• Title/Summary/Keyword: Defense-In-Depth Strategy

Search Result 16, Processing Time 0.021 seconds

A Comparative Study on the Information Security Strategy of Korean I-Government with Defense-in-Depth Strategy of DoD (미 국방성의 종심방어전략과 전자정부의 정보보호전략에 관한 비교 연구)

  • Song Woon-ho;Jeong Wook-jae;Kim Joon-bum;Kang Han-seung
    • The KIPS Transactions:PartC
    • /
    • v.12C no.5 s.101
    • /
    • pp.659-664
    • /
    • 2005
  • Advanced countries overhaul government workflows using IT, which not only enhances efficiency and productivity, but paves the way to a 'e-Government' offering prompt, quality service for citizens. This research analyzes the DiD(Defense-in-Depth Strategy) and compares the information protection strategy of Korean e-Government with DiD for reliable and safe e-Government's build.

The Design of Anti-DDoS System using Defense on Depth (다단계 방어기법을 활용한 DDoS 방어시스템 설계)

  • Seo, Jin-Won;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.679-689
    • /
    • 2012
  • There were clear differences between the DDoS attack on 7th July 2009 and the rest of them prior to the attack. Despite It had emitted relatively small sized packets per infected PC, the attack was very successful making use of HTTP Flooding attack by aggregating small sized packets from the well sized zombie network. As the objective of the attack is not causing permanent damage to the target system but temporal service disruption, one should ensure the availability of the target server by deploying effective defense strategy. In this paper, a novel HTTP based DDoS defense mechanism is introduced with capacity based defense-in-depth strategy.

OBSERVABILITY-IN-DEPTH: AN ESSENTIAL COMPLEMENT TO THE DEFENSE-IN-DEPTH SAFETY STRATEGY IN THE NUCLEAR INDUSTRY

  • Favaro, Francesca M.;Saleh, Joseph H.
    • Nuclear Engineering and Technology
    • /
    • v.46 no.6
    • /
    • pp.803-816
    • /
    • 2014
  • Defense-in-depth is a fundamental safety principle for the design and operation of nuclear power plants. Despite its general appeal, defense-in-depth is not without its drawbacks, which include its potential for concealing the occurrence of hazardous states in a system, and more generally rendering the latter more opaque for its operators and managers, thus resulting in safety blind spots. This in turn translates into a shrinking of the time window available for operators to identify an unfolding hazardous condition or situation and intervene to abate it. To prevent this drawback from materializing, we propose in this work a novel safety principle termed "observability-in-depth". We characterize it as the set of provisions technical, operational, and organizational designed to enable the monitoring and identification of emerging hazardous conditions and accident pathogens in real-time and over different time-scales. Observability-in-depth also requires the monitoring of conditions of all safety barriers that implement defense-in-depth; and in so doing it supports sensemaking of identified hazardous conditions, and the understanding of potential accident sequences that might follow (how they can propagate). Observability-in-depth is thus an information-centric principle, and its importance in accident prevention is in the value of the information it provides and actions or safety interventions it spurs. We examine several "event reports" from the U.S. Nuclear Regulatory Commission database, which illustrate specific instances of violation of the observability-in-depth safety principle and the consequences that followed (e.g., unmonitored releases and loss of containments). We also revisit the Three Mile Island accident in light of the proposed principle, and identify causes and consequences of the lack of observability-in-depth related to this accident sequence. We illustrate both the benefits of adopting the observability-in-depth safety principle and the adverse consequences when this principle is violated or not implemented. This work constitutes a first step in the development of the observability-in-depth safety principle, and we hope this effort invites other researchers and safety professionals to further explore and develop this principle and its implementation.

A Study on the Information Security Technical Architecture focusing on the Primary Defense Information Infrastructure (국방주요정보통신기반시설 중심의 정보보호기술구조 연구)

  • Choi, Ji-Na;Nam, Kil-Hyun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.9 no.1 s.24
    • /
    • pp.80-88
    • /
    • 2006
  • The purpose of this thesis is to research and propose a practical Information Security Technical Architecture on Primary Defense Information Infrastructure with regard to requirement of information security. The scope of this research is limited to national defense information master plan & security rule, and U.S. DoD's IATF is used to plan a detailed structure. The result of this research can be used as a guide book for providing security for Army IT infrastructure now and in the future as well as to devise a plan for research and development in information protection technology.

A research on cyber kill chain and TTP by APT attack case study (APT 공격 사례 분석을 통한 사이버 킬체인과 TTP에 대한 연구)

  • Yoon, Youngin;Kim, Jonghwa;Lee, Jaeyeon;Yu, Sukdea;Lee, Sangjin
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.91-101
    • /
    • 2020
  • We analyzed APT attack cases that occurred overseas in the past using a cyber kill chain model and a TTP model. As a result of the analysis, we found that the cyber kill chain model is effective in figuring out the overall outline, but is not suitable for establishing a specific defense strategy, however, TTP model is suitable to have a practical defense system. Based on these analysis results, it is suggested that defense technology development which is based on TTP model to build defense-in-depth system for preparing cyber attacks.

Concept of Strategy in Organizational Information Security (조직 차원의 정보보안 전략의 개념)

  • Park, Sang-Seo
    • Convergence Security Journal
    • /
    • v.7 no.3
    • /
    • pp.15-24
    • /
    • 2007
  • As the importance of information security increases, organizations are employing various security countermeasures into their information systems. However, they are not being adapted based on a strategic framework. Therefore this paper researches on the concept of the strategy in organizational information security. This paper studies literatures to find out how information security strategies have been discussed and what types of them have been proposed until now. This paper contributes to the formation of concept of strategy and classification of them by focusing on strategies themselves in organizational information security.

  • PDF

Bayesian Rules Based Optimal Defense Strategies for Clustered WSNs

  • Zhou, Weiwei;Yu, Bin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5819-5840
    • /
    • 2018
  • Considering the topology of hierarchical tree structure, each cluster in WSNs is faced with various attacks launched by malicious nodes, which include network eavesdropping, channel interference and data tampering. The existing intrusion detection algorithm does not take into consideration the resource constraints of cluster heads and sensor nodes. Due to application requirements, sensor nodes in WSNs are deployed with approximately uncorrelated security weights. In our study, a novel and versatile intrusion detection system (IDS) for the optimal defense strategy is primarily introduced. Given the flexibility that wireless communication provides, it is unreasonable to expect malicious nodes will demonstrate a fixed behavior over time. Instead, malicious nodes can dynamically update the attack strategy in response to the IDS in each game stage. Thus, a multi-stage intrusion detection game (MIDG) based on Bayesian rules is proposed. In order to formulate the solution of MIDG, an in-depth analysis on the Bayesian equilibrium is performed iteratively. Depending on the MIDG theoretical analysis, the optimal behaviors of rational attackers and defenders are derived and calculated accurately. The numerical experimental results validate the effectiveness and robustness of the proposed scheme.

Patent Trend Analysis of Unmanned Ground Vehicles(UGV) using Topic Modeling (토픽모델링을 이용한 무인지상차량(UGV) 특허 동향 분석)

  • Kihwan Kim;Chasoo Jun;Chiehoon Song;Jeonghwan Jeon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.27 no.3
    • /
    • pp.395-405
    • /
    • 2024
  • This study provides a thorough examination of Unmanned Ground Vehicles(UGVs), focusing on crucial technologies and trends across major global markets. It includes an in-depth patent analysis revealing the dominant positions of the United States and the European Union in this field. Additionally, it underscores substantial advancements made by China, Japan, and Korea since 2010. Using Latent Dirichlet Allocation(LDA)-based patent text mining, the study identified key technology areas in UGV development, such as advanced control systems, navigation technologies, power supply mechanisms, and sensing and communication tools. Through linear regression analysis, the study predicted the future paths of these technology areas, offering important insights into the evolving world of UGV technology. The findings can provide strategic guidance for stakeholders in the defense, commercial, and academic sectors, pointing out the future directions in UGV advancements.

Application of Analytical Hierarchy Process in Analyzing the Priorities of Strategy for Improving the Army Military Foodservice (계층분석과정(AHP)을 이용한 육군 군대급식 개선과제의 실행 우선순위 분석)

  • Baek, Seung-Hee
    • Korean Journal of Community Nutrition
    • /
    • v.19 no.1
    • /
    • pp.51-59
    • /
    • 2014
  • The current exploratory study presents the Analytical Hierarchy Process (AHP) as a potential decision-making method to obtain the relative weights of alternatives through pairwise comparison in the context of hierarchical structure. The aim of this study was to elicit prior strategy to improve army military foodservice. Content analysis and seven times of in-depth interview from 13 officers of the Ministry of National Defense were conducted to develop the hierarchical structure for AHP analysis. Questionnaires were distributed to 61 foodservice managers and 39 dietitian and military foodservice officers. The highest-ranked strategy for improving military foodservice was the 'renewal of the kitchen facilities' (0.2578), followed by 'enlargement of foodservice operating staffs' (0.2345), 'specialization of sanitation & foodservice management' (0.2222), 'Practical foodservice budget control' (0.1394), and 'menu variety & standardized recipe' (0.1281). 'Enlargement of foodservice facilities' (0.3995), 'increase the no. of kitchen police' (0.3463), 'sanitary & cooking training reinforcement of kitchen police' (0.4445), 'management of foodservice budget by total amount' (0.5043), and 'standardization of mass cooking' (0.3571) were the highest overweight item in each strategy. The study also compared the relative weights of alternatives of foodservice managers with that of dietitians and military foodservice officers. Those two groups revealed some difference in their priority of important strategy regarding army military foodservice. The results of this study would provide the data for making a policy or compilation of the budget regarding army military foodservice.