• 제목/요약/키워드: attacks and countermeasures

검색결과 210건 처리시간 0.022초

A Study on the Countermeasures for Securing Safety of Ship from Piracy Attacks

  • Noh, Seung-Dae;Kim, Cheol-Seung;Park, Sung-Hyeon
    • 한국항해항만학회지
    • /
    • 제36권4호
    • /
    • pp.273-278
    • /
    • 2012
  • This study is concerned with the applicable countermeasures for securing safety of ship from piracy attacks. For improvements and countermeasures, we analyzed the recent anti-piracy trends. In spite of international community's various activities for safety navigating, the number of piracy in Gulf of Aden and in the vicinity of Somali waters has been increasing dramatically in the last few years, so has the number of piracy on Korean vessels. In case of piracy attack which based on Somalia, it continues constantly and widely not only near shore, but coastal and oceanic waters. This study figures out the limitations of international community's efforts including military and legal improvements. There are no studies concerning the countermeasures of bridge protection by piracy. This study suggested the additional installation of outside door of bridge as well as the adjustment of piracy operation area(POA) of Korea navy.

미국의 생물테러대책에 관한 고찰 (Perspective on Bioterrorism in the United States)

  • 강영길;권정훈
    • 한국재난정보학회 논문집
    • /
    • 제5권1호
    • /
    • pp.10-27
    • /
    • 2009
  • The fear briefly became reality in the U.S. after 9/11, as man-made anthrax spores were found in letters and in east coast post offices on a number of occasions. Anthrax attacks must be related to the terrorist attacks of September 11. These two accidents changed the situation completely. Characteristics are summarized as belows. First, it is necessary for all countries to create each own appropriate countermeasures against bioterrorism. In addition, it is urgent to consider countermeasures focusing on bioterror characteristics that terrorists may use biological agents because they can be extremely difficult to detect and do not cause illness for several hours to several days. Otherwise, those attacks will also show the panic and very real danger posed by the release of such toxins on an unsuspecting public. Second, it is crucial to manage the result thoroughly. A biological weapon is useful to a terrorist group mainly as a method of creating mass panic and disruption to a society. Because it is not easy to predict and collect information about how terrorists utilize pathogenic microbe as well as terror measures in their activities, more realistic approach should be taken to reduce damage. Third, to expand investment in research and development is necessary. Considering advances in microbiology and genetic engineering lately, it is likely that new pathogenic microbe would be created by the enemy. For that matter, it is imperative that medical countermeasures should be devised.

  • PDF

차량용 LiDAR 센서 물리적 신호교란 공격 중심의 실험적 분석과 대응방안 제안 (Experimental Analysis of Physical Signal Jamming Attacks on Automotive LiDAR Sensors and Proposal of Countermeasures)

  • 황지웅;윤요섭;오인수;임강빈
    • 정보보호학회논문지
    • /
    • 제34권2호
    • /
    • pp.217-228
    • /
    • 2024
  • 자율주행 자동차의 안전한 운행을 위해 카메라, RADAR(RAdio Detection And Ranging), 초음파 센서 중 중추적인 역할을 하는 LiDAR(Light Detection And Ranging) 센서는 360도에서 사물을 인식하고 탐지할 수 있다. 하지만 이러한 LiDAR 센서는 레이저를 통해서 거리를 측정하기 때문에 공격자에 노출되기 쉬우며 다양한 보안위협에 직면해있다. 따라서 본 논문에서는 LiDAR 센서를 대상으로 한 여러 가지 보안 위협인 Relay, Spoofing, Replay 공격을 살펴보고 물리적 신호교란(Jamming) 공격의 가능성과 그 영향을 분석하며, 이러한 공격이 자율주행 시스템의 안정성에 미치는 위험을 분석한다. 실험을 통해, 물리적 신호교란 공격이 LiDAR 센서의 거리 측정 능력에 오류를 유발할 수 있음을 보여준다. 개발이 진행 중인 차량 간 통신(Vehicle-to-Vehicle, V2V), 다중 센서 융합과 LiDAR 비정상 데이터 탐지를 통해 이러한 위협에 대한 대응방안과 자율주행 차량의 보안 강화를 위한 기초적인 방향을 제시하고 향후 연구에서 제안된 대응방안의 실제 적용 가능성과 효과를 검증하는 것을 목표로 한다.

A Survey on the Detection of SQL Injection Attacks and Their Countermeasures

  • Nagpal, Bharti;Chauhan, Naresh;Singh, Nanhay
    • Journal of Information Processing Systems
    • /
    • 제13권4호
    • /
    • pp.689-702
    • /
    • 2017
  • The Structured Query Language (SQL) Injection continues to be one of greatest security risks in the world according to the Open Web Application Security Project's (OWASP) [1] Top 10 Security vulnerabilities 2013. The ease of exploitability and severe impact puts this attack at the top. As the countermeasures become more sophisticated, SOL Injection Attacks also continue to evolve, thus thwarting the attempt to eliminate this attack completely. The vulnerable data is a source of worry for government and financial institutions. In this paper, a detailed survey of different types of SQL Injection and proposed methods and theories are presented, along with various tools and their efficiency in intercepting and preventing SQL attacks.

DEVS-based Modeling Methodology for Cybersecurity Simulations from a Security Perspective

  • Kim, Jiyeon;Kim, Hyung-Jong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권5호
    • /
    • pp.2186-2203
    • /
    • 2020
  • Security administrators of companies and organizations need to come up with proper countermeasures against cyber-attacks considering infrastructures and security policies in their possession. In order to develop and verify such countermeasures, the administrators should be able to reenact both cyber-attacks and defenses. Simulations can be useful for the reenactment by overcoming its limitations including high risk and cost. If the administrators are able to design various scenarios of cyber-attacks and to develop simulation models from their viewpoints, they can simulate desired situations and observe the results more easily. It is challenging to simulate cyber-security issues, because there is lack of theoretical basis for modeling a wide range of the security field as well as pre-defined basic components used to model cyber-attacks. In this paper, we propose a modeling method for cyber-security simulations by developing a basic component and a composite model, called Abstracted Cyber-Security Unit Model (ACSUM) and Abstracted Cyber-security SIMulation model (ACSIM), respectively. The proposed models are based on DEVS(Discrete Event systems Specification) formalism, a modeling theory for discrete event simulations. We develop attack scenarios by sequencing attack behaviors using ACSUMs and then model ACSIMs by combining and abstracting the ACSUMs from a security perspective. The concepts of ACSUM and ACSIM enable the security administrators to simulate numerous cyber-security issues from their viewpoints. As a case study, we model a worm scenario using ACSUM and simulate three types of simulation models based on ACSIM from a different security perspective.

Threats of MANPADS and Its Counter-Measures

  • Choi, Jin-Tai
    • International Journal of Contents
    • /
    • 제6권3호
    • /
    • pp.89-96
    • /
    • 2010
  • The International air transportation industry provides a vital communication link which brings prosperity to many states in our modern age. This invaluable link has been threatened by terrorism. Airlines have been one of the most attractive targets in the eyes of terrorists for several reasons, including particularly the international and symbolic nature of aviation, and the potential of multigovernmental involvement which can inevitably generate wide publicity. Terrorist attacks against civil aviation have been committed since the earliest days of civil aviation history. The first attack against civil aircraft dates back to the early 1930s. Since then, aircraft hijacking and other forms of attack against air transport operations have become one of the most serious challenges to the safety of flying. In recent years, a new form of threats against civil aviation has appeared. Man-portable air defense systems (MANPADS) in the hands of criminals, terrorists, and other non-state actors pose a serious potential threat to passenger air travel, the commercial aviation industry, and military aircraft around the world. The purpose of this study is to provide some countermeasures against such attacks. In order to foster a better understanding of the problem, an introduction of MANPADS and a brief history of attacks using MANPADS are presented. It also examines the level of threats, trends of attacks using MANPADS and the possible countermeasures to be taken by the international community.

오류 확산 기법을 이용한 CRT-RSA 오류 주입 공격 대응 방안 (A Countermeasure Resistant to Fault Attacks on CRT-RSA using Fault Infective Method)

  • 하재철;박제훈;문상재
    • 정보보호학회논문지
    • /
    • 제18권2호
    • /
    • pp.75-84
    • /
    • 2008
  • 최근 일반 CRT-RSA 알고리듬은 오류 주입 공격에 취약하다는 점이 실험적 결과에 의해 밝혀졌다. 본 논문에서는 CRT-RSA에 대한 오류 주입 공격 및 방어 대책을 분석하고 다양한 형태의 오류 주입 공격을 방어할 수 있는 새로운 알고리듬을 제안하고자 한다. 제안하는 알고리듬은 CRT-RSA에서 두 소수에 대한 멱승연산 시 오류가 발생하면 그 오류를 재결합 과정에서 확산되도록 설계하였다. 이 알고리듬은 판정 기법에 기반한 오류를 검사하는 과정이 없으며 공개 파라미터 e를 사용하지 않는다. 또한 계산량 측면에서도 안전성을 갖춘 타 방식에 비해 효율적이다.

긴급제언: 해킹대응과 기술사의 역할 (Professional Engineer's Role to Respond to Haeker Attacks)

  • 권영관
    • 기술사
    • /
    • 제44권5호
    • /
    • pp.26-30
    • /
    • 2011
  • The hacking attacks as a DDoS attack on a telecommunications network has depleted the network resources. When hacking attack occurs a user can not access to the network and can not use the telecommunication services. Professional Engineers with expertise and experience in the field of Information and communication could play an important role to respond to the hacking attacks. Professional Engineers will build the information and communication network system for the hacking countermeasures.

  • PDF

A Survey on Defense Mechanism against Distributed Denial of Service (DDoS) Attacks in Control System

  • Kwon, YooJin
    • KEPCO Journal on Electric Power and Energy
    • /
    • 제1권1호
    • /
    • pp.55-59
    • /
    • 2015
  • Denial of Service (DoS) attack is to interfere the normal user from using the information technology services. With a rapid technology improvements in computer and internet environment, small sized DoS attacks targeted to server or network infrastructure have been disabled. Thus, Distributed Denial of Service (DDoS) attacks that utilizes from tens to several thousands of distributed computers as zombie PC appear to have as one of the most challenging threat. In this paper, we categorize the DDoS attacks and classify existing countermeasures based on where and when they prevent, detect, and respond to the DDoS attacks. Then we propose a comprehensive defense mechanism against DDoS attacks in Control System to detect attacks efficiently.

Quantitative Approach for Calculating DRDoS Risk

  • Young-Ryul Choi;Nam-Kyun Baik
    • Journal of information and communication convergence engineering
    • /
    • 제21권3호
    • /
    • pp.192-197
    • /
    • 2023
  • A Distributed reflection denial of service (DRDoS) is a variant of DDoS attacks that threatens the availability of services to legitimate users. In response to this evolving threat landscape, the cybersecurity industry and service providers have intensified their efforts to develop effective countermeasures. Despite these efforts, attackers continue to innovate, developing new strategies and tools while becoming more sophisticated. Consequently, DRDoS attacks continue to be harmful. Therefore, ongoing research and development is essential to improve defense against DRDoS attacks. To advance our understanding and analysis of DRDoS attacks, this study examines the unique characteristics of DRDoS attacks and quantifies the risks involved. Additionally, it adopts a quantitative rather than traditional qualitative methods to derive and apply risk, particularly the probability of loss that can be caused by DRDoS attacks.