• Title/Summary/Keyword: Cyber terror

Search Result 77, Processing Time 0.026 seconds

A Study on New Selective Agent Attack Technology in Windows System (윈도우시스템에서 새로운 선택적 에이전트 공격 기술에 관한 연구)

  • Kim, Yeong-Woo;Lim, Young-Hwan;Park, Won-Hyung
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.2
    • /
    • pp.226-233
    • /
    • 2012
  • Recently, Like we saw with 3.4 DDoS Cyber Terror, a behavior of cyber terror becomes increasingly more complicated, sophisticated and larger, and there has been largely damage on industry, the general economy. For responding cyber terrors which occur in the future, we should recognize security holes of system which isn't exposed yet before attacker in advance as we anticipate and implement new technique of cyber attack which not exist hitherto. We design and implement a new technique of cyber attack; it seems to us that a server denies agent' service by altering value of registry in windows system. Network connections of agent are restricted to the new technique we suggest as the a value of registry is changed to a less value than a necessary value and there has happened packet loss by attacker.

Dynamic Simulation on a Network Security Simulator using SSFNet (SSFNet을 이용한 네트워크 보안 시뮬레이터에서 동적 시뮬레이션 방법)

  • 박응기;윤주범;임을규
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.101-106
    • /
    • 2004
  • Recently, a network defense simulator becomes essential in studying cyber incidents because the cyber terror become more and more interesting. The network defense simulator is a tool to estimate damages and an effectiveness of a defense mechanism by modeling network intrusions and defense mechanisms. Using this tool, users can find efficient ways of preventing a cyber terror and recovering from the damage. Previous simulators start the simulation after entire scenario has made and been loaded to simulation engine. However, in this way it can't model human judgement and behavior, and it can't simulate the real cyber terror very well. In this paper, we have added a dynamic simulation component to our previous network security simulator. This component improved accurate modeling of network intrusions and defense behaviors. We have also proposed new modified architecture of the simulation system. Finally we have verified correct simulation results from stammer worn simulation.

Consideration on the Revision Direction of National Cyber Security Management Legislation (국가 사이버안전 관리 법제의 개정방향에 관한 소고)

  • Oh, Tae-Kon;Seoung, Gwan-Sil
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.3
    • /
    • pp.163-170
    • /
    • 2014
  • Cyberspace is closely related with one another, transcending the spacetime throughout the world, and is already located in the most important area of our lives. However, if the organizational cyber terror happens like the national paralysis crisis of major information network such as the previous 1.25 the Internet crisis, the possibility of cyber crisis highly damaging our whole society such as the leakage of the national secrecy and advanced technology is increasing. But we haven't set up the institutional procedure systematically performing the national cyber security management affairs yet. So, in case of cyber crisis, this is highly likely to damage the aspects of national and personal level. On this point, this study looks into the examples of legislation related to our cyber security, and suggests the implication on the revision direction of national cyber security management regulations through relative examination about the examples of legislation in major countries.

Learning Model Development of utilizing a Tutor to study cyber-terrorism (사이버테러에 대비한 국가정보보안 현장 튜터를 활용한 교수-학습 모형 개발)

  • Yun, Dong Sic
    • Convergence Security Journal
    • /
    • v.15 no.6_1
    • /
    • pp.49-57
    • /
    • 2015
  • Changes in the national intelligence security industry is becoming increasingly rapidly changing due to the development of the network and the use of the Internet. Information also can be called by critical information assets, as well as social infrastructure of the country's reality is that individuals at risk. These professionals make to prevent terrorists to destroy national defense system and network was absolutely necessary. But, Cyber Terror Response NCOs to be responsible for cyber terrorism requires a professional NCOs with advanced knowledge. National Competency Standards(NCS) using a national information security field tutors to conduct training courses teaching - learning model to develop and to apply.

Cyber Terror Threat Elimination Method Study for Safe Smart World (안전한 스마트월드를 위한 사이버 테러위협 제거 방안 연구)

  • Han, Choong-Hee;Han, ChangHee
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.107-113
    • /
    • 2021
  • Recently, large-scale research and efforts aimed at the smart world such as smart city, smart home, smart transportation, and smart care are continuing. As these smart worlds become more common, the expansion of connectivity with the Internet and the threat of cyber terrorism will be inevitable. Increasing the threat of cyber terrorism is increasing the likelihood of a massive disaster and safety accident. Therefore, in this paper, we examine smart worlds that are expanded in various forms and derive the security threat factors that smart worlds have. In addition, it is proposed to block the threat of terrorism from abroad if access from abroad is not required when constructing a smart world. Through this, we intend to present a method to eliminate cyber terror threats for the establishment and operation of a safe smart world.

Systems Approach to Sociotechnical Systems - Cyber Security (사회기술적 시스템의 시스템보안과 시스템엔지니어링)

  • Han, Myeong Deok
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.10 no.1
    • /
    • pp.65-71
    • /
    • 2014
  • As one member of the Korea Society of Systems Engineering (KOSSE) and especially as a member of Sociotechnical Systems session of the KOSSE, I tried to contribute somehow to the activity of KOSSE to help development of better Korea systems. This report is a brief discussion of the need for KOSSE activity in the Cyber Security area especially for the protection of national critical infrastructure systems from cyber terror.

Construction of Intrusion Inspection System Using the Open Sources (오픈 소스를 이용한 침입자 감시시스템 구축)

  • Choi, Byeong-Cheol;Seo, Dong-Il
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.973-976
    • /
    • 2001
  • 본 논문은 공개 소프트웨어를 이용하여 침입자 감시시스템을 효과적으로 구축하는 방법을 제안한다. 침입자 감시시스템의 구축에는 Linux, Apache, PHP, MySQL, Snort, ACID, Tcpwrapper 그리고 phpMyAdmin 이 사용되었으며, 침입자 감시시스템의 자체 보안을 위해서 httpd.conf를 사용한 홈 디렉토리 접근제어 및 Tcpwrapper 의 inetd 방식의 데몬 접근제어를 통해서 관리자만이 시스템에 접근할 수 있도록 하였다. 본 논문의 실험 및 결과에서는 실제 테스트베드를 구축하고, 취약성 점검 툴인 Nessus를 이용하여 침입자 감시시스템을 공격하였다. 실험 결과는 ACID 를 통해서 웹상에서 효과적으로 분석할 수 있었다. 본 논문은 효율적인 네트워크 보안 관리 및 침입자를 감시 및 역추적하기 위해서 제안된 것이다.

  • PDF

Design and Implementation of Watermarked Packet Creation System for the Intruder Traceback (침입자 역추적을 위한 워터마크 패킷 생성 시스템 설계 및 구현)

  • Han, Seung-Wan;Seo, Dong-Il
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05c
    • /
    • pp.2249-2252
    • /
    • 2003
  • 역추적 기술은 해킹이 발생했을 때 해커의 실제적인 위치를 추적하는 기술이다. 해커의 위치를 추적하기 위해 현재 가장 널리 사용되는 방법은 시스템 관리자의 시스템 로그 분석과 시스템 관리자 사이의 상호 정보 교환을 통한 수동적인 역추적 방법이다. 그러나 수동적인 역추적 방법은 수작업으로 수행되는 시스템 로그 분석과 관리자의 개입으로 인하여 땀은 비용이 요구되고 추적 시간의 지연이 발생하기 때문에 이러한 수동적인 방법으로는 해커의 위치를 실시간으로 추적할 수 없다. 만약, 네트워크의 특정 패킷을 식별 가능한 형태로 가공할 수 있다면, 특정 패킷의 이동 경로를 효과적으로 추적할 수 있어 공격자의 위치를 실시간 역추적 하는데 활용될 수 있다. 본 논문에서는 네트워크의 특정 패킷에 의미적인 워터마크를 삽입하여 워터마크 패킷을 생성하는 워터마크 패킷 생성 시스템을 설계하고 구현한다. 이 시스템은 중간 경유지를 활용하여 우회 공격하는 공격자의 실제 위치를 실시간 역추적 하는 ACT 역추적 기법의 구현에 활용되었다.

  • PDF

Limiting user process method based on PAM against DoS attacks (DoS 공격에 대비한 PAM 기반 사용자 프로세스 제한 기법)

  • Lee, Jae-Ung;Jung, Sung-Jae;Bae, Yu-Mi;Jang, Rae-Young;Soh, Woo-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.309-312
    • /
    • 2016
  • Considering that interkorean relations got worse and worse recently, cyber terror of North Korea has seriously become a possibility. Therefore, DoS(Denial of Service), a typical way of cyber terror, is becoming a big issue. Consequently, people are growing more and more interested in information security. Internal DoS attacks, out of a variety of ways of Dos attacks, include disks and memories and shortages of process resources. PAM(Pluggable Authentication Module) is one of the ways of preventing internal DoS attacks in Linux system. This paper provides with a method to internally respond to dos attacks and efficiently prevent shortages of resources by utilizing PAM.

  • PDF

Internet of Things (IoT) Based Modeling for Dynamic Security in Nuclear Systems with Data Mining Strategy (데이터 마이닝 전략을 사용하여 원자력 시스템의 동적 보안을 위한 사물 인터넷 (IoT) 기반 모델링)

  • Jang, Kyung Bae;Baek, Chang Hyun;Kim, Jong Min;Baek, Hyung Ho;Woo, Tae Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.1
    • /
    • pp.9-19
    • /
    • 2021
  • The data mining design incorporated with big data based cloud computing system is investigated for the nuclear terrorism prevention where the conventional physical protection system (PPS) is modified. The networking of terror related bodies is modeled by simulation study for nuclear forensic incidents. It is needed for the government to detect the terrorism and any attempts to attack to innocent people without illegal tapping. Although the mathematical algorithm of the study can't give the exact result of the terror incident, the potential possibility could be obtained by the simulations. The result shows the shape oscillation by time. In addition, the integration of the frequency of each value can show the degree of the transitions of the results. The value increases to -2.61741 in 63.125th hour. So, the terror possibility is highest in later time.