• Title/Summary/Keyword: Cyber Operations

Search Result 117, Processing Time 0.028 seconds

A Study on the Detection of Malware That Extracts Account IDs and Passwords on Game Sites and Possible Countermeasures Through Analysis (게임 사이트의 계정과 비밀번호 유출 악성코드 분석을 통한 탐지 및 대응방안 연구)

  • Lee, Seung-Won;Roh, Young-Sup;Kim, Woo-Suk;Lee, Mi-Hwa;Han, Kook-Il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.283-293
    • /
    • 2012
  • A new type of malware that extracts personal and account data over an extended period of time and that apparently is resistant to detection by vaccines has been identified. Generally, a malware is installed on a computer through network-to-network connections by utilizing Web vulnerabilities that contain injection, XSS, broken authentication and session management, or insecure direct-object references, among others. After the malware executes registration of an arbitrary service and an arbitrary process on a computer, it then periodically communicates the collected confidential information to a hacker. This paper is a systematic approach to analyzing a new type of malware called "winweng," a kind of worm that frequently made appearances during the first half of 2011. The research describes how the malware came to be in circulation, how it infects computers, how its operations expose its existence and suggests improvements in responses and countermeasures. Keywords: Malware, Worm, Winweng, SNORT.

선형계획을 위한 Matrix Generator/Report Writer [PDS/MAGEN] 소프트웨어

  • 안병훈;남보우
    • Korean Management Science Review
    • /
    • v.1
    • /
    • pp.81-87
    • /
    • 1984
  • 이 글에서는 PDS/MAGEN이란 무엇이며 그 사용방법은 어떻게 하고 어떤 면에서 장점을 가지고 있는가를 살펴보았다. PDS/MAGEN도 컴퓨터의 다른 소프트웨어와 마찬가지로 사용법을 새로 알아야 하지만 APEX 등 선형계획 문제를 위한 소프트웨어를 사용할 때 매우 편리하다. 일단 문제가 구성되면 선형계획법이나 PDS/MAGEN의 전문가가 아니더라도 선형계획법을 쉽게 사용할 수 있으므로 실제 업무에서는 매우 필요한 소프트웨어라 하겠다. PDS/MAGEN은 현재 KAIST부설 전산개발센타내 CDC Cyber 174에 장착되어 있어, 기타 다른 기종에 적합한 소프트웨어들도 보급 판매되고 있으며, 이의 도입 적용은 효율적인 선형계획기법 응용의 필요불가결한 소프트웨어라 하겠다.

  • PDF

Analysis of Research Trends of Cyber Physical System(CPS) in the Manufacturing Industry (제조 분야 사이버 물리 시스템(CPS) 연구 동향 분석)

  • Kang, Hyung-Muck;Hwang, Kyung-Tae
    • Informatization Policy
    • /
    • v.25 no.3
    • /
    • pp.3-28
    • /
    • 2018
  • The purpose of this study is to analyze the research trends and present future research directions in the field of Cyber Physical System (CPS), a key element in the 4th Industrial Revolution, Industry 4.0, and Smart Manufacturing that are currently promoted as important innovation agenda both at home and abroad. In this study, (1) the concepts of industry 4.0, smart manufacturing and CPS are summarized; (2) analysis criteria of these fields are established; and 3) analysis results are presented and future research direction is proposed. 74 overseas and 8 domestic literature on manufacturing CPS from 2013 to 2017 are identified through 'Google Scholar Search'. Major results of the analysis are summarized as follows: (1) research on a common methodology and framework for the manufacturing CPS needs to be done based on the analysis of the existing methodologies and frameworks of various perspectives; (2) in order to improve the maturity of the manufacturing CPS, it is necessary to study actual deployment and operations of CPS, including the existing systems; (3) it is necessary to study the diagnostic methodology that can evaluate manufacturing CPS and suggest improvement strategy; and (4) as for the detailed model and tool, it is necessary to reinforce research on SCM production planning and human-machine collaboration while considering the characteristics of CPS.

"An Analysis Study of Factors for Strengthening Cybersecurity at the Busan Port Container Terminal (부산항 컨테이너 터미널 사이버 보안 강화를 위한 요인 분석연구)

  • Do-Yeon Ha;Yul-Seong Kim
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.11a
    • /
    • pp.64-65
    • /
    • 2023
  • The purpose of this study was to assess the current status of cyber security at the Busan Port container terminal and derive strengthening factors through exploratory research. In recent years, the maritime industry has actively adopted Fourth Industrial Revolution technologies, resulting in changes in the form of ports, such as automated and smart terminals. While these changes have brought positive improvements in port efficiency, they have also increased the potential for cyber security incidents and threats, including information leakage through cargo handling equipment and ransomware attacks leading to terminal operations disruption. Especially in the case of ports, cyber security threats can have not only local effects within the port but also physical damage and implications for national security. However, despite the growing cyber security threats within ports, research related to domestic port cyber security remains limited. Therefore, this study aimed to identify factors for enhancing cyber security in ports and derive future enhancement strategies. The study conducted an analysis focusing on the Busan Port container terminal, which is one of the leading ports in South Korea actively adopting Fourth Industrial Revolution technologies, and conducted a survey of stakeholders in the Busan Port container terminal. Subsequently, exploratory factor analysis was used to derive strengthening factors. This study holds significance in providing directions for enhancing cyber security in domestic container ports in the future.

  • PDF

Error Detection Architecture for Modular Operations (Modular 연산에 대한 오류 탐지)

  • Kim, Chang Han;Chang, Nam Su
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.193-199
    • /
    • 2017
  • In this paper, we proposed an architecture of error detection in $Z_N$ operations using $Z_{(2^r-1)N}$. The error detection can be simply constructed in hardware. The hardware overheads are only 50% and 1% with respectively space and time complexity. The architecture is very efficient because it is detection 99% for 1 bit fault. For 2 bit fault, it is detection 99% and 50% with respective r=2 and r=3.

A Study on the Critical Defense Information Resources Mobilization for Information Warfare (정보전 대비 국방부문 핵심정보자원 동원 방안에 관한 연구)

  • 이승구;김화수
    • Journal of the military operations research society of Korea
    • /
    • v.26 no.2
    • /
    • pp.131-142
    • /
    • 2000
  • The emergence of computer-based information society has fundamentally changed the paradigms of everyday human life and will continue its trend in the 21st century when resources of information technology become more and more important because they can be directly transformed into military use. Future warfare will include such high-tech weapon systems as precision-guided munitions and satellite. But, with the spread of internet and advances in information technology, cyber space appears to be resources can be deciding factor in winning future war. In this paper we proposed to identify core information technology in national defense, improve mobilizing method of information resources in time of crisis, come up with combat effective measures utilizing information technology by estimating future information technological developments.

  • PDF

How to Strengthen Convergeance of Special Operations through High-Tech Intertwinement (첨단과학기술의 융복합을 통한 특수작전의 융합성 강화 방안)

  • Sang-Keun Cho;Kang-Il Seo;Min-Seop Jung;Jun-Seong Yoo;Chul-Ki Min;Sang-Hyuk Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.2
    • /
    • pp.301-306
    • /
    • 2023
  • Convergeance in the military operations can be attained by simultaneously integrating effects based on sensor, C2, shooter asset in multi-domain and there is no exception to special operations. However, because of challenges from enemy, terrain, geopraphy, and weather, it's not easy to intertwine effects created from ground, sea, air, cyber and electromagnetic spectrum, and space in special operations conducted in deep area. This study presented how to intertwine high-tech such as long-rane reconnaissance·strike drone, cutting-edge sensor, jamming pod, and modular repeater in order to offset aforementioned challenges. Several new high-tech are able to strengthen convergeance of special operations in accordance with the development of the 4th industrial revolution. Therefore, follow-up studies need to be continued making an efforts to search for them.

A Study on the Loyalty to Web Based Cyber Trading Systems (웹기반 사이버트레이딩시스템의 충성도에 관한 연구)

  • 이원호;김은홍;권순범
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.29 no.2
    • /
    • pp.97-116
    • /
    • 2004
  • Recently, e portion of on-line stock brokerage has been rapidly increased to be more than 50%, on the basis of contracted money. The usage of wCTS(Web Based Cyber Trading Systems) has now got into the steady state over the initial diffusion stage, which means wCTS has got more-than-half customer base in on-line service. Therefore, brokerage service providers have their competitive strategic focus on customer retention through the enhancement of customer loyalty. This study provides framework and survey results on explanation of wCTS user's loyalty, what and how factors affect wCTS user's loyalty. We adopt the results of early studies on information technology acceptance and diffusion such as TAM(Technology Acceptance Model) and IDT(Innovation Diffusion Theory). We also referred loyalty theory of marketing area and studios on CTS usage. We categorized explanation factors as three groups characteristics of users, characteristics of system, social environment. And we assumed that these three factors could affect the loyalty through two parameters : customer satisfaction and trust to the system. This study firstly shows that the ease of use and usefulness, the major factors of TAM. can also be applied to the loyalty of wCTS with resulting that the usefulness is more important than the ease of use In wCTS. Secondly, it shows that the innovative and risk-sensitive user has the lower degree of loyalty. Thirdly, it shows that the satisfaction and trust impact the loyalty simultaneously, the trust particularly impacts more strongly than the loyalty, due to the characteristics of monetary transaction in wCTS. This study provides meaningful results to the other on-line EC service fields as a first empirical research regarding the loyalty to wCTS which is a typical on-line EC service.

Implementation of a Network Simulator for Cyber Attacks and Detections based on SSFNet (SSFNet 기반 사이버 공격 및 탐지를 위한 네트워크 시뮬레이터의 구현)

  • Shim, Jae-Hong;Jung, Hong-Ki;Lee, Cheol-Won;Choi, Kyung-Hee;Park, Seung-Kyu;Jung, Gi-Hyun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.4
    • /
    • pp.457-467
    • /
    • 2002
  • In order to simulate cyber attacks and predict network behavior by attacks, we should represent attributes of network components in the simulation model, and should express characteristics of systems that carry out various cyber attacks and defend from these attacks. To simulate how network load may change under the cyber attacks, we extended SSF[9, 10] that is process-based event-oriented simulation system. We added a firewall class and a packet manipulator into the SSFNet that is a component of SSF. The firewall class, which is related to the security, is to simulate cyber attacks, and the packet manipulator is a set of functions to write attack programs for the simulation. The extended SSFNet enables to simulate a network with the security systems and provides advantages that make easy to port already exsiting attack programs and apply them to the simulation evironment. We made a vitual network model to verify operations of the added classes, and simulated a smurf attack that is a representative denial of sevive attack, and observed the network behavior under the smurf attack. The results showed that the firewall class and packet manipulator developed in this paper worked normaly.

The Development of Quality Assurance Program for CyberKnife (사이버나이프의 품질관리 절차서 개발)

  • Jang, Ji-Sun;Kang, Young-Nam;Shin, Dong-Oh;Kim, Moon-Chan;Yoon, Sei-Chul;Choi, Ihl-Bohng;Kim, Mi-Sook;Cho, Chul-Koo;Yoo, Seong-Yul;Kwon, Soo-Il;Lee, Dong-Han
    • Radiation Oncology Journal
    • /
    • v.24 no.3
    • /
    • pp.185-191
    • /
    • 2006
  • [ $\underline{Purpose}$ ]: Standardization quality assurance (QA) program of CyberKnife for suitable circumstances in Korea has not been established. In this research, we investigated the development of QA program for CyberKnife and evaluation of the feasibility under applications. $\underline{Materials\;and\;Methods}$: Considering the feature of constitution for systems and the therapeutic methodology of CyberKnife, the list of quality control (QC) was established and divided dependent on the each period of operations. And then all these developed QC lists were categorized into three groups such as basic QC, delivery specific QC, and patient specific QC based on the each purpose of QA. In order to verify the validity of the established QA program, this QC lists was applied to two CyberKnife centers. The acceptable tolerance was based on the undertaking inspection list from the CyberKnife manufacturer and the QC results during last three years of two CyberKnife centers in Korea. The acquired measurement results were evaluated for the analysis of the current QA status and the verification of the propriety for the developed QA program. $\underline{Results}$: The current QA status of two CyberKnife centers was evaluated from the accuracy of all measurements in relation with application of the established QA program. Each measurement result was verified having a good agreement within the acceptable tolerance limit of the developed QA program. $\underline{Conclusion}$: It is considered that the developed QA program in this research could be established the standardization of QC methods for CyberKnife and confirmed the accuracy and stability for the image-guided stereotactic radiotherapy.