• Title/Summary/Keyword: Cyber security training

Search Result 82, Processing Time 0.024 seconds

A Network Packet Analysis Method to Discover Malicious Activities

  • Kwon, Taewoong;Myung, Joonwoo;Lee, Jun;Kim, Kyu-il;Song, Jungsuk
    • Journal of Information Science Theory and Practice
    • /
    • v.10 no.spc
    • /
    • pp.143-153
    • /
    • 2022
  • With the development of networks and the increase in the number of network devices, the number of cyber attacks targeting them is also increasing. Since these cyber-attacks aim to steal important information and destroy systems, it is necessary to minimize social and economic damage through early detection and rapid response. Many studies using machine learning (ML) and artificial intelligence (AI) have been conducted, among which payload learning is one of the most intuitive and effective methods to detect malicious behavior. In this study, we propose a preprocessing method to maximize the performance of the model when learning the payload in term units. The proposed method constructs a high-quality learning data set by eliminating unnecessary noise (stopwords) and preserving important features in consideration of the machine language and natural language characteristics of the packet payload. Our method consists of three steps: Preserving significant special characters, Generating a stopword list, and Class label refinement. By processing packets of various and complex structures based on these three processes, it is possible to make high-quality training data that can be helpful to build high-performance ML/AI models for security monitoring. We prove the effectiveness of the proposed method by comparing the performance of the AI model to which the proposed method is applied and not. Forthermore, by evaluating the performance of the AI model applied proposed method in the real-world Security Operating Center (SOC) environment with live network traffic, we demonstrate the applicability of the our method to the real environment.

Expand public interest of Private Security activities (민간경비 활동의 공익성 확대 논의)

  • Gong, Bae Wan;Park, Yong Soo
    • Convergence Security Journal
    • /
    • v.14 no.1
    • /
    • pp.3-10
    • /
    • 2014
  • Private security organizations are complementary to the national safety of life and property of individuals as a social role to play in maintaining peace and order. Pursuit of profit is to the public practice according to the logic of capitalist markets and customers seeking to protect the lives and property. However, the legal and institutional constraints of private security is being requirements inhibited by the development. Crime prevention as a private security role that the private companies, which will pursue the public interest. After all, the expansion of the private security crime is results in an increase in unit. The current level of private security in the 1970s remain, and the constraints is being under goodwill and expertise outside of the training system on the market. Variety of crimes, including cyber crime increases and considering the reality of the constraints on private security requirements are able to improve or supplement shall be realistic. In particular, the legal, regulatory and institutional factors must be improved, with goodwill, and for the creation of new industrial policy as a complement to the public interest should be also provided. The private security law interests through integration of private security guards should be guaranteed, and the term of the theorem, sales activities, ensuring the training of professional staff with professional qualifications system is to be settled. As a private security guard industry growth and development can be based on this composition.

Priority Analysis of Information Security Policy in the ICT Convergence Industry in South Korea Using Cross-Impact Analysis (교차영향분석을 이용한 국내 ICT 융합산업의 정보보호정책 우선순위 분석)

  • Lee, Dong-Hee;Jun, Hyo-Jung;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.695-706
    • /
    • 2018
  • In recent years, industrial convergence centered on ICBM (internet of things (IoT), cloud, big data, mobile) has been experiencing rapid development in various fields such as agriculture and the financial industry. In order to prepare for cyber threats, one of the biggest problems facing the convergence industry in the future, the development of the industry must proceed in tandem with a framework of information security. In this study, we analyze the details of the current industrial development policy and related information protection policies using cross impact analysis and present policy priorities through the expert questionnaire. The aim of the study was to clarify the priorities and interrelationships within information security policy as a first step in suggesting effective policy direction. As a result, all six information security policy tasks derived from this study belong to key drivers. Considering the importance of policies, policies such as improving the constitution of the security industry and strengthening of support, training of information protection talent, and investing in the information security industry need to be implemented relatively first.

A Study on the Laws and Regulations in Korea through the Analysis of Cybersecurity Workforce Developing Laws and Regulations in U.S. (미국 사이버보안 인력 양성 법·규정 분석을 통한 국내 법·규정 개선 방안 연구)

  • Hong, Soonjwa;Kim, Joonsoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.123-139
    • /
    • 2020
  • In 1987, Computer Security Act was enacted, requiring computer security awareness and practical training for federal workforce. This is the beginning of US development of federal cybersecurity workforce. It has been strengthening the development of federal cybersecurity workforce policy by establishing OPM regulations and OMB circulation in cases where it is difficult to define by law. Through GISRA 2000 and FISMA 2002, which has been improved, it played a central role for development of federal cybersecurity workforce for more than 10 years. Since then, FISMA 2014 has been enacted as a necessity for supplementing technology and policy. In 2014, the importance of cyber security personnel in US federal agencies has been increased even more, by enacting a single law on cybersecurity workforce twice. We will review the current state of Korea's development of cybersecurity workforce by reviewing and analyzing the development and federal cybersecurity workforce in the United States.

Robust URL Phishing Detection Based on Deep Learning

  • Al-Alyan, Abdullah;Al-Ahmadi, Saad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.7
    • /
    • pp.2752-2768
    • /
    • 2020
  • Phishing websites can have devastating effects on governmental, financial, and social services, as well as on individual privacy. Currently, many phishing detection solutions are evaluated using small datasets and, thus, are prone to sampling issues, such as representing legitimate websites by only high-ranking websites, which could make their evaluation less relevant in practice. Phishing detection solutions which depend only on the URL are attractive, as they can be used in limited systems, such as with firewalls. In this paper, we present a URL-only phishing detection solution based on a convolutional neural network (CNN) model. The proposed CNN takes the URL as the input, rather than using predetermined features such as URL length. For training and evaluation, we have collected over two million URLs in a massive URL phishing detection (MUPD) dataset. We split MUPD into training, validation and testing datasets. The proposed CNN achieves approximately 96% accuracy on the testing dataset; this accuracy is achieved with URL schemes (such as HTTP and HTTPS) removed from the URL. Our proposed solution achieved better accuracy compared to an existing state-of-the-art URL-only model on a published dataset. Finally, the results of our experiment suggest keeping the CNN up-to-date for better results in practice.

Design of Rehabilitation Program Contents using Motion Detection Sensors (동작인식센서를 이용한 재활 프로그램 콘텐츠 설계)

  • Jang, Jae-Youl;Lee, Young-Sik;Kim, Do-Moon;Lee, Tae-Hee;Choi, Chul-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.4
    • /
    • pp.903-910
    • /
    • 2018
  • The necessary rehabilitation training for patients with disability currently does not match the actual amount of training conducted, which requires interest in rehabilitation treatment, continued investment and infrastructure for rehabilitation contents, while the most common forms of rehabilitation treatment comprises of art, music, and play treatments. In this paper, we provide a game-style rehabilitation program including audio and visual elements through motion detection process on the patient and design a digital game rehabilitation program that allows different level of management for various categories of disabled people.

Enhanced ACGAN based on Progressive Step Training and Weight Transfer

  • Jinmo Byeon;Inshil Doh;Dana Yang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.3
    • /
    • pp.11-20
    • /
    • 2024
  • Among the generative models in Artificial Intelligence (AI), especially Generative Adversarial Network (GAN) has been successful in various applications such as image processing, density estimation, and style transfer. While the GAN models including Conditional GAN (CGAN), CycleGAN, BigGAN, have been extended and improved, researchers face challenges in real-world applications in specific domains such as disaster simulation, healthcare, and urban planning due to data scarcity and unstable learning causing Image distortion. This paper proposes a new progressive learning methodology called Progressive Step Training (PST) based on the Auxiliary Classifier GAN (ACGAN) that discriminates class labels, leveraging the progressive learning approach of the Progressive Growing of GAN (PGGAN). The PST model achieves 70.82% faster stabilization, 51.3% lower standard deviation, stable convergence of loss values in the later high resolution stages, and a 94.6% faster loss reduction compared to conventional methods.

An Analysis of Relationship between Industry Security Education and Capability: Case Centric on Insider Leakage (보안교육과 보안관리 역량의 상관관계 분석: 인가된 내부자 기밀유출사례를 중심으로)

  • Lee, Chi-Seok;Kim, Yanghoon
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.2
    • /
    • pp.27-36
    • /
    • 2015
  • Current leakage of industrial technologies with revealing state secret against nation is gradually increasing and scope of the spill is diversified from technology-oriented leakage to new economic security sector like information and communication, electrical and electronic, defense industry, illegal export of strategic material, economic order disturbance by foreign country, infringement of intellectual property, etc. So the spill damage can affect not only leaked company but also national interests and entire domestic industry. According to statistics from National Industrial Security Center of National Intelligence Service, a major cause of technology leakage is not only by external things about hacking and malignant code, but internal leakage of former and current employees account for about 80%. And technology leakage due to temptation of money and personal interests followed by technology leakage of subcontractor is steadily increased. Most studies in the field of security have tended to focus on measuring security capability of company in order to prevent leakage core assets or developing measurement Indicators for management rather than security activities of the company members that is most important. Therefore, this study analyzes the effect of most underlying security education in security activities on security capabilities of enterprise. As a result, it indicates that security education have a positive(+) correlation with security capabilities.

A Development of Curriculum for Information Security Professional Manpower Training (정보보안 전문인력 양성을 위한 교육과정 개발)

  • Lee, Moongoo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.1
    • /
    • pp.46-52
    • /
    • 2017
  • Social attention to information security field is inspired, and manpower demand forecast of this area is getting high. This study surveyed information security knowledge of practitioners who work in a field of information security such as computer and network system. We analyzed a connection between survey data, information protection job system that was suggested by NICE, IT skills that NCS and KISA classified and security field classification system. Base on data that analyzed, this study suggests a curriculum that trains professional manpower who perform duties in the field of information security. Suggested curriculum can be applied to 2 year college, 3 year college and 4 year college. Suggested curriculum provides courses that students who want to work in a field of information security must learn during the college. Suggested courses are closely connected to a related field and detailed guideline is indicated to each course to educate. Suggested curriculum is required, and it combines a theoretical education that become basis and a practical education so that it is not weighted to learn theory and is not only focusing on learning simple commands. This curriculum is established to educate students countermeasures of hacking and security defend that based on scenario that connected to executive ability. This curriculum helps to achieve certificates related to a field more than paper qualification. Also, we expect this curriculum helps to train convergent information security manpower for next generation.

Following the Cold War, both the United States' military operational concept and the Republic of Korea Army's developmental study (탈냉전기 미국의 군사작전 개념과 한국군 발전방향 연구-합동작전을 중심으로)

  • Lee, Se-Han
    • Journal of National Security and Military Science
    • /
    • s.2
    • /
    • pp.121-163
    • /
    • 2004
  • Science technique development expanded into, not only land, sea, and air operations but also those of airspace, and cyber battle spaces. It is generally accepted at this time that space centric operations currently cannot be effectively divided from air operations. However, science and technology advancements make it possible to integrate Army, Navy, Airforce, and Marine forces into effective operations as never before. The Republic of Korea Armed Forces needs to establish a more effective joint concept. The US military, considered by many experts as the most effective in the world, understands the necessity of joint operations and accordingly has highly developed its own concept of joint operations. The US joint operational concepts demonstrated their effectiveness during the Iraqi War by dominating the battlefield through effective use of all combat and non-combat power. Following the US Iraqi War experience, the US Department of Defense continued to enhance Joint Capability through the acceleration of US Military Transformation involving all components. The future national security of the Republic of Korea, faced with the peculiarity of communist threat in the form of North Korea, and the conflicting interest of four strong powers; the United States, China, Japan, and Russia, depends on small but strong armed forces employing all available combat power through effective National and Military Strategy, and considering domestic and international constraints. In order to succeed in future wars, military operations following joint operational concepts must effectively employ all available combat power in a timely manner. The Republic of Korea Armed Forces must establish a joint forces concept in order to integrate all available combat power during employment. Therefore we must establish military operations that develop the military structure and organization, doctrine, weapon systems, training and education of our armed forces based on the key concept of joint operations.

  • PDF