• Title/Summary/Keyword: Attack Model

Search Result 1,005, Processing Time 0.024 seconds

A DDoS attack Mitigation in IoT Communications Using Machine Learning

  • Hailye Tekleselase
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.170-178
    • /
    • 2024
  • Through the growth of the fifth-generation networks and artificial intelligence technologies, new threats and challenges have appeared to wireless communication system, especially in cybersecurity. And IoT networks are gradually attractive stages for introduction of DDoS attacks due to integral frailer security and resource-constrained nature of IoT devices. This paper emphases on detecting DDoS attack in wireless networks by categorizing inward network packets on the transport layer as either "abnormal" or "normal" using the integration of machine learning algorithms knowledge-based system. In this paper, deep learning algorithms and CNN were autonomously trained for mitigating DDoS attacks. This paper lays importance on misuse based DDOS attacks which comprise TCP SYN-Flood and ICMP flood. The researcher uses CICIDS2017 and NSL-KDD dataset in training and testing the algorithms (model) while the experimentation phase. accuracy score is used to measure the classification performance of the four algorithms. the results display that the 99.93 performance is recorded.

An Experimental Study on Characteristics of Hydrodynamic Forces Acting on Unmanned Undersea Vehicle at Large Attack Angles (대각도 받음각을 갖는 무인잠수정에 작용하는 동유체력 특성에 관한 실험적 연구)

  • Bae, Jun-Young;Kim, Jeong-Jung;Sohn, Kyoung-Ho
    • Journal of Navigation and Port Research
    • /
    • v.35 no.3
    • /
    • pp.197-204
    • /
    • 2011
  • The authors adopt the Unmanned Undersea Vehicle(UUV), the shape of which is like a manta. They call here it Manta UUV. Manta UUV has been designed from the similar concept of the UUV called Manta Test Vehicle(MTV), which was originally built by the Naval Undersea Warfare Center of USA(Lisiewicz and French, 2000; Simalis et al., 2001; U.S. Navy, 2004). The present study deals with the effect of Reynolds numbers on hydrodynamic forces acting on Manta UUV at large angles of attack. The large angles of attack cover the whole range of 0 to ${\pm}$ 180 degrees in horizontal plane and in vertical plane respectively. Static test at large attack angles has been carried out with two Manta UUV models in circulating water channel. The authors assume that the experimental results of hydrodynamic forces (lateral force, yaw moment, vertical force and pitch moment) are analyzed into two components, which are lift force component and cross-flow drag component. First of all, Based on two dimensional cross-flow drag coefficient at 90 degrees of attack angle, the cross-flow drag component at whole range of attack angles is calculated. Then the remainder is assumed to be the lift force component. The only cross-flow drag component is assumed to be subject to Reynolds number.entstly the authors suggest the methodology to predict hydrodynamic derivertives acting on the full-scale Manta UUV.

The Effects of Adolescent's Big-Five Personality Factors, Self-Esteem and Self-Monitoring on Their Conflict Resolution Management Style (갈등관리스타일에 영향을 미치는 퍼스낼리티 요인: 성격 5요인(Big Five Factors), 자아존중감, 자기감시를 중심으로)

  • Jang, Hae-Soon;Han, Ju-Lie;Hur, Gyeong-Ho
    • Korean journal of communication and information
    • /
    • v.37
    • /
    • pp.418-451
    • /
    • 2007
  • The current study examined the relationships between the adolescent's conflict resolution style and Big-Five personality factors, self-monitoring and self-esteem. Firstly, results showed that adolescent's big-five personality model affects their conflict resolution styles with their friends and peer group. In detail, the higher the neuroticism was, the stronger became the attack and avoidance strategies. The higher the extraversion was, the higher became the collaborative strategy and the lower became the attack and avoidance strategies. The higher the agreeableness was, the higher became the collaborative strategy and the lower became the attack strategy. The higher the conscientiousness was, the higher became the collaborative strategy and the lower became the avoidance strategy. The higher the openness to experience was, the higher became the collaborative strategy and the lower became the avoidance strategy. The higher the self-esteem was, the higher became the collaborative strategy and the lower became the avoidance and attack strategies. The higher the self-monitoring was, the higher became the collaborative strategy and the lower became the avoidance strategy. Secondly, the big-five personality factors also affected the adolescent's conflict resolution styles. The extraversion, conscientiousness, and agreeableness positively affected the collaborative strategy. The neuroticism was positively related with the attack strategy, whereas agreeableness was negatively affected the attack strategy. The neuroticism and agreeableness were positively related with the avoidance strategy, whereas the extraversion was negatively affected the avoidance strategy. Limitations and suggestions for future study were discussed thereafter.

  • PDF

North Korea's Cyber Attack Patterns and Behaviors : An Analysis Based on Cyber Power and Coercion Theory (북한의 대남 사이버공격 양상과 행태 : 사이버파워와 강압이론을 통한 분석)

  • Yoon, Taeyoung;Woo, Jeongmin
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.117-128
    • /
    • 2018
  • The purpose of this paper is to analyze the behavior of North Korea's cyber attack against South Korea since 2009 based on major international security theories and suggest South Korea's policy option. For this purpose, this paper applied the behavioral domain and characteristics of 'cyber power' and 'coercion dynamics' model, which are attracting attention in international security studies. The types of cyber attacks from North Korea are classified into the following categories: power-based incarceration, leadership attacks and intrusions, military operations interference, and social anxiety and confusion. In terms of types and means of cyber power, North Korean GPS disturbance, the Ministry of Defense server hacking and EMP are hard power with high retaliation and threat and cyber money cashing and ransomware are analyzed by force in the act of persuasion and incentive in the point of robbing or asking for a large amount of money with software pawns. North Korea 's cyber attack has the character of escape from realistic sanctions based on the second nuclear test. It is important for South Korea to clearly recognize that the aggressive cyberpower of North Korea is changing in its methods and capabilities, and to ensure that North Korea's actions result in far greater losses than can be achieved. To do this, it is necessary to strengthen the cyber security and competence to simultaneously attack and defend through institutional supplement and new establishment such as cyber psychological warfare, EMP attack preparation, and enhancement of security expertise against hacking.

  • PDF

An Adversarial Attack Type Classification Method Using Linear Discriminant Analysis and k-means Algorithm (선형 판별 분석 및 k-means 알고리즘을 이용한 적대적 공격 유형 분류 방안)

  • Choi, Seok-Hwan;Kim, Hyeong-Geon;Choi, Yoon-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1215-1225
    • /
    • 2021
  • Although Artificial Intelligence (AI) techniques have shown impressive performance in various fields, they are vulnerable to adversarial examples which induce misclassification by adding human-imperceptible perturbations to the input. Previous studies to defend the adversarial examples can be classified into three categories: (1) model retraining methods; (2) input transformation methods; and (3) adversarial examples detection methods. However, even though the defense methods against adversarial examples have constantly been proposed, there is no research to classify the type of adversarial attack. In this paper, we proposed an adversarial attack family classification method based on dimensionality reduction and clustering. Specifically, after extracting adversarial perturbation from adversarial example, we performed Linear Discriminant Analysis (LDA) to reduce the dimensionality of adversarial perturbation and performed K-means algorithm to classify the type of adversarial attack family. From the experimental results using MNIST dataset and CIFAR-10 dataset, we show that the proposed method can efficiently classify five tyeps of adversarial attack(FGSM, BIM, PGD, DeepFool, C&W). We also show that the proposed method provides good classification performance even in a situation where the legitimate input to the adversarial example is unknown.

Analysis of the Flow Field around a Hydrofoil Catamaran by Using Model Experiment and Numerical Analysis (모형시험 및 수치해석을 통한 수중익쌍동선 주위의 유동장 해석)

  • Na, Y.I.;Lee, Y.G.
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.34 no.4
    • /
    • pp.61-71
    • /
    • 1997
  • Numerical and experimental studies are carried out to analyse the resistance characteristics of a hydrofoil catamaran which is advancing on calm water with uniform speed. For the hydrofoil catamaran with modified Wigley hull which has asymmetric transverse section and transom stem, the studies are carried out for the range of Froude number 0.2 to 1.0 and the angle of attack of the hydrofoil $0.0^{\circ}$ to $3.0^{\circ}$. The model tests are carried out in the ship model basin of Inha University. Also the numerical computations using a finite difference method are performed for the simulations of fluid flow around the hull form and the results are compared with the results of the model tests. The present computation results show well quantitative agreement with the experimental results. The experimental results show that the shape and angle of attack of the foils exerts a considerable influence on the running posture and resistance performance of ship.

  • PDF

Probabilistic Analysis of Repairing Cost Considering Random Variables of Durability Design Parameters for Chloride Attack (염해-내구성 설계 변수에 변동성에 따른 확률론적 보수비용 산정 분석)

  • Lee, Han-Seung;Kwon, Seung-Jun
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.22 no.1
    • /
    • pp.32-39
    • /
    • 2018
  • Repairing timing and the extended service life with repairing are very important for cost estimation during operation. Conventionally used model for repair cost shows a step-shaped cost elevation without consideration of variability of extended service life due to repairing. In the work, RC(Reinforced Concrete) Column is considered for probabilistic evaluation of repairing number and cost. Two mix proportions are prepared and chloride behavior is evaluated with quantitative exterior conditions. The repairing frequency and cost are investigated with varying service life and the extended service life with repairing which were derived from the chloride behavior analysis. The effect of COV(Coefficient of Variation) on repairing frequency is small but the 1st repairing timing is shown to be major parameter. The probabilistic model for repairing cost is capable of reducing the number of repairing with changing the intended service life unlike deterministic model of repairing cost since it can provide continuous repair cost with time.

Biometric Template Security for Personal Information Protection (개인정보 보호를 위한 바이오인식 템플릿 보안)

  • Shin, Yong-Nyuo;Lee, Yong-Jun;Chun, Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.4
    • /
    • pp.437-444
    • /
    • 2008
  • This paper deals with the biometric template protection in the biometric system which has been widely used for personal authentication. First, we consider the structure of the biometric system and the function of its sub-systems and define the biometric template and identification(ID) information. And then, we describe the biometric template attack points of a biometric system and attack examples and provide their countermeasures. From this, we classify the vulnerability which can be protected by encryption and hashing techniques. For more detail investigation of these at real operating situations, we analyze them and suggest several protection methods for the typical application scheme of biometric systems such as local model, download model, attached model, and center model. Finally, we also handle the privacy problem which is most controversy issue related to the biometric systems and suggest some guidances of safeguarding procedures on establishing privacy sympathy biometric systems.

Building an Analysis Model for Social Engineering Based Cyberspace Operations (사회공학 사이버작전 분석모델 정립연구)

  • Shin, Kyuyong;Kim, Jeewon;Lim, Hyun-myung;Kim, Yongju;Yoo, Jincheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1595-1606
    • /
    • 2018
  • Recently, there has been an increase in the number of social engineering techniques that indirectly attack the target system administrators or organizational weaknesses rather than the traditional technical cyber attacks that directly attacked the target systems. Accordingly, the type analysis and case study of social engineering techniques are being actively conducted. There has been, however, little effort to derive an analysis model that systematically analyzes social engineering based cyberspace operations. Therefore, this paper aims at building a Social Engineering Based Cyberspace Operations Analysis Model, which can be used as a reference framework for a case study or attack scenario generation of social engineering based cyberspace operations.

A study on the threat hunting model for threat detection of circumvent connection remote attack (우회 원격공격의 위협탐지를 위한 위협 헌팅 모델 연구)

  • Kim, Inhwan;Ryu, Hochan;Jo, Kyeongmin;Jeon, Byungkook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.4
    • /
    • pp.15-23
    • /
    • 2021
  • In most hacking attacks, hackers intrudes inside for a long period of time and attempts to communicate with the outside using a circumvent connection to achieve purpose. research in response to advanced and intelligent cyber threats has been mainly conducted with signature-based detection and blocking methods, but recently it has been extended to threat hunting methods. attacks from organized hacking groups are advanced persistent attacks over a long period of time, and bypass remote attacks account for the majority. however, even in the intrusion detection system using intelligent recognition technology, it only shows detection performance of the existing intrusion status. therefore, countermeasures against targeted bypass rwjqthrwkemote attacks still have limitations with existing detection methods and threat hunting methods. in this paper, to overcome theses limitations, we propose a model that can detect the targeted circumvent connection remote attack threat of an organized hacking group. this model designed a threat hunting process model that applied the method of verifying the origin IP of the remote circumvent connection, and verified the effectiveness by implementing the proposed method in actual defense information system environment.