• Title/Summary/Keyword: Attack Case

Search Result 625, Processing Time 0.032 seconds

Known-Key Attacks on 4-Branch GFN-2 Structures with SP F-Functions (SP F-함수를 갖는 4-브랜치 GFN-2 구조에 대한 기지키 공격)

  • Hong, Deukjo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.795-803
    • /
    • 2020
  • In this paper, we study known-key distinguishing and partial-collision attacks on GFN-2 structures with SP F-functions and various block lengths. Firstly, we show the known-key distinguishing attack is possible up to 15 rounds. Secondly, for the case that the last round function has the shuffle operation, we show that the partial-collision attack is possible up to 14 rounds. Finally, for the case that the last round function has no shuffle operation, we show that the partial-collision attacks are possible up to 11 rounds.

A study on the shape of supercavitation center line change according to the gravity and angle of attack effect (중력효과와 받음각 효과에 따른 초공동 형상 중심선 변화에 관한 연구)

  • Yi, Jong-Ju;Kim, Min-Jae;Paik, Bu-Geun;Kim, Kyung Chun
    • Journal of the Korean Society of Visualization
    • /
    • v.20 no.1
    • /
    • pp.18-28
    • /
    • 2022
  • In this study, a cavity shape measurement experiment was conducted by changing the diameter and the angle of attack of a disk cavitator. Since the gravity effect is proportional to the cavity volume, the larger the cavity, the greater the effect. It is concluded that the gravity effect becomes smaller as the cavitation number decreases because of a short cavity maintaining time. The cavity centerline rises in case of the positive angle of attack and descends in case of the negative angle of attack. Since the effect of the angle of attack is inversely proportional to the square of the cavity radius, the effect of the angle of attack becomes dominant in the vicinity of the cavitator. It is judged that the horizontal section of the cavity centerline cannot be extended because the factors affecting the gravity effect and the angle of attack effect are different.

An Attack Behavior Expressions for Web Attack Analysis and Composing Attack Database (웹 공격 분석 및 공격 데이터베이스 생성을 위한 효과적인 표현 방법에 관한 연구)

  • Lee, Chang-Hoon
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.5
    • /
    • pp.725-736
    • /
    • 2010
  • Nowadays, followed the internet service contents increasing makes also increase attack case on the web system. Usually web attack use mixed many kinds of attack mechanism for successfully attack to the server system. These increasing of the kinds attack mechanism, however web attack defence mechanism is not follow the spread of the attack. Therefore, for the defends web application, web attack should be categorizing and analysing for the effective defense. In this paper, we analyze web attack specification evidence and behavior system that use for effective expressions what we proposed. Also, we generate web attack scenario, it is for using verification of our proposed expressions.

A Study on the Microbial Contaminant Transport and Control Method According to Government Building Bio- Attack (청사 건물의 Bio-Attack에 따른 미생물 오염원 확산 및 제어방안에 관한 연구)

  • Lee, Hyun-Woo;Choi, Sang-Gon;Hong, Jin-Kwan
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.20 no.4
    • /
    • pp.252-259
    • /
    • 2008
  • The purpose of this study is to estimate the movement of microbial contaminant caused by bio-attack using bio-agent such as bacillus anthracis for preventing contaminant diffusion. multizone simulation was carried out in the case of three types of bio-attack scenario in the government building. Simulation results show that severe contaminant diffusion is brought about in all cases of bio-attack scenario in one hour, though pollution boundaries have different mode according to bio-attack scenarios. Simulation results also show that immune building technology such as filter and UVGI technology gives us powerful alternatives to meet the emergent situation caused by unexpected bio-attack.

Vulnerability Case Analysis of Wireless Moving Vehicle (무선이동체의 취약점 사례 분석)

  • Oh, Sangyun;Hong, Jinkeun
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.8
    • /
    • pp.41-46
    • /
    • 2018
  • As the industry related to drones has been activated, the public interest in drones has increased explosively, and many cases of drone-using are increasing. In the case of military drones, the security problem is the level of defense of the aircraft or cruise missiles, but commercial small and low cost drones are often released and utilized without security count-measure. This makes it possible for an attacker to easily gain access to the root of the drones, access internal files, or send fake packets. However, this droning problem can lead to another dangerous attack. In this regard, this paper has identified the vulnerabilities inherent in the commercial drones by analyzing the attack cases in the communication process of the specific drones. In this paper, we analyze and test the vulnerability in terms of scanning attack, meson attack, authentication revocation attack, packet stop command attack, packet retransmission attack, signal manipulation and de-compile attack. This study is useful for the analysis of drones attack and vulnerability.

The Study of Prediction Method of Cavity Shape Considering Both Gravity Effect and Angle of Attack of Cavitator (중력효과 및 캐비테이터 받음각 고려 공동 형상 예측기법 연구)

  • Kim, Minjae;Yi, Jongju;Kim, Sunbum
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.2
    • /
    • pp.180-187
    • /
    • 2018
  • In this study, we develop a prediction method of cavity shape taking gravity effect and angle of attack of cavitator into consideration simultaneously. Logvinovich's theoretical formulas are superimposed to predict the change of cavity centerline due to both gravity effect and angle of attack of cavitator. It is found that as the angle of attack of cavitator increases, the gravity effect is weakened due to decrease in cavity volume, and even in case of the same angle of attack, cavity shape changes in different ways depending on whether the angle of attack of cavitator is positive or negative. We conclude that cavity shapes are largely affected by the angle of attack of cavitator, and the gravity effect and angle of attack of cavitator should be considered at the same time for the prediction of cavity shape.

A Study on Effective Adversarial Attack Creation for Robustness Improvement of AI Models (AI 모델의 Robustness 향상을 위한 효율적인 Adversarial Attack 생성 방안 연구)

  • Si-on Jeong;Tae-hyun Han;Seung-bum Lim;Tae-jin Lee
    • Journal of Internet Computing and Services
    • /
    • v.24 no.4
    • /
    • pp.25-36
    • /
    • 2023
  • Today, as AI (Artificial Intelligence) technology is introduced in various fields, including security, the development of technology is accelerating. However, with the development of AI technology, attack techniques that cleverly bypass malicious behavior detection are also developing. In the classification process of AI models, an Adversarial attack has emerged that induces misclassification and a decrease in reliability through fine adjustment of input values. The attacks that will appear in the future are not new attacks created by an attacker but rather a method of avoiding the detection system by slightly modifying existing attacks, such as Adversarial attacks. Developing a robust model that can respond to these malware variants is necessary. In this paper, we propose two methods of generating Adversarial attacks as efficient Adversarial attack generation techniques for improving Robustness in AI models. The proposed technique is the XAI-based attack technique using the XAI technique and the Reference based attack through the model's decision boundary search. After that, a classification model was constructed through a malicious code dataset to compare performance with the PGD attack, one of the existing Adversarial attacks. In terms of generation speed, XAI-based attack, and reference-based attack take 0.35 seconds and 0.47 seconds, respectively, compared to the existing PGD attack, which takes 20 minutes, showing a very high speed, especially in the case of reference-based attack, 97.7%, which is higher than the existing PGD attack's generation rate of 75.5%. Therefore, the proposed technique enables more efficient Adversarial attacks and is expected to contribute to research to build a robust AI model in the future.

Cyber attack taxonomy for digital environment in nuclear power plants

  • Kim, Seungmin;Heo, Gyunyoung;Zio, Enrico;Shin, Jinsoo;Song, Jae-gu
    • Nuclear Engineering and Technology
    • /
    • v.52 no.5
    • /
    • pp.995-1001
    • /
    • 2020
  • With the development of digital instrumentation and control (I&C) devices, cyber security at nuclear power plants (NPPs) has become a hot issue. The Stuxnet, which destroyed Iran's uranium enrichment facility in 2010, suggests that NPPs could even lead to an accident involving the release of radioactive materials cyber-attacks. However, cyber security research on industrial control systems (ICSs) and supervisory control and data acquisition (SCADA) systems is relatively inadequate compared to information technology (IT) and further it is difficult to study cyber-attack taxonomy for NPPs considering the characteristics of ICSs. The advanced research of cyber-attack taxonomy does not reflect the architectural and inherent characteristics of NPPs and lacks a systematic countermeasure strategy. Therefore, it is necessary to more systematically check the consistency of operators and regulators related to cyber security, as in regulatory guide 5.71 (RG.5.71) and regulatory standard 015 (RS.015). For this reason, this paper attempts to suggest a template for cyber-attack taxonomy based on the characteristics of NPPs and exemplifies a specific cyber-attack case in the template. In addition, this paper proposes a systematic countermeasure strategy by matching the countermeasure with critical digital assets (CDAs). The cyber-attack cases investigated using the proposed cyber-attack taxonomy can be used as data for evaluation and validation of cyber security conformance for digital devices to be applied, and as effective prevention and mitigation for cyber-attacks of NPPs.

A Study on Aerodynamic Properties of Two-Dimensional Rectangular Prism in Various Angles of Attack (다양한 영각을 갖는 2차원 장방형 각주의 공력특성에 관한 연구)

  • 송근택;김유택;이영호
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.26 no.4
    • /
    • pp.485-492
    • /
    • 2002
  • The present study is aimed to reveal macroscopic aerodynamic characteristics of two-dimensional rectangular prisms with three aspect ratios(D/H=1, 2 and 3) and six angles of attack($0^{circ}, 10^{circ}, 13.5^{circ}, 20^{circ}, 30^{circ} and 45^{\circ}$). The Reynolds number is fixed as $1\times10^4$. The SOLA-based revised finite difference method for the conservation form on irregular grid was adopted as a new numerical method. Instantaneous flow patterns at $45^{\circ}$ in case of D/H=2 and D/H=3 show larger asymmetric wake development which is closely related to the sharp decrease of drag coefficients at higher angles of attack range. Vorticity propagation into enlarged wake region is conjectured to be responsible for this phenomenon. The Strouhal number is found to be sensitive to the angle of attack at higher aspect ratios(D/H=2 and 3).

Study on Hit Judgement Model of MMORPG - in case of Travia Online - (MMORPG 히트판정 모델에 관한 연구 - 트라비아 온라인을 중심으로 -)

  • Sohn Hyoung-Ryul
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.6
    • /
    • pp.172-177
    • /
    • 2005
  • Hit judgement is essential factor in design for battle-style MMORPG game system and sets foundation for other game systems. Hit judgement model consists of attack power and attack rate. The former contains minimum, maximum, and critical attack, the latter has miss, hit, and critical blow rate. Random function generates one value of attack rate and consequently the damage is calculated. In this article, we propose hit judgement model which Is widely acceptable for generic MMORPG and describe the effort of applying the proposed model to Travia Online in detail.

  • PDF