• 제목/요약/키워드: Information Systems Security Strategy

검색결과 170건 처리시간 0.033초

An Adaptive JPEG Steganographic Method Based on Weight Distribution for Embedding Costs

  • Sun, Yi;Tang, Guangming;Bian, Yuan;Xu, Xiaoyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권5호
    • /
    • pp.2723-2740
    • /
    • 2017
  • Steganographic schemes which are based on minimizing an additive distortion function defined the overall impacts after embedding as the sum of embedding costs for individual image element. However, mutual impacts during embedding are often ignored. In this paper, an adaptive JPEG steganographic method based on weight distribution for embedding costs is proposed. The method takes mutual impacts during embedding in consideration. Firstly, an analysis is made about the factors that affect embedding fluctuations among JPEG coefficients. Then the Distortion Update Strategy (DUS) of updating the distortion costs is proposed, enabling to dynamically update the embedding costs group by group. At last, a kind of adaptive JPEG steganographic algorithm is designed combining with the update strategy and well-known additive distortion function. The experimental result illustrates that the proposed algorithm gains a superior performance in the fight against the current state-of-the-art steganalyzers with high-dimensional features.

Securing SCADA Systems: A Comprehensive Machine Learning Approach for Detecting Reconnaissance Attacks

  • Ezaz Aldahasi;Talal Alkharobi
    • International Journal of Computer Science & Network Security
    • /
    • 제23권12호
    • /
    • pp.1-12
    • /
    • 2023
  • Ensuring the security of Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS) is paramount to safeguarding the reliability and safety of critical infrastructure. This paper addresses the significant threat posed by reconnaissance attacks on SCADA/ICS networks and presents an innovative methodology for enhancing their protection. The proposed approach strategically employs imbalance dataset handling techniques, ensemble methods, and feature engineering to enhance the resilience of SCADA/ICS systems. Experimentation and analysis demonstrate the compelling efficacy of our strategy, as evidenced by excellent model performance characterized by good precision, recall, and a commendably low false negative (FN). The practical utility of our approach is underscored through the evaluation of real-world SCADA/ICS datasets, showcasing superior performance compared to existing methods in a comparative analysis. Moreover, the integration of feature augmentation is revealed to significantly enhance detection capabilities. This research contributes to advancing the security posture of SCADA/ICS environments, addressing a critical imperative in the face of evolving cyber threats.

INFORMATION AND COMMUNICATION TECHNOLOGIES AS A TOOL OF STRATEGY FOR ENSURING THE HIGHER EDUCATION ADAPTABILITY TO THE DIGITAL ECONOMY CHALLENGES

  • Kholiavko, Nataliia;Popelo, Olha;Bazhenkov, Ievgen;Shaposhnykova, Iryna;Sheremet, Oleh
    • International Journal of Computer Science & Network Security
    • /
    • 제21권8호
    • /
    • pp.187-195
    • /
    • 2021
  • The intensification of the processes of the digital economy development is leading to the transformation of the higher education system. Universities are forced to digitalize their own educational, research, international, marketing, financial and economic activities in order to maintain a competitive position in the global market of educational services. The purpose of the article is to study the role of information and communication technologies in the development of the higher education system and to ensure its adaptability to modern challenges of digital economy. To achieve this goal, methods of content analysis, logical generalization, systematization and a structural-functional method are used. In the article, the authors substantiate the urgency of forming a holistic strategy to ensure the adaptability of higher education to the challenges of digital economy. In the structure of this strategy, the information-technological block is singled out and described. The authors specified a set of positive synergetic effects from the introduction of modern information and communication technologies in the activities of universities. The main information threats to the digitalization of higher education related to the protection of personal data and university systems from cyberattacks and fraudulent schemes are identified. In conclusion, the authors detail the measures for the strategy implementation to ensure the adaptability of higher education to digital economy.

The Integrated Cyber SRM(Security Risk Monitoring) System Based on the Patterns of Cyber Security Charts

  • Lee, Gang-Soo;Jung, Hyun Mi
    • 한국컴퓨터정보학회논문지
    • /
    • 제24권11호
    • /
    • pp.99-107
    • /
    • 2019
  • 사이버 보안을 위한 활동인 '위험관리(Risk management)'와 '보안관제(security monitoring)' 업무는 미래에 발생할 보안 위협에 대비하고 보안 사고를 최소화 하는 활동이라는 점에서 깊은 상관관계를 가지고 있다. 또한 위험관리와 보안관제 분야 모두 관리자에게 시각적으로 그 정보자산에 대한 위협을 보여주는 패턴 모델을 적용하는 것이 효과적이다. 검증받은 패턴모델로는 전통적인 품질관리 분야에서 오랫동안 사용되어온 '관리도'(control chart)모델이 존재하지만 정보시스템의 사이버 위험관리와 보안관제에서의 활용은 부족하다. 이에 본 논문에서는 위험관리와 보안관제 시스템을 통합한 사이버 SRM(Security Risk Monitoring)시스템을 설계하였다. SRM은 '관리도'의 패턴을 이용한 '보안대책' (security control)의 적용 전략을 제시한다. 보안대책은 기존의 표준화된 보안대책 집합인 ISMS, NIST SP 800-53, CC를 통합적으로 적용하였다. 이를 활용하여 2014~2018년 까지 4년간 우리나라사이버위기 경보동향을 분석하였고 이는 향후 보다 유연한 보안대책 수립을 가능하게 한다.

국가 사이버테러대응 미래 발전전략 수립에 관한 연구 (A Study on Establishing of the Future Development Strategy for National Cyber Terror Response)

  • 김민수;양정모
    • 융합보안논문지
    • /
    • 제20권1호
    • /
    • pp.15-24
    • /
    • 2020
  • 사이버터러나 사이버전(cyber warfare)은 더 이상 가상적 상황이 아닌 현실적이며, 실체적인 안보상황으로 상대국의 군사지휘체계는 물론 통신, 에너지, 금융, 수송체계 등 국가 주요기능 무력화의 전쟁 개념의 확대로 재인식과 국가적 차원에서의 사이버보안 미래전략 수립이 필요하다. 각 국의 사이버전(戰) 동향 분석 및 국내 사이버전(戰) 현황 분석을 통해 사이버보안 기술개발과 산업육성, 그리고 인력양성 전략 마련과 기존의 정보보호 정책과 법·제도을 바탕으로 신규 정책수요에 대한 체계적 발굴과 이를 통해 지속적 발생 가능한 국가적 위기를 효율적으로 관리하고, 효과적이며 능동적으로 사이버전(戰)에 대응할 수 있는 중·장기적 사이버보안 미래전략 수립에 대하여 제안한다.

Cyber attack taxonomy for digital environment in nuclear power plants

  • Kim, Seungmin;Heo, Gyunyoung;Zio, Enrico;Shin, Jinsoo;Song, Jae-gu
    • Nuclear Engineering and Technology
    • /
    • 제52권5호
    • /
    • pp.995-1001
    • /
    • 2020
  • With the development of digital instrumentation and control (I&C) devices, cyber security at nuclear power plants (NPPs) has become a hot issue. The Stuxnet, which destroyed Iran's uranium enrichment facility in 2010, suggests that NPPs could even lead to an accident involving the release of radioactive materials cyber-attacks. However, cyber security research on industrial control systems (ICSs) and supervisory control and data acquisition (SCADA) systems is relatively inadequate compared to information technology (IT) and further it is difficult to study cyber-attack taxonomy for NPPs considering the characteristics of ICSs. The advanced research of cyber-attack taxonomy does not reflect the architectural and inherent characteristics of NPPs and lacks a systematic countermeasure strategy. Therefore, it is necessary to more systematically check the consistency of operators and regulators related to cyber security, as in regulatory guide 5.71 (RG.5.71) and regulatory standard 015 (RS.015). For this reason, this paper attempts to suggest a template for cyber-attack taxonomy based on the characteristics of NPPs and exemplifies a specific cyber-attack case in the template. In addition, this paper proposes a systematic countermeasure strategy by matching the countermeasure with critical digital assets (CDAs). The cyber-attack cases investigated using the proposed cyber-attack taxonomy can be used as data for evaluation and validation of cyber security conformance for digital devices to be applied, and as effective prevention and mitigation for cyber-attacks of NPPs.

정보보호 분야 직무별 필요 지식 및 기술 분석 (Analysis on Knowledge and Skills for Information Security Professionals)

  • 전효정;유혜원;김태성
    • 경영정보학연구
    • /
    • 제10권2호
    • /
    • pp.253-267
    • /
    • 2008
  • 정보보호의 중요성이 확산되면서 국내 정보보호 산업의 발전과 함께 정보보호 전문인력 양성을 위한 노력이 다각도로 이루어져왔다. 특히 정보보호 인력 질적인 양성을 위해서는 보다 체계적인 정보보호 교육 시스템이 필요하다는 전제 아래, 정보보호 분야 지식 및 기술 분석에 대한 연구가 활발히 진행되어 왔다. 본 연구는 정보보호 전문인력이 갖추어야 할 지식 및 기술에 대해 정보보호 주 직무군에 따른 차이를 분석하고 있다. 먼저 문헌고찰과 전문가 조사를 통해 55개의 정보보호 분야 전문지식 및 기술을 도출하였다. 51개 조사대상 기술 및 지식에 대해 현업에 종사하고 있는 정보보호 전문인력을 대상으로 정보보호 업무를 수행하기 위해 필요한 정도와 숙련 정도를 조사하였다. 최종적으로는 정보보호 분야의 4개 주 직무군에 따른 정보보호 전문지식 및 기술에 대한 필요정도 차이를 분석하였다. 이를 통해 직무수행에 필요한 지식 및 기술을 도출하고, 수행 직무에서의 수요에 기반하여 정보보호 분야의 훈련 및 교육 체계를 수립하는 데에 기여할 수 있을 것이다.

QoS Guaranteed Secure Network Service Realization using Global User Management Framework (GUMF);Service Security Model for Privacy

  • Choi, Byeong-Cheol;Kim, Kwang-Sik;Seo, Dong-Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2005년도 ICCAS
    • /
    • pp.1586-1589
    • /
    • 2005
  • GUMF (Global User Management Framework) that is proposed in this research can be applied to next generation network such as BcN (Broadband convergence Network), it is QoS guaranteed security framework for user that can solve present Internet's security vulnerability. GUMF offers anonymity for user of service and use the user's real-name or ID for management of service and it is technology that can realize secure QoS. GUMF needs management framework, UMS (User Management System), VNC (Virtual Network Controller) etc. UMS consists of root UMS in country dimension and Local UMS in each site dimension. VNC is network security equipment including VPN, QoS and security functions etc., and it achieves the QoSS (Quality of Security Service) and CLS(Communication Level Switching) functions. GUMF can offer safety in bandwidth consumption attacks such as worm propagation and DoS/DDoS, IP spoofing attack, and current most attack such as abusing of private information because it can offer the different QoS guaranteed network according to user's grades. User's grades are divided by 4 levels from Level 0 to Level 3, and user's security service level is decided according to level of the private information. Level 3 users that offer bio-information can receive secure network service that privacy is guaranteed. Therefore, GUMF that is proposed in this research can offer profit model to ISP and NSP, and can be utilized by strategy for secure u-Korea realization.

  • PDF

발전 제어시스템의 융합보안 연구 (A Study on Convergence Security of Power Generation Control System)

  • 이대성
    • 융합보안논문지
    • /
    • 제18권5_1호
    • /
    • pp.93-98
    • /
    • 2018
  • 한국수력원자력, 한국전력공사, 한국남동발전 등의 발전 제어시스템은 전력을 공급하는 국가의 주요 인프라 시설로 악의적인 해킹 공격이 진행될 경우 그 피해는 상상을 초월한다. 실제로 한국수력원자력은 해킹 공격을 당하여 내부정보가 유출되는 등 사회적인 큰 문제를 야기하였다. 본 연구에서는 최근 이슈가 되고 있는 융합보안 연구에 대해 전력회사 중심의 발전 제어시스템을 대상으로 그 환경을 분석하고, 현황을 분석하여 다양한 발전 제어시스템의 안정화를 위한 전략체계 수립과 대응책을 제시하고자 한다. 다양한 물리적 보안시스템(시설), IT 보안시스템, 출입통제시스템 등에서 나오는 데이터 형태를 정규화하고 통합하여 융합인증을 통해 전체 시스템을 통제하고, 융합관제를 통해 위험을 탐지하는 방법을 제안한다.

  • PDF

마이크로컴퓨터의 네트워크화 여부가 보안 위협 인식에 미치는 영향 : 군조직을 대상으로 (The Effects of Microcomputer Networking on the Perception of Threats to Security : the Military User크s Case)

  • 이찬희;김준석;서길수
    • 정보기술과데이타베이스저널
    • /
    • 제6권2호
    • /
    • pp.1-18
    • /
    • 1999
  • The purpose of this study was to identify the effect of microcomputer networking on user perception of potential threats to security employing user attitudes as a moderating variable. A research model consisting of microcomputer networking as the independent variable, user perception of potential threats to security as the dependent variable, and user attitude toward security control as the moderating variable was developed through literature review. The results of this study provide an empirical evidence of the importance of environmental change(information systems networking) on user perception of potential threats to security. Further-more the result imply that in order to improve security performance through the reinforcement of user perception of threats to security in the organization, user attitudes should be made favorable.

  • PDF