• Title/Summary/Keyword: Attack Model

Search Result 1,005, Processing Time 0.031 seconds

A Study on the Birth of a Holy Land and the Role of Local Residents: The failure to establish a memorial facility for the victims of the Kyoto Animation's arson attack in 2019

  • Lee, Jeonghoon
    • Journal of East-Asian Urban History
    • /
    • v.2 no.2
    • /
    • pp.272-296
    • /
    • 2020
  • The study will first pay attention to the conflict between Kyoto Animation Co. and residents over establishing memorial facilities after the "Kyoto Animation 1st Studio arson and Murder Incident," which occurred in Kyoto, Japan on the morning of July 18, 2019. And through on-site coverage and review of related TV program "Summer of Prayer, Voice of the Holy Land" aired by Mainichi Broadcasting System on August 17, 2019. We reviewed what this conflict means by Japanese animation fans to set a "Holy Land" of specific regions and the resulting content tourism business model. The conflict between Kyoto Animation Co. and the residents resulted in a lengthy confrontation which did not get solved until late July 2020. It proves the cooperation of residents is essential for the success of content tourism, especially the cooperation model for development of Holy Land.

Optimization of a four-bar mechanism cyclic pitch control for a vertical axis wind turbine

  • Montenegro-Montero, Mariana;Richmond-Navarro, Gustavo;Casanova-Treto, Pedro
    • Wind and Structures
    • /
    • v.35 no.2
    • /
    • pp.121-130
    • /
    • 2022
  • In this paper, the issue of pitch control in a vertical axis wind turbine was tackled. Programming the Actuator Cylinder model in MATLAB, a theoretical optimum pitch solution was found and then a classic four-bar mechanism was adapted to that theoretical solution to achieve a simple and elegant control of the pitch in the turbine. A simulation using the mechanism worked to find the optimum pitch cycles, where it was found that the mechanism would, in fact, increase the efficiency of the VAWT, by at least 11% and in the best case, over 35%. Another aspect that is studied is the possibility of self-start of the turbine by only changing the pitch on the blades. This analysis, however, proved that a further individual pitch control must be used to surpass the cogging torque. All analyses conducted were done for a specific wind turbine that is 2 m2 in the swept area.

A Margin-based Face Liveness Detection with Behavioral Confirmation

  • Tolendiyev, Gabit;Lim, Hyotaek;Lee, Byung-Gook
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.187-194
    • /
    • 2021
  • This paper presents a margin-based face liveness detection method with behavioral confirmation to prevent spoofing attacks using deep learning techniques. The proposed method provides a possibility to prevent biometric person authentication systems from replay and printed spoofing attacks. For this work, a set of real face images and fake face images was collected and a face liveness detection model is trained on the constructed dataset. Traditional face liveness detection methods exploit the face image covering only the face regions of the human head image. However, outside of this region of interest (ROI) might include useful features such as phone edges and fingers. The proposed face liveness detection method was experimentally tested on the author's own dataset. Collected databases are trained and experimental results show that the trained model distinguishes real face images and fake images correctly.

A Study on VR Device User Authentication Model based on User Behavior using Anomaly Detection Model (이상 탐지 모델을 활용한 사용자 행위 기반의 VR기기 사용자 인증 모델 연구)

  • Woo-Jin Jeon;Hyoung-Shick Kim
    • Annual Conference of KIPS
    • /
    • 2024.05a
    • /
    • pp.856-858
    • /
    • 2024
  • VR 기술의 발전은 다양한 분야에서 사용자에게 몰입감 있는 가상 현실 경험을 제공하지만, VR기기 내부에 사용자의 생체 데이터 및 금융정보와 같은 민감한 정보들이 저장되어 새로운 보안 문제를 야기하고 있다. 이에 따라 PIN, 패스워드 등과 같은 기존의 인증 방식이 VR 기기에 적용되고 있지만 이들은 shoulder-surfing attack 공격 취약하며 VR 환경에서 사용하기에 불편한 인터페이스를 가지고 있다. 따라서 본 논문에서는 이상 탐지 모델을 활용하여 외부 추론 공격에 강인하며 VR 환경에 적합한 사용자 행위 기반의 VR기기 사용자 인증 모델을 구현한다. 특정 task를 수행하는 동안 사용자의 행위 데이터를 수집 및 feature 데이터를 추출하고, 정상으로 라벨링 된 사용자의 데이터로 이상 탐지 머신러닝 모델들을 학습 후 정상 데이터와 비정상 데이터를 이용하여 인증 모델의 성능을 평가하였다. OC-SVM이 87.72%의 F1-score로 세 모델 중 가장 높은 성능을 보임을 확인하였으며, 향후 인증 모델 성능 향상을 위한 계획을 제시하였다.

Generation of security system defense strategies based on evolutionary game theory

  • Bowen Zou;Yongdong Wang;Chunqiang Liu;Mingguang Dai;Qianwen Du;Xiang Zhu
    • Nuclear Engineering and Technology
    • /
    • v.56 no.9
    • /
    • pp.3463-3471
    • /
    • 2024
  • The physical protection systems of Nuclear Power Plant are utilized to safeguard targets against intrude by attacker. As the methods employed by attackers to intrude Nuclear Power Plant become increasingly complex and diverse, there is an urgent need to identify optimal defense strategies to interrupt adversary intrusions. This paper focuses on studying the defense of security personnel against adversary intrusions and utilizes an evolutionary game approach to select the optimal defense decisions for physical protection systems. Under the assumption of bounded rationality for both the attacker and defender, the paper constructs replication dynamic equations for attack and defense strategies, investigating the process of strategy selection and the stability of evolution. Finally, a minimal model is proposed to validate the feasibility of utilizing the evolutionary game model for defense strategy selection.

A Study on Resistance of Chloride Ion Penetration in Ground Granulated Blast-Furnace Slag Concrete (고로슬래그 미분말 콘크리트의 염화물 침투 저항성에 관한 연구)

  • Song, Ha-Won;Kwon, Seung-Jun;Lee, Suk-Won;Byun, Keun-Joo
    • Journal of the Korea Concrete Institute
    • /
    • v.15 no.3
    • /
    • pp.400-408
    • /
    • 2003
  • Chloride ion inside concrete destroys the so-called passive film surrounding reinforcing bars inside concrete so that the so-called salt attack accelerates corrosion which is the most critical factor for durability as well as structural safety of reinforced concrete structures. Recently, as a solution of the salt attack, the ground granulated blast-furnace slag(GGBFS) have been used as binder or blended cement more extensively. In this paper, characteristics of chloride ion diffusion for the GGBFS concrete, which is known to possess better resistance to damage due to the chloride ion penetration than ordinary portland cement(OPC) concrete possesses, are analyzed and a chloride ion diffusion model for the GGBFS concrete is proposed by modifying an existing diffusion model for the OPC concrete. The proposed model is verified by comparing diffusion analysis results using the model accelerated chloride penetration test results for concrete specimens as well as field test results for an RC bridge pier. Then, an optimal resistance condition to chloride penetration for the GGBFS concrete is obtained according to degrees of fineness and replacement ratios of the GGBFS concrete. The result shows that the GGBFS concrete has better resistance to chloride ion penetration than OPC concrete has and the resistance is more affected by the replacement ratio than the degree of fineness of the GGBFS.

Implementation of reliable dynamic honeypot file creation system for ransomware attack detection (랜섬웨어 공격탐지를 위한 신뢰성 있는 동적 허니팟 파일 생성 시스템 구현)

  • Kyoung Wan Kug;Yeon Seung Ryu;Sam Beom Shin
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.27-36
    • /
    • 2023
  • In recent years, ransomware attacks have become more organized and specialized, with the sophistication of attacks targeting specific individuals or organizations using tactics such as social engineering, spear phishing, and even machine learning, some operating as business models. In order to effectively respond to this, various researches and solutions are being developed and operated to detect and prevent attacks before they cause serious damage. In particular, honeypots can be used to minimize the risk of attack on IT systems and networks, as well as act as an early warning and advanced security monitoring tool, but in cases where ransomware does not have priority access to the decoy file, or bypasses it completely. has a disadvantage that effective ransomware response is limited. In this paper, this honeypot is optimized for the user environment to create a reliable real-time dynamic honeypot file, minimizing the possibility of an attacker bypassing the honeypot, and increasing the detection rate by preventing the attacker from recognizing that it is a honeypot file. To this end, four models, including a basic data collection model for dynamic honeypot generation, were designed (basic data collection model / user-defined model / sample statistical model / experience accumulation model), and their validity was verified.

A Nature-inspired Multiple Kernel Extreme Learning Machine Model for Intrusion Detection

  • Shen, Yanping;Zheng, Kangfeng;Wu, Chunhua;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.2
    • /
    • pp.702-723
    • /
    • 2020
  • The application of machine learning (ML) in intrusion detection has attracted much attention with the rapid growth of information security threat. As an efficient multi-label classifier, kernel extreme learning machine (KELM) has been gradually used in intrusion detection system. However, the performance of KELM heavily relies on the kernel selection. In this paper, a novel multiple kernel extreme learning machine (MKELM) model combining the ReliefF with nature-inspired methods is proposed for intrusion detection. The MKELM is designed to estimate whether the attack is carried out and the ReliefF is used as a preprocessor of MKELM to select appropriate features. In addition, the nature-inspired methods whose fitness functions are defined based on the kernel alignment are employed to build the optimal composite kernel in the MKELM. The KDD99, NSL and Kyoto datasets are used to evaluate the performance of the model. The experimental results indicate that the optimal composite kernel function can be determined by using any heuristic optimization method, including PSO, GA, GWO, BA and DE. Since the filter-based feature selection method is combined with the multiple kernel learning approach independent of the classifier, the proposed model can have a good performance while saving a lot of training time.

A study on the modeling and dynamic analysis of the offshore crane and payload (해상작업용 크레인의 모델링과 부하운동 특성해석에 관한 연구)

  • LEE, Dong-Hun;KIM, Tae-Wan;PARK, Hwan-Cheol;KIM, Young-Bok
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.56 no.1
    • /
    • pp.61-70
    • /
    • 2020
  • In this study, system modeling and dynamic analysis of crane are conducted. Especially, among many different kinds of a crane system, the issues on crane operating problems installed on the vessel are considered. As well known, marine systems including cranes are exposed to various disturbances such as vessel motions, hydrodynamic forces, wave and wind attack, etc. In order to analysis the system dynamic with environmental conditions, the authors derived the nonlinear dynamic model of offshore crane and derived a linear model which is used for designing the control system. Using the obtained nonlinear and linear models, simulations were conducted to evaluate the usefulness of the obtained models. By simulation and result evaluation, the usefulness of the linear model, which presents the dynamics, is effectively verified.

An Attack Model Based on Software Cruise for Information Warfare (정보전을 위한 소프트웨어 순항 기반 공격 모델)

  • Ryu Ho-Yeon;Nam Young-Ho
    • Journal of Internet Computing and Services
    • /
    • v.5 no.5
    • /
    • pp.49-60
    • /
    • 2004
  • Information Warfare(IW), a new aspect of war, is the field centralized the concern and research in the information security and national security, Both the defense and the offensive are important in the next generation IW, and so we need to do the various research to secure the network and system for gaining the superiority of IW. This paper proposes a model for IW based on software cruise to prepare the IW that is changing the offensive aspect. Software cruise is defined as a behavior of computer programs that travel toward specific destination from a source through the network. The proposed model have the cruise property and uses the cybermap to cruise toward the destination chosen in advance. Also, while self-movement, the model can function the predefined task.

  • PDF