, Processing Time 0.027 seconds

Reversible Secret Sharing Scheme Using Symmetric Key Encryption Algorithm in Encrypted Images (암호화된 이미지에서 대칭키 암호화 알고리듬을 이용한 가역 비밀이미지 공유 기법)

  • Jeon, Byoung-Hyun;Shin, Sang-Ho;Jung, Ki-Hyun;Lee, Joon-Ho;Yoo, Kee-Young
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.11
    • /
    • pp.1332-1341
    • /
    • 2015
  • This paper proposes a novel reversible secret sharing scheme using AES algorithm in encrypted images. In the proposed scheme, a role of the dealer is divided into an image provider and a data hider. The image provider encrypts the cover image with a shared secret key and sends it to the dealer. The dealer embeds the secret data into the encrypted image and transmits encrypted shadow images to the corresponding participants. We utilize Galois polynomial arithmetic operation over 28 and the coefficient of the higher-order term is fixed to one in order to prevent the overflow. In experimental results, we demonstrate that the PSNR is sustained close to 44dB and the embedding capacity is 524,288 bits.

A Design and Implementation of a Solution for Real Detection of Information Leakage by Keylogging Attack (키로깅을 통한 정보유출 실시간 탐지 솔루션 설계 및 구현)

  • Choi, In Young;Choi, Ji Hun;Lee, Won Yeoul
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.10
    • /
    • pp.1198-1204
    • /
    • 2014
  • Most of vaccine type security solutions detect intrusion of computer virus or malicious code. However, they almost don't have functionalities of the information leakage detection. In particular, information leakage through keylogging attact cannot be detected. In this paper, we design and implement a solution to detect the leakage of information through keylogging attact. Proposed solution detects the user-specified information in real time. To detect the leakage of user-specified information, the solution extracts the payload field from each outbound packet and compares with user-specified information. We design the solution to reduce the effect on the packet transmission delay time due to packet monitoring operation. And we design a simple user interface. By proposed solution, user can response to intrusion or information leakage immediately because he or she can perceives a leakage of information in real time.

A Discovery System of Malicious Javascript URLs hidden in Web Source Code Files

  • Park, Hweerang;Cho, Sang-Il;Park, Jungkyu;Cho, Youngho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.5
    • /
    • pp.27-33
    • /
    • 2019
  • One of serious security threats is a botnet-based attack. A botnet in general consists of numerous bots, which are computing devices with networking function, such as personal computers, smartphones, or tiny IoT sensor devices compromised by malicious codes or attackers. Such botnets can launch various serious cyber-attacks like DDoS attacks, propagating mal-wares, and spreading spam e-mails over the network. To establish a botnet, attackers usually inject malicious URLs into web source codes stealthily by using data hiding methods like Javascript obfuscation techniques to avoid being discovered by traditional security systems such as Firewall, IPS(Intrusion Prevention System) or IDS(Intrusion Detection System). Meanwhile, it is non-trivial work in practice for software developers to manually find such malicious URLs which are hidden in numerous web source codes stored in web servers. In this paper, we propose a security defense system to discover such suspicious, malicious URLs hidden in web source codes, and present experiment results that show its discovery performance. In particular, based on our experiment results, our proposed system discovered 100% of URLs hidden by Javascript encoding obfuscation within sample web source files.

Development of Digital Twin platform using Smart Factory based CPPS (스마트팩토리 기반 CPPS를 활용한 Digital Twin 플랫폼 개발)

  • Lee, Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.305-307
    • /
    • 2021
  • In this paper, we propose a study related to the development of a Digital-Twin platform using a smart factory based CPPS (Cyber Pysical Production System) using ICT (Information Communication Technology) technology. The platform developed through this study performs a 3D model simulation function in conjunction with P3R (Product, Process, Plant, Resource) including BOP (Bill of Process) management function from the preceding manufacturing process planning stage. In addition, we propose a digital twin platform that can predict production processes, equipment, layout, and production. The platform proposed through this paper proposes a feature that can manage the entire smart factory manufacturing process from the initial planning design stage to the manufacturing, production, operation, and maintenance stages.

  • PDF

Analysis of vulnerabilities and Breaches in a network separation environment (망분리 환경에서 취약성 및 침해사고 분석)

  • Choe, Ye-won;Lee, DongHwi
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.632-634
    • /
    • 2021
  • In proportion to the development of the Internet and the increase in users, the rate of cyber-incident using it is increasing. As a countermeasure, there is a network separation method that separates the system accessible to users and the system containing key information from each other. However, in the case of tasks that require the use of the Internet network, it is exposed to cyber attacks, and there are many loopholes in the method of data transmission between networks and the management and operation of the system, resulting in infection of the closed network. In this paper, we aim to enhance the safety of the networking system by investigating the types and cases of infringement accidents in these network separation environments.

  • PDF

Decision Making Model for Selecting Financial Company Server Privilege Account Operations (금융회사 서버 Privilege 계정 운영방식 결정 모델)

  • Lee, Suk-Won;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1607-1620
    • /
    • 2015
  • The server privilege account must be operated through law and regulation. However, due to regulation non-compliance and inadequate operation on financial company server privilege, an incident that every server data being deleted by hacker occur which is later being named as 'NH Bank Cyber Attack'. In this paper, the current operation status on financial company privilege accounts is being analysed to elicit problems and improvement. From the analysis, important evaluation factors will be also selected and applied generating the decision making model for financial company server privilege account operation. The evaluation factor deducted from privilege account status analysis will be used to present and verify the decision making model and formula through AHP(Analytic Hierarchy process).

Design of the Digital Neuron Processor (디지털 뉴런프로세서의 설계에 관한 연구)

  • Hong, Bong-Wha;Lee, Ho-Sun;Park, Wha-Se
    • 전자공학회논문지 IE
    • /
    • v.44 no.3
    • /
    • pp.12-22
    • /
    • 2007
  • In this paper, we designed of the high speed digital neuron processor in order to digital neural networks. we designed of the MAC(Multiplier and Accumulator) operation unit used residue number system without carry propagation for the high speed operation. and we implemented sigmoid active function which make it difficult to design neuron processor. The Designed circuits are descripted by VHDL and synthesized by Compass tools. we designed of MAC operation unit and sigmoid processing unit are proved that it could run time 19.6 nsec on the simulation and decreased to hardware size about 50%, each order. Designed digital neuron processor can be implementation in parallel distributed processing system with desired real time processing, In this paper.

Analysis of Health Promoting Schools: Focusing on Small-sized Elementary School in Rural Area (건강증진모델학교 분석: 읍면 지역 소규모 초등학교를 중심으로)

  • Kim, Miju
    • Journal of the Korean Society of School Health
    • /
    • v.28 no.2
    • /
    • pp.67-78
    • /
    • 2015
  • The purpose of the study was to present a model of WHO Health Promoting School easily applicable to small-sized schools in rural areas. Methods: The study analyzed data of 11 small-sized schools in rural areas selected from 85 health promoting schools, an initiative led by the Ministry of Education from 2012 to 2014. Results: Through the analysis, the study found out the operation process of health promoting schools consists of five stages: system development, needs survey & survey on current status, school health policy development, program development & execution, and evaluation. In addition, the study was able to discover three key factors in operating health promoting schools: connection with curriculum, connection with community, and consensus among members. While it turned out the schools were following operation manuals faithfully, the biggest problem with operation was that the stages of needs survey, priority setting, and core task development were not closely coordinated. Conclusion: Although the model suggested in the study fails to reflect the characteristics of small-sized schools in rural areas, it is close to a universal model which could serve as a guideline when regular schools adopt the system of health promoting schools.

A Study of Effectiveness of the Improved Security Operation Model Based on Vulnerability Database (취약점 데이터베이스 기반 개선된 보안관제 모델의 효과성 연구)

  • Hyun, Suk-woo;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1167-1177
    • /
    • 2019
  • In this paper, the improved security operation model based on the vulnerability database is studied. The proposed model consists of information protection equipment, vulnerability database, and a dashboard that visualizes and provides the results of interworking with detected logs. The evaluation of the model is analyzed by setting up a simulated attack scenario in a virtual infrastructure. In contrast to the traditional method, it is possible to respond quickly to threats of attacks specific to the security vulnerabilities that the asset has, and to find redundancy between detection rules with a secure agent, thereby creating an optimal detection rule.

A Study on CPS-based Mold Life-cycle Management System for Smart Factory (스마트 공장을 위한 CPS 기반 금형 수명 관리 시스템에 관한 연구)

  • Shin, Hyun-Jun;Kim, Sung-Jin;Oh, Chang-Heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.816-818
    • /
    • 2016
  • The Industry 4.0 should decide work operation of manufacture facilities by itself. But small and medium sized enterprises(SMEs) still not prepared these work operations. In this paper, we had research that work operation manufacture facilities of a management system of mold life-cycle based on CPS. The management system of mold manages life-cycle using by shot, this information offers users by cloud system. This system will help SMEs products quality improve and business operation more efficiency.

  • PDF