• Title/Summary/Keyword: Attack Model

Search Result 1,005, Processing Time 0.024 seconds

Behavior and Script Similarity-Based Cryptojacking Detection Framework Using Machine Learning (머신러닝을 활용한 행위 및 스크립트 유사도 기반 크립토재킹 탐지 프레임워크)

  • Lim, EunJi;Lee, EunYoung;Lee, IlGu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1105-1114
    • /
    • 2021
  • Due to the recent surge in popularity of cryptocurrency, the threat of cryptojacking, a malicious code for mining cryptocurrencies, is increasing. In particular, web-based cryptojacking is easy to attack because the victim can mine cryptocurrencies using the victim's PC resources just by accessing the website and simply adding mining scripts. The cryptojacking attack causes poor performance and malfunction. It can also cause hardware failure due to overheating and aging caused by mining. Cryptojacking is difficult for victims to recognize the damage, so research is needed to efficiently detect and block cryptojacking. In this work, we take representative distinct symptoms of cryptojacking as an indicator and propose a new architecture. We utilized the K-Nearst Neighbors(KNN) model, which trained computer performance indicators as behavior-based dynamic analysis techniques. In addition, a K-means model, which trained the frequency of malicious script words for script similarity-based static analysis techniques, was utilized. The KNN model had 99.6% accuracy, and the K-means model had a silhouette coefficient of 0.61 for normal clusters.

A Captive Model Test on Hydrodynamic Force and Neutral Level Flight of BB2 Submarine in Straight Operation at Near Free Surface with Different Depths (자유수면 근처에서 직진하는 BB2 잠수함의 심도별 유체력과 중립운항에 대한 구속모형시험 연구)

  • Kwon, Chang-Seop;Kim, Dong-Jin;Yun, Kunhang;Kim, Yeon-Gyu
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.59 no.5
    • /
    • pp.288-295
    • /
    • 2022
  • In this study, the force and moment acting on a Joubert BB2 submarine model at depths near the free surface were measured through a captive model test with the scale ratio of 1/15. Based on the experiment, the pitch moment and heave force due to the "Tail suction effect", including the change in surge force with depth near the free surface, were quantitatively analyzed. The change of force and moment according to the relative position of the sail and the free surface was reviewed with the free surface waves generated for each depths. As a result, the angle of attack of the hull to counteract the pitch moment induced by the tail suction effect was derived. The effect of the hydrostatic moment component according to the angle of attack on the equilibrium of pitch moment was also taken into account. The control plane performance tests for the X-type rudder and sail plane were conducted in snorkel and surface depth conditions to figure out the control plane angles for the neutral level flight of the submarine at near free surface. The results of this study are expected to be used as a reference data for the neutral level flight of the submarine at near free surface operation in the free running model test as well as numerical studies.

Improvement Plan for Public Institution Remote Security Model in the New-Normal Era (뉴노멀 시대의 공공기관 원격보안 모델 개선방안)

  • Shin, SeungWoo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.9
    • /
    • pp.104-112
    • /
    • 2022
  • The pandemic caused by the COVID-19 virus, which has lasted for the past three years, has changed society and the way people live in many ways. These changes also affect cyberspace, so the pre-pandemic information security model and standards have limitations when applied to the current situation. In this paper, a new method to improve the information security model of public institutions was proposed in consideration of various situations in the new normal era. In other words, through the proposed information security model, the possibility of external intrusion is blocked in advance through the policy and technical supplementation of remote work, which is a weakness of the existing information security operation of public institutions. Also, how to prevent abnormal authentication attempts by building a secure VPN environment, how to prevent social engineering cyber attacks targeting fear and uncertainty caused by COVID-19, and how to use a smooth network and create a remote work environment. For this purpose, methods for securing service availability were additionally presented.

Numerical investigation of turbulence models with emphasis on turbulent intensity at low Reynolds number flows

  • Musavir Bashir;Parvathy Rajendran;Ambareen Khan;Vijayanandh Raja;Sher Afghan Khan
    • Advances in aircraft and spacecraft science
    • /
    • v.10 no.4
    • /
    • pp.303-315
    • /
    • 2023
  • The primary goal of this research is to investigate flow separation phenomena using various turbulence models. Also investigated are the effects of free-stream turbulence intensity on the flow over a NACA 0018 airfoil. The flow field around a NACA 0018 airfoil has been numerically simulated using RANS at Reynolds numbers ranging from 100,000 to 200,000 and angles of attack (AoA) ranging from 0° to 18° with various inflow conditions. A parametric study is conducted over a range of chord Reynolds numbers for free-stream turbulence intensities from 0.1 % to 0.5 % to understand the effects of each parameter on the suction side laminar separation bubble. The results showed that increasing the free-stream turbulence intensity reduces the length of the separation bubble formed over the suction side of the airfoil, as well as the flow prediction accuracy of each model. These models were used to compare the modeling accuracy and processing time improvements. The K- SST performs well in this simulation for estimating lift coefficients, with only small deviations at larger angles of attack. However, a stall was not predicted by the transition k-kl-omega. When predicting the location of flow reattachment over the airfoil, the transition k-kl-omega model also made some over-predictions. The Cp plots showed that the model generated results more in line with the experimental findings.

A Security Model Analysis Adopt to Authentication State Information in IPTV Environment (IPTV 환경에서 가입자의 인증 상태정보를 이용한 인증보안 모델 설계)

  • Jeong, Yoon-Su;Jung, Yoon-Sung;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.421-430
    • /
    • 2010
  • Now a days, as a communications network is being broadband, IPTV(Internet Protocol Television) service which provides various two-way TV service is increasing. But as the data which is transmitted between IPTV set-top box and smart card is almost transmitted to set-top box, the illegal user who gets legal authority by approaching to the context of contents illegally using McComac Hack Attack is not prevented perfectly. In this paper, set-top box access security model is proposed which is for the protection from McComac Hack Attack that tries to get permission for access of IPTV service illegally making data line which is connected from smart card to set-top box by using same kind of other set-top box which illegal user uses. The proposed model reports the result of test which tests the user who wants to get permission illegally by registration the information of a condition of smart card which is usable in set-top box in certification server so that it prevents illegal user. Specially, the proposed model strengthen the security about set-top box by adapting public key which is used for establishing neighbor link and inter-certification process though secret value and random number which is created by Pseudo random function.

A Design of Time-based Anomaly Intrusion Detection Model (시간 기반의 비정상 행위 침입탐지 모델 설계)

  • Shin, Mi-Yea;Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.5
    • /
    • pp.1066-1072
    • /
    • 2011
  • In the method to analyze the relationship in the system call orders, the normal system call orders are divided into a certain size of system call orders to generates gene and use them as the detectors. In the method to consider the system call parameters, the mean and standard deviation of the parameter lengths are used as the detectors. The attack of which system call order is normal but the parameter values are changed, such as the format string attack, cannot be detected by the method that considers only the system call orders, whereas the model that considers only the system call parameters has the drawback of high positive defect rate because of the information obtained from the interval where the attack has not been initiated, since the parameters are considered individually. To solve these problems, it is necessary to develop a more efficient learning and detecting method that groups the continuous system call orders and parameters as the approach that considers various characteristics of system call related to attacking simultaneously. In this article, we detected the anomaly of the system call orders and parameters by applying the temporal concept to the system call orders and parameters in order to improve the rate of positive defect, that is, the misjudgment of anomaly as normality. The result of the experiment where the DARPA data set was employed showed that the proposed method improved the positive defect rate by 13% in the system call order model where time was considered in comparison with that of the model where time was not considered.

Mechanisms of sulfate ionic diffusion in porous cement based composites

  • Gospodinov, P.;Mironova, M.;Kazandjiev, R.
    • Computers and Concrete
    • /
    • v.4 no.4
    • /
    • pp.273-284
    • /
    • 2007
  • The paper considers a theoretical model for the study of the process of transfer of sulfate ions in saturated porous media - mineral composites. In its turn, the model treats diffusion of sulfate ions into cement based composites, accounting for simultaneous effects such as filling of micro-capillaries with ions and chemical products and liquid push out of them. The proposed numerical algorithm enables one to account for those simultaneous effects, as well as to model the diffusive behavior of separate sections of the considered volume, such as inert fillers. The cases studied illustrate the capabilities of the proposed model and those of the algorithm developed to study diffusion, considering the specimen complex configuration. Computations show that the theoretical assumptions enable one to qualitatively estimate the experimental evidence and the capabilities of the studied composite. The results found can be used to both assess the sulfate corrosion in saturated systems and predict and estimate damage of structures built of cement-based mineral composites.

Data Mining Approaches for DDoS Attack Detection (분산 서비스거부 공격 탐지를 위한 데이터 마이닝 기법)

  • Kim, Mi-Hui;Na, Hyun-Jung;Chae, Ki-Joon;Bang, Hyo-Chan;Na, Jung-Chan
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.279-290
    • /
    • 2005
  • Recently, as the serious damage caused by DDoS attacks increases, the rapid detection and the proper response mechanisms are urgent. However, existing security mechanisms do not effectively defend against these attacks, or the defense capability of some mechanisms is only limited to specific DDoS attacks. In this paper, we propose a detection architecture against DDoS attack using data mining technology that can classify the latest types of DDoS attack, and can detect the modification of existing attacks as well as the novel attacks. This architecture consists of a Misuse Detection Module modeling to classify the existing attacks, and an Anomaly Detection Module modeling to detect the novel attacks. And it utilizes the off-line generated models in order to detect the DDoS attack using the real-time traffic. We gathered the NetFlow data generated at an access router of our network in order to model the real network traffic and test it. The NetFlow provides the useful flow-based statistical information without tremendous preprocessing. Also, we mounted the well-known DDoS attack tools to gather the attack traffic. And then, our experimental results show that our approach can provide the outstanding performance against existing attacks, and provide the possibility of detection against the novel attack.

Development of Chloride Ingress Model in Reinforced Concrete Structures (철근콘크리트 구조물의 염소이온 침투 모델 개발)

  • 구현본;이광명
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2002.05a
    • /
    • pp.731-736
    • /
    • 2002
  • The degradation of reinforced concrete (RC) structures due to physical and chemical attacks has been a major issue in construction engineering. Deterioration of RC structures due to chloride attack followed by reinforcement corrosion is one of the serious problems. The objective of this study is to develop a form of mathematical model of chloride ingress into concrete. In order to overcome some limits of the previous approaches, a mathematical model of chloride ingress into concrete consisting of chloride solution intrusion through the capillary pore and chloride ion diffusion through the pore water was proposed. Moreover, the variability of diffusivity of chloride ion due to degree of hydration of concrete, relative humidity in pore, exposure condition, and variation of chloride binding was considered in the chloride ingress model.

  • PDF

A study on the mathematical model of an influenza system control (인플루엔자 류행 관리의 수학적 모델화)

  • 정형환;박상희
    • 전기의세계
    • /
    • v.30 no.3
    • /
    • pp.167-171
    • /
    • 1981
  • In this paper, the mathematical model of influenza derived by the state space method induced a new model by using normal distribution curve of incubation period and researched the effect of vaccination. The important results are as follows. (1) A new model represents accurate spread curve. (2) The standard deviation period in Korea is about 1.5 degree. (3) The number of carries of influenza since put in practice to the vaccination 20% is reduced by average 9.8% degree, the period of spread increase 4 days degree. (4) The vaccination at early put in operation was far surperior and the period of spread grow longer more or less. (5) In the first stage of an attack of disease a case increase since reducing. (6) The number of carries at night is reduced by average 5.468% than in the daytime.

  • PDF