• Title/Summary/Keyword: Attack Model

Search Result 1,005, Processing Time 0.037 seconds

A Study on Improving Data Poisoning Attack Detection against Network Data Analytics Function in 5G Mobile Edge Computing (5G 모바일 에지 컴퓨팅에서 빅데이터 분석 기능에 대한 데이터 오염 공격 탐지 성능 향상을 위한 연구)

  • Ji-won Ock;Hyeon No;Yeon-sup Lim;Seong-min Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.549-559
    • /
    • 2023
  • As mobile edge computing (MEC) is gaining attention as a core technology of 5G networks, edge AI technology of 5G network environment based on mobile user data is recently being used in various fields. However, as in traditional AI security, there is a possibility of adversarial interference of standard 5G network functions within the core network responsible for edge AI core functions. In addition, research on data poisoning attacks that can occur in the MEC environment of standalone mode defined in 5G standards by 3GPP is currently insufficient compared to existing LTE networks. In this study, we explore the threat model for the MEC environment using NWDAF, a network function that is responsible for the core function of edge AI in 5G, and propose a feature selection method to improve the performance of detecting data poisoning attacks for Leaf NWDAF as some proof of concept. Through the proposed methodology, we achieved a maximum detection rate of 94.9% for Slowloris attack-based data poisoning attacks in NWDAF.

Social Engineering Attack Characteristics and Countermeasure Strategies of Major Threat Countries (주요 위협국의 사회공학 공격특징과 대응전략)

  • Jeewon Kim
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.165-172
    • /
    • 2023
  • Nation-state social engineering attacks are steadily being carried out as they are highly effective attacks, primarily to gain an advantage over secret information, diplomatic negotiations or future policy changes. As The Ukraine-Russia war prolongs, the activities of global hacking organizations are steadily increasing, and large-scale cyberattack attempts against major infrastructure or global companies continue, so a countermeasure strategy is needed. To this end, we determined that the social engineering attack cycle excluding physical contact among various social engineering models is the most suitable model, and analyzed the preferred social engineering attack method by comparing it with geopolitical tactics through case analysis. AS a result China favors phishing attacks, which prefer quantity over quality, such as man-made tactics, Russia prefers covert and complex spear phishing reminiscent of espionage warfare, and North Korea uses geopolitical tactics such as spear phishing and watering holes for attacks on the US and South Korea Most of the other countries aimed to secure funds with ransomware. Accordingly, a Clean Pass policy for China, periodic compulsory education in Russia, and international sanctions against North Korea were presented as countermeasure strategies.

Enhanced mass balance Tafel slope model for computer based FEM computation of corrosion rate of steel reinforced concrete coupled with CO2 transport

  • Hussain, Raja Rizwan
    • Computers and Concrete
    • /
    • v.8 no.2
    • /
    • pp.177-192
    • /
    • 2011
  • This research paper aims at computer based modeling of carbonation induced corrosion under extreme conditions and its experimental verification by incorporating enhanced electrochemical and mass balance equations based on thermo-hygro physics with strong coupling of mass transport and equilibrium in micro-pore structure of carbonated concrete for which the previous research data is limited. In this paper the carbonation induced electrochemical corrosion model is developed and coupled with carbon dioxide transport computational model by the use of a concrete durability computer based model DuCOM developed by our research group at concrete laboratory in the University of Tokyo and its reliability is checked in the light of experiment results of carbonation induced corrosion mass loss obtained in this research. The comparison of model analysis and experiment results shows a fair agreement. The carbonation induced corrosion model computation reasonably predicts the quantitative behavior of corrosion rate for normal air dry relative humidity conditions. The computational model developed also shows fair qualitative corrosion rate simulation and analysis for various pH levels and coupled environmental actions of chloride and carbonation. Detailed verification of the model for the quantitative carbonation induced corrosion rate computation under varying relative conditions, different pH levels and combined effects of carbonation and chloride attack remain as scope for future research.

Honeypot Model Analysis using CPN (CPN을 이용한 Honeypot 모델 설계)

  • 현병기;구경옥;조도은;조용환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.5B
    • /
    • pp.489-499
    • /
    • 2003
  • This paper is a study about Honey-pot Model using CPN(Colored Petri Nets) that is a method of intrusion detection. Suggested Honey-pot model consists of two parts : \circled1 security kernel module for active induction of hacker's intrusion, intrusion detection and behavior pattern analysis. \circled2 virtual module for activity of induced hackers. However, suggested model was compared and analysed with conventional Denning model and Shieh nodel. The Honey-pot model using CPN can classify the characteristic of intrusion pattern, modeling intrusion pattern and pattern matching procedure, detect DDoS attack through multi hosts, and provide basis of study model for analysing intrusion pattern, finally.

A Practical Application of Multiple Wave Models to the Small Fishery Harbor Entrance

  • Jung, Jae-Hyun;Lee, Joong-Woo;Jeon, Min-Su;Kang, Seok-Jin
    • Journal of Navigation and Port Research
    • /
    • v.31 no.7
    • /
    • pp.579-587
    • /
    • 2007
  • Samchunpo(Sin Hyang) Harbor is located in the bay of Sa Chun, the central south coast of Korean peninsula. The harbor and coastal boundaries have been protecting by natural coastal islands and shoals. Currently, The Sin Hyang harbor needs maintenance and renovation of the sheltered structures against the weather deterioration and typhoon damages. Consequently to support this, the calculation of accurate design wave through the typhoon wave attack is necessary. In this study, calculation of incident wave condition is simulated using steady state spectrum energy wave model(wide area wave model) from 50 years return wave condition. And this simulation results in wide offshore area were used for the input of the extended mild slope wave model at the narrow coastal area. Finally, the calculation of design wave at Sin Hyang harbor entrance was induced by Boussinesq wave model(detail area wave model) simulation. The numerical model system was able to simulate wave transformations from generation scale to shoreline or harbor impact. We hope these results will be helpful to the engineers doing placement, design, orientation, and evaluation of a wide range of potential solutions in this area.

Passive Benign Worm Propagation Modeling with Dynamic Quarantine Defense

  • Toutonji, Ossama;Yoo, Seong-Moo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.1
    • /
    • pp.96-107
    • /
    • 2009
  • Worm attacks can greatly distort network performance, and countering infections can exact a heavy toll on economic and technical resources. Worm modeling helps us to better understand the spread and propagation of worms through a network, and combining effective types of mitigation techniques helps prevent and mitigate the effects of worm attacks. In this paper, we propose a mathematical model which combines both dynamic quarantine and passive benign worms. This Passive Worm Dynamic Quarantine (PWDQ) model departs from previous models in that infected hosts will be recovered either by passive benign worms or quarantine measure. Computer simulation shows that the performance of our proposed model is significantly better than existing models, in terms of decreasing the number of infectious hosts and reducing the worm propagation speed.

BASE DRAG PREDICTION OF A SUPERSONIC MISSILE USING CFD (CFD를 이용한 초음속 유도탄 기저항력 예측)

  • Lee Bok-Jik
    • Journal of computational fluids engineering
    • /
    • v.11 no.3 s.34
    • /
    • pp.59-63
    • /
    • 2006
  • Accurate prediction of a supersonic missile base drag continues to defy even well-rounded CFD codes. In an effort to address the accuracy and predictability of the base drags, the influence of grid system and competitive turbulence models on the base drag is analyzed. Characteristics of some turbulence models is reviewed through incompressible turbulent flow over a flat plate, and performance for the base drag prediction of several turbulence models such as Baldwin-Loman(B-L), Spalart-Allmaras(S-A), k-$\varepsilon$, k-$\omega$ model is assessed. When compressibility correction is injected into the S-A model, prediction accuracy of the base drag is enhanced. The NSWC wind tunnel test data are utilized for comparison of CFD and semi-empirical codes on the accuracy of base drag predictability: they are about equal, but CFD tends to perform better. It is also found that, as angle of attack of a missile with control fins increases, even the best CFD analysis tool we have lacks the accuracy needed for the base drag prediction.

Transonic Flutter Characteristics of the AGARD 445.6 Wing Considering DES Turbulent Model and Different Angle-of-Attacks (DES 난류모델 및 받음각 변화를 고려한 AGARD 445.6 날개의 천음속 플러터 응답 특성)

  • Kim, Yo-Han;Kim, Dong-Hyun
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.18 no.1
    • /
    • pp.27-32
    • /
    • 2010
  • In this study, transonic flutter response characteristics have been studied for the AGARD 445.6 wing considering various turbulent models and several angle of attacks. The developed fluid-structure coupled analysis system is applied for flutter computations combining computational structural dynamics(CSD), finite element method(FEM) and computational fluid dynamics(CFD) in the time domain. The flutter boundaries of AGARD 445.6 wing are verified using developed computational system. For the nonlinear unsteady aerodynamics in high transonic flow region, DES turbulent model using the structured grid system have been applied for the wing model. Characteristics of flutter responses have been investigated for various angle of attack conditions. Also, it is typically shown that the current computation approach can yield realistic and practical results for aircraft design and test engineers.

Enhanced Classical Tafel Diagram Model for Corrosion of Steel in Chloride Contaminated Concrete and the Experimental Non-Linear Effect of Temperature

  • Hussain, Raja Rizwan
    • International Journal of Concrete Structures and Materials
    • /
    • v.4 no.2
    • /
    • pp.71-75
    • /
    • 2010
  • The chloride ion attack on the passive iron oxide layer of reinforcement steel embedded in concrete under variable temperature environment is influenced by several parameters and some of them still need to be further investigated in more detail. Different school of thoughts exist between past researchers and the data is limited in the high temperature and high chloride concentration range which is necessary with regards to setting boundary conditions for enhancement of tafel diagram model presented in this research. The objective of this paper is to investigate the detrimental coupled effects of chloride and temperature on corrosion of reinforced concrete structures in the high range by incorporating classical Tafel diagram chloride induced corrosion model and laboratory controlled experimental non-linear effect of temperature on corrosion of rebar embedded in concrete.

Combinatorial Optimization Model of Air Strike Packages based on Target Groups (표적군 기반 공격 편대군 조합 최적화 모형)

  • Cho, Sanghyeon;Lee, Moongul;Jang, Youngbai
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.42 no.6
    • /
    • pp.386-394
    • /
    • 2016
  • In this research, in order to optimize the multi-objective function effectively, we suggested the optimization model to maximize the total destruction of ground targets and minimize the total damage of aircrafts and cost of air munitions by using goal programming. To satisfy the various variables and constraints of this mathematical model, the concept of air strike package is applied. As a consequence, effective attack can be possible by identifying the prior ground targets more quickly. This study can contribute to maximize the ROK air force's combat power and preservation of high value air asset in the war.