• Title/Summary/Keyword: Attack Mitigation

Search Result 51, Processing Time 0.027 seconds

A brief review of national management system in public health and medical aspect (보건의료관점에서 본 국가재난안전관리 체계 및 대책)

  • Kim, Jee-Hee;Lee, Si-Young
    • 한국방재학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.375-376
    • /
    • 2008
  • Recently the increase of natural disaster and man-made disaster, newly emerging infectious diseases and bioterrorism attack changed the world in many aspects. So the Ministry of Health and Welfare and other related agencies are trying to solve the problems with disasters. We discussed these problems in the following eleven categories. (1) emergency medicine (2) communicable disease control, (3) food safety control, (4) public facilities safety, (5) social welfare facilities safety, (6) bioterrorism control, (7) geriatric health care, (8) insurance support, (9) overseas disaster victim support, (10) national organization protection, (11) fire fighter safety in forest fire. Through the reviews on the various kinds of disaster, we proposed the disaster control measure for the near future.

  • PDF

Risk-based Security Impact Evaluation of Bridges for Terrorism (Security and Risk를 기반으로 한 교량구조물의 재난 안전성 평가)

  • Kang, Sang-Hyeok;Choi, Hyun-Ho;Seo, Jong-Won
    • 한국방재학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.629-632
    • /
    • 2008
  • Risk-based security impact evaluation may be affected by various factors according to numerous combinations of explosive devices, cutting devices, impact vehicles, and specific attack location to consider. Presently, in planning and design phases, designers are still often uncertain of their responsibility, lack of information and training of security. Therefore, designers are still failing to exploit the potential to reduce threats on site. In this study, the concept of security impact assessment is introduced in order to derive the performing design for safety in design phase. For this purpose, a framework for security impact assessment model using risk-based approach for bridge structures is suggested. The suggested model includes of information survey, classification of terror threats, and quantitative estimation of severity and occurrence.

  • PDF

A study of Power analysis Attack Mitigation for RISC-V processor (RISC-V 프로세서에 대한 전력 분석 완화 기법 연구)

  • Kibong Kang;Yunheung Paek
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.358-361
    • /
    • 2024
  • 2010 년 UC Berkely 에서 개발한 RISC-V ISA 는 x86, Arm 과 다르게 Free Open-source 라는 장점으로 인해 많은 연구와 개발이 이루어지고 있다. RISC-V ISA 는 RISC 명령어셋을 활용하며 서버 및 데스트탑 CPU 부터 IoT 디바이스까지 여러 방면에서 상용을 위한 노력이 계속되고 있다. 하지만 상용 CPU 에 비해 부채널 공격 방어 기법이 제한적으로 구현되어 있는 것을 확인하였고 특히 부채널 공격 중 전력 분석(Power Analysis)에 대한 방어 기법이 부족한 것을 확인하였다. 따라서 본 논문에서는 RISC-V 를 포함한 여러 아키텍처에 대해 전력 분석 및 하드웨어 방어 기법을 분석하고, RISC-V에 추가적으로 적용되어야 할 방어 기법에 대해 서술한다.

Effect of Bacillus aryabhattai H26-2 and B. siamensis H30-3 on Growth Promotion and Alleviation of Heat and Drought Stresses in Chinese Cabbage

  • Shin, Da Jeong;Yoo, Sung-Je;Hong, Jeum Kyu;Weon, Hang-Yeon;Song, Jaekyeong;Sang, Mee Kyung
    • The Plant Pathology Journal
    • /
    • v.35 no.2
    • /
    • pp.178-187
    • /
    • 2019
  • Plants are exposed to biotic stresses caused by pathogen attack and complex abiotic stresses including heat and drought by dynamic climate changes. To alleviate these stresses, we investigated two bacterial stains, H26-2 and H30-3 in two cultivars ('Ryeokkwang' and 'Buram-3-ho') of Chinese cabbage in plastic pots in a greenhouse. We evaluated effects of bacterial strains on plant growth-promotion and mitigation of heat and drought stresses; the role of exopolysaccharides as one of bacterial determinants on alleviating stresses; biocontrol activity against soft rot caused by Pectobacterium carotovorum subsp. carotovorum PCC21. Strains H26-2 and H30-3 significantly increased fresh weights compared to a $MgSO_4$ solution; reduced leaf wilting and promoted recovery after re-watering under heat and drought stresses. Chinese cabbages treated with H26-2 and H30-3 increased leaf abscisic acid (ABA) content and reduced stomatal opening after stresses treatments, in addition, these strains stably colonized and maintained their populations in rhizosphere during heat and drought stresses. As well as tested bacterial cells, exopolysaccharides (EPS) of H30-3 could be one of bacterial determinants for alleviation of tested stresses in Chinese cabbages, however, the effects were different to cultivars of Chinese cabbages. In addition to bacterial activity to abiotic stresses, H30-3 could suppress incidence (%) of soft rot in 'Buram-3-ho'. The tested strains were identified as Bacillus aryabhattai H26-2 and B. siamensis H30-3 based on 16S rRNA gene sequence analysis. Taken together, H26-2 and H30-3 could be candidates for both plant growth promotion and mitigation of heat and drought stresses in Chinese cabbage.

A Hybrid K-anonymity Data Relocation Technique for Privacy Preserved Data Mining in Cloud Computing

  • S.Aldeen, Yousra Abdul Alsahib;Salleh, Mazleena
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.51-58
    • /
    • 2016
  • The unprecedented power of cloud computing (CC) that enables free sharing of confidential data records for further analysis and mining has prompted various security threats. Thus, supreme cyberspace security and mitigation against adversaries attack during data mining became inevitable. So, privacy preserving data mining is emerged as a precise and efficient solution, where various algorithms are developed to anonymize the data to be mined. Despite the wide use of generalized K-anonymizing approach its protection and truthfulness potency remains limited to tiny output space with unacceptable utility loss. By combining L-diversity and (${\alpha}$,k)-anonymity, we proposed a hybrid K-anonymity data relocation algorithm to surmount such limitation. The data relocation being a tradeoff between trustfulness and utility acted as a control input parameter. The performance of each K-anonymity's iteration is measured for data relocation. Data rows are changed into small groups of indistinguishable tuples to create anonymizations of finer granularity with assured privacy standard. Experimental results demonstrated considerable utility enhancement for relatively small number of group relocations.

CacheSCDefender: VMM-based Comprehensive Framework against Cache-based Side-channel Attacks

  • Yang, Chao;Guo, Yunfei;Hu, Hongchao;Liu, Wenyan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.6098-6122
    • /
    • 2018
  • Cache-based side-channel attacks have achieved more attention along with the development of cloud computing technologies. However, current host-based mitigation methods either provide bad compatibility with current cloud infrastructure, or turn out too application-specific. Besides, they are defending blindly without any knowledge of on-going attacks. In this work, we present CacheSCDefender, a framework that provides a (Virtual Machine Monitor) VMM-based comprehensive defense framework against all levels of cache attacks. In designing CacheSCDefender, we make three key contributions: (1) an attack-aware framework combining our novel dynamic remapping and traditional cache cleansing, which provides a comprehensive defense against all three cases of cache attacks that we identify in this paper; (2) a new defense method called dynamic remapping which is a developed version of random permutation and is able to deal with two cases of cache attacks; (3) formalization and quantification of security improvement and performance overhead of our defense, which can be applicable to other defense methods. We show that CacheSCDefender is practical for deployment in normal virtualized environment, while providing favorable security guarantee for virtual machines.

Insights into the corrosion inhibition of steel rebar in chloride-contaminated synthetic concrete pore solutions by a new hydrazone (새로운 히드라존에 의한 염화물 오염 합성 콘크리트 공극 솔루션에서 철근의 부식 억제에 대한 통찰력)

  • Lgaz, Hassane;Lee, Han-seung
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2022.04a
    • /
    • pp.101-102
    • /
    • 2022
  • A new hydrazone derivatives namely (E)-N'-(4-(dimethylamino)benzylidene)-2-(5-methoxy-2-methyl-1H-indol-3-yl)acetohydrazide (HIND) has been confirmed for mitigating the corrosion of the steel rebar exposed to chloride contaminated synthetic concrete pore solution (ClSCPS). The mitigation of corrosion properties has been characterized by weight loss and electrochemical methods (Electrochemical impedance, Potentiodynamic polarization studies) as well as surface observations. The presence of HIND in the ClSCPS decreased the corrosion of steel rebar by adsorption of HIND molecules on the surface of the steel rebar. The optimal HIND concentration was 0.5 mmol/L, corresponding to an inhibition efficiency of 88.4%. The use of HIND enables the corrosion process to have a higher energy barrier. X-ray photo electron spectroscopy (XPS), atomic force microscopy (AFM), scanning electron microscopy-energy-dispersive spectroscopy (SEM-EDS), and X-ray diffraction (XRD) spectroscopy interpretations confirmed that HIND mitigates the corrosion attack on the surface steel rebar.

  • PDF

An Experimental Study on the dynamic behavior of 4-Span Cable-Stayed Bridge with ${\pi}$-Type Girder (${\pi}$형 거더를 가진 4경간 사장교의 동적거동에 관한 실험적 연구)

  • Cho, Jae-Young;Kim, Young-Min;Lee, Hak-Eun;Yoon, Ki-Yong
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.4 no.1 s.12
    • /
    • pp.15-24
    • /
    • 2004
  • Generally, a ${\pi}$-type girder composed of two I-type girders is known to have a significant disadvantage in wind resistance design because of aerodynamic instability. A representative bridge for this girder was Tacoma Narrows Bridge. Since Tacoma Narrows Bridge had very low stiffness of the bridge structure and its cross-section shape had aerodynamic instability, the bridge collapsed after severe torsion and vibration events in 19m/s wind speed. Aerodynamic vibration can be avoided by enhancing structural stiffness and damping factor and conducting a study of cross-section shapes. This study shows the angle of attack for the four-span cable stayed bridge having ${\pi}$-type cross-section and describes the aerodynamic characteristics of the changed cross-section with aerodynamic vibration damping additions, by carrying out two-dimension vibration tests. As a result of uniform flow and turbulent flow, the study shows that because the basic ${\pi}$-type cross-section alone can have efficient wind resistant stability, there is no need to have additional aerodynamic damping equipment. Since this four 230m-main-span bridge has a large frequency and also has a big stiffness compared to other bridges containing a similar cross-section, it has aerodynamic stability under the design wind speed.

Extraction and Taxonomy of Ransomware Features for Proactive Detection and Prevention (사전 탐지와 예방을 위한 랜섬웨어 특성 추출 및 분류)

  • Yoon-Cheol Hwang
    • Journal of Industrial Convergence
    • /
    • v.21 no.9
    • /
    • pp.41-48
    • /
    • 2023
  • Recently, there has been a sharp increase in the damages caused by ransomware across various sectors of society, including individuals, businesses, and nations. Ransomware is a malicious software that infiltrates user computer systems, encrypts important files, and demands a ransom in exchange for restoring access to the files. Due to its diverse and sophisticated attack techniques, ransomware is more challenging to detect than other types of malware, and its impact is significant. Therefore, there is a critical need for accurate detection and mitigation methods. To achieve precise ransomware detection, an inference engine of a detection system must possess knowledge of ransomware features. In this paper, we propose a model to extract and classify the characteristics of ransomware for accurate detection of ransomware, calculate the similarity of the extracted characteristics, reduce the dimension of the characteristics, group the reduced characteristics, and classify the characteristics of ransomware into attack tools, inflow paths, installation files, command and control, executable files, acquisition rights, circumvention techniques, collected information, leakage techniques, and state changes of the target system. The classified characteristics were applied to the existing ransomware to prove the validity of the classification, and later, if the inference engine learned using this classification technique is installed in the detection system, most of the newly emerging and variant ransomware can be detected.

Design of a Security System to Defeat Abnormal IPSec Traffic in IPv6 Networks (IPv6 환경에서 비정상 IPSec 트래픽 대응 보안 시스템 설계)

  • Kim Ka-Eul;Ko Kwang-Sun;Gyeong Gye-Hyeon;Kang Seong-Goo;Eom Young-Ik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.4
    • /
    • pp.127-138
    • /
    • 2006
  • The IPSec is a basic security mechanism of the IPv6 protocol, which can guarantee an integrity and confidentiality of data that transmit between two corresponding hosts. Also, both data and communication subjects can be authenticated using the IPSec mechanism. However, it is difficult that the IPSec mechanism protects major important network from attacks which transmit mass abnormal IPSec traffic in session-configuration or communication phases. In this paper, we present a design of the security system that can effectively detect and defeat abnormal IPSec traffic, which is encrypted by the ESP extension header, using the IPSec Session and Configuration table without any decryption. This security system is closely based on a multi-tier attack mitigation mechanism which is based on network bandwidth management and aims to counteract DDoS attacks and DoS effects of worm activity.