• Title/Summary/Keyword: Security Target

Search Result 702, Processing Time 0.023 seconds

Target Practising in a Global Commons: The Chinese ASAT Test and Outer Space Law

  • Dunk, Frans G.Von Der
    • The Korean Journal of Air & Space Law and Policy
    • /
    • no.spc
    • /
    • pp.181-199
    • /
    • 2007
  • When the People's Republic of China destroyed one of its own defunct meteorological satellites, the Fengyun-1C, at an altitude of some 865 km above the earth's surface, the PRC was accused of initiating, or at the very least risking an(other) arms race in outer space also. The test also gave rise to a few legal questions as to the permissibility of this test, and the broader permissibility of using space for military and other weapon-touting activities, Whilst the test cannot be considered to constitute a direct threat to international peace and security so as to invoke relevant legal principles and consequences in terms of the UN Charter for example, it highlights the importance of such clauses in international space law as requiring international cooperation and consultation, due regard for the interests of all other countries both on earth and in outer space, and the further development of general regimes of registration and space debris-prevention. From that perspective, the PRC violated international outer space law not so much by the test itself but by the accompanying lack of information, consultation and due regard for other states', and indeed mankind's, interests.

  • PDF

Design of an Authentication System Based on Personal Identity Verification Card (전자신분증 기반의 개인 신분확인을 위한 인증시스템 설계)

  • Park, Young-Ho;Kong, Byung-Un;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.8
    • /
    • pp.1029-1040
    • /
    • 2011
  • Electronic identity (e-ID) card based on smartcard is a representative identity credential for on-line and off-line personal identification. The e-ID card can store the personal identity information securely, so that the information can be accessed fast, automated identity verification and used to determine the cardholder's authorization to access protected resources. Due to such features of an e-ID card, the number of government organizations and corporate enterprises that consider using e-ID card for identity management is increasing. In this paper, we present an authentication framework for access control system using e-ID cards by discussing the threat environment and security requirement against e-ID card. Specifically, to accomplish our purpose, we consider the Personal Identity Verification system as our target model.

Differential Fault Attack on SSB Cipher (SSB 암호 알고리즘에 대한 차분 오류 공격)

  • Kang, HyungChul;Lee, Changhoon
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.1
    • /
    • pp.48-52
    • /
    • 2015
  • In this paper, we propose a differential fault analysis on SSB having same structure in encryption and decryption proposed in 2011. The target algorithm was designed using advanced encryption standard and has advantage about hardware implementations. The differential fault analysis is one of side channel attacks, combination of the fault injection attacks with the differential cryptanalysis. Because SSB is suitable for hardware, it must be secure for the differential fault analysis. However, using proposed differential fault attack in this paper, we can recover the 128 bit secret key of SSB through only one random byte fault injection and an exhausted search of $2^8$. This is the first cryptanalytic result on SSB having same structure in encryption and decryption.

Laser Radar-Based Railroad Crossing Detection Device Developed for Crossing Security Device Integration (건널목 보안장치 통합화를 위한 레이저레이더기반 철도 건널목 지장물 검지장치 개발)

  • Baek, Jong-Hyen;Kim, Gon-Yop;Song, Yong-Soo;Oh, Seh-Chan;Kim, Yong-Kyu;Chae, Eun-Kyung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.5
    • /
    • pp.471-478
    • /
    • 2013
  • In this paper, we have designed and implemented an obstacle detecting device based laser radar. It is an alternative to solve through problem analysis of that are currently operated safety equipment and status research of domestic railway crossing. It is target to improve the safety and reliability of the rail traffic through effective obstacle detection at crossing account for a large proportion of train accidents. suggest a system to overcome the problems caused by aging and limitation of existing safety equipment. Design a crossing obstacle detection device that utilizes laser radar scanner, proved this through performance evaluation and testing of the prototype.

A Consecutive Motion and Situation Recognition Mechanism to Detect a Vulnerable Condition Based on Android Smartphone

  • Choi, Hoan-Suk;Lee, Gyu Myoung;Rhee, Woo-Seop
    • International Journal of Contents
    • /
    • v.16 no.3
    • /
    • pp.1-17
    • /
    • 2020
  • Human motion recognition is essential for user-centric services such as surveillance-based security, elderly condition monitoring, exercise tracking, daily calories expend analysis, etc. It is typically based on the movement data analysis such as the acceleration and angular velocity of a target user. The existing motion recognition studies are only intended to measure the basic information (e.g., user's stride, number of steps, speed) or to recognize single motion (e.g., sitting, running, walking). Thus, a new mechanism is required to identify the transition of single motions for assessing a user's consecutive motion more accurately as well as recognizing the user's body and surrounding situations arising from the motion. Thus, in this paper, we collect the human movement data through Android smartphones in real time for five targeting single motions and propose a mechanism to recognize a consecutive motion including transitions among various motions and an occurred situation, with the state transition model to check if a vulnerable (life-threatening) condition, especially for the elderly, has occurred or not. Through implementation and experiments, we demonstrate that the proposed mechanism recognizes a consecutive motion and a user's situation accurately and quickly. As a result of the recognition experiment about mix sequence likened to daily motion, the proposed adoptive weighting method showed 4% (Holding time=15 sec), 88% (30 sec), 6.5% (60 sec) improvements compared to static method.

A Study on the DDoS Defense Algorithm using CFC based on Attack Pattern Analysis of TCP/IP Layers (TCP/IP Layer별 공격패턴 분석에 기반한 CFC를 이용한 DDoS 방어 알고리즘 연구)

  • Seo, Woo Seok;Park, Dea Woo;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.117-130
    • /
    • 2010
  • Paper is on defense for so-called internet crisis, the attack of DDoS (Distributed Denial of Service) which was targeted to the central government ministries, financial sector, and portal sites of chief counties including Korea on June 7th, 2009 as its start. By conducting attack with various DDoS attacking methods in the lab environment and dividing networks targeted by the attack by layers, this paper records and analyzes the chief information for attack, destination information of packets, defense policy setting, and the flow of packet attack with the subjects of the networks separated. This study suggests CFC system using multiple firewalls applying defense policy corresponding to the target layer for ultimate attack and tests it according to the result of analyzing the attack packet information and its amount, log analysis, access recording port, and MAC and IT information, etc. by layers. This article is meaningful in that it analyzes the attack by layers, establishes firewall policy for protecting each layer, and secures accurate mechanism for detect and defense.

Design and Implementation of Scenario-based Attack Simulator using NS (NS를 이용한 시나리오기반 공격 시뮬레이터 설계 및 구현)

  • Choi, Hyang-Chang;Noh Bong-Nam;Lee Hyung-Hyo
    • Journal of Internet Computing and Services
    • /
    • v.7 no.5
    • /
    • pp.59-69
    • /
    • 2006
  • Generally, network attacks are based on a scenario composed of a series of single-attacks, scenario attacks are launched over a wide network environment and their targets are not apparent. it is required to analyze entire packets captured on the network. This method makes it difficult to detect accurate patterns of attacks because it unnecessarily analyzes even packets unrelated to attacks. In this paper, we design and implement a simulation system for attacks scenario, which helps packet classification connected with attacks. The proposed system constitutes a target network for analysis in a virtual simulation environment, and it simulates dumping TCPDUMP packets including scenario attacks under the constructed virtual environment, We believe that our proposed simulation system will be a useful tool when security administrators perform the analysis of patterns of attack scenarios.

  • PDF

Hydroacoustic Survey of Fish Distribution and Aggregation Characteristics in the Yongdam Reservoir, Korea (수중음향기법을 이용한 용담호의 어류 분포특성 연구)

  • Lee, Hyungbeen;Lee, Kyounghoon;Kim, Seonghun;Kim, In-Ok;Kang, Donhyug
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.47 no.6
    • /
    • pp.1055-1062
    • /
    • 2014
  • Hydroacoustic surveys were conducted for spatio-temporal distribution and size estimation of fish in the Yongdam reservoir, Korea, from April to July 2014. Acoustic data were collected along acoustic transects using a 120 kHz scientific echosounder. The received acoustic data were the in situ acoustic target strength (dB) and nautical area scattering coefficient ($m^2/mile^2$). Data on fish behavioral patterns and size were collected using a DIDSON acoustic camera at stationary stations. Fish were mainly distributed in the center channel and close to the outer Yongdam reservoir. Acoustic density of fish in the summer season were higher than in the spring season. The seasonal vertical distribution pattern of fish aggregations may be strongly related to the vertical temperature structure. The size distribution of fish obtained from an acoustic camera correlated well with the acoustic size of fish from an echosounder.

Quantitative Analysis of Food and Nutrition Informations on the Internet (인터넷 사이트 식품영양정보의 양적 평가)

  • Kim, Byeong-Suk;Jeong, Mi-Ran;Lee, Yeong-Eun
    • Journal of the Korean Dietetic Association
    • /
    • v.12 no.2
    • /
    • pp.185-199
    • /
    • 2006
  • The purpose of this study was to estimate the sites providing accurate and useful informations to the public by monitoring food and nutrition informations distributed through the internet quantitatively about 13 items of 7 necessary requisites. Total of 457 internet sites on the searching engines of Yahoo, Empas, Nate, Naver and Daum were monitored by 10 panels from May, 2004 to October. Thirty eight % of the sites got 7 & 8 total of 14 points and total sites showed a normal distribution. From the estimation of meta data, individual sites(5.19) were operated insufficiently compared with the commercial sites(6.10) and institutional sites(6.60) (p<0.000). According to administrators, sites were evaluated in the order of research institute> government organization> academic association> pharmaceutical company, club, food company, university> hospital> individual (p<0.000). While low-ranked sites were lack of authority because they didn't show the information provider and source, high-ranked ones lack of sustainable management(updating informations) and security. From this study, we suggest that 1) theme, contents and design have to prepared with variety to suit the need of target clients instead of that of site operator; 2) source and origin of information have to be provided; 3) informations have to be updated often and site to be managed sustainably.

  • PDF

Threat Management System for Anomaly Intrusion Detection in Internet Environment (인터넷 환경에서의 비정상행위 공격 탐지를 위한 위협관리 시스템)

  • Kim, Hyo-Nam
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.157-164
    • /
    • 2006
  • The Recently, most of Internet attacks are zero-day types of the unknown attacks by Malware. Using already known Misuse Detection Technology is hard to cope with these attacks. Also, the existing information security technology reached the limits because of various attack's patterns over the Internet, as web based service became more affordable, web service exposed to the internet becomes main target of attack. This paper classifies the traffic type over the internet and suggests the Threat Management System(TMS) including the anomaly intrusion detection technologies which can detect and analyze the anomaly sign for each traffic type.

  • PDF