• Title/Summary/Keyword: Attack Model

Search Result 1,005, Processing Time 0.031 seconds

Comparison of Detection Performance of Intrusion Detection System Using Fuzzy and Artificial Neural Network (퍼지와 인공 신경망을 이용한 침입탐지시스템의 탐지 성능 비교 연구)

  • Yang, Eun-Mok;Lee, Hak-Jae;Seo, Chang-Ho
    • Journal of Digital Convergence
    • /
    • v.15 no.6
    • /
    • pp.391-398
    • /
    • 2017
  • In this paper, we compared the performance of "Network Intrusion Detection System based on attack feature selection using fuzzy control language"[1] and "Intelligent Intrusion Detection System Model for attack classification using RNN"[2]. In this paper, we compare the intrusion detection performance of two techniques using KDD CUP 99 dataset. The KDD 99 dataset contains data sets for training and test data sets that can detect existing intrusions through training. There are also data that can test whether training data and the types of intrusions that are not present in the test data can be detected. We compared two papers showing good intrusion detection performance in training and test data. In the comparative paper, there is a lack of performance to detect intrusions that exist but have no existing intrusion detection capability. Among the attack types, DoS, Probe, and R2L have high detection rate using fuzzy and U2L has a high detection rate using RNN.

Prediction of Deterioration Process for Concrete Considering Combined Deterioration of Carbonation and Chlorides Ion (중성화와 염해를 고려한 콘크리트의 복합열화 예측)

  • Lee, Chang-Soo;Yoon, In-Seok
    • Journal of the Korea Concrete Institute
    • /
    • v.15 no.6
    • /
    • pp.902-912
    • /
    • 2003
  • The most common deteriorating processes of concrete structures are carbonation and chloride ion ingress. Many concrete structures have been suffered from chloride ions diffusion or carbonation induced reinforcement corrosion damage and many studies have been done on it. However, those studies were confined mostly to the single deterioration of carbonation or chloride attack only, although actual environment is rather of combined conditions. In case of many in-situ concrete structures, deterioration happened more for the case of combined attack than the single case of carbonation or chloride attack. In this paper, chloride profiles of carbonated concrete is predicted by considering two layer composite model, which is based on Fick's 2nd law. From the experimental result on combined deterioration of chloride and carbonation, it was examined that high chloride concentration was built up to 3∼5 mm over depth from carbonation depth. The analytical modeling of chloride diffusion was suggested to depict the relative influence of the carbonation depth. The diffusion coefficients of carbonation concrete and uncarbonated concrete with elapsed time were considered in this modeling.

Flow Structure of Conical Vortices Generated on the Roof of a Rectangular Prism (직사각형 프리즘 상면에서 발생되는 원추형 와의 유동구조)

  • Kim, Gyeong-Cheon;Ji, Ho-Seong;Seong, Seung-Hak
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.25 no.5
    • /
    • pp.713-721
    • /
    • 2001
  • Characteristics of the conical vortices on the roof corner of a rectangular prism have been investigated by using a PIV(Particle Image Velocimetry) technique. The Reynolds number based on the free stream velocity and the height of the model was 5.3$\times$10$^3$. The mean, instantaneous velocity vector fields, vorticity fields, and turbulent kinetic energy distribution were measured for two different angles of attack, 30$^{\circ}$and 45$^{\circ}$. The PIV measurements clearly observed not only the conical main vortex and the secondary vortex but also the tertiary vortex which is firstly reported in this paper. Asymmetric formation of the corner vortex for the case of 30$^{\circ}$angle of attack produces relatively the high magnitude of vorticity and turbulent kinetic energy around the bigger vortex which generates the peak suction pressure on the roof. Fairly symmetric features of the roof vortex are observed in the case of 45$^{\circ}$angle of attack, however, the dynamic characteristics are proved to be asymmetric due to the rectangular shape of the roof.

Threat Classification Schemes for Effective Management based on W-TMS(Wireless-Threat Management System) (W-TMS(Wireless-Threat Management System)에서의 효율적 관리를 위한 위협 분류기법)

  • Seo, Jong-Won;Jo, Je-Gyeong;Lee, Hyung-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.3
    • /
    • pp.93-100
    • /
    • 2007
  • Internet had spread in all fields with the fast speed during the last 10 years. Lately, wireless network is also spreading rapidly. Also, number of times that succeed attack attempt and invasion for wireless network is increasing rapidly TMS system was developed to overcome these threat on wireless network. Existing TMS system supplies active confrontation mechanism on these threats. However, existent TMS has limitation that new form of attack do not filtered efficiently. Therefor this paper proposes a new method that it automatically compute the threat from the imput packets with vector space model and detect anomaly detection of wireless network. Proposed mechanism in this research analyzes similarity degree between packets, and detect something wrong symptom of wireless network and then classify these threats automatically.

Cost-Effective, Real-Time Web Application Software Security Vulnerability Test Based on Risk Management (위험관리 기반의 비용 효율적인 실시간 웹 애플리케이션 소프트웨어 보안취약점 테스팅)

  • Kumi, Sandra;Lim, ChaeHo;Lee, SangGon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.59-74
    • /
    • 2020
  • The web space where web applications run is the cyber information warfare of attackers and defenders due to the open HTML. In the cyber attack space, about 84% of worldwide attacks exploit vulnerabilities in web applications and software. It is very difficult to detect web vulnerability attacks with security products such as web firewalls, and high labor costs are required for security verification and assurance of web applications. Therefore, rapid vulnerability detection and response in web space by automated software is a key and effective cyber attack defense strategy. In this paper, we establish a security risk management model by intensively analyzing security threats against web applications and software, and propose a method to effectively diagnose web and application vulnerabilities. The testing results on the commercial service are analyzed to prove that our approach is more effective than the other existing methods.

Effect of Air Pollution on Emergency Room Visits for Asthma : a Time Series Analysis (대기오염과 천식발작의 관련성에 관한 시계열적 연구)

  • Ju, Young-Su;Cho, Soo-Hun
    • Journal of Preventive Medicine and Public Health
    • /
    • v.34 no.1
    • /
    • pp.61-72
    • /
    • 2001
  • Objectives : To evaluate the hypothesis that increasing ambient levels of ozone or particulate matter are associated with increased emergency room visits for asthma and to quantify the strength of association, if any, between these. Methods : Daily counts of emergency room visits for asthma, air quality, and weather data were collected from hospitals with over 200 beds and from monitoring Stations in Seoul, Korea from 1994 through 1997. Daily counts of emergency mom visits for asthma attack were analyzed using a general additive Poisson model, with adjustment for the effects of secular trend, seasonal variation, Sunday and holiday, temperature, and humidly, according to levels of ozone and particulate matter. Results : The association between daily counts of emergency room visits for asthma attack and ozone levels was statistically significant in summer(from June to August), and the RR by unit inclement of 100 ppb ozone was 1.30(95% CI = $1.11\sim1.52$) without lag time. With restriction of the period from April to September in 1996, the RR was 1.37(95% CI = $1.06\sim1.76$), and from June to August in 1995, the RR was 1.62(95% CI = $1.12\sim2.35$). In the data for children$(5\sim14yr)$, the RR was 2.57(95% CI = $1.31\sim5.05$) with restriction of the period from April to September in 1997. There was no Significant association between TSP levels and asthma attacks, but a slight association was seen between PM10 levels and asthma attacks in a very restricted period. Conclusion : There was a statistically significant association between ambient levels of ozone and daily counts of emergency room visits for asthma attack. Therefore, we must make efforts to effectively minimize air pollution, in order to protect public health.

  • PDF

Topic Automatic Extraction Model based on Unstructured Security Intelligence Report (비정형 보안 인텔리전스 보고서 기반 토픽 자동 추출 모델)

  • Hur, YunA;Lee, Chanhee;Kim, Gyeongmin;Lim, HeuiSeok
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.6
    • /
    • pp.33-39
    • /
    • 2019
  • As cyber attack methods are becoming more intelligent, incidents such as security breaches and international crimes are increasing. In order to predict and respond to these cyber attacks, the characteristics, methods, and types of attack techniques should be identified. To this end, many security companies are publishing security intelligence reports to quickly identify various attack patterns and prevent further damage. However, the reports that each company distributes are not structured, yet, the number of published intelligence reports are ever-increasing. In this paper, we propose a method to extract structured data from unstructured security intelligence reports. We also propose an automatic intelligence report analysis system that divides a large volume of reports into sub-groups based on their topics, making the report analysis process more effective and efficient.

Power Analysis Attacks on the Stream Cipher Rabbit (스트림 암호 Rabbit에 대한 전력분석 공격)

  • Bae, Ki-Seok;Ahn, Man-Ki;Park, Jea-Hoon;Lee, Hoon-Jae;Moon, Sang-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.27-35
    • /
    • 2011
  • Design of Sensor nodes in Wireless Sensor Network(WSN) should be considered some properties as electricity consumption, transmission speed, range, etc., and also be needed the protection against various attacks (e.g., eavesdropping, hacking, leakage of customer's secret data, and denial of services). The stream cipher Rabbit, selected for the final eSTREAM portfolio organized by EU ECRYPT and selected as algorithm in part of ISO/IEC 18033-4 Stream Ciphers on ISO Security Standardization recently, is a high speed stream cipher suitable for WSN. Since the stream cipher Rabbit was evaluated the complexity of side-channel analysis attack as 'Medium' in a theoretical approach, thus the method of power analysis attack to the stream cipher Rabbit and the verification of our method by practical experiments were described in this paper. We implemented the stream cipher Rabbit without countermeasures of power analysis attack on IEEE 802.15.4/ZigBee board with 8-bit RISC AVR microprocessor ATmega128L chip, and performed the experiments of power analysis based on difference of means and template using a Hamming weight model.

Numerical Analysis of Flow around Bow Rudder (선수 타 주위 유동의 수치적 해석)

  • Koo, Bon-Guk;Park, Jun-Mo
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.21 no.4
    • /
    • pp.170-176
    • /
    • 2020
  • In this study, the lift, drag and moments of the rudder that influences on the maneuvering ships directly has been investigated using CFD(Computational Fluid Dynamics). One of typical ship rudders effecting on the forces and moments is the bow rudders during maneuvering on the sea. Thus, the forces and moments should be investigated for the bow of ship rudder. Among the IFS bow rudder series, the balance IFS 54 BR 15 is used for study. As a turbulent model, standard k-epsilon is applied to this study. The hydrodynamic of the bow rudder, especially lift, drag and moment coefficients are calculated for the different angles of attack. The angles of attack between water flow and rudder are presented in cases including 0°, 5°, 10°, 15°, 20°, 25°, 30° and 35°. The results of calculation for those influences on maneuvering performance of ships are compared with the relevant results of the previous experimental studies.

GCNXSS: An Attack Detection Approach for Cross-Site Scripting Based on Graph Convolutional Networks

  • Pan, Hongyu;Fang, Yong;Huang, Cheng;Guo, Wenbo;Wan, Xuelin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.12
    • /
    • pp.4008-4023
    • /
    • 2022
  • Since machine learning was introduced into cross-site scripting (XSS) attack detection, many researchers have conducted related studies and achieved significant results, such as saving time and labor costs by not maintaining a rule database, which is required by traditional XSS attack detection methods. However, this topic came across some problems, such as poor generalization ability, significant false negative rate (FNR) and false positive rate (FPR). Moreover, the automatic clustering property of graph convolutional networks (GCN) has attracted the attention of researchers. In the field of natural language process (NLP), the results of graph embedding based on GCN are automatically clustered in space without any training, which means that text data can be classified just by the embedding process based on GCN. Previously, other methods required training with the help of labeled data after embedding to complete data classification. With the help of the GCN auto-clustering feature and labeled data, this research proposes an approach to detect XSS attacks (called GCNXSS) to mine the dependencies between the units that constitute an XSS payload. First, GCNXSS transforms a URL into a word homogeneous graph based on word co-occurrence relationships. Then, GCNXSS inputs the graph into the GCN model for graph embedding and gets the classification results. Experimental results show that GCNXSS achieved successful results with accuracy, precision, recall, F1-score, FNR, FPR, and predicted time scores of 99.97%, 99.75%, 99.97%, 99.86%, 0.03%, 0.03%, and 0.0461ms. Compared with existing methods, GCNXSS has a lower FNR and FPR with stronger generalization ability.