• Title/Summary/Keyword: Threat Management

Search Result 655, Processing Time 0.021 seconds

IP를 이용한 패트리어트 미사일 최적배치모형

  • Lee, Jae-Yeong;Jeong, Chi-Yeong
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2005.10a
    • /
    • pp.38-50
    • /
    • 2005
  • The current Air defense missile, Nike, will be replaced by the Patriot missile in the near future. In this paper, we developed an optimal allocation model for the Patriot missile. In order to formulate the model, we applied a set covering and If model. This model considers not only weapon's characteristics and performances but also the threat of enemy aircrafts and SCUD missiles. When we apply this model, we can find the optimal location of Patriot batteries which maximizes the kill probability of enemy aircrafts and SCUD missiles attacking vital area of our forces. This model can directly be used to the decision making for the optimal military facility allocation.

  • PDF

Attack Path and Intention Recognition System for detecting APT Attack (APT 공격 탐지를 위한 공격 경로 및 의도 인지 시스템)

  • Kim, Namuk;Eom, Jungho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.1
    • /
    • pp.67-78
    • /
    • 2020
  • Typical security solutions such as intrusion detection system are not suitable for detecting advanced persistent attack(APT), because they cannot draw the big picture from trivial events of security solutions. Researches on techniques for detecting multiple stage attacks by analyzing the correlations between security events or alerts are being actively conducted in academic field. However, these studies still use events from existing security system, and there is insufficient research on the structure of the entire security system suitable for advanced persistent attacks. In this paper, we propose an attack path and intention recognition system suitable for multiple stage attacks like advanced persistent attack detection. The proposed system defines the trace format and overall structure of the system that detects APT attacks based on the correlation and behavior analysis, and is designed with a structure of detection system using deep learning and big data technology, etc.

A Study of Authentication Algorithm in Electronic Commerce (전자상거래에서의 인증 알고리즘에 관한 연구)

  • Kim Young-Sun
    • Management & Information Systems Review
    • /
    • v.6
    • /
    • pp.1-19
    • /
    • 2001
  • Partial transactions which use computer networks are formed in the cyberspace due to rapid progress of communication and computer technology. Electronic business transactions have security problems according to the special quality of opening networks, while it can be approached easily by anyone without being tied to time and places through Internets. To revitalize the electronic business transactions, security technology which can establish its security and trust is the prior task and both safe information communication and better information security service offer are essential factors. The method to exchange information through Internets must be made after confirming one another's exact connection in the mutual identity certification to prevent a lot of threat which can occur in the use of password techniques. To satisfy these electronic business transactions, we intend to increase understanding of authentication algorithm provided with authentication function of messages and users as well to plan safety and trust of business information and contents in the electronic business transactions.

  • PDF

Implementation of the DMM System for Flight Information Visualization (비행 정보 시각화를 위한 DMM 시스템의 구현)

  • Hur, Hwa Ra;Park, Myeong Chul
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.3
    • /
    • pp.115-121
    • /
    • 2011
  • The flight information visualization of the aircraft is the system which is widely used to the threat against low altitude tasks and terrain altitude. But, it is difficult to implement the system because of restrictions that GPS data and huge geographic information should be stored. In this paper, it proposes economic DMM (Digital Moving Map) system for flight information visualization from open-source-base. First, the flight information is transferred from X-Plane through UDP and then demonstrated on the DMM system. In the proposed DMM system, flight information is visualized on the map information downloaded from an ArcGIS Map server using the mapping data between the present altitude of the aircraft and the terrain altitude. The result of this paper could be used an economic tool in the field of flight information visualization and the game algorithm research.

A Study on International Countermeasures to Cyber-terrorism (사이버 테러리즘에 대한 국제적 대응에 관한 연구)

  • Kim Jeong-Tae;Lee Hyeon-U
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.644-647
    • /
    • 2004
  • Developing into information oriented society, dependency on network systems increases gradually in the area of economy, society and so on. Under that circumstance, temporary stop or damage of integrity of network system may have a strong impact on economic activities and overall society. Recently, threat of cyber terrorism, organized hostile action to government or industry through network, is increasing. Because of the features of network, it is not sufficient only a nation's countermeasure against Cyber terrorism, so international cooperation is needed. We review the status of countermeasure against cyber terrorism and examine several considerations for policy establishment.

  • PDF

A Study on the Insider Behavior Analysis Using Machine Learning for Detecting Information Leakage (정보 유출 탐지를 위한 머신 러닝 기반 내부자 행위 분석 연구)

  • Kauh, Janghyuk;Lee, Dongho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.2
    • /
    • pp.1-11
    • /
    • 2017
  • In this paper, we design and implement PADIL(Prediction And Detection of Information Leakage) system that predicts and detect information leakage behavior of insider by analyzing network traffic and applying a variety of machine learning methods. we defined the five-level information leakage model(Reconnaissance, Scanning, Access and Escalation, Exfiltration, Obfuscation) by referring to the cyber kill-chain model. In order to perform the machine learning for detecting information leakage, PADIL system extracts various features by analyzing the network traffic and extracts the behavioral features by comparing it with the personal profile information and extracts information leakage level features. We tested various machine learning methods and as a result, the DecisionTree algorithm showed excellent performance in information leakage detection and we showed that performance can be further improved by fine feature selection.

Privacy Analysis and Comparison of Pandemic Contact Tracing Apps

  • Piao, Yanji;Cui, Dongyue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.11
    • /
    • pp.4145-4162
    • /
    • 2021
  • During the period of epidemic prevention and control, contact tracing systems are developed in many countries, to stop or slow down the progression of COVID-19 contamination. However, the privacy issues involved in the use of contact tracing apps have also attracted people's attention. First, we divide contact tracing techniques into two types: Bluetooth Low Energy (BLE) based and Global Positioning System (GPS) based techniques. In order to clear understand the system structure and its elements, we create data flow diagram (DFD) of each types. Second, we analyze the possible privacy threats contained in various types of contact tracing apps by applying LINDDUN, which is a threat modeling technique for personal information protection. Third, we make a comparison and analysis of various contact tracing techniques from privacy point of view. These studies can facilitate improve tracing and security performance to contact tracing apps through comparisons between different types.

A Component Model for Managing Covid-19 Crisis

  • Taweel, Faris M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.365-373
    • /
    • 2021
  • Covid-19 posed a serious threat to public health worldwide, especially in the absence of vaccines or medicines. The only viable strategies to combat a virus with a high infection rate were to apply lock-down strategies, transport ban, social and physical distancing. In this work, we provide a domain-specific component model for crisis management. The model allows for building a plan for managing Covid-19 crisis and use the plan as a template to generate a system specific for managing that crisis. The crisis component model is derived from X-MAN II, a generic component model that we have developed for the aircraft industry

Development of an Ultra Light Flying Device for Remove the Vespiary (말벌 집 제거용 초경량 비행장치의 개발)

  • Geun-Chul Lee;Kyong-Jin Park
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.26 no.3
    • /
    • pp.395-400
    • /
    • 2023
  • Recently, the number of hornet is rapidly increasing because of change in the ecological climate. It gives a sense of threat to the people and damages the beekeeping industry as a predator of honey bees. Firefighters are working to remove hornet and vespiary, but it has been reported that it is difficult to remove at high altitudes. In this study, an ultra-light flying device was developed to remove vespiary. It has been developed in four types: Drug spray type, Clamp type, Cutter type, and Scraper type, which can be used as field-customized equipment. Therefore, the developed equipment is expected to contribute to the safe field activities of firefighters.

A Study on Flight Crew Cabin Threats

  • Jin-Kook Choi
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.31 no.2
    • /
    • pp.116-121
    • /
    • 2023
  • 항공 사고는 첨단 항공 기술의 발달로 꾸준히 감소해 왔지만, 여전히 발생하고 있다. 조종사는 목적지 공항까지 안전하고 효율적으로 비행하기 위해 위협과 오류를 관리해야 한다. 조종사에게 영향을 미치는 위협은 환경적 위협과 항공사 위협으로 나눌 수 있으며, 환경사위협에는 객실 위협이 포함된다. 조종사와 객실 승무원은 정상적인 운항 중에는 협력이 필요하며, 비상시에는 안전한 비행을 위해 효과적인 협력이 절대적으로 필요하다. 조종사가 비행 중에 간섭이나 작업 흐름의 중단이 발생할 때 에러를 할 가능성이 높아진다. 항공사들은 안전 운항을 방해할 수 있는 객실위협의 종류를 적극적으로 식별하고 분석하여, 조종사들이 안전한 비행을 유지하기 위해서 위협을 관리하도록 절차 및 훈련을 개선해야 한다. 본 연구는 안전관리시스템(SMS)의 안전도구인 LOSA(Line Operation Safety Audit)를 기반으로 기내위협의 유형을 파악하고, 항공사들에게 조종실위협 관리를 체계적으로 개선하는 데 필요한 객실위협과 간섭에 대한 자료를 제공하고자 한다.