• Title/Summary/Keyword: 방어 모델

Search Result 367, Processing Time 0.033 seconds

Detecting Adversarial Example Using Ensemble Method on Deep Neural Network (딥뉴럴네트워크에서의 적대적 샘플에 관한 앙상블 방어 연구)

  • Kwon, Hyun;Yoon, Joonhyeok;Kim, Junseob;Park, Sangjun;Kim, Yongchul
    • Convergence Security Journal
    • /
    • v.21 no.2
    • /
    • pp.57-66
    • /
    • 2021
  • Deep neural networks (DNNs) provide excellent performance for image, speech, and pattern recognition. However, DNNs sometimes misrecognize certain adversarial examples. An adversarial example is a sample that adds optimized noise to the original data, which makes the DNN erroneously misclassified, although there is nothing wrong with the human eye. Therefore studies on defense against adversarial example attacks are required. In this paper, we have experimentally analyzed the success rate of detection for adversarial examples by adjusting various parameters. The performance of the ensemble defense method was analyzed using fast gradient sign method, DeepFool method, Carlini & Wanger method, which are adversarial example attack methods. Moreover, we used MNIST as experimental data and Tensorflow as a machine learning library. As an experimental method, we carried out performance analysis based on three adversarial example attack methods, threshold, number of models, and random noise. As a result, when there were 7 models and a threshold of 1, the detection rate for adversarial example is 98.3%, and the accuracy of 99.2% of the original sample is maintained.

Thermal Characteristic Analysis of Thermal Protection System with Porous Insulation (다공성 단열재를 포함한 열방어구조의 열 특성 분석)

  • Hwang, Kyungmin;Kim, Yongha;Lee, Jungjin;Park, Jungsun
    • Journal of Aerospace System Engineering
    • /
    • v.10 no.4
    • /
    • pp.26-34
    • /
    • 2016
  • In a number of industries, porous insulations have been frequently used, reducing thermal insulation space through excellent performance of the thermal insulation's characteristics. This paper suggests an effective thermal conductivity prediction model. Firstly, we perform a literature review of traditional effective thermal conductivity prediction models and compare each model with experimental heat transfer results. Furthermore, this research defines the effectiveness of thermal conductivity prediction models using experimental heat transfer results and the Zehner-Schlunder model. The newly defined effective thermal conductivity prediction model has been verified to better predict performance than other models. Finally, this research performs a transient heat transfer analysis of a thermal protection system with a porous insulation in a high speed vehicle using the finite element method and confirms the validity of the effective thermal conductivity prediction model.

Application and Determination of Defended Footprint Using a Simulation Model for Ballastic Missile Trajectory (탄도미사일 궤적 시뮬레이션 모델을 이용한 방어영역 산출 및 응용)

  • Hong, Dongwg;Yim, Dongsoon;Choi, Bongwhan
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.4
    • /
    • pp.551-561
    • /
    • 2018
  • Footprint is defined as ground area that is projected from the outer edges of the battle space protected by a defence system. This concept can be effectively used for making decisions on site selection of anti missile systems to defend against enemy's ballistic missiles. In this paper, simulations of ballistic missile trajectories based on various launch conditions are performed first and then the footprint is derived with engagement zone set as a boundary condition. Results of the simulation with various relative positions between the defense system and defended asset are also presented. The proposed method, in which the trajectories are generated based on launch point of the ballistic missile, has an advantage of approximating the defended area close to reality. Two applications are introduced in the present paper to describe how the derivation of defended area could be utilized in deployment decision of defense systems.

Design and Implementation of Network Defense Simulator (네트워크 방어 시뮬레이터 설계 및 구현)

  • 이철원;윤주범;임을규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.4C
    • /
    • pp.441-447
    • /
    • 2004
  • Information security simulator is required for the study on the cyber intrusion and defense as information security has been increasingly popular Until now, the main purposes of information security simulation are security estimation of small network as well as performance analysis of information protection systems. However, network simulators that can simulate attacks in a huge network are in needs since large scale internet attacks are very common in these days. In this paper we proposed a simulator design and its implementation details. Our simulator is implemented by expanding the SSFNet program to the client-sewer architecture. A cyber attack scenario used in our simulator is composed by the advanced attack tree model. We analyzed the simulation results to show the correctness of our network defense simulator.

AI Security Vulnerabilities in Fully Unmanned Stores: Adversarial Patch Attacks on Object Detection Model & Analysis of the Defense Effectiveness of Data Augmentation (완전 무인 매장의 AI 보안 취약점: 객체 검출 모델에 대한 Adversarial Patch 공격 및 Data Augmentation의 방어 효과성 분석)

  • Won-ho Lee;Hyun-sik Na;So-hee Park;Dae-seon Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.245-261
    • /
    • 2024
  • The COVID-19 pandemic has led to the widespread adoption of contactless transactions, resulting in a noticeable increase in the trend towards fully unmanned stores. In such stores, all operational processes are automated, primarily using artificial intelligence (AI) technology. However, this AI technology has several security vulnerabilities, which can be critical in the environment of fully unmanned stores. This paper analyzes the security vulnerabilities that AI-based fully unmanned stores may face, focusing particularly on the object detection model YOLO, demonstrating that Hiding Attacks and Altering Attacks using adversarial patches are possible. It is confirmed that objects with adversarial patches attached may not be recognized by the detection model or may be incorrectly recognized as other objects. Furthermore, the paper analyzes how Data Augmentation techniques can mitigate security threats by providing a defensive effect against adversarial patch attacks. Based on these results, we emphasize the need for proactive research into defensive measures to address the inherent security threats in AI technology used in fully unmanned stores.

A New Dataset for Ethical Dialogue Generation in Multi-Turn Conversations (멀티턴 대화에서 윤리적인 발화 생성을 위한 새로운 데이터 세트)

  • Jang, Bin;Kim, Seo Hyun;Park, Kyubyong
    • Annual Conference of KIPS
    • /
    • 2022.11a
    • /
    • pp.446-448
    • /
    • 2022
  • 별개의 분류 모델을 이용하여 비윤리 발화를 억제하려 했던 과거의 시도들과는 달리, 본 연구에서는 데이터 추가를 통한 발화 생성 단계에서의 윤리성 체화에 대해 실험하였다. 본 연구에서는 분류 모델로는 감지하기 어려운 멀티턴 비윤리 공격으로 이루어진 새로운 대화 데이터 세트를 소개하고, 해당 데이터 세트를 통해 개선된 챗봇 대화 모델의 방어 성능을 공개한다.

Reinforcement Learning-Based APT Attack Response Technique Utilizing the Availability Status of Assets (방어 자산의 가용성 상태를 활용한 강화학습 기반 APT 공격 대응 기법)

  • Hyoung Rok Kim;Changhee Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.1021-1031
    • /
    • 2023
  • State-sponsored cyber attacks are highly impactful because they are carried out to achieve pre-planned goals. As a defender, it is difficult to respond to them because of the large scale of the attack and the possibility that unknown vulnerabilities may be exploited. In addition, overreacting can reduce the availability of users and cause business disruption. Therefore, there is a need for a response policy that can effectively defend against attacks while ensuring user availability. To solve this problem, this paper proposes a method to collect the number of processes and sessions of defense assets in real time and use them for learning. Using this method to learn reinforcement learning-based policies on a cyber attack simulator, the attack duration based on 100 time-steps was reduced by 27.9 time-steps and 3.1 time-steps for two attacker models, respectively, and the number of "restore" actions that impede user availability during the defense process was also reduced, resulting in an overall better policy.

A Study on the Selection of Optimum Location Using GIS Technique: The Case of Optimum Defense Area between Seoul and Dongducheon (GIS 기법을 이용한 최적입지 선정 연구 - 서울-동두천간의 최적방어지역 선정 -)

  • Kim, Doo-Il;Lee, Hyung-Ho;Han, Uk
    • Journal of the Korean Geographical Society
    • /
    • v.28 no.2
    • /
    • pp.137-147
    • /
    • 1993
  • Terrain is on of the most important factors in the selection of defense areas. The objective of the study is selection optimum defense area between Seoul and Dongducheon using GIS technique. The contents of the study are: (1) to select the defense area by pure terrain factors, (2) to select the defense area with focusing on the avenues of approach, and (3) to compare the above two kinds of area. The study area is located in the northeastern part of Seoul metropolitan area. It is part of Choogaryung Rift Valley which is running from Seoul to Wonsan. Six factors are considered for the selection: tactical distance, direction, elevation, slope, aspect and the distance from main roads. The defense score of each area is calculated by the multiplication of scores of each factors. The optimum defense area I consists of high-mountain areas such as Mt. Dobong, Mt. Wan-gbang, etc. The optimum defense area II consists of high-mountain areas along the three main roads selected. An east-west line of optimum defense area from Kuksabong in the east to Mt. Bulkuk in the west through Chookseok pass is identified from the spatial pattern of the area II. The line is also a dividing line between the northern and the southern watersheds.

  • PDF

침입 감지 모델 설정과 시스템의 분석

  • 신종태;이대기
    • Review of KIISC
    • /
    • v.3 no.3
    • /
    • pp.23-30
    • /
    • 1993
  • 이 논문에서는 고도의 정보보호를 필요로 하는 문서나 시스템에 대한 불법 행위를 막을 수 있는 침입 감지 시스템을 설계함에 있어 필요한 시스템 모델의 구성요소를 분석하였다. 또한 외국에서 개발되었거나 개발 중인 침입 감지 시스템들을 소개하였다. 전산망이나 컴퓨터 시스템에 있어 신분확인과 외부의 침입을 막기 위한 1차적인 방어 수단이 되지만 이러한 것들이 타협이나 공모에 의해 파괴되었을 때 이러한 침입 감지 시스템은 큰 역할을 수행하게 된다. 앞으로 다양한 형태의 내부적/외부적 침입 행위와 컴퓨터 시스템을 악용하려는 모든 행위를 즉각적으로 감지하는 기능을 수행하는 실시간 ㅣㅁ입 감지 시스템에 대한 연구가 절실히 요구될 것이다.

  • PDF