• Title/Summary/Keyword: DoS Attacks

Search Result 219, Processing Time 0.024 seconds

Counter-Terrorism Policy of Mongolia: Raising Awareness on Terrorism (몽골의 대테러 정책: 테러인식 제고)

  • Urangoo, Khash-Erdene;Lee, Ju-Lak
    • Korean Security Journal
    • /
    • no.60
    • /
    • pp.155-173
    • /
    • 2019
  • This study touches upon the challenges of globalization, in which terrorism is one of the most brutal forms of criminal violence targeting innocent people. No country is immune from terrorist attacks, and no person is immune from becoming a victim. Interest in this topic is increasing as terrorism, in all its forms and manifestations, in its scale and intensity, and in its inhumanity and cruelty, is now becoming one of the most acute and pressing problems of global importance. Legal regulations passed in Mongolia in 2004 have established a structure to prevent and detect terrorist threats. However, the country's anti-terrorism policy should be improved with respect to its global counter-terrorism strategy. Because Mongolia is a comparatively safe country in the region, the people do not consider terrorism to be a real threat. This study aims to suggest methods to quickly raise awareness and create a security culture to improve Mongolia's long-term terrorism prevention policy. In particular, the authors review Mongolia's anti-terrorism policy, focusing on legal regulations, and suggest education methods to raise terrorism awareness for the public as a primary preventive measure. The study also presents a comparative analysis and a summary conclusion by examining international legal acts, conventions on new manifestations of terrorism, the foundations of laws and regulations of Mongolia, and related research on terrorism.

A study on the guidelines for the Military Continuity of Operations Plan (군 COOP전략 지침 수립을 위한 연구)

  • Park, Chanyoung;Park, Seongsu
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.1
    • /
    • pp.291-298
    • /
    • 2022
  • Unexpected massive disasters have occurred around the world, causing enormous socio-economic damage. The military has long been enacting laws, organizing organizations and establishing systems for crisis and disaster management, but it did not consider the situation when military essential functions were suspended due to unpredictable and massive disasters. With the September 11 terrorist attacks, the U.S. military has developed COOP strategy aimed at continuing military essential functions in all crisis, and is contributed to national continuity by ensuring uninterrupted national security functions. Korean military has established a crisis and disaster management system, but focuses on managing and controlling disasters and crisis situations. Korean military needs a system to guarantee military essential functions even in national crisis beyond its management capabilities. In this study, We compared and reviewed the U.S. administration and military COOP guidelines and directives, ISO22301 international standards., and developed planning guidelines suitable for the Korean military situation by responding to detailed items based on ISO22301. In particular, the U.S. military(DoD, Army, Navy, Air Force) COOP guidelines were drawn and incorporated into the guidelines(such as protection and succession of command authority, the fulfillment of essential functions and operational security, etc.). The planning guidelines are expected to be used as reference materials for the introduction of COOP systems in the military and the establishment of plans in the future.

Security Threats Analysis for Network-based Mobile IPv6 (네트워크 기반 Mobile IPv6 보안 취약점 분석)

  • Kim, Hyun-Gon;Seo, Jae-Hyeon;Oh, Byeong-Kyun;Ahn, Tae-Nam;Kim, Jin-Hyung
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.10
    • /
    • pp.137-147
    • /
    • 2007
  • In the host-based Mobile IPv6, a mobile node is responsible for doing the signaling to its home agent to enable session continuity as it moves between subnets. To remove the mobile node's signalling processing load, the network-based Mobile IPv6 has been proposed recently. It allows session continuity for a mobile node without its involvement in mobility management. The proxy mobility agent in the network performs the signaling and does the mobility management on behalf of the mobile node. However, to make secure communications for a mobile node, security mechanisms against diverse attacks should be adopted. To do this, first of all security threats to the network-based Mobile IPv6 should be also identified and analyzed. Potential attack objectives may be to consume network services at the cost of a legitimate mobile node and, eavesdropping and fabrication of user traffic through interception of a mobile node's communications. This paper identifies and discusses security threats to the network-based Mobile IPv6 in details. The results of threats analysis are limited to threats that are peculiar to the network-based Mobile IPv6 except threats to IPv6 in general.

A Case Report of Herpes Zoster Patient Improved by the East-west Medical Combined Treatment (대상포진에 대한 한양방 병행치료 치험 1례)

  • Cho, Ye Eun;Lee, Seung Min;Yoon, Kang Hyun;Lim, Ji Seok;Kim, Ji Hye;Choi, Do Young;Lee, Jae Dong
    • Journal of Acupuncture Research
    • /
    • v.31 no.1
    • /
    • pp.177-186
    • /
    • 2014
  • Objectives : The aim of this study is to report a case of a 51-year-old patient with Herpes zoster, whose symptoms were relieved within five weeks after the East-west medical combined treatment. Methods : A Herpes zoster patient with extreme pain around the right lower ribs and lower back was admitted into the Korean medicine hospital. Bee venom acupuncture was applied directly onto the site of pain and electroacupuncture was applied on $GV_6-BL_{20}$, inferior site of spinous process of the 12th thoracic vertebra-$BL_{21}$, $GV_5-BL_{22}$, $GV_4-BL_{23}$ six times a week. Moxibustion was applied on $BL_{49}$, $BL_{50}$, $BL_{51}$, $BL_{52}$, $GB_{25}$, $LR_{13}$ six times a week, and the patient took daily doses of herbal medicine and western medicines such as anticonvulsants, analgesics, antiepileptics. The patient's symptoms were evaluated with numeric rating scale(NRS) and neuropathic pain scale(NPS). Results : The results were as follows: 1. After the East-west medical combined treatment, the NRS grade decreased from 8 to 1. 2. On the neuropathic pain scale, the patient's symptoms changed from deep sharp pain and burning sensation to superficial dull pain and coldness. Sensitivity to touch, discomfort, and itchiness also decreased. Sudden attacks of pain appeared 14 to 21 days after onset, but disappeared after final treatment. Conclusions : The results of the above patient suggests that the East-west medical combined treatment may be effective for total remission of herpes zoster. Further research is needed to confirm such effects.

The Work of Mourning of 9/11 in U. S. A (미국의 9/11 애도 작업에 관한 고찰 : 9/11추모관 건립과 테러와의 전쟁을 중심으로)

  • OH, bonghee
    • Cross-Cultural Studies
    • /
    • v.38
    • /
    • pp.89-113
    • /
    • 2015
  • This paper explores the work of mourning of 9/11 in the United States, focusing on the project of building the National September 11 Memorial managed by the Lower Manhattan Development Corporation(LMDC) and the War on Terror declared by the George W. Bush administration in the wake of 9/11. This paper first looks at the project of building the Natioanl September 11 Memorial and considers what was at stake in achieving this project. It also examines the limitations of the project. This paper argues that, in spite of the efforts to mourn the victims in significant and meaningful ways, the work of mourning in the memorial project fails at least in two respects. First, the memorial project "began so soon" right after 9/11 that the victims' families were not given enough time to mourn their loved ones. Second, the project were permeated with American nationalism and patriotism, which made the 316 non-American victims of 9/11 invisible and forgotten. Then, it goes on to examine the War on Terror because the War on Terror epitomized the failure of mourning due to these causes. In his address to the nation delivered on the very day of 9/11, President George W. Bush stated that "America was targeted for the attack because we're the brightest beacon for freedom and opportunity in the world" and that the terrorists failed to threaten America into chaos. He also stated that America is in "the war against terrorism." These statements were a futile reassertion of the illusion of American invulnerability and a prohibition of mourning in favor of violent military responses to 9/11. American nationalism also underlies Bush's official naming of September 11 as "Patriot Day." The victims were sacrificed because they were at the site when terrorists attacked, which implies that their death had nothing to do with American patriotism. Naming September 11 as Patriot Day was an act of imbuing the absurdity of the victims' death with a false meaning and an act of forgetting the non-American victims. The failure of the work of mourning of 9/11 consisted in the inability to recognize human vulnerability and interdependence and the inability to mourn not only American victims but also non-American victims killed in 9/11 and the War on Terror. A meaningful and significant mourning could be possible when we realizes that all human beings are exposed to one another and their lives are interdependent on one another. September Eleventh Families for Peaceful Tomorrows well demonstrated this kind of mourning. When most Americans supported violent retaliations, Peaceful Tomorrows made pleas for nonviolent responses to 9/11. Turning their grief into action for peace, its members work "to create a safer and more peaceful world for everyone," not only for Americans. Their effort to mourn in meaningful and nonviolent ways delivers the message that a disaster like 9/11 should not happen anywhere.

A Study on Constructing a RMF Optimized for Korean National Defense for Weapon System Development (무기체계 개발을 위한 한국형 국방 RMF 구축 방안 연구)

  • Jung keun Ahn;Kwangsoo Cho;Han-jin Jeong;Ji-hun Jeong;Seung-joo Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.827-846
    • /
    • 2023
  • Recently, various information technologies such as network communication and sensors have begun to be integrated into weapon systems that were previously operated in stand-alone. This helps the operators of the weapon system to make quick and accurate decisions, thereby allowing for effective operation of the weapon system. However, as the involvement of the cyber domain in weapon systems increases, it is expected that the potential for damage from cyber attacks will also increase. To develop a secure weapon system, it is necessary to implement built-in security, which helps considering security from the requirement stage of the software development process. The U.S. Department of Defense is implementing the Risk Management Framework Assessment and Authorization (RMF A&A) process, along with the introduction of the concept of cybersecurity, for the evaluation and acquisition of weapon systems. Similarly, South Korea is also continuously making efforts to implement the Korea Risk Management Framework (K-RMF). However, so far, there are no cases where K-RMF has been applied from the development stage, and most of the data and documents related to the U.S. RMF A&A are not disclosed for confidentiality reasons. In this study, we propose the method for inferring the composition of the K-RMF based on systematic threat analysis method and the publicly released documents and data related to RMF. Furthermore, we demonstrate the effectiveness of our inferring method by applying it to the naval battleship system.

Adaptive Partitioning of the Global Key Pool Method using Fuzzy Logic for Resilience in Statistical En-Route Filtering (통계적 여과기법에서 훼손 허용도를 위한 퍼지 로직을 사용한 적응형 전역 키 풀 분할 기법)

  • Kim, Sang-Ryul;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.4
    • /
    • pp.57-65
    • /
    • 2007
  • In many sensor network applications, sensor nodes are deployed in open environments, and hence are vulnerable to physical attacks, potentially compromising the node's cryptographic keys. False sensing report can be injected through compromised nodes, which can lead to not only false alarms but also the depletion of limited energy resource in battery powered networks. Fan Ye et al. proposed that statistical en-route filtering scheme(SEF) can do verify the false report during the forwarding process. In this scheme, the choice of a partition value represents a trade off between resilience and energy where the partition value is the total number of partitions which global key pool is divided. If every partition are compromised by an adversary, SEF disables the filtering capability. Also, when an adversary has compromised a very small portion of keys in every partition, the remaining uncompromised keys which take a large portion of the total cannot be used to filter false reports. We propose a fuzzy-based adaptive partitioning method in which a global key pool is adaptively divided into multiple partitions by a fuzzy rule-based system. The fuzzy logic determines a partition value by considering the number of compromised partitions, the energy and density of all nodes. The fuzzy based partition value can conserve energy, while it provides sufficient resilience.

  • PDF

A novel power trace aligning method for power analysis attacks in mobile devices (모바일 기기에서의 전력 분석 공격을 위한 새로운 전력 신호 정렬 방법)

  • Lee, Yu-Ri;Kim, Wan-Jin;Lee, Young-Jun;Kim, Hyoung-Nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.153-166
    • /
    • 2011
  • Recent trends in mobile device market whose services are rapidly expanding to provide wireless internet access are drawing people's attention to mobile security. Especially, since threats to information leakage are reaching to the critical level due to the frequent interchange of important data such as personal and financial information through wireless internet, various encryption algorithms has been developed to protect them. The encryption algorithms confront the serious threats by the appearance of side channel attack (SCA) which uses the physical leakage information such as timing, and power consumption, though the their robustness to threats is theoretically verified. Against the threats of SCA, researches including the performance and development direction of SCA should precede. Among tile SCA methods, the power analysis (PA) attack overcome this misalignment problem. The conventional methods require large computational power and they do not effectively deal with the delay changes in a power trace. To overcome the limitation of the conventional methods, we proposed a novel alignment method using peak matching. By computer simulations, we show the advantages of the proposed method compared to the conventional alignment methods.

Prioritization Analysis for Cyber Security Enhancement at Busan Port Container Terminal (부산항 컨테이너 터미널 사이버 보안 강화를 위한 우선순위 분석)

  • Ha, Do-Yeon;Kim, Chi-Yeol;Kim, Yul-Seong
    • Journal of Korea Port Economic Association
    • /
    • v.40 no.1
    • /
    • pp.1-14
    • /
    • 2024
  • The port industry has been actively adopting Fourth Industrial Revolution technologies, leading to transformations in port infrastructure, such as automated and smart ports. While these changes have improved port efficiency, they have also increased the potential for Cyber Security incidents, including data leaks and disruptions in terminal operations due to ransomware attacks. Recognizing the need to prioritize Cyber Security measures, a study was conducted, focusing on Busan Port's rapidly automating container terminal in South Korea. The results of the Eisenhower Matrix analysis identified legal and regulatory factors as a top priority in the first quadrant, with educational systems, workforce development, network infrastructure, and policy support in the third quadrant. Subsequently, a Borich Needs Analysis revealed that the highest priority was given to legal improvements in security management systems, while the development of Cyber Security professionals ranked lowest. This study provides foundational research for enhancing Cyber Security in domestic container terminals and offers valuable insights into their future direction.