• Title/Summary/Keyword: Attack Mitigation

Search Result 48, Processing Time 0.023 seconds

Effect of Bacillus aryabhattai H26-2 and B. siamensis H30-3 on Growth Promotion and Alleviation of Heat and Drought Stresses in Chinese Cabbage

  • Shin, Da Jeong;Yoo, Sung-Je;Hong, Jeum Kyu;Weon, Hang-Yeon;Song, Jaekyeong;Sang, Mee Kyung
    • The Plant Pathology Journal
    • /
    • v.35 no.2
    • /
    • pp.178-187
    • /
    • 2019
  • Plants are exposed to biotic stresses caused by pathogen attack and complex abiotic stresses including heat and drought by dynamic climate changes. To alleviate these stresses, we investigated two bacterial stains, H26-2 and H30-3 in two cultivars ('Ryeokkwang' and 'Buram-3-ho') of Chinese cabbage in plastic pots in a greenhouse. We evaluated effects of bacterial strains on plant growth-promotion and mitigation of heat and drought stresses; the role of exopolysaccharides as one of bacterial determinants on alleviating stresses; biocontrol activity against soft rot caused by Pectobacterium carotovorum subsp. carotovorum PCC21. Strains H26-2 and H30-3 significantly increased fresh weights compared to a $MgSO_4$ solution; reduced leaf wilting and promoted recovery after re-watering under heat and drought stresses. Chinese cabbages treated with H26-2 and H30-3 increased leaf abscisic acid (ABA) content and reduced stomatal opening after stresses treatments, in addition, these strains stably colonized and maintained their populations in rhizosphere during heat and drought stresses. As well as tested bacterial cells, exopolysaccharides (EPS) of H30-3 could be one of bacterial determinants for alleviation of tested stresses in Chinese cabbages, however, the effects were different to cultivars of Chinese cabbages. In addition to bacterial activity to abiotic stresses, H30-3 could suppress incidence (%) of soft rot in 'Buram-3-ho'. The tested strains were identified as Bacillus aryabhattai H26-2 and B. siamensis H30-3 based on 16S rRNA gene sequence analysis. Taken together, H26-2 and H30-3 could be candidates for both plant growth promotion and mitigation of heat and drought stresses in Chinese cabbage.

A Hybrid K-anonymity Data Relocation Technique for Privacy Preserved Data Mining in Cloud Computing

  • S.Aldeen, Yousra Abdul Alsahib;Salleh, Mazleena
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.51-58
    • /
    • 2016
  • The unprecedented power of cloud computing (CC) that enables free sharing of confidential data records for further analysis and mining has prompted various security threats. Thus, supreme cyberspace security and mitigation against adversaries attack during data mining became inevitable. So, privacy preserving data mining is emerged as a precise and efficient solution, where various algorithms are developed to anonymize the data to be mined. Despite the wide use of generalized K-anonymizing approach its protection and truthfulness potency remains limited to tiny output space with unacceptable utility loss. By combining L-diversity and (${\alpha}$,k)-anonymity, we proposed a hybrid K-anonymity data relocation algorithm to surmount such limitation. The data relocation being a tradeoff between trustfulness and utility acted as a control input parameter. The performance of each K-anonymity's iteration is measured for data relocation. Data rows are changed into small groups of indistinguishable tuples to create anonymizations of finer granularity with assured privacy standard. Experimental results demonstrated considerable utility enhancement for relatively small number of group relocations.

CacheSCDefender: VMM-based Comprehensive Framework against Cache-based Side-channel Attacks

  • Yang, Chao;Guo, Yunfei;Hu, Hongchao;Liu, Wenyan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.6098-6122
    • /
    • 2018
  • Cache-based side-channel attacks have achieved more attention along with the development of cloud computing technologies. However, current host-based mitigation methods either provide bad compatibility with current cloud infrastructure, or turn out too application-specific. Besides, they are defending blindly without any knowledge of on-going attacks. In this work, we present CacheSCDefender, a framework that provides a (Virtual Machine Monitor) VMM-based comprehensive defense framework against all levels of cache attacks. In designing CacheSCDefender, we make three key contributions: (1) an attack-aware framework combining our novel dynamic remapping and traditional cache cleansing, which provides a comprehensive defense against all three cases of cache attacks that we identify in this paper; (2) a new defense method called dynamic remapping which is a developed version of random permutation and is able to deal with two cases of cache attacks; (3) formalization and quantification of security improvement and performance overhead of our defense, which can be applicable to other defense methods. We show that CacheSCDefender is practical for deployment in normal virtualized environment, while providing favorable security guarantee for virtual machines.

Insights into the corrosion inhibition of steel rebar in chloride-contaminated synthetic concrete pore solutions by a new hydrazone (새로운 히드라존에 의한 염화물 오염 합성 콘크리트 공극 솔루션에서 철근의 부식 억제에 대한 통찰력)

  • Lgaz, Hassane;Lee, Han-seung
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2022.04a
    • /
    • pp.101-102
    • /
    • 2022
  • A new hydrazone derivatives namely (E)-N'-(4-(dimethylamino)benzylidene)-2-(5-methoxy-2-methyl-1H-indol-3-yl)acetohydrazide (HIND) has been confirmed for mitigating the corrosion of the steel rebar exposed to chloride contaminated synthetic concrete pore solution (ClSCPS). The mitigation of corrosion properties has been characterized by weight loss and electrochemical methods (Electrochemical impedance, Potentiodynamic polarization studies) as well as surface observations. The presence of HIND in the ClSCPS decreased the corrosion of steel rebar by adsorption of HIND molecules on the surface of the steel rebar. The optimal HIND concentration was 0.5 mmol/L, corresponding to an inhibition efficiency of 88.4%. The use of HIND enables the corrosion process to have a higher energy barrier. X-ray photo electron spectroscopy (XPS), atomic force microscopy (AFM), scanning electron microscopy-energy-dispersive spectroscopy (SEM-EDS), and X-ray diffraction (XRD) spectroscopy interpretations confirmed that HIND mitigates the corrosion attack on the surface steel rebar.

  • PDF

An Experimental Study on the dynamic behavior of 4-Span Cable-Stayed Bridge with ${\pi}$-Type Girder (${\pi}$형 거더를 가진 4경간 사장교의 동적거동에 관한 실험적 연구)

  • Cho, Jae-Young;Kim, Young-Min;Lee, Hak-Eun;Yoon, Ki-Yong
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.4 no.1 s.12
    • /
    • pp.15-24
    • /
    • 2004
  • Generally, a ${\pi}$-type girder composed of two I-type girders is known to have a significant disadvantage in wind resistance design because of aerodynamic instability. A representative bridge for this girder was Tacoma Narrows Bridge. Since Tacoma Narrows Bridge had very low stiffness of the bridge structure and its cross-section shape had aerodynamic instability, the bridge collapsed after severe torsion and vibration events in 19m/s wind speed. Aerodynamic vibration can be avoided by enhancing structural stiffness and damping factor and conducting a study of cross-section shapes. This study shows the angle of attack for the four-span cable stayed bridge having ${\pi}$-type cross-section and describes the aerodynamic characteristics of the changed cross-section with aerodynamic vibration damping additions, by carrying out two-dimension vibration tests. As a result of uniform flow and turbulent flow, the study shows that because the basic ${\pi}$-type cross-section alone can have efficient wind resistant stability, there is no need to have additional aerodynamic damping equipment. Since this four 230m-main-span bridge has a large frequency and also has a big stiffness compared to other bridges containing a similar cross-section, it has aerodynamic stability under the design wind speed.

Extraction and Taxonomy of Ransomware Features for Proactive Detection and Prevention (사전 탐지와 예방을 위한 랜섬웨어 특성 추출 및 분류)

  • Yoon-Cheol Hwang
    • Journal of Industrial Convergence
    • /
    • v.21 no.9
    • /
    • pp.41-48
    • /
    • 2023
  • Recently, there has been a sharp increase in the damages caused by ransomware across various sectors of society, including individuals, businesses, and nations. Ransomware is a malicious software that infiltrates user computer systems, encrypts important files, and demands a ransom in exchange for restoring access to the files. Due to its diverse and sophisticated attack techniques, ransomware is more challenging to detect than other types of malware, and its impact is significant. Therefore, there is a critical need for accurate detection and mitigation methods. To achieve precise ransomware detection, an inference engine of a detection system must possess knowledge of ransomware features. In this paper, we propose a model to extract and classify the characteristics of ransomware for accurate detection of ransomware, calculate the similarity of the extracted characteristics, reduce the dimension of the characteristics, group the reduced characteristics, and classify the characteristics of ransomware into attack tools, inflow paths, installation files, command and control, executable files, acquisition rights, circumvention techniques, collected information, leakage techniques, and state changes of the target system. The classified characteristics were applied to the existing ransomware to prove the validity of the classification, and later, if the inference engine learned using this classification technique is installed in the detection system, most of the newly emerging and variant ransomware can be detected.

Design of a Security System to Defeat Abnormal IPSec Traffic in IPv6 Networks (IPv6 환경에서 비정상 IPSec 트래픽 대응 보안 시스템 설계)

  • Kim Ka-Eul;Ko Kwang-Sun;Gyeong Gye-Hyeon;Kang Seong-Goo;Eom Young-Ik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.4
    • /
    • pp.127-138
    • /
    • 2006
  • The IPSec is a basic security mechanism of the IPv6 protocol, which can guarantee an integrity and confidentiality of data that transmit between two corresponding hosts. Also, both data and communication subjects can be authenticated using the IPSec mechanism. However, it is difficult that the IPSec mechanism protects major important network from attacks which transmit mass abnormal IPSec traffic in session-configuration or communication phases. In this paper, we present a design of the security system that can effectively detect and defeat abnormal IPSec traffic, which is encrypted by the ESP extension header, using the IPSec Session and Configuration table without any decryption. This security system is closely based on a multi-tier attack mitigation mechanism which is based on network bandwidth management and aims to counteract DDoS attacks and DoS effects of worm activity.

A Quantitative Security Metric Based on MITRE ATT&CK for Risk Management (위험 관리를 위한 MITRE ATT&CK 기반의 정량적 보안 지표)

  • Haerin Kim;Seungwoon Lee;Su-Youn Hong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.53-60
    • /
    • 2024
  • Security assessment is an indispensable process for a secure network, and appropriate performance indicators must be present to manage risks. The most widely used quantitative indicator is CVSS. CVSS has a problem that it cannot consider context in terms of subjectivity, complexity of interpretation, and security risks. To compensate for these problems, we propose indicators that itemize and quantify four things: attackers, threats, responses, and assets, taking into account the security context of ISO/IEC 15408 documents. Vulnerabilities discovered through network scanning can be mapped to MITREATT&CK's technology by the connection between weaknesses and attack patterns (CAPEC). We use MITREATT&CK's Groups, Tactic, and Mitigations to produce consistent and intuitive scores. Accordingly, it is expected that security evaluation managers will have a positive impact on strengthening security such as corporate networks by expanding the range of choices among security indicators from various perspectives.