• Title/Summary/Keyword: Security Target

Search Result 693, Processing Time 0.024 seconds

DDoS attacks prevention in cloud computing through Transport Control protocol TCP using Round-Trip-Time RTT

  • Alibrahim, Thikra S;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.276-282
    • /
    • 2022
  • One of the most essential foundations upon which big institutions rely in delivering cloud computing and hosting services, as well as other kinds of multiple digital services, is the security of infrastructures for digital and information services throughout the world. Distributed denial-of-service (DDoS) assaults are one of the most common types of threats to networks and data centers. Denial of service attacks of all types operates on the premise of flooding the target with a massive volume of requests and data until it reaches a size bigger than the target's energy, at which point it collapses or goes out of service. where it takes advantage of a flaw in the Transport Control Protocol's transmitting and receiving (3-way Handshake) (TCP). The current study's major focus is on an architecture that stops DDoS attacks assaults by producing code for DDoS attacks using a cloud controller and calculating Round-Tripe Time (RTT).

A Study on Photoneutron Characteristics Generated from Target and Collimator of Electron Linear Accelerator for Container Security Inspection using MCNP6 Code (MCNP6 코드를 이용한 컨테이너 보안 검색용 전자 선형가속기 표적과 조준기에서 발생한 광중성자 특성에 관한 연구)

  • Lee, Chang-Ho;Kim, Jang-Oh;Lee, Yoon-Ji;Jeon, Chan-hee;Lee, Ji-Eun;Min, Byung-In
    • Journal of the Korean Society of Radiology
    • /
    • v.14 no.4
    • /
    • pp.455-465
    • /
    • 2020
  • The purpose of this study is to evaluate the photoneutron characteristics generated by the linear accelerator target and collimator. The computer simulation design firstly, consisted of a target, a single material target and a composite material target. Secondly, it consisted of a cone beam and a fan beam depending on the type of the collimator. Finally, the material of the fan beam collimator is composed of a single material composed of only lead (Pb) and a composite material collimator composed of tungsten (W) and lead (Pb). The research method calculated the photoneutron production rate and energy spectrum using F2 tally from the surface of a virtual sphere at a distance of 100 cm from the target. As a result, firstly the photoneutron production rate was 20% difference, depending on the target. Secondly, depending on the type of the collimator, there was a 10% difference. Finally, depending on the collimator material, there was a 40% difference. In the photoneutron energy spectrum, the average photoneutron flux tended to be similar to the photoneutron production rate. As a result, it was confirmed that the 9 MeV linear accelerator photoneutron are production increased more by the collimator than by the target, and by the material, not the type of the collimator. Selecting and operating targets and collimator with low photoneutron production will be the most active radiation protection. Therefore, it is considered that this research can be a useful data for introducing and operating and radiation protection of a linear accelerator for container security inspection.

Infrared Target Extraction Using Weighted Information Entropy and Adaptive Opening Filter

  • Bae, Tae Wuk;Kim, Hwi Gang;Kim, Young Choon;Ahn, Sang Ho
    • ETRI Journal
    • /
    • v.37 no.5
    • /
    • pp.1023-1031
    • /
    • 2015
  • In infrared (IR) images, near targets have a transient distribution at the boundary region, as opposed to a steady one at the inner region. Based on this fact, this paper proposes a novel IR target extraction method that uses both a weighted information entropy (WIE) and an adaptive opening filter to extract near finely shaped targets in IR images. Firstly, the boundary region of a target is detected using a local variance WIE of an original image. Next, a coarse target region is estimated via a labeling process used on the boundary region of the target. From the estimated coarse target region, a fine target shape is extracted by means of an opening filter having an adaptive structure element. The size of the structure element is decided in accordance with the width information of the target boundary and mean WIE values of windows of varying size. Our experimental results show that the proposed method obtains a better extraction performance than existing algorithms.

A Study on Airport Security Performance Improvement based on Risk Management Concept (위험관리 개념에 근거한 항공보안업무 합리화 방안 연구)

  • Hwang, Kyung-Chul;Yoo, Kwang-Eui
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.20 no.2
    • /
    • pp.47-57
    • /
    • 2012
  • The strengthened aviation security measurements caused by increased terror threat all around the world have air passengers annoyed by uneasy treatment and some delayed process. The service level of air travel and competitiveness of airlines industry has been weakened also. The aviation security process is mainly conducted at an airport. The threat level of airport is not usually same airport to airport, and the quality of aviation security activity is neither same. However, ICAO requires every international airport to conduct similar process to ensure aviation security without considering situational difference of each airport. The paper has objectives to develop reasonable security measurements based on risk management concept. It studied the ways of achieving target level of security of an airport, considering the threat situation of the airport and its ability to conduct security procedures.

A Threats Statement Generation Method for Security Environment of Protection Profile (PP의 보안환경을 위한 위협문장 생성방법)

  • 고정호;이강수
    • The Journal of Society for e-Business Studies
    • /
    • v.8 no.3
    • /
    • pp.69-86
    • /
    • 2003
  • A Protection Profile(PP) is a common security and assurance requirements for a specific class of Information Technology security products such as firewall and smart card. A PP should be included "TOE(Target of Evaluation) Security Environment", which is consisted of subsections: assumptions, treat, organizational security policies. This paper presents a new threats statement generation method for developing TOE security environment section of PP. Our survey guides the statement of threats in CC(Common Criteria) scheme through collected and analysed hundred of threat statements from certified and published real PPs and CC Tool Box/PKB that is included a class of pre-defined threat and attack statements. From the result of the survey, we present a new asset classification method and propose a threats statement generation model. The former is a new asset classification method, and the later is a production rule for a well formed statement of threats.

  • PDF

A Design for Security Functional Requirements of IoT Middleware System (IoT(Internet of Things) 시스템 미들웨어 보안기능요구사항 설계)

  • Jung, Hyun Mi;Jeong, Kimoon;Cho, Han Jin
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.11
    • /
    • pp.63-69
    • /
    • 2017
  • The middleware in the IoT system is software that acts as a messenger to connect and exchange data between humans and objects, objects and objects. IoT middleware exists in various forms in all areas, including hardware, protocol, and communication of different kinds, which are different in form and purpose. However, IoT middleware exists in various forms across different areas, including hardware, protocol, and communication of different types and purposes. Therefore, even if the system is designed differently for each role, it is necessary to strengthen the security in common. In this paper, we analyze the structure of IoT middleware using Service Oriented Architecture(SOA) approach and design system security requirements based on it. It was defined: Target Of Evaluation(TOE) existing system development method and the object is evaluated by Common Criteria(CC) for verification based otherwise. The proposed middleware system will be correlated with the security problem definition and the security purpose, which will be the basis for implementing the security enhanced IoT system.

Analysis of Threat Model and Requirements in Network-based Moving Target Defense

  • Kang, Koo-Hong;Park, Tae-Keun;Moon, Dae-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.10
    • /
    • pp.83-92
    • /
    • 2017
  • Reconnaissance is performed gathering information from a series of scanning probes where the objective is to identify attributes of target hosts. Network reconnaissance of IP addresses and ports is prerequisite to various cyber attacks. In order to increase the attacker's workload and to break the attack kill chain, a few proactive techniques based on the network-based moving target defense (NMTD) paradigm, referred to as IP address mutation/randomization, have been presented. However, there are no commercial or trial systems deployed in real networks. In this paper, we propose a threat model and the request for requirements for developing NMTD techniques. For this purpose, we first examine the challenging problems in the NMTD mechanisms that were proposed for the legacy TCP/IP network. Secondly, we present a threat model in terms of attacker's intelligence, the intended information scope, and the attacker's location. Lastly, we provide seven basic requirements to develop an NMTD mechanism for the legacy TCP/IP network: 1) end-host address mutation, 2) post tracking, 3) address mutation unit, 4) service transparency, 5) name and address access, 6) adaptive defense, and 7) controller operation. We believe that this paper gives some insight into how to design and implement a new NMTD mechanism that would be deployable in real network.

Analysis of Radar Performance Requirements for VTS System Based on IALA Guidelines (IALA 가이드라인에 기반한 VTS 시스템을 위한 레이더 성능 요구사항 분석)

  • Kim, Byung-Doo;Lee, Byung-Gil
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2015.10a
    • /
    • pp.27-29
    • /
    • 2015
  • Based on IALA guidelines, the fundamental requirements of radar system for vessel traffic services are analyzed in this paper. target separation, target position accuracy, target track accuracy of X-band radar and recommended test conditions are analyzed. Also, in order to check if it satisfies the requirement of target position accuracy from IALA guideline, the test is carried out through processing of radar raw image acquired at VTS center.

  • PDF

Automated Assessment Of The Air Situation During The Preparation And Conduct Of Combat Operations Using A Decision Support System Based On Fuzzy Networks Of Target Installations

  • Volkov, Andriy;Bazilo, Serhii;Tokar, Oleksandr;Horbachov, Kostiantyn;Lutsyshyn, Andrii;Zaitsev, Ihor;Iasechko, Maksym
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.184-188
    • /
    • 2022
  • The article considers the improved method and model of automated air situation assessment using a decision support system based on fuzzy networks of target installations. The advanced method of automated assessment of the air situation using the decision support system is based on the methodology of reflexive control of the first rank. With this approach, the process of assessing the air situation in the framework of the formulated task can be reduced to determining the purpose, probabilistic nature of actions and capabilities of the air target. The use of a homogeneous functional network for the formal presentation of air situation assessment processes will formally describe the process of determining classes of events during air situation assessment and the process of determining quantitative and qualitative characteristics of recognized air situation situations. To formalize the patterns of manifestation of the values of quantitative and symbolic information, it is proposed to use the mathematical apparatus of fuzzy sets.

Framework Based Smart City Cyber Security Matrix (프레임워크 기반 스마트시티 사이버 보안 메트릭스)

  • Kim, Sung-Min;Jung, Hae-Sun;Lee, Yong-Woo
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.23 no.2_2
    • /
    • pp.333-341
    • /
    • 2020
  • In this paper, we introduce a smart city-cyber-security-grid-matrix methodology, as a result of research on overall cyber security of smart cities. The identified cyber security risks that threaten smart cities and smart-city-cyber-security-threat list are presented. The smart-city-cyber-security-requirements necessary to secure the smart city cyber security with the developed smart city-cyber-security-grid-matrix are given in this paper. We show how the developed smart city-cyber-security-grid-matrix methodology can be applied to real world. For it, we interlocked the developed smart city-cyber-security-grid-matrix methodology with the cyber-security-framework of the National Institute of Standards and Technology, and developed a framework-based smart city-cyber-security-grid-matrix. Using it, it is easy and comfortable to check the level of cyber security of the target smart ciy at a glace, and the construction and operation of the smart city security system is systematized.