• Title/Summary/Keyword: 공격 모델

Search Result 857, Processing Time 0.027 seconds

Watermarking of 3D Mesh Model using DCT of Distances between Vertices (정점간 거리의 DCT를 이용한 3차원 메쉬 모델 워터마킹)

  • Kim Sung-Jun;Kim Jeong-Yeop;Hyun Ki-Ho
    • Annual Conference of KIPS
    • /
    • 2004.11a
    • /
    • pp.875-878
    • /
    • 2004
  • 본 논문은 3차원 메쉬 모델의 정점간 거리 및 DCT를 이용한 3차원 메쉬 모델 워터마킹 방법을 제안한다. 제안한 방법은 3차원 메쉬 모델의 임의의 정점간 거리를 이용하여 워터마킹하게 되며 삽입 시 임의의 정점간 거리집합을 DCT 변환 하여 그 계수 값에 워터마크가 삽입된다. 그러므로 정점간의 거리를 DCT변환하여 삽입함으로써 비지각성 및 여러 공격에 강인하다. 또한 워터마크 크기만큼의 여러 거리집합을 생성하여 사용함으로 지역패치 및 지역분할 개념으로써 부분적인 공격에 강인하며 3차원 메쉬 모델의 페이스모양에 상관없이 워터마크를 삽입 할 수 있다.

  • PDF

A Study on Secure and Improved Single Sign-On Authentication System against Replay Attack (재전송 공격에 안전하고 개선된 Single Sign-On 인증 시스템에 관한 연구)

  • Kim, Hyun-Jin;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.769-780
    • /
    • 2014
  • In general, internet users need to remember several IDs and passwords when they use diverse web sites. From an effective management perspective, SSO system was suggested to reduce user inconvenience. Kerberos authentication, which uses centralized system management, is a typical example of a broker-based SSO authentication model. However, further research is required, because the existing Kerberos authentication system has security vulnerability problems of password and replay attacks. In SSO authentication systems, a major security vulnerability is the replay attack. When user credentials are seized by attackers, an authorized session can be obtained through a replay attack. In this paper, an improved SSO authentication model based on the broker-based model and a secure lightweight SSO mechanism against credential replay attack is proposed.

Robust 3D Model Hashing Scheme Based on Shape Feature Descriptor (형상 특징자 기반 강인성 3D 모델 해싱 기법)

  • Lee, Suk-Hwan;Kwon, Seong-Geun;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.6
    • /
    • pp.742-751
    • /
    • 2011
  • This paper presents a robust 3D model hashing dependent on key and parameter by using heat kernel signature (HKS), which is special shape feature descriptor, In the proposed hashing, we calculate HKS coefficients of local and global time scales from eigenvalue and eigenvector of Mesh Laplace operator and cluster pairs of HKS coefficients to 2D square cells and calculate feature coefficients by the distance weights of pairs of HKS coefficients on each cell. Then we generate the binary hash through binarizing the intermediate hash that is the combination of the feature coefficients and the random coefficients. In our experiment, we evaluated the robustness against geometrical and topological attacks and the uniqueness of key and model and also evaluated the model space by estimating the attack intensity that can authenticate 3D model. Experimental results verified that the proposed scheme has more the improved performance than the conventional hashing on the robustness, uniqueness, model space.

A Study of Step-by-step Countermeasures Model through Analysis of SQL Injection Attacks Code (공격코드 사례분석을 기반으로 한 SQL Injection에 대한 단계적 대응모델 연구)

  • Kim, Jeom-Goo;Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.17-25
    • /
    • 2012
  • SQL Injection techniques disclosed web hacking years passed, but these are classified the most dangerous attac ks. Recent web programming data for efficient storage and retrieval using a DBMS is essential. Mainly PHP, JSP, A SP, and scripting language used to interact with the DBMS. In this web environments application does not validate the client's invalid entry may cause abnormal SQL query. These unusual queries to bypass user authentication or da ta that is stored in the database can be exposed. SQL Injection vulnerability environment, an attacker can pass the web-based authentication using username and password and data stored in the database. Measures against SQL Inj ection on has been announced as a number of methods. But if you rely on any one method of many security hole ca n occur. The proposal of four levels leverage is composed with the source code, operational phases, database, server management side and the user input validation. This is a way to apply the measures in terms of why the accident preventive steps for creating a phased step-by-step response nodel, through the process of management measures, if applied, there is the possibility of SQL Injection attacks can be.

Delay based Authentication Model for Flooding of Service Tolerance of Rehabilitation Psychology Analysis System (재활심리분석시스템의 폭주서비스 감내를 위한 지연기반 인증모델)

  • Lim, Ho-Chan;Kim, Young-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.9
    • /
    • pp.2073-2081
    • /
    • 2013
  • Today's rapidly changing society can lead to maladaptive behaviors. In the situations, rehabilitation psychology analysis using the on-line test be needed to solve the problem. However, Internet-based rehabilitation psychology analysis by a malicious attacker may still be vulnerable to denial-of-service attacks. The service flooding attacks render the server incapable of providing its service to legitimate clients. Therefore the importance of implementing systems that prevent denial of service attacks and provide service to legitimate users cannot be overemphasized. In this paper, we propose a puzzle protocol which applies to authentication model. our gradually strengthening authentication model improves the availability and continuity of services and prevent denial of service attacks and we implement flooding of service tolerance system to verify the efficiency of our model. This system is expected to be ensure in the promotion of reliability.

A Design and Implementation of Anomaly Detection Model based the Web Traffic Trend Analysis (웹 트래픽 추이 분석 기반 비정상행위 탐지 모델의 설계 및 구현)

  • Jang, Sung-Min;Park, Soon-Dong
    • Journal of the Korea Computer Industry Society
    • /
    • v.6 no.5
    • /
    • pp.715-724
    • /
    • 2005
  • Recently many important systems that used to be operated in a closed environment are now providing web services and these kinds of web-based services are often an easy and common target of attacks. In addition, the great variety of web content and applications cause the development of new various intrusion technologies, while the misuse-based intrusion detection technology cannot keep the peace with the attacks and it seems to lack the capability to deal with such various new security threats, As a result it is necessary to research and develop new types of detection technologies that can detect newly developed attacks and intrusions as well as to be able to deal with previous types of exploits. In this paper, a HTTP traffic model is tested for its anomaly by using a HTTP request traffic pattern analysis and the field information analysis of the HTTP packet. Consequently, the HTTP traffic models by applying anomaly tests is designed and established.

  • PDF

Designing Mutual Cooperation Security Model for IP Spoofing Attacks about Medical Cluster Basis Big Data Environment (의료클러스터 기반의 빅 데이터 환경에 대한 IP Spoofing 공격 발생시 상호협력 보안 모델 설계)

  • An, Chang Ho;Baek, Hyun Chul;Seo, Yeong Geon;Jeong, Won Chang;Park, Jae Heung
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.21-29
    • /
    • 2016
  • Our society is currently exposed to environment of various information that is exchanged real time through networks. Especially regarding medical policy, the government rushes to practice remote medical treatment to improve the quality of medical services for citizens. The remote medical practice requires establishment of medical information based on big data for customized treatment regardless of where patients are. This study suggests establishment of regional medical cluster along with defense and protection cooperation models that in case service availability is harmed, and attacks occur, the attacks can be detected, and proper measures can be taken. For this, the study suggested forming networks with nationwide local government hospitals as regional virtual medical cluster bases by the same medical information system. The study also designed a mutual cooperation security model that can real time cope with IP Spoofing attack that can occur in the medical cluster and DDoS attacks accordingly, so that the limit that sole system and sole security policy have can be overcome.

Engagement Level Simulator Development for Wire-Guided Torpedo Performance Analysis (선유도어뢰 전술 효과도 분석을 위한 교전수준 모델 개발 연구)

  • Cho, Hyunjin
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.1
    • /
    • pp.33-38
    • /
    • 2018
  • This paper introduces the simulation concepts and technical approach of wire-guided torpedo performance analysis simulator, as a consequence, provide a framework for understanding overall attack procedures and effectiveness of tactics to torpedo operator. It described the mathematical models of simulation components and weapon engagement principle, especially it derived the closed-form solution of time consumption and leading angle problem of torpedo attack situation based on geographical assumption. In addition, it adopted the proportional navigation guidance at final stage of torpedo attack and also consider the tradeoff relation between target ship speed(propeller noise level) and detection probability, so that it improves the fidelity of physical realism. Simulator is developed with high degree of freedom in the perspective of tactical situation, and it helps user to understand the overall situation and tactical effectiveness.

The Combat Effectiveness Analysis of Attack Helicopter Using Simulation and AHP (시뮬레이션 및 AHP기법을 이용한 공격헬기 전투효과 분석)

  • Lee, Jae-Moon;Jung, Chi-Young;Lee, Jae-Yeong
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.3
    • /
    • pp.63-70
    • /
    • 2010
  • The purpose of this paper is to propose a methodology that can measure the combat effectiveness of attack helicopter which Korea army will be operating in the near future. To measure the combat effectiveness, firstly, we use a wargame model, AAsim (Army Aviation simulation), as a analytic simulation model which is used to analyze DOTMLPF and operation in army aviation field, secondly we use an Analytic Hierarchy Process by opinion of experts. For simulation and AHP, we consider anti armored corps operation reflecting attack helicopter's combat effectiveness. As a result of this study, the combat effectiveness per each attack helicopter can be measured and this combat effectiveness is useful for reasonable decision making such as selection helicopter type, quantity when acquiring new weapon system.

A Study of Aggressive Driver Detection Combining Machine Learning Model and Questionnaire Approaches (기계학습 모델과 설문결과를 융합한 공격적 성향 운전자 탐색 연구)

  • Park, Kwi Woo;Park, Chansik
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.3
    • /
    • pp.361-370
    • /
    • 2017
  • In this paper, correlation analysis was performed between questionnaire and machine learning based aggressive tendency measurements. this study is part of a aggressive driver detection using machine learning and questionnaire. To collect two types tendency from questionnaire and measurements system, we constructed experiments environments and acquired the data from 30 drivers. In experiment, the machine learning based aggressive tendency measurements system was designed using a driver behavior detection model. And the model was constructed using accelerate and brake position data and hidden markov model method through supervised learning. We performed a correlation analysis between two types tendency using Pearson method. The result was represented to high correlation. The results will be utilize for fusing questionnaire and machine learning. Furthermore, It is verified that the machine learning based aggressive tendency is unique to each driver. The aggressive tendency of driver will be utilized as measurements for advanced driver assistance system such as attention assist, driver identification and anti-theft system.