• Title/Summary/Keyword: Threat

Search Result 2,716, Processing Time 0.029 seconds

Feasibility Analysis on the Attack Graph Applicability in Selected Domains

  • Junho Jang;Saehee Jun;Huiju Lee;Jaegwan Yu;SungJin Park;Su-Youn Hong;Huy Kang Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.5
    • /
    • pp.57-66
    • /
    • 2023
  • In this paper, a research trend of attack graph studies for Cyber-Physical System (CPS) environments is surveyed, and we analyse the limitations of previous works and prospect the future directions. 35 among around 150 attack graph studies conducted within 5 years target CPS, and we inspect key features of CPS environment in the security aspect. Also, we categorize and analyze target studies in the aspect of modelling physical systems and considering air gaps, which are derived as key features of the security aspects of CPS. Half of 20 research that we surveyed do not reflect those two features, and other studies only consider one of the two features. In this circumstance, we examine challenges that attack graph studies on CPS environment face. Finally, we expect state-led studies or studies targeting open-spec commercial CPS will dominate.

Resupply Behavior Modeling in Small-unit Combat Simulation using Decision Trees (소부대 전투 모의를 위한 의사결정트리 기반 재보급 행위 모델링)

  • Seil An;Sang Woo Han
    • Journal of the Korea Society for Simulation
    • /
    • v.32 no.3
    • /
    • pp.9-21
    • /
    • 2023
  • The recent conflict between Russia and Ukraine underscores the significant of military logistics support in modern warfare. Military logistics support is intricate and specialized, and traditionally centered on the mission-level operational analysis and functional models. Nevertheless, there is currently increasing demand for military logistics support even at the engagement level, especially for resupply using unmanned transport assets. In response to the demand, this study proposes a task model of the military logistics support for engagement-level analysis that relies on the logic of ammunition resupply below the battalion level. The model employs a decisions tree to establish the priority of resupply based on variables such as the enemy's level of threat and the remaining ammunition of the supported unit. The model's feasibility is demonstrated through a combat simulation using OneSAF.

South Korean State-Building, Nationalism and Christianity: A Case Study of Cold War International Conflict, National Partition and American Hegemony for the Post-Cold War Era

  • Benedict E. DeDominicis
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.3
    • /
    • pp.277-296
    • /
    • 2023
  • The South Korean ethnic diaspora US lobby shows efficacy as an interest group in generating influence in American foreign and domestic public policy making. The persuasive portrayal of South Korea as a critical Cold War US ally reinforced US amenability to pro-South Korea lobbying. Also, the South Korean US diaspora is a comparatively recent immigrant group, thus its lingering resistance to assimilation facilitates its political mobilization to lobby the US government. One source of this influence includes the foundational legacy of proselytizing Western and particularly American religious social movement representatives in Korean religiosity and society. US protestant Christianity acquired a strong public association with emerging Korean nationalism in response to Japanese imperialism and occupation. Hostility towards Japanese colonialism followed by the threat from Soviet-sponsored, North Korean Communism meant Christianity did not readily become a cultural symbol of excessive external, US interference in South Korean society by South Korean public opinion. The post-Cold War shift in US foreign policy towards targeting so-called rogue state vestiges of the Cold War including North Korea enhanced further South Korea's influence in Washington. Due to essential differences in the perceived historical role of American influence, extrapolation of the South Korean development model is problematic. US hegemony in South Korea indicates that perceived alliance with national self-determination constitutes the core of soft power appeal. Civilizational appeal per se in the form of religious beliefs are not critically significant in promoting American polity influence in target polities in South Korea or, comparatively, in the Middle East. The United States is a perceived opponent of pan-Arab nationalism which has trended towards populist Islamic religious symbolism with the failure of secular nationalism. The pronounced component of evangelical Christianity in American core community nationalism which the Trump campaign exploited is a reflection of this orientation in the US.

Raoultella ornithinolytica as a Potential Candidate for Bioremediation of Heavy Metal from Contaminated Environments

  • Laila Ibrahim Faqe Salih;Rezan Omer Rasheed;Sirwan Muhsin Muhammed
    • Journal of Microbiology and Biotechnology
    • /
    • v.33 no.7
    • /
    • pp.895-908
    • /
    • 2023
  • Disposal of waste containing heavy metals into the environment is a major threat to human health and can result in toxic or chronic poisoning in aquatic life. In the current study, metal-resistant Raoultella ornithinolytica was isolated from metal-contaminated samples collected from the Tanjaro River, located southwest of Sulaymaniyah, Iraq. R. ornithinolytica was identified by partial amplification of 16S rRNA. The uptake potency of heavy metals was assessed using inductively coupled plasma-optical emission spectroscopy (ICP-OES) and indicated that R. ornithinolytica removed 67, 89, 63.4, 55.6, 56.5, 65, and 61.9% of Cd, Pb, Cr, Ni, Zn, Co, and Fe, respectively. These removal rates were influenced by temperature, pH, and contact time; at 35℃ and pH 5 with a change in the incubation time, the reduction rate improved from 89 to 95% for Pb, from 36.4 to 45% for Cu, and from 55.6 to 64% for Ni. Gene analysis indicated that R. ornithinolytica contained pbrT, chrB, nccA, iroN, and czcA genes, but the pcoD gene was absent. Energy-dispersive X-ray spectroscopy (EDS) images showed evidence of metal ion binding on the cell wall surface with different rates of binding. Transmission electron microscopy (TEM) detected different mechanisms for metal particle localization; cell surface adsorption was the main mechanism for Pb, Zn, and Co uptake, while Cd, Ni, and Fe were accumulated inside the cell. The current study describes, for the first time, the isolation of R. ornithinolytica from metal-contaminated water, which can be used as an eco-friendly biological expedient for the remediation and detoxification of metals from contaminated environments.

Static Filtering Probability Control Method Based on Reliability of Cluster in Sensor Networks (센서 네트워크에서 클러스터 신뢰도 기반 정적 여과 확률 조절 기법)

  • Hur, Suh-Mahn;Seo, Hee-Suk;Lee, Dong-Young;Kim, Tae-Kyung
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.1
    • /
    • pp.161-171
    • /
    • 2010
  • Sensor Networks are often deployed in unattended environments, thus leaving these networks vulnerable to false data injection attacks in which an adversary injects forged reports into the network through compromised nodes. Such attacks by compromised sensors can cause not only false alarms but also the depletion of the finite amount of energy in a battery powered network. Ye et al. proposed the Statistical En-route Filtering scheme to overcome this threat. In statistical en-route filtering scheme, all the intermediate nodes perform verification as event reports created by center of stimulus node are forwarded to the base station. This paper applies a probabilistic verification method to the Static Statistical En-route Filtering for energy efficiency. It is expected that the farther from the base station an event source is, the higher energy efficiency is achieved.

Determination Method of TTL for Improving Energy Efficiency of Wormhole Attack Defense Mechanism in WSN (무선 센서 네트워크에서 웜홀 공격 방어기법의 에너지 효율향상을 위한 TTL 결정 기법)

  • Lee, Sun-Ho;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.4
    • /
    • pp.149-155
    • /
    • 2009
  • Attacks in wireless sensor networks (WSN), are similar to the attacks in ad-hoc networks because there are deployed on a wireless environment. However existing security mechanism cannot apply to WSN, because it has limited resource and hostile environment. One of the typical attack in WSN is setting up wrong route that using wormhole. To overcome this threat, Ji-Hoon Yun et al. proposed WODEM (WOrmhole attack DEfense Mechanism) which can detect and counter with wormhole. In this scheme, it can detect and counter with wormhole attacks by comparing hop count and initial TTL (Time To Live) which is pre-defined. The selection of a initial TTL is important since it can provide a tradeoff between detection ability ratio and energy consumption. In this paper, we proposed a fuzzy rule-based system for TTL determination that can conserve energy, while it provides sufficient detection ratio in wormhole attack.

A Study on the Protection of Biometric Information against Facial Recognition Technology

  • Min Woo Kim;Il Hwan Kim;Jaehyoun Kim;Jeong Ha Oh;Jinsook Chang;Sangdon Park
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.8
    • /
    • pp.2124-2139
    • /
    • 2023
  • In this article, the authors focus on the use of smart CCTV, a combnation of biometric recognition technology and AI algorithms. In fact, the advancements in relevant technologies brought a significant increase in the use of biometric information - fingerprint, retina, iris or facial recognition - across diverse sectors. Both the public and private sectors, with the developments of biometric technology, widely adopt and use an individual's biometric information for different reasons. For instance, smartphone users highly count on biometric technolgies for the purpose of security. Public and private orgazanitions control an access to confidential information-controlling facilities with biometric technology. Biometric infomration is known to be unique and immutable in the course of one's life. Given the uniquness and immutability, it turned out to be as reliable means for the purpose of authentication and verification. However, the use of biometric information comes with cost, posing a privacy issue. Once it is leaked, there is little chance to recover damages resulting from unauthorized uses. The governments across the country fully understand the threat to privacy rights with the use of biometric information and AI. The EU and the United States amended their data protection laws to regulate it. South Korea aligned with them. Yet, the authors point out that Korean data aprotection law still requires more improvements to minimize a concern over privacy rights arising from the wide use of biometric information. In particular, the authors stress that it is necessary to amend Section (2) of Article 23 of PIPA to reflect the concern by changing the basis for permitting the processing of sensitive information from 'the Statutes' to 'the Acts'.

Epidemiology of carbapenem-resistant Enterobacteriaceae in Jeju Province, Korea, using national surveillance data, 2018-2021 (2018-2021년 제주도 내 카바페넴내성장내세균속 균종 감염증의 역학)

  • Juyoung Park;Eun-Suk Cho;Jong-Myon Bae
    • Journal of Medicine and Life Science
    • /
    • v.20 no.2
    • /
    • pp.67-72
    • /
    • 2023
  • Carbapenem-resistant Enterobacteriaceae (CRE) infections have increased rapidly over the past decade and are recognized as a severe health threat in Korea and worldwide. This study aimed to identify the status and characteristics of CRE infection in Jeju province and provide important basic data for the prevention and management of CRE infection. A descriptive epidemiological analysis was performed on reported cases of CRE infection in Jeju Province between 2018 and 2021 using the integrated management system for disease, an infectious disease reporting system from the Korea Disease Control and Prevention Agency. The annual difference and distribution trends of CRE infection were analyzed using CRE isolates, carbapenemase-producing CREs (CP-CRE) and their genotypes, and the type of medical institution in Jeju Province. CRE infections steadily increased in Jeju from 2018 to 2021, and the proportion of CP-CRE among the CREs also showed a statistically significant increase each year. Among the CRE isolates, Klebsiella pneumoniae (KPC, 62.13%) was the most common, and among the CP-CRE genotypes, KPC (81.62%) showed the highest distribution and increased each year. As the distribution of CP-CRE in have increased over the past 4 years, measures to prevent the spread and outbreak of CRE infections are warranted. The results of this study are expected to be used as basic data for prevention and management of CRE infections in the province.

Physiology and Gene Expression Analysis of Tomato (Solanum lycopersicum L.) Exposed to Combined-Virus and Drought Stresses

  • Samra Mirzayeva;Irada Huseynova;Canan Yuksel Ozmen;Ali Ergul
    • The Plant Pathology Journal
    • /
    • v.39 no.5
    • /
    • pp.466-485
    • /
    • 2023
  • Crop productivity can be obstructed by various biotic and abiotic stresses and thus these stresses are a threat to universal food security. The information on the use of viruses providing efficacy to plants facing growth challenges owing to stress is lacking. The role of induction of pathogen-related genes by microbes is also colossal in drought-endurance acquisition. Studies put forward the importance of viruses as sustainable means for defending plants against dual stress. A fundamental part of research focuses on a positive interplay between viruses and plants. Notably, the tomato yellow leaf curl virus (TYLCV) and tomato chlorosis virus (ToCV) possess the capacity to safeguard tomato host plants against severe drought conditions. This study aims to explore the combined effects of TYLCV, ToCV, and drought stress on two tomato cultivars, Money Maker (MK, UK) and Shalala (SH, Azerbaijan). The expression of pathogen-related four cellulose synthase gene families (CesA/Csl) which have been implicated in drought and virus resistance based on gene expression analysis, was assessed using the quantitative real-time polymerase chain reaction method. The molecular tests revealed significant upregulation of Ces-A2, Csl-D3,2, and Csl-D3,1 genes in TYLCV and ToCV-infected tomato plants. CesA/Csl genes, responsible for biosynthesis within the MK and SH tomato cultivars, play a role in defending against TYLCV and ToCV. Additionally, physiological parameters such as "relative water content," "specific leaf weight," "leaf area," and "dry biomass" were measured in dual-stressed tomatoes. Using these features, it might be possible to cultivate TYLCV-resistant plants during seasons characterized by water scarcity.

Development of Recombinase Polymerase Amplification Combined with Lateral Flow Strips for Rapid Detection of Cowpea Mild Mottle Virus

  • Xinyang Wu;Shuting Chen;Zixin Zhang;Yihan Zhang;Pingmei Li;Xinyi Chen;Miaomiao Liu;Qian Lu;Zhongyi Li;Zhongyan Wei;Pei Xu
    • The Plant Pathology Journal
    • /
    • v.39 no.5
    • /
    • pp.486-493
    • /
    • 2023
  • Cowpea mild mottle virus (CPMMV) is a global plant virus that poses a threat to the production and quality of legume crops. Early and accurate diagnosis is essential for effective managing CPMMV outbreaks. With the advancement in isothermal recombinase polymerase amplification and lateral flow strips technologies, more rapid and sensitive methods have become available for detecting this pathogen. In this study, we have developed a reverse transcription recombinase polymerase amplification combined with lateral flow strips (RT-RPA-LFS) method for the detection of CPMMV, specifically targeting the CPMMV coat protein (CP) gene. The RT-RPA-LFS assay only requires 20 min at 40℃ and demonstrates high specificity. Its detection limit was 10 copies/µl, which is approximately up to 100 times more sensitive than RT-PCR on agarose gel electrophoresis. The developed RT-RPA-LFS method offers a rapid, convenient, and sensitive approach for field detection of CPMMV, which contribute to controlling the spread of the virus.