• Title/Summary/Keyword: Web Threat

Search Result 72, Processing Time 0.023 seconds

An Intelligent Game Theoretic Model With Machine Learning For Online Cybersecurity Risk Management

  • Alharbi, Talal
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.390-399
    • /
    • 2022
  • Cyber security and resilience are phrases that describe safeguards of ICTs (information and communication technologies) from cyber-attacks or mitigations of cyber event impacts. The sole purpose of Risk models are detections, analyses, and handling by considering all relevant perceptions of risks. The current research effort has resulted in the development of a new paradigm for safeguarding services offered online which can be utilized by both service providers and users. customers. However, rather of relying on detailed studies, this approach emphasizes task selection and execution that leads to successful risk treatment outcomes. Modelling intelligent CSGs (Cyber Security Games) using MLTs (machine learning techniques) was the focus of this research. By limiting mission risk, CSGs maximize ability of systems to operate unhindered in cyber environments. The suggested framework's main components are the Threat and Risk models. These models are tailored to meet the special characteristics of online services as well as the cyberspace environment. A risk management procedure is included in the framework. Risk scores are computed by combining probabilities of successful attacks with findings of impact models that predict cyber catastrophe consequences. To assess successful attacks, models emulating defense against threats can be used in topologies. CSGs consider widespread interconnectivity of cyber systems which forces defending all multi-step attack paths. In contrast, attackers just need one of the paths to succeed. CSGs are game-theoretic methods for identifying defense measures and reducing risks for systems and probe for maximum cyber risks using game formulations (MiniMax). To detect the impacts, the attacker player creates an attack tree for each state of the game using a modified Extreme Gradient Boosting Decision Tree (that sees numerous compromises ahead). Based on the findings, the proposed model has a high level of security for the web sources used in the experiment.

Current Status and Challenges of BGP Hijacking Security Threat (BGP 하이재킹 보안 위협 대응 현황 및 과제)

  • Han, Wooyoung;Hong, Yunseok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.10
    • /
    • pp.1525-1530
    • /
    • 2022
  • BGP(Border Gateway Protocol) is a routing protocol that is actively used in inter-AS routing on the Internet. However, BGP routing protocol is vulnerable to BGP hijacking attacks that hijack the network by impersonating normal BGP sessions. BGP Hijacking attacks can lead to causing intercept IP traffic or interference with the normal service operation. Recently, BGP hijacking attacks, which have often occurred overseas, have also occurred in Korea. It means threatening the security of the Internet. In this paper, we analyze the overall process of attack through representative attack cases and virtual scenarios of BGP hijacking and based on the results of analyzing the application status of security technology to prevent BGP hijacking attacks by Korea and global major ISPs. It covers the technical proposal of ISPs and autonomous system operators should take to defend against BGP hijacking attacks.

Behavior and Script Similarity-Based Cryptojacking Detection Framework Using Machine Learning (머신러닝을 활용한 행위 및 스크립트 유사도 기반 크립토재킹 탐지 프레임워크)

  • Lim, EunJi;Lee, EunYoung;Lee, IlGu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1105-1114
    • /
    • 2021
  • Due to the recent surge in popularity of cryptocurrency, the threat of cryptojacking, a malicious code for mining cryptocurrencies, is increasing. In particular, web-based cryptojacking is easy to attack because the victim can mine cryptocurrencies using the victim's PC resources just by accessing the website and simply adding mining scripts. The cryptojacking attack causes poor performance and malfunction. It can also cause hardware failure due to overheating and aging caused by mining. Cryptojacking is difficult for victims to recognize the damage, so research is needed to efficiently detect and block cryptojacking. In this work, we take representative distinct symptoms of cryptojacking as an indicator and propose a new architecture. We utilized the K-Nearst Neighbors(KNN) model, which trained computer performance indicators as behavior-based dynamic analysis techniques. In addition, a K-means model, which trained the frequency of malicious script words for script similarity-based static analysis techniques, was utilized. The KNN model had 99.6% accuracy, and the K-means model had a silhouette coefficient of 0.61 for normal clusters.

Clip Toaster : Pastejacking Attack Detection and Response Technique (클립 토스터 : 페이스트재킹 공격 탐지 및 대응 기술)

  • Lee, Eun-young;Kil, Ye-Seul;Lee, Il-Gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.192-194
    • /
    • 2022
  • This paper analyzes the attack method of pastejacking and proposes a clip toaster that can effectively defend it. When programming, developers often copy and paste code from GitHub, Stack Overflow, or blogs. Pastejacking is an attack that injects malicious data into the clipboard when a user copies code posted on the web, resulting in security threats by executing malicious commands that the user does not intend or by inserting dangerous code snippets into the software. In this paper, we propose clip toaster to visualize and alertusers of threats to defend pastejacking that threatens the security of the developer's terminal and program code. Clip Toaster can visualize security threat notifications and effectively detect and respond to attacks without interfering with user actions.

  • PDF

Security Frameworks for Industrial Technology Leakage Prevention (산업기술 유출 방지를 위한 보안 프레임워크 연구)

  • YangKyu Lim;WonHyung Park;Hwansoo Lee
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.33-41
    • /
    • 2023
  • In recent years, advanced persistent threat (APT) attack organizations have exploited various vulnerabilities and attack techniques to target companies and institutions with national core technologies, distributing ransomware and demanding payment, stealing nationally important industrial secrets and distributing them on the black market (dark web), selling them to third countries, or using them to close the technology gap, requiring national-level security preparations. In this paper, we analyze the attack methods of attack organizations such as Kimsuky and Lazarus that caused industrial secrets leakage damage through APT attacks in Korea using the MITRE ATT&CK framework, and derive 26 cybersecurity-related administrative, physical, and technical security requirements that a company's security system should be equipped with. We also proposed a security framework and system configuration plan to utilize the security requirements in actual field. The security requirements presented in this paper provide practical methods and frameworks for security system developers and operators to utilize in security work to prevent leakage of corporate industrial secrets. In the future, it is necessary to analyze the advanced and intelligent attacks of various APT attack groups based on this paper and further research on related security measures.

Epigenetic Regulation of Fungal Development and Pathogenesis in the Rice Blast Fungus

  • Jeon, Junhyun
    • 한국균학회소식:학술대회논문집
    • /
    • 2014.10a
    • /
    • pp.11-11
    • /
    • 2014
  • Fungal pathogens have huge impact on health and economic wellbeing of human by causing life-threatening mycoses in immune-compromised patients or by destroying crop plants. A key determinant of fungal pathogenesis is their ability to undergo developmental change in response to host or environmental factors. Genetic pathways that regulate such morphological transitions and adaptation are therefore extensively studied during the last few decades. Given that epigenetic as well as genetic components play pivotal roles in development of plants and mammals, contribution of microbial epigenetic counterparts to this morphogenetic process is intriguing yet nearly unappreciated question to date. To bridge this gap in our knowledge, we set out to investigate histone modifications among epigenetic mechanisms that possibly regulate fungal adaptation and processes involved in pathogenesis of a model plant pathogenic fungus, Magnaporthe oryzae. M. oryzae is a causal agent of rice blast disease, which destroys 10 to 30% of the rice crop annually. Since the rice is the staple food for more than half of human population, the disease is a major threat to global food security. In addition to the socioeconomic impact of the disease it causes, the fungus is genetically tractable and can undergo well-defined morphological transitions including asexual spore production and appressorium (a specialized infection structure) formation in vitro, making it a model to study fungal development and pathogenicity. For functional and comparative analysis of histone modifications, a web-based database (dbHiMo) was constructed to archive and analyze histone modifying enzymes from eukaryotic species whose genome sequences are available. Histone modifying enzymes were identified applying a search pipeline built upon profile hidden Markov model (HMM) to proteomes. The database incorporates 22,169 histone-modifying enzymes identified from 342 species including 214 fungal, 33 plants, and 77 metazoan species. The dbHiMo provides users with web-based personalized data browsing and analysis tools, supporting comparative and evolutionary genomics. Based on the database entries, functional analysis of genes encoding histone acetyltransferases and histone demethylases is under way. Here I provide examples of such analyses that show how histone acetylation and methylation is implicated in regulating important aspects of fungal pathogenesis. Current analysis of histone modifying enzymes will be followed by ChIP-Seq and RNA-seq experiments to pinpoint the genes that are controlled by particular histone modifications. We anticipate that our work will provide not only the significant advances in our understanding of epigenetic mechanisms operating in microbial eukaryotes but also basis to expand our perspective on regulation of development in fungal pathogens.

  • PDF

A Critical Review on the Inherent Problems of MOOC (MOOC(Massive Open Online Course)의 근원적인 문제점들에 대한 비판적 고찰)

  • Yang, Dan-Hee
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.6
    • /
    • pp.293-299
    • /
    • 2015
  • MOOC (Massive Open Online Course) is an online course aimed at limited participation and open access via the web. There is even the prospect that MOOC may break down the existing university system and open a new horizon of education. However, MOOC is going differently from the first prospect that it would threat the existing higher education institutions. So this study wishes to provide a starting point of discussion that we can produce and utilize MOOC to fit our situation of higher education by revealing the inherent problems of MOOC. MOOC is a basically online education, so that it cannot help inheriting the essential weakness of the existing one: the interaction, supervision and evaluation. The newly added concept 'massive' raises the problem of class size which is the most sensitive part in the field of education. The concept 'open' reverses a customized education because MOOC is a kind of video clips of a lecture for unspecific massive learners. As a conclusion, we predicts that MOOC will be positioned as a higher education service for very prominent learners in self-led learning ability and people who cannot access even traditional online higher education institutions. Also MOOC is highly likely to be used as a means of Flipped Learning in universities. Therefore, considering these points in the future, we need to develop MOOC to suit these targets.

Antioxidant Responses in Brackish Water Flea Diaphanosoma celebensis - Exposed to Mercury (수은 노출에 대한 기수산 물벼룩 Diaphnosoma celebensis의 항산화 반응)

  • Bae, Chulhee;Lee, Young-Mi
    • Journal of Marine Life Science
    • /
    • v.3 no.2
    • /
    • pp.74-80
    • /
    • 2018
  • Mercury (Hg) poses a threat to marine ecosystem due to continuous inflow from various industries and bioaccumulation to higher trophic level via food web. Mercury can adversely affect growth, development, reproduction and metabolism to aquatic organisms. In the present study, acute toxicity and oxidative stress markers (total glutathione content, and activities of GST, GR and GPx) were investigated in brackish water flea Disphanosoma celebensis exposed to HgCl2 for 24 h. As results, Hg showed negative effect in survival of D. celebensis. 24 h-LC50 value was determined as 0.589 mg/l (95% C.I. 0.521~0.655 mg/l). After exposure to Hg (0.08 and 0.4 mg/l) for 24 h, total glutathione content was significantly decreased, whereas GST, GPx and GR activities were enhanced. These findings indicate that Hg induced oxidative stress in D. celebensis, and oxidative stress markers may be involved in cellular defense against Hg - mediated toxicity. This study provides a better understanding of molecular mode of action of Hg toxicity in this specie and potent of molecular markers for heavy metal monitoring in marine ecosystem.

Assessing the Habitat Potential of Eurasian Otter (Lutra lutra) in Cheonggye Stream Utilizing the Habitat Suitability Index (서식지 적합성 지수를 이용한 청계천 수달의 서식지 평가)

  • In-Yoo Kim;Kwang-Hun Choi;Dong-Wook W. Ko
    • Korean Journal of Environment and Ecology
    • /
    • v.37 no.2
    • /
    • pp.140-150
    • /
    • 2023
  • The Eurasian otter (Lutra lutra) is an apex predator of the riparian ecosystem. It is a keystone and an indicator species; consequently, its presence suggests a sustainable water environment. Otter is a keystone species as a predator at the top of the food web in the aquatic environment and an indicator species representing the health of the aquatic environment. Although Eurasian otters disappeared from the Han River urban water system because of anthropogenic activities like habitat destruction, poaching, and environmental pollution in the 1980s, the species were sighted in the Cheonggye Stream, Jungrang Stream, and Seongnae Stream, which are urban sections of the Han River, in 2016 and 2021. Therefore, it is pertinent to assess the habitat potential in the area for conservation and management measures to ensure its permanent presence. However, existing studies on otter habitats focused on natural rivers and reservoirs, and there is a limit to applying them to habitats artificially confined habitats in narrow spaces such as tributaries in urban areas of the Han River. This study selected the Cheonggye Stream, an artificially restored urban stream, to evaluate its potential as a habitat for Eurasian otters in urban water environments using the habitat suitability index (HSI). The HSI was calculated with selected environment attributes, such as the cover, food, and threat, that best describe the L. lutra habitat. According to the results, the confluence area of Seongbuk Stream and Cheonggye Stream and the confluence area of Cheonggye Stream and Jungnang Stream were suitable otter habitats, requiring appropriate conservation efforts. The HSI model suggests a valuable method to assess the habitat quality of Eurasian otters in urban water environments. The study is crucial as it can help rehabilitate the species' populations by identifying and managing potential Eurasian otter habitats in highly urbanized areas of the Han River basin and its tributaries.

An Efficient Estimation of Place Brand Image Power Based on Text Mining Technology (텍스트마이닝 기반의 효율적인 장소 브랜드 이미지 강도 측정 방법)

  • Choi, Sukjae;Jeon, Jongshik;Subrata, Biswas;Kwon, Ohbyung
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.2
    • /
    • pp.113-129
    • /
    • 2015
  • Location branding is a very important income making activity, by giving special meanings to a specific location while producing identity and communal value which are based around the understanding of a place's location branding concept methodology. Many other areas, such as marketing, architecture, and city construction, exert an influence creating an impressive brand image. A place brand which shows great recognition to both native people of S. Korea and foreigners creates significant economic effects. There has been research on creating a strategically and detailed place brand image, and the representative research has been carried out by Anholt who surveyed two million people from 50 different countries. However, the investigation, including survey research, required a great deal of effort from the workforce and required significant expense. As a result, there is a need to make more affordable, objective and effective research methods. The purpose of this paper is to find a way to measure the intensity of the image of the brand objective and at a low cost through text mining purposes. The proposed method extracts the keyword and the factors constructing the location brand image from the related web documents. In this way, we can measure the brand image intensity of the specific location. The performance of the proposed methodology was verified through comparison with Anholt's 50 city image consistency index ranking around the world. Four methods are applied to the test. First, RNADOM method artificially ranks the cities included in the experiment. HUMAN method firstly makes a questionnaire and selects 9 volunteers who are well acquainted with brand management and at the same time cities to evaluate. Then they are requested to rank the cities and compared with the Anholt's evaluation results. TM method applies the proposed method to evaluate the cities with all evaluation criteria. TM-LEARN, which is the extended method of TM, selects significant evaluation items from the items in every criterion. Then the method evaluates the cities with all selected evaluation criteria. RMSE is used to as a metric to compare the evaluation results. Experimental results suggested by this paper's methodology are as follows: Firstly, compared to the evaluation method that targets ordinary people, this method appeared to be more accurate. Secondly, compared to the traditional survey method, the time and the cost are much less because in this research we used automated means. Thirdly, this proposed methodology is very timely because it can be evaluated from time to time. Fourthly, compared to Anholt's method which evaluated only for an already specified city, this proposed methodology is applicable to any location. Finally, this proposed methodology has a relatively high objectivity because our research was conducted based on open source data. As a result, our city image evaluation text mining approach has found validity in terms of accuracy, cost-effectiveness, timeliness, scalability, and reliability. The proposed method provides managers with clear guidelines regarding brand management in public and private sectors. As public sectors such as local officers, the proposed method could be used to formulate strategies and enhance the image of their places in an efficient manner. Rather than conducting heavy questionnaires, the local officers could monitor the current place image very shortly a priori, than may make decisions to go over the formal place image test only if the evaluation results from the proposed method are not ordinary no matter what the results indicate opportunity or threat to the place. Moreover, with co-using the morphological analysis, extracting meaningful facets of place brand from text, sentiment analysis and more with the proposed method, marketing strategy planners or civil engineering professionals may obtain deeper and more abundant insights for better place rand images. In the future, a prototype system will be implemented to show the feasibility of the idea proposed in this paper.