• 제목/요약/키워드: Attack Model

Search Result 1,005, Processing Time 0.023 seconds

Digital Forensic Model Suitable for Cloud Environment (클라우드 환경에 적합한 디지털 포렌식 수사 모델)

  • Lee, Gymin;Lee, Youngsook
    • Convergence Security Journal
    • /
    • v.17 no.3
    • /
    • pp.15-20
    • /
    • 2017
  • Cloud computing is a service that to use IT resources (software, storage, server, network) through various equipment in an Internet-enabled environment. Due to convenience, efficiency, and cost reduction, the utilization rate has increased recently. However, Cloud providers have become targets for attack Also, Abuse of cloud service is considered as the top security threat. The existing digital forensic procedures are suitable for investigations on individual terminals. In this paper, we propose a new investigation model by analyzing the vulnerable points that occur when you investigate the cloud environment with the existing digital forensic investigation procedure. The proposed investigation model adds a way to obtain account information, and can apply public cloud and private cloud together. Cloud services are also easily accessible and are likely to destroy digital evidence. Therefore, the investigation model was reinforced by adding an account access blocking step.

A Study on Material Transportation Capability Analysis Method in NK using Scenario-based Simulation (시나리오 기반 시뮬레이션을 활용한 북한지역 반격 시 물자수송 능력 분석방법 연구)

  • Choi, Byung Kwon;Jeong, Suk Jae
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.2
    • /
    • pp.279-288
    • /
    • 2017
  • The Material Transportation Capability Analysis Method in North Korea includes adversary's activities such as destruction of bridge which is one kind of choke points in the road network and surprise attack against resupply march unit. Also, the amount of damage on choke points in the road network and repair time depending on repair unit commitment must be reflected. In this study, a scenario encompassing plausible resupply transportation circumstances while counterattacking into NK will be established. Then, based on such scenario, a simulation model will be established and the result of simulation will be compared to the results of numeric example which has been used in the ROK Army. We demonstrate, through a certain Corps operation area, that the Scenario-based Simulation Model results predict the performance of resupply operation very well. Therefore, it makes sustainment planners and commanders do activities which is suitable for battlefield and should be used in the real situation. It is also a stochastic model.

A Study on the Dynamic and Impact Analysis of Side Kick in Taekwondo (태권도 옆차기 동작의 동력학해석과 충격해석에 관한 연구)

  • Lee, Jung-Hyun;Han, Kyu-Hyun;Lee, Hyun-Seung;Lee, Eun-Yup;Lee, Young-Shin
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.32 no.1
    • /
    • pp.83-90
    • /
    • 2008
  • Taekwondo is a martial art form and sport that uses the hands and foot for attack and defense. Taekwondo basic motion is composed of the breaking, competition and poomsea motion. In the side kick among the competition motion, the impact force is larger than other kinds of kicks. The side kick with the front foot can be made in two steps. In the first step, the front foot is stretched forward from back stance free-fighting position. For the second step, the rear foot is followed simultaneously. Then, the kick is executed while entire body weight rests on the rear foot. In this paper, impact analysis of the human model for hitting posture is carried out. The ADAMS/LifeMOD is used in hitting modeling and simulation. The simulation model creates the human model to hit the opponent. As the results, the dynamic analysis of human muscle were presented.

One-round Secure Key Exchange Protocol With Strong Forward Secrecy

  • Li, Xiaowei;Yang, Dengqi;Chen, Benhui;Zhang, Yuqing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.11
    • /
    • pp.5639-5653
    • /
    • 2016
  • Security models for key exchange protocols have been researched for years, however, lots of them only focus on what secret can be compromised but they do not differentiate the timing of secrets compromise, such as the extended Canetti-Krawczyk (eCK) model. In this paper, we propose a new security model for key exchange protocols which can not only consider what keys can be compromised as well as when they are compromised. The proposed security model is important to the security proof of the key exchange protocols with forward secrecy (either weak forward secrecy (wFS) or strong forward secrecy (sFS)). In addition, a new kind of key compromise impersonation (KCI) attacks which is called strong key compromise impersonation (sKCI) attack is proposed. Finally, we provide a new one-round key exchange protocol called mOT+ based on mOT protocol. The security of the mOT+ is given in the new model. It can provide the properties of sKCI-resilience and sFS and it is secure even if the ephemeral key reveal query is considered.

A Comparative Study on the Performance of Intrusion Detection using Decision Tree and Artificial Neural Network Models (의사결정트리와 인공 신경망 기법을 이용한 침입탐지 효율성 비교 연구)

  • Jo, Seongrae;Sung, Haengnam;Ahn, Byunghyuk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.4
    • /
    • pp.33-45
    • /
    • 2015
  • Currently, Internet is used an essential tool in the business area. Despite this importance, there is a risk of network attacks attempting collection of fraudulence, private information, and cyber terrorism. Firewalls and IDS(Intrusion Detection System) are tools against those attacks. IDS is used to determine whether a network data is a network attack. IDS analyzes the network data using various techniques including expert system, data mining, and state transition analysis. This paper tries to compare the performance of two data mining models in detecting network attacks. They are decision tree (C4.5), and neural network (FANN model). I trained and tested these models with data and measured the effectiveness in terms of detection accuracy, detection rate, and false alarm rate. This paper tries to find out which model is effective in intrusion detection. In the analysis, I used KDD Cup 99 data which is a benchmark data in intrusion detection research. I used an open source Weka software for C4.5 model, and C++ code available for FANN model.

Implementation of Natural Behavior Patterns of Monster based on Energy Model (에너지 모델 기반으로 한 몬스터의 자연스러운 행동 패턴 구현)

  • Lee, Jae Moon;Lim, Seong Kyu
    • Journal of Korea Game Society
    • /
    • v.14 no.5
    • /
    • pp.87-96
    • /
    • 2014
  • In developing games, realism is considered as an important factor to increase immersion. To do this, the paper developed 'Jungle Master' game applying the conventional energy model to movement of monsters in RPG. The main scenario of the game is that animals attack each other in order to survive the competition in jungle. While chasing monster : fleeing monster is 1:1 in the conventional energy model, it is extended as n:1 in order to increase fun. As the results, this paper showed that the energy model can be effectively applied to the real game and monsters can be implemented so that they can move in natural.

Causal Relationship Analysis of Winning Factors in Football Game : Structural Equation Model (구조방정식 모형(SEM)을 이용한 축구 요인간 인과관계 분석)

  • Kim, Ju-Hyung;Chang, Kyu-Chang;Kim, Sang-Hye;Park, Jung-Min;Ha, Chunghun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.2
    • /
    • pp.101-107
    • /
    • 2015
  • Modern football has transformed into a scientific football based on data. With this trend, various methods for tactics studies and outcome prediction have been developed on the perspective of data analysis. In this paper, we propose a structural equation model for football game. We analyze critical factors that affect to the winning of game except psychological parts and the causal relationship between latent variables and observed variables is statistically verified through the proposed structural equation model. The results show that the Passing ability and the Ball possession affect to the Attack ability, and consequently it has a positive impact on the winning of game.

A Study on Traffic Anomaly Detection Scheme Based Time Series Model (시계열 모델 기반 트래픽 이상 징후 탐지 기법에 관한 연구)

  • Cho, Kang-Hong;Lee, Do-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5B
    • /
    • pp.304-309
    • /
    • 2008
  • This paper propose the traffic anomaly detection scheme based time series model. We apply ARIMA prediction model to this scheme and transform the value of the abnormal symptom into the probability value to maximize the traffic anomaly symptom detection. For this, we have evaluated the abnormal detection performance for the proposed model using total traffic and web traffic included the attack traffic. We will expect to have an great effect if this scheme is included in some network based intrusion detection system.

A Study of Effectiveness of the Improved Security Operation Model Based on Vulnerability Database (취약점 데이터베이스 기반 개선된 보안관제 모델의 효과성 연구)

  • Hyun, Suk-woo;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1167-1177
    • /
    • 2019
  • In this paper, the improved security operation model based on the vulnerability database is studied. The proposed model consists of information protection equipment, vulnerability database, and a dashboard that visualizes and provides the results of interworking with detected logs. The evaluation of the model is analyzed by setting up a simulated attack scenario in a virtual infrastructure. In contrast to the traditional method, it is possible to respond quickly to threats of attacks specific to the security vulnerabilities that the asset has, and to find redundancy between detection rules with a secure agent, thereby creating an optimal detection rule.

Modeling of diffusion-reaction behavior of sulfate ion in concrete under sulfate environments

  • Zuo, Xiao-Bao;Sun, Wei;Li, Hua;Zhao, Yu-Kui
    • Computers and Concrete
    • /
    • v.10 no.1
    • /
    • pp.79-93
    • /
    • 2012
  • This paper estimates theoretically the diffusion-reaction behaviour of sulfate ion in concrete caused by environmental sulfate attack. Based on Fick's second law and chemical reaction kinetics, a nonlinear and nonsteady diffusion-reaction equation of sulfate ion in concrete, in which the variable diffusion coefficient and the chemical reactions depleting sulfate ion concentration in concrete are considered, is proposed. The finite difference method is utilized to solve the diffusion-reaction equation of sulfate ion in concrete, and then it is used to simulate the diffusion-reaction process and the concentration distribution of sulfate ion in concrete. Afterwards, the experiments for measuring the sulfate ion concentration in concrete are carried out by using EDTA method to verify the proposal model, and results show that the proposed model is basically in agreement with the experimental results. Finally, Numerical example has been completed to investigate the diffusion-reaction behavior of sulfate ion in the concrete plate specimen immersed into sulfate solution.