• Title/Summary/Keyword: MITRE

Search Result 34, Processing Time 0.017 seconds

3-Step Security Vulnerability Risk Scoring considering CVE Trends (CVE 동향을 반영한 3-Step 보안 취약점 위험도 스코어링)

  • Jihye, Lim;Jaewoo, Lee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.27 no.1
    • /
    • pp.87-96
    • /
    • 2023
  • As the number of security vulnerabilities increases yearly, security threats continue to occur, and the vulnerability risk is also important. We devise a security threat score calculation reflecting trends to determine the risk of security vulnerabilities. The three stages considered key elements such as attack type, supplier, vulnerability trend, and current attack methods and techniques. First, it reflects the results of checking the relevance of the attack type, supplier, and CVE. Secondly, it considers the characteristics of the topic group and CVE identified through the LDA algorithm by the Jaccard similarity technique. Third, the latest version of the MITER ATT&CK framework attack method, technology trend, and relevance between CVE are considered. We used the data within overseas sites provide reliable security information to review the usability of the proposed final formula CTRS. The scoring formula makes it possible to fast patch and respond to related information by identifying vulnerabilities with high relevance and risk only with some particular phrase.

Efforts against Cybersecurity Attack of Space Systems

  • Jin-Keun Hong
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.4
    • /
    • pp.437-445
    • /
    • 2023
  • A space system refers to a network of sensors, ground systems, and space-craft operating in space. The security of space systems relies on information systems and networks that support the design, launch, and operation of space missions. Characteristics of space operations, including command and control (C2) between space-craft (including satellites) and ground communication, also depend on wireless frequency and communication channels. Attackers can potentially engage in malicious activities such as destruction, disruption, and degradation of systems, networks, communication channels, and space operations. These malicious cyber activities include sensor spoofing, system damage, denial of service attacks, jamming of unauthorized commands, and injection of malicious code. Such activities ultimately lead to a decrease in the lifespan and functionality of space systems, and may result in damage to space-craft and, lead to loss of control. The Cybersecurity Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) matrix, proposed by Massachusetts Institute of Technology Research and Engineering (MITRE), consists of the following stages: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command & Control, Exfiltration, and Impact. This paper identifies cybersecurity activities in space systems and satellite navigation systems through the National Institute of Standards and Technology (NIST)'s standard documents, former U.S. President Trump's executive orders, and presents risk management activities. This paper also explores cybersecurity's tactics attack techniques within the context of space systems (space-craft) by referencing the Sparta ATT&CK Matrix. In this paper, security threats in space systems analyzed, focusing on the cybersecurity attack tactics, techniques, and countermeasures of space-craft presented by Space Attack Research and Tactic Analysis (SPARTA). Through this study, cybersecurity attack tactics, techniques, and countermeasures existing in space-craft are identified, and an understanding of the direction of application in the design and implementation of safe small satellites is provided.

Reinforcement Learning-Based APT Attack Response Technique Utilizing the Availability Status of Assets (방어 자산의 가용성 상태를 활용한 강화학습 기반 APT 공격 대응 기법)

  • Hyoung Rok Kim;Changhee Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.1021-1031
    • /
    • 2023
  • State-sponsored cyber attacks are highly impactful because they are carried out to achieve pre-planned goals. As a defender, it is difficult to respond to them because of the large scale of the attack and the possibility that unknown vulnerabilities may be exploited. In addition, overreacting can reduce the availability of users and cause business disruption. Therefore, there is a need for a response policy that can effectively defend against attacks while ensuring user availability. To solve this problem, this paper proposes a method to collect the number of processes and sessions of defense assets in real time and use them for learning. Using this method to learn reinforcement learning-based policies on a cyber attack simulator, the attack duration based on 100 time-steps was reduced by 27.9 time-steps and 3.1 time-steps for two attacker models, respectively, and the number of "restore" actions that impede user availability during the defense process was also reduced, resulting in an overall better policy.

Comparative growth and development of the metacercariae of Fibricola seorszensis (Trematoda: Diplostomidae) in vitro, in vivo and on the chick chorioallantois (Fibricolu seoulensis (Trematoda: Diplostomidae) 피낭유충의 in vitro, in vivo 및 닭 장뇨막 상에서의 생존 및 발육 성장 비교)

  • 서병설
    • Parasites, Hosts and Diseases
    • /
    • v.27 no.4
    • /
    • pp.231-248
    • /
    • 1989
  • The growth and development of the metacercariae of F. seoulensis cultivated in vitro or on the chick chorioallantois were assessed by comparison with the optimum process of maturation in albino rats and new born chickens. The process of maturation was divided for convenience into six stages: Stage 1 ; cell multiplication, Stage 2; body shaping, Stage 3; separation of genital anlagen, Stage :1 organogeny, Stage 5; gametogony, and Stage 6: oviposition. In Hank's and Tyrode's .solutions, the metacercariae were alive up to 200 days or more at $4^{\circ}C$ without any development. The in vivo maturation process in rats or chicks was as follows: stage 1 from 6 hours; stage 2 from 24 hours; stage 3 from 48 to 72 hours; stage 4 from 3 to 4 days; stage 5 from 4 to 5 days; and stage 6 from 5 to 8 days. Despite unsuccessful infection of the metacercariae to 12 day old chicks, fully mature worms of stage 5 or 6 were recovered from new born chicks (1 to 2 days old), The metacercariae of F. seoulensis grown in vitro were up to stage 3 and no further maturation was observed. Of various media employed, the medium NCTC 109 (Gibco) or NCTC 135(Gibco) supplemented with 20% egg yolk or 20% whole egg macerate or 0.5% yeast was basically required for the earlier development of the fluke. It took 16.1 days(in average) to reach the stage 3 after cultivation. The metacercariae cultivated on the chorioallantoic membranes of 6∼13 day old chick embryo at 37∼38℃ showed their full development up to stage 5 or 6. However, the worms were in general remarkably retarded, compared with those grown in rats or chickens. In the experiments of worm transplant, although the transfer was failed from in vitro culture to in vivo of rats(Per os), the transplants from in vitro culture to the chorioallantois and from the choriollantois to in vivo of rat host were successful with or without development of the transferred worms. In the present study, it was observed that the metacercariae of F, seoulensis can be maintained in vitro media with poor development as well as fully matured in 1 to 2 day-old chicks or on the chorioallantois at a very low rate.

  • PDF