• Title/Summary/Keyword: Cyber-Attacks

검색결과 515건 처리시간 0.028초

ICS 사이버 공격 탐지를 위한 딥러닝 전처리 방법 연구 (A Study on Preprocessing Method in Deep Learning for ICS Cyber Attack Detection)

  • 박성환;김민석;백은서;박정훈
    • 스마트미디어저널
    • /
    • 제12권11호
    • /
    • pp.36-47
    • /
    • 2023
  • 주요 산업현장에서 설비를 제어하는 산업제어시스템(ICS, Industrial Control System)이 네트워크로 다른 시스템과 연결되는 사례가 증가하고 있다. 또한, 이러한 통합과 함께 한 번의 외부 침입이 전체 시스템 마비로 이루어질 수 있는 지능화된 공격의 발달로, 산업제어시스템에 대한 보안에 대한 위험성과 파급력이 증가하고 있어, 사이버 공격에 대한 보호 및 탐지 방안의 연구가 활발하게 진행되고 있으며, 비지도학습 형태의 딥러닝 모델이 많은 성과를 보여 딥러닝을 기반으로 한 이상(Anomaly) 탐지 기술이 많이 도입되고 있다. 어어, 본 연구에서는 딥러닝 모델에 전처리 방법론을 적용하여 시계열 데이터의 이상 탐지성능을 향상시키는 것에 중점을 두어, 그 결과 웨이블릿 변환(WT, Wavelet Transform) 기반 노이즈 제거 방법론이 딥러닝 기반 이상 탐지의 전처리 방법론으로 효과적임을 알 수 있었으며, 특히 센서에 대한 군집화(Clustering)를 통해 센서의 특성을 반영하여 Dual-Tree Complex 웨이블릿 변환을 차등적으로 적용하였을 때 사이버 공격의 탐지성능을 높이는 것에 가장 효과적임을 확인하였다.

Fifteen Deadly Cybersecurity Threats Aimed Covid-19

  • Alaboudi, Abdulellah A.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.123-130
    • /
    • 2021
  • Cybersecurity has been vital for decades and will remain vital with upcoming ages with new technological developments. Every new day brings advancement in technology, which leads to new horizons, and at the same time, it brings new security challenges. Numerous researchers around the globe are continuously striving hard to provide better solutions for the daily basis of new arising security issues. However, the challenges are always there. These challenges become new norms during the current Covid pandemic, where most industries, small industrial enterprises, education, finance, public sectors, etc. were under several attacks and threats globally. The hacker has more opportunities during the pandemic period by shifting most of the operations live. This research enlightened the several cybersecurity attacks and threats during this pandemic time globally. It provided the best possible recommendations to avoid them using the cyber awareness and with appropriately linked training. This research can provide a guideline to the above stated sector by identifying the related attacks.

On-line Shared Platform Evaluation Framework for Advanced Persistent Threats

  • Sohn, Dongsik;Lee, Taejin;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권5호
    • /
    • pp.2610-2628
    • /
    • 2019
  • Advanced persistent threats (APTs) are constant attacks of specific targets by hackers using intelligent methods. All current internal infrastructures are constantly subject to APT attacks created by external and unknown malware. Therefore, information security officers require a framework that can assess whether information security systems are capable of detecting and blocking APT attacks. Furthermore, an on-line evaluation of information security systems is required to cope with various malicious code attacks. A regular evaluation of the information security system is thus essential. In this paper, we propose a dynamic updated evaluation framework to improve the detection rate of internal information systems for malware that is unknown to most (over 60 %) existing static information security system evaluation methodologies using non-updated unknown malware.

위협 헌팅을 적용한 사이버 상황인식 시스템 개발에 관한 연구 (A Study for Cyber Situation Awareness System Development with Threat Hunting)

  • 이재연;최정인;박상현;김병진;현대원;김관영
    • 한국군사과학기술학회지
    • /
    • 제21권6호
    • /
    • pp.807-816
    • /
    • 2018
  • Threat hunting is defined as a process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions. The main concept of threat hunting is to find out weak points and remedy them before actual cyber threat has occurred. And HMM(Hunting Maturity Matrix) is suggested to evolve hunting processes with five levels, therefore, CSOC(Cyber Security Operations Center) can refer HMM how to make them safer from complicated and organized cyber attacks. We are developing a system for cyber situation awareness system with pro-active threat hunting process called unMazeTM. With this unMaze, it can be upgraded CSOC's HMM level from initial level to basic level. CSOC with unMaze do threat hunting process not only detecting existing cyber equipment post-actively, but also proactively detecting cyber threat by fusing and analyzing cyber asset data and threat intelligence.

SCADA 통신 데이터 보호 기술 (Security Technology for SCADA Communication Data)

  • 김학만
    • 한국조명전기설비학회:학술대회논문집
    • /
    • 한국조명전기설비학회 2008년도 추계학술대회 논문집
    • /
    • pp.217-219
    • /
    • 2008
  • SCADA(Supervisory Control and Data Acquisition) is popular control and monitor areas not only in critical infrastructures such as electric power, gas, oil but also industrial applications. Increasement of cyber attack technique and frequency threats secure operation of SCADA systems. Recently many researches have been studied for protecting SCADA system against cyber attacks. This paper introduces overall security technologies in SCADA systems.

  • PDF

국방 사이버 방호체계 구축 생태계 취약점 분석 및 개선방안 (Cyber Defense Analysis and Improvement of Military ecosystem with Information Security Industry)

  • 백재종;문병무
    • 정보보호학회논문지
    • /
    • 제24권6호
    • /
    • pp.1263-1269
    • /
    • 2014
  • 상용제품에 종속적인 국방 사이버 방호체계 생태계는 APT(Advanced Persistent Threat) 등 지능화된 최근 사이버 공격양상에 더욱 취약할 수 있다. 일반무기체계는 대부분 특정 방위산업체가 양산한 관급제품으로 원천기술 등에 대한 보호가 가능하지만 사이버 방호체계는 대부분 상용제품으로 군을 공격하지 않고 산업체 공격을 통해 군 공격이 직 간접적으로 가능하다. 본 논문에서는 국방 사이버 방호체계를 구축해나가는 생태계에 있어서 적 공격의 가상 시나리오를 분석해보고, 이에 대한 취약성 및 위협성을 평가 및 검증하여 안전한 국방 사이버 방호체계 생태계 구축을 위한 기술적, 정책적 방안을 제시한다.

해상 사이버보안 강화방안 연구 (Study on Strengthening the Maritime Sector Cybersecurity)

  • 유윤자;박한선;박혜리
    • 한국항해항만학회:학술대회논문집
    • /
    • 한국항해항만학회 2019년도 춘계학술대회
    • /
    • pp.238-239
    • /
    • 2019
  • 사이버 공격은 통신기능을 수행하는 모든 장비에서 야기될 수 있으며, 통신기술의 발달로 인한 선박과 육상간 연계는 육상부문과 마찬가지로 선박부문 또한 사이버 위협 취약성에 쉽게 노출될 수 있음을 의미한다. 본 논문에서는 해상분야에서의 사이버보안 취약성을 파악하기 위하여 사이버 위협 트렌드 변화를 분석하고 타 산업 사례연구를 통한 해상 사이버보안 강화방안을 제시하였다.

  • PDF

정보전대응을 위한 컴퓨터 포렌식스 기반 모의실험1) (A Simulation Model for the Response of Information-Warfare based on Computer Forensics)

  • 최용락;고병수;박명찬
    • 안보군사학연구
    • /
    • 통권1호
    • /
    • pp.391-421
    • /
    • 2003
  • While the social activities using Internet become generalized, the side effect of the information security violation is increasing steadily and threaten the countries which is not ready to prevent from offensive penetration such as the Information-fighter or Cyber-military. In this paper, we define the concept and characteristics of the modern Information-Warfare and analyze various kinds of threatened elements and also examine the recent trend in other countries. And introducing Computer Forensics raised recently for the confrontation against the security violation in the future, we will show the developing strategies and the necessity in order to response cyber attacks. These developing strategies can be used to ensure and re-trace the technical evidence for the security violation and to achieve the disaster relief effectively. So we hope that can apply them to the actual preparation through developing cyber trial test of the defense and attack for the Information-Warfare.

  • PDF

Cyber Security Approaches for Industrial Control Networks

  • Dillabaugh, Craig;Nandy, Biswajit;Seddigh, Nabil;Wong, Kevin;Lee, Byoung-Joon (BJ)
    • 정보보호학회지
    • /
    • 제26권6호
    • /
    • pp.42-50
    • /
    • 2016
  • Critical infrastructure (CI) such as the electrical grid, transportation systems and water resource systems are controlled by Industrial Control and SCADA (Supervisory Control and Data Acquisition) networks. During the last few years, cyber attackers have increasingly targeted such CI systems. This is of great concern because successful attacks have wide ranging impact and can cause widespread destruction and loss of life. As a result, there is a critical requirement to develop enhanced algorithms and tools to detect cyber threats for SCADA networks. Such tools have key differences with the tools utilized to detect cyber threats in regular IT networks. This paper discusses key factors which differentiate network security for SCADA networks versus regular IT networks. The paper also presents various approaches used for SCADA security and some of the advancements in the area.

Key Distribution Process for Encryption of SCADA Communication using Game Theory applied Multiagent System

  • Kim, Hak-Man;Kang, Dong-Joo
    • 조명전기설비학회논문지
    • /
    • 제23권11호
    • /
    • pp.34-43
    • /
    • 2009
  • SCADA (Supervisory Control and Data Acquisition) system has been used for remote measurement and control on the critical infrastructures as well as modem industrial facilities. As cyber attacks increase on communication networks, SCADA network has been also exposed to cyber security problems. Especially, SCADA systems of energy industry such as electric power, gas and oil are vulnerable to targeted cyber attack and terrorism Recently, many research efforts to solve the problems have made progress on SCADA network security. In this paper, flexible key distribution concept is proposed for improving the security of SCADA network using Multiagent System (MAS).