• Title/Summary/Keyword: 공격각

Search Result 603, Processing Time 0.028 seconds

Security Analysis of Software-Oriented Stream Ciphers against Algebraic Attacks (소프트웨어 구현에 적합한 스트림 암호의 대수적 공격에 대한 안전성)

  • Sung Jaechul;Moon Dukjae;Im Hung-su;Chee Seongtaek;Lee Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.1
    • /
    • pp.29-40
    • /
    • 2005
  • In this paper we consider the security of recently proposed software-orienred stram cipher HELIX, SCREAM, MUGI, and PANAMA against algebraic attacks. Algebraic attack is a key recovery attack by solving an over-defined system of multi-variate equations with input-output pairs of an algorithm. The attack was firstly applied to block ciphers with some algebraic properties and then it has been mon usefully applied to stream ciphers. However it is difficult to obtain over-defined algebraic equations for a given cryptosystem in general. Here we analyze recently proposed software-oriented stream ciphers by constructing a system of equations for each cipher. furthermore we propose three design considerations of software-oriented stream ciphers.

Effects on the pathogenicity and the immunogenicity of Eimeria tenella to the chickens treated with dexamethasone and testosterone propionate and on the relation with antibody titers for Newcastle disease virus (덱사메타손과 테스토스테론 호르몬으로 처리된 닭에서 Eimeria tenella의 병원성 및 면역원성과 뉴캣슬병 바이러스에 대한 항체가의 비교)

  • Youn, Hee-jeong;Noh, Jae-wuk;Oh, Hwa-gyun
    • Korean Journal of Veterinary Research
    • /
    • v.35 no.2
    • /
    • pp.337-345
    • /
    • 1995
  • To evaluate the pathogenicity and immunogenicity of Eimeria tenella to the chicken treated with dexamethasone(DEX) and testosterone propionate (TES), we administered 0.1ml/chicken of dexamethasone and 40mg/chicken of testosterone propionate at 1-, 2-, and 7-days old, respectively. We also immunized with ND oil-emulsion vaccine at 2 weeks old. After that, we immunized and challenged with 100 and $1{\times}10^5$ oocysts/chicken of E tenella at 2 and 4 weeks old, respectively. And then we investigated the HI titers for ND virus, survival rate, body weight gain, lesion score and the weight of the bursa of Fabricius and thymus. The titers for ND virus in the groups treated with TES were higher than those in the groups treated with DEX and CON during 3 to 6 weeks. After challenge, the survival rate of testosterone propionate treated-challenged(TES-CHA) and TES-immunized and challenged(TES-V&C) groups were 61.5 and 83.3% and those of the other groups were all 100%. At 1 week after challenge, the lesion scores of TES-CHA group(4.0) was the highest of all experimental groups. Those of DEX and controlchallenged( CON-CHA) groups were 2.8, and those of all V&C groups were 2.4. During 1 and 2 weeks after immunization, the body weight gains of TES groups were severe low(61.6-82.2g and 189.6-260.4g). During 1 and 2 weeks after challenge, the body weight gains of all CHA groups were lower than those of not challenged groups. But, those of all V AC groups were not different from those of not immunized groups. At 4- and 6-weeks old, the weight of the bursa of Fabricius and thymus in the chicken of all TES groups were lower than those of all control (CON) and DEX groups. Therefore, testosterone propionate acted as immunosuppressive drug. Also, it was thought that the chicken affected a little humoral immunity to E tenella.

  • PDF

Improvement of Attack Traffic Classification Performance of Intrusion Detection Model Using the Characteristics of Softmax Function (소프트맥스 함수 특성을 활용한 침입탐지 모델의 공격 트래픽 분류성능 향상 방안)

  • Kim, Young-won;Lee, Soo-jin
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.81-90
    • /
    • 2020
  • In the real world, new types of attacks or variants are constantly emerging, but attack traffic classification models developed through artificial neural networks and supervised learning do not properly detect new types of attacks that have not been trained. Most of the previous studies overlooked this problem and focused only on improving the structure of their artificial neural networks. As a result, a number of new attacks were frequently classified as normal traffic, and attack traffic classification performance was severly degraded. On the other hand, the softmax function, which outputs the probability that each class is correctly classified in the multi-class classification as a result, also has a significant impact on the classification performance because it fails to calculate the softmax score properly for a new type of attack traffic that has not been trained. In this paper, based on this characteristic of softmax function, we propose an efficient method to improve the classification performance against new types of attacks by classifying traffic with a probability below a certain level as attacks, and demonstrate the efficiency of our approach through experiments.

Robust and Blind Watermarking for DIBR Using a Depth Variation Map (깊이변화지도를 이용한 DIBR 공격의 강인성 블라인드 워터마킹)

  • Lee, Yong-Seok;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of Broadcast Engineering
    • /
    • v.21 no.6
    • /
    • pp.845-860
    • /
    • 2016
  • This paper proposes a digital watermarking scheme to protect the ownership of the freeview 2D or 3D image such that the viewer watches the image(s) by rendering a arbitrary viewpoint image(s) with the received texture image and its depth image. In this case a viewpoint change attack essentially occurs, even if it is not malicious. In addition some malicious attacks should be considered, which is to remove the embedded watermark information. In this paper, we generate a depth variation map (DVM) to find the locations less sensitive to the viewpoint change. For each LH subband after 3-level 2DDWT for the texture image, the watermarking locations are found by referring the DVM. The method to embed a watermark bit to a pixel uses a linear quantizer whose quantization step is determined according to the energy of the subband. To extract the watermark information, all the possible candidates are first extracted from the attacked image by considering the correlation to the original watermark information. For each bit position, the final extracted bit is determined by a statistical treatment with all the candidates corresponding that position. The proposed method is experimented with various test images for the various attacks and compared to the previous methods to show that the proposed one has excellent performance.

The Analysis on Game Content of Karate Excellent Player (공수도 우수선수들의 경기내용 분석)

  • Jeang, Il-Hong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.1
    • /
    • pp.129-135
    • /
    • 2015
  • This study was the content and flow of the present study Karate match. 2011, second elimination rounds national developmen, 7th Korea Open International Championships and National development in first elimination rounds, 2012 is a World Cup game against Karate1 in Busan. Man Of The match in the final three games by 5 grade were selected to match match 15, 30 people. I was about to score the study Karate and attack techniques. The conclusion is as follows: 1) In this study, there was a significant difference in use between the class score and the frequency of use of attack technology. The frequency of use of the technology of attack of each class per 60kg or less, 67kg or less, 75kg or less, was the order of 84kg and more than 84kg or less. Frequency of use disonchigi, apsonchigi, apdollyeochagi, geolgi aphurigi. It was followed by scores of attack technology of class per 84kg or more, 60kg or less, 67kg or less, 75kg or less, the following 84kg. 2) Winner has a lot of attack skills than the loser. The game was a draw and the loser disonchigi, apdollyeochagi, apsonchigi. The winner is aphurigi, apdollyeochagi, apsonchigi in the order of many uses.

The Cluster of Adults' Gender Role Conflict, Ambivalent Sexism and Aggression and Their Differences in Acceptance of Rape Myths (한국 성인의 성역할갈등, 양가적 성차별주의, 공격성에 따른 군집 유형별 강간통념수용도)

  • Cho, Eun Hye;Jang, Jin Yi
    • Korean Journal of Culture and Social Issue
    • /
    • v.28 no.1
    • /
    • pp.1-22
    • /
    • 2022
  • The purpose of this study was to explore natural groupings among adults based on gender role conflict, ambivalent sexism and aggression, and find differences in their acceptance of rape myths. 372 male and female adults in the Daegu and Gyeongsang province were surveyed and 350 were analyzed on their gender role conflict, ambivalent sexism, aggression and acceptance of rape myths. The cluster analysis divided participants into sub-groups such as 'unaggressive but conflicted about gender stereotypes', 'receptive to adaptive gender notions ' and 'compliant to aggressive gender stereotypes'. The sub-groups had differing levels of gender, age and education. There were differences in acceptance of rape myths among these groups, Post-hoc testing showed that the 'compliant to aggressive gender stereotype' subgroup showed the highest level of acceptance of rape myths, following by 'unaggressive but with gender stereotype conflicts' and 'receptive of adaptive gender notions'. Finally, needs for assessing individual characteristics according to their subgroup types and developing psychoeducational programs focused on the subgroup characteristics were addressed. Then, recommendations for future study were discussed.

An Implementation of Mining Prototype System for Network Attack Analysis (네트워크 공격 분석을 위한 마이닝 프로토타입 시스템 구현)

  • Kim, Eun-Hee;Shin, Moon-Sun;Ryu, Keun-Ho
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.455-462
    • /
    • 2004
  • Network attacks are various types with development of internet and are a new types. The existing intrusion detection systems need a lot of efforts and costs in order to detect and respond to unknown or modified attacks because of detection based on signatures of known attacks. In this paper, we present a design and implementation for mining prototype system to predict unknown or modified attacks through network protocol attributes analysis. In order to analyze attributes of network protocols, we use the association rule and the frequent episode. The collected network protocols are storing schema of TCP, UDP, ICMP and integrated type. We are generating rules that can predict the types of network attacks. Our mining prototype in the intrusion detection system aspect is useful for response against new attacks as extra tool.

Power Trace Selection Method in Template Profiling Phase for Improvements of Template Attack (프로파일링 단계에서 파형 선별을 통한 템플릿 공격의 성능 향상)

  • Jin, Sunghyun;Kim, Taewon;Kim, HeeSeok;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.15-23
    • /
    • 2017
  • Template attack is a powerful side-channel analysis technique which can be performed by an attacker who has a test device that is identical to target device. Template attack is consisted of building template in profiling phase and matching the target device using template that were calculated in profiling phase. One methods to improve the success rate of template attack is to better estimate template which is consisted sample mean and sample covariance matrix of gaussian distribution in template profiling. However restriction of power trace in profiling phase led to poor template estimation. In this paper, we propose new method to select noisy power trace in profiling phase. By eliminating noisy power trace in profiling phase, we can construct more advanced mean and covariance matrix which relates to better performance in template attack. We proved that the proposed method is valid through experiments.

Identification of Attack Group using Malware and Packer Detection (악성코드 및 패커 탐지를 이용한 공격 그룹 판별)

  • Moon, Heaeun;Sung, Joonyoung;Lee, Hyunsik;Jang, Gyeongik;Kwak, Kiyong;Woo, Sangtae
    • Journal of KIISE
    • /
    • v.45 no.2
    • /
    • pp.106-112
    • /
    • 2018
  • Recently, the number of cyber attacks using malicious code has increased. Various types of malicious code detection techniques have been researched for several years as the damage has increased. In recent years, profiling techniques have been used to identify attack groups. This paper focuses on the identification of attack groups using a detection technique that does not involve malicious code detection. The attacker is identified by using a string or a code signature of the malicious code. In addition, the detection rate is increased by adding a technique to confirm the packing file. We use Yara as a detection technique. We have research about RAT (remote access tool) that is mainly used in attack groups. Further, this paper develops a ruleset using malicious code and packer main feature signatures for RAT which is mainly used by the attack groups. It is possible to detect the attacker by detecting RAT based on the newly created ruleset.

The Extended TCP for Preventing from SYN Flood DoS Attacks (SYN Flood DoS 공격을 차단하기 위한 확장 TCP)

  • Park Zin-Won;Kim Myung-Kyun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.10
    • /
    • pp.491-498
    • /
    • 2005
  • The Denial of Service(DoS) attacks, which are done by consuming all of the computing or communication resources necessary for the services, are known very difficult to be protected from. TCP has drawbacks in its connection establishment for possible DoS attacks. TCP maintains the state of each partly established connection in the connection queue until it is established completely and accepted by the application. The attackers can make the queue full by sending connection requests repeatedly and not completing the connection establishment steps for those requests. In this paper, we have designed and implemented the extended TCP for preventing from SYN Flood DoS attacks. In the extended TCP, the state of each partly established connection is not maintained in the queue until the connection is established completely. For the extended TCP, we have modified the 3-way handshake procedure of TCP and implemented the extended TCP in the Linux operating system. The test result shows $0.05\%$ delay more than original TCP, but it shows that the extended TCP is strong for SYN Flood attacks.