• Title/Summary/Keyword: ATTACK SUCCESS

Search Result 94, Processing Time 0.025 seconds

ELiSyR: Efficient, Lightweight and Sybil-Resilient File Search in P2P Networks

  • Kim, Hyeong-S.;Jung, Eun-Jin;Yeom, Heon-Y.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.6
    • /
    • pp.1311-1326
    • /
    • 2010
  • Peer-to-peer (P2P) networks consume the most bandwidth in the current Internet and file sharing accounts for the majority of the P2P traffic. Thus it is important for a P2P file sharing application to be efficient in bandwidth consumption. Bandwidth consumption as much as downloaded file sizes is inevitable, but those in file search and bad downloads, e.g. wrong, corrupted, or malicious file downloads, are overheads. In this paper, we target to reduce these overheads even in the presence of high volume of malicious users and their bad files. Sybil attacks are the example of such hostile environment. Sybil attacker creates a large number of identities (Sybil nodes) and unfairly influences the system. When a large portion of the system is subverted, either in terms of the number of users or the number of files shared in the system, the overheads due to the bad downloads rapidly increase. We propose ELiSyR, a file search protocol that can tolerate such a hostile environment. ELiSyR uses social networks for P2P file search and finds benign files in 71% of searches even when more than half of the users are malicious. Furthermore, ELiSyR provides similar success with less bandwidth than other general efforts against Sybil attacks. We compare our algorithm to SybilGuard, SybilLimit and EigenTrust in terms of bandwidth consumption and the likelihood of bad downloads. Our algorithm shows lower bandwidth consumption, similar chances of bad downloads and fairer distribution of computation loads than these general efforts. In return, our algorithm takes more rounds of search than them. However the time required for search is usually much less than the time required for downloads, so the delay in search is justifiable compared to the cost of bad downloads and subsequent re-search and downloads.

Fuzzy Logic based Next Hop Node Selection Method for Energy Efficient PVFS in WSN (무선 센서 네트워크에서 확률적 투표 기반 여과 기법의 에너지 효율성을 위한 퍼지 로직 시스템 기반의 다음 이웃 노드 선택 기법)

  • Lee, Jae Kwan;Nam, Su Man;Cho, Tae Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.23 no.2
    • /
    • pp.65-72
    • /
    • 2014
  • Sensor nodes are easily compromised by attacker when which are divided in open environment. The attacker may inject false report and false vote attack through compromised sensor node. These attacks interrupt to transmission legitimate report or the energy of sensor node is exhausted. PVFS are proposed by Li and Wu for countermeasure in two attacks. The scheme use inefficiency to energy of sensor node as fixed report threshold and verification node. In this paper, our propose the next neighbor node selection scheme based on fuzzy logic system for energy improvement of PVFS. The parameter of fuzzy logic system are energy, hops, verification success count, CH select high the next neighbor node among neighbor nodes of two as deduction based on fuzzy logic system. In the experimental, our proposed scheme was improvement to energy of about 9% compare to PVFS.

Development of a Risk Assessment Program for Chemical Terrorism (화학적 테러에 대한 위험성 평가 프로그램 개발)

  • Lee, Younghee;Kim, Eunyong;Kim, Jinkyung;Moon, Il
    • Journal of Korean Society of societal Security
    • /
    • v.1 no.1
    • /
    • pp.63-67
    • /
    • 2008
  • This study focuses on assessing the security ri sk or the terrorism in chemical process industries. This research modifies conventional method for assessing the terrorism risk. The risk assessment method is developed and it is implemented as software to analyze the possibility of terrorism and sabotage. This program includes five steps; asset characterization, threat assessment, vulnerability analysis, risk assessment and new countermeasures. It is a systematic, risk based approach in which risk is a function of the severity of consequences of an undesired event, the likelihood of adversary attack, and the likelihood of adversary success in causing the undesired event. The reliability of the program is verified using a dock zone case. The case dock zone includes a storage farm, a manufacturing plant, an electrical supply utility, a hydrotreater unit, many containers, and administration buildings. This study represents chemical terrorism response technology, the prevention plan, and new countermeasure to mitigate by using risk assessment methods in the chemical industry and public sector. This study suggests an effective approach to the chemical terrorism response management.

  • PDF

A Study on the countermeasures and drones's threats in Military security (군보안상 드론위협과 대응방안)

  • Kim, Doo-hwan;Lee, Youn-hwan
    • Journal of Digital Convergence
    • /
    • v.16 no.10
    • /
    • pp.223-233
    • /
    • 2018
  • The forces to protect people's life and property against the enemy attack is an organization which is regulated by the constitutional law. In terms of nature, its security is a significant factor to determine success or failure for the war. However, recently the 4th industrial revolution represents the rapid change in the advancement of civilization and technology. It can influence on the environment of military security which can make various changes. Unless taking proper action againsty these changes, it can inflict a vital harm for the organization of forces and its internal security. In this aspect, this study discuss new threats of the military security, above all, the most technical improvements and harms for the drones in terms of security. In addition, the advantages and disadvantages of drones which can influence on the ragions of military command and control, information operations, maneuvers, firepower, operation sustainment supports are analyzed. Moreover, this study set the purpose of developmental security measure for security threats in the aspects of military security.

RFID Distance Bounding Protocol Secure Against Mafia and Terrorist Fraud (테러리스트 공격과 마피아 공격에 안전한 RFID 거리 제한 프로토콜)

  • Kwon, Hye Jin;Kim, Soon Ja
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.11
    • /
    • pp.660-674
    • /
    • 2014
  • RFID system has been used in a variety of services. So, a lot of attacks like a free ride on the service, leakage of property or personal information are known. Therefore, the solutions that address these attacks have been proposed. Among the attacks, mafia fraud, a kind of relay attack, can not be addressed by common authentication protocol. So, Hancke and Kuhn used distance bounding protocol for RFID authentication. After that, Munilla and Peinado modified HK protocol by adding void challenge. So the mafia fraud success probability of adversary is lower than probability of HK protocol. Ahn et al. proposed a protocol that reduces number of a hash computation and traffic than MP protocol. Here, we show that MP protocol can not defend the terrorist fraud and is vulnerable to noise. And we show that also AYBN protocol is vulnerable to mafia fraud and key leakage. Moreover, we propose a new protocol and our experimental results show that our protocol is secure to terrorist and mafia fraud.

The Influence of Christian Dior on Fashion, Clothing, and Cosmetic Trends (디올 패션이 향장미용에 미친 영향에 관한 연구)

  • Seok, Eun-Kyung;Chae, Keum-Seok
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.33 no.9
    • /
    • pp.1374-1385
    • /
    • 2009
  • This study focuses on three points. First, how designers develop clothing and cosmetic culture (which reflect time and culture) into other fashion products in order to verify that attire and makeup can be the objects of aesthetics in addition to functionality. Second, why the fashion design of Christian Dior has been continuously popular for women of all ages and countries in the development of fashion, attire, and makeup. Third, this study analyzes how the aesthetical characteristics of the fashion of Christian Dior are reflected in clothing and cosmetic culture in order to clarify the brand outlook on attire and makeup as a source of France's luxury fashion industry. The philosophical characteristics of Dior's fashion were studied based on existing literature. First, her childhood background (that became the motif of Dior's design) and the philosophical ideology of fashion design, perfume, and beauty were the focus of this study. Second, this study examined how consciousness on beauty expressed in hairstyle, perfume, and cosmetics is expressed in connection with clothing. Third, the background with which Dior's fashion and perfume business became successful is examined in addition the necessity of the image strategy for success in the cosmetics market was studied. Domestic and international books on clothing and cosmetics, preceding studies, the internet, and related magazines are utilized to consider the cosmetics and beauty fashion of Dior. The results of this study show how Korean fashion and cosmetic culture can further globalize. This study encompasses the period of 1905 when Christian Dior was born until 1957 when he died of a heart attack; it also deals with well-known designers of the Christian Dior House from Yves Saint Laurent of 1957 to John Galliano of the present.

Deep Learning Based Side-Channel Analysis for Recent Masking Countermeasure on SIKE (SIKE에서의 최신 마스킹 대응기법에 대한 딥러닝 기반 부채널 전력 분석)

  • Woosang Im;Jaeyoung Jang;Hyunil Kim;Changho Seo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.151-164
    • /
    • 2023
  • Recently, the development of quantum computers means a great threat to existing public key system based on discrete algebra problems or factorization problems. Accordingly, NIST is currently in the process of contesting and screening PQC(Post Quantum Cryptography) that can be implemented in both the computing environment and the upcoming quantum computing environment. Among them, SIKE is the only Isogeny-based cipher and has the advantage of a shorter public key compared to other PQC with the same safety. However, like conventional cryptographic algorithms, all quantum-resistant ciphers must be safe for existing cryptanlysis. In this paper, we studied power analysis-based cryptographic analysis techniques for SIKE, and notably we analyzed SIKE through wavelet transformation and deep learning-based clustering power analysis. As a result, the analysis success rate was close to 100% even in SIKE with applied masking response techniques that defend the accuracy of existing clustering power analysis techniques to around 50%, and it was confirmed that was the strongest attack on SIKE.

Comparison of Early Complications of Oral Anticoagulants after Totally Thoracoscopic Ablation: Warfarin versus Non-vitamin K Antagonist Oral Anticoagulants

  • MuHyung Heo;Dong Seop Jeong;Suryeun Chung;Kyoung Min Park;Seung Jung Park;Young Keun On
    • Journal of Chest Surgery
    • /
    • v.56 no.2
    • /
    • pp.90-98
    • /
    • 2023
  • Background: Atrial fibrillation (AF) is the most common type of cardiac arrhythmia. Totally thoracoscopic ablation (TTA) is a surgical treatment showing a high success rate as a hybrid procedure with radiofrequency catheter ablation to control AF. This study compared the early complications of warfarin and non-vitamin K antagonist oral anticoagulants (NOACs) in patients who underwent TTA. Methods: This single-center retrospective cohort study enrolled patients who underwent planned TTA for AF from February 2012 to October 2020. All patients received postoperative anticoagulation, either with warfarin or a NOAC (apixaban, rivaroxaban, dabigatran, or edoxaban). Propensity score matching was performed for both groups. Early complications were assessed at 12 weeks after TTA and were divided into efficacy and safety outcomes. Both efficacy and safety outcomes were compared in the propensity score-matched groups. Results: Early complications involving efficacy outcomes, such as stroke and transient ischemic attack, were seen in 5 patients in the warfarin group and none in the NOAC group. Although the 2 groups differed in the incidence of efficacy outcomes, it was not statistically significant. In safety outcomes, 11 patients in the warfarin group and 24 patients in the NOAC group had complications, but likewise, the between-group difference was not statistically significant. Conclusion: Among patients who underwent TTA, those who received NOACs had a lower incidence of thromboembolic complications than those who received warfarin; however, both groups showed a similar bleeding complication rate. Using a NOAC after TTA does not reduce efficacy and safety when compared to warfarin.

A Case Report of Korean Traditional Medical Therapy on Gastric Dysmotility Involved in Patient with Systemic Sclerosis Sine Scleroderma (Systemic Sclerosis Sine Scleroderma 환자의 위운동성장애에 대한 한의학적 치험 1예)

  • Yoon, Sang-Hyub;Rhu, Jong-Min;Lim, Jung-Hwa;Han, Sook-Young;Kim, Hyun-Kyung;Lee, Joon-Suk;Shim, Yun-Seub;Kim, Guk-Bum;Han, Jong-Hyun;Kim, Sun-Hong;Kim, Eun-Gon;Kim, Sang-Uk;Seong, Ki-Won;Jang, Sun-Young
    • The Journal of Internal Korean Medicine
    • /
    • v.25 no.2
    • /
    • pp.344-351
    • /
    • 2004
  • Systemic sclerosis Sine scleroderma(ssSSc) is an uncommon subtype of Systemic sclerosis(SSc), which is believed to attack internal organs without causing changes in the skin. Electrogastrography has been known to be a simple, non-invasive, and effective method in assessing gastric motility. In this new study, a case of Systemic sclerosis Sine Scleroderma exhibiting gastric symptoms was observed. For this, we applied herbal medicine. manual acupucture, electro-acupucture, and lumbar skin wanning. After applying these therapies, both systemic and dyspeptic symptoms of the patient improved. Electrogastrography suggests a relation between gastric myoelectrical activity and the patient's improvement in dyspeptic symptoms. Therefore, based on study of Oriental medical classics and recent medical articles, clinically emperical success in treating gastric dysmotility was seen in a patient with Systemic sclerosis Sine Scleroderma.

  • PDF

Design and Implementation of Interactive Game based on Embedded System (내장형 시스템 기반 체험형 게임의 설계 및 구현)

  • Lee, Woosik;Jung, Hoejung;Heo, Hojin;Kim, Namgi
    • Journal of Internet Computing and Services
    • /
    • v.18 no.4
    • /
    • pp.43-50
    • /
    • 2017
  • Embedded System includes touch, GPS, motion, and acceleration sensor, and can communicate with neighbor devices using wireless communication. Because Arduino with embedded system provides good environment for development and application, developers, engineers, designers, as well as artists, students have a great interest. They utilize Arduino in the robot, home appliances, fashion, culture and so on. In this paper, we design and implement a game using Arduino with embedded system which recognizes the human movement by moving away from one-dimensional game of the existing touch method. Implemented embedded system game measures gyro-sensor to recognize human movement and detects the attack success of the opponent by using touch sensor. Moreover, health of the game player is updated in the real time through the android phone-based database. In this paper, implemented embedded system-based game provides GUI screen of android phone. It is possible to select watching mode and competition mode. Also, it has low energy consumption and easy to expand because it send and receive data packet through recent Bluetooth communication.