• Title/Summary/Keyword: Attack Model

Search Result 1,005, Processing Time 0.03 seconds

Design of an IMU-based Wearable System for Attack Behavior Recognition and Intervention (공격 행동 인식 및 중재를 위한 IMU 기반 웨어러블 시스템 개발)

  • Woosoon Jung;Kyuman Jeong;Jeong Tak Ryu;Kyoung-Ock Park;Yoosoo Oh
    • Smart Media Journal
    • /
    • v.13 no.5
    • /
    • pp.19-25
    • /
    • 2024
  • The biggest type of behavior that prevents people with developmental disabilities from entering society is aggressive behavior. Aggressive behavior can pose a threat not only to the personal safety of the person with a developmental disability, but also to the physical safety of others. In this study, we propose a wearable system using a low-power processor. The proposed system uses an IMU (Inertial Measurement Unit) to analyze user behavior, and when attack behavior is not detected for a certain period of time through an LED array attached to the developed system, an interesting LED is displayed. By expressing patterns, we provide behavioral intervention through compensation to people with developmental disabilities. In order to implement a system that must be worn for a long time in a power-limited environment, we present a method to optimize performance and energy consumption across all stages, from data preprocessing to AI model application.

Reverse-Update Adversarial Data for Enhancing Adversarial Attack and Adversarial Training Performance (적대적 공격 및 방어 기술의 성능 향상을 위한 역방향 적대적 데이터 생성 연구)

  • Jung Yup Rhee;Wonyoung Cho;Leo Hyun Park;Taekyoung Kwon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.5
    • /
    • pp.981-991
    • /
    • 2024
  • Adversarial attacks, which induce malfunctions in AI technologies, can be applied to various domains and models, easily compromising SOTA (State-of-the-Art) models. Although adversarial defense techniques have been developed to counter these attacks, their applicability is limited due to constraints. Consequently, not only is the adoption of AI technology delayed, but also advanced research is restricted. To address this issue, this paper introduces a novel concept of adversarial data by reversing the sign of the loss function update in adversarial attacks. Experiments were conducted by applying the reverse-update adversarial data to data poisoning and adversarial training environments, showing that it can reduce the model's performance up to 72% and is most effective in enhancing robustness in 6 out of 9 environments. Ultimately, the proposed data can stimulate extensive research on adversarial attacks and defenses, further promoting the advancement of defense technology and contributing to the safe adoption of AI.

Clock Glitch-based Fault Injection Attack on Deep Neural Network (Deep Neural Network에 대한 클럭 글리치 기반 오류 주입 공격)

  • Hyoju Kang;Seongwoo Hong;Youngju Lee;Jeacheol Ha
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.5
    • /
    • pp.855-863
    • /
    • 2024
  • The use of Deep Neural Network (DNN) is gradually increasing in various fields due to their high efficiency in data analysis and prediction. However, as the use of deep neural networks becomes more frequent, the security threats associated with them are also increasing. In particular, if a fault occurs in the forward propagation process and activation function that can directly affect the prediction of deep neural network, it can have a fatal damage on the prediction accuracy of the model. In this paper, we performed some fault injection attacks on the forward propagation process of each layer except the input layer in a deep neural network and the Softmax function used in the output layer, and analyzed the experimental results. As a result of fault injection on the MNIST dataset using a glitch clock, we confirmed that faut injection on into the iteration statements can conduct deterministic misclassification depending on the network parameters.

Model Proposal for Detection Method of Cyber Attack using SIEM (SIEM을 이용한 침해사고 탐지방법 모델 제안)

  • Um, Jin-Guk;Kwon, Hun-Yeong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.43-54
    • /
    • 2016
  • The occurrence of cyber crime is on the rise every year, and the security control center, which should play a crucial role in monitoring and early response against the cyber attacks targeting various information systems, its importance has increased accordingly. Every endeavors to prevent cyber attacks is being attempted by information security personnel of government and financial sector's security control center, threat response Center, cyber terror response center, Cert Team, SOC(Security Operator Center) and else. The ordinary method to monitor cyber attacks consists of utilizing the security system or the network security device. It is anticipated, however, to be insufficient since this is simply one dimensional way of monitoring them based on signatures. There has been considerable improvement of the security control system and researchers also have conducted a number of studies on monitoring methods to prevent threats to security. In accordance with the environment changes from ESM to SIEM, the security control system is able to be provided with more input data as well as generate the correlation analysis which integrates the processed data, by extraction and parsing, into the potential scenarios of attack or threat. This article shows case studies how to detect the threat to security in effective ways, from the initial phase of the security control system to current SIEM circumstances. Furthermore, scenarios based security control systems rather than simple monitoring is introduced, and finally methods of producing the correlation analysis and its verification methods are presented. It is expected that this result contributes to the development of cyber attack monitoring system in other security centers.

Study on the Measurements of Flow Field around Cambered Otter Board Using Particle Image Velocimetry (PIV를 이용한 만곡형 전개판의 유동장 계측에 관한 연구)

  • 박경현;이주희;현범수;노영학;배재현
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.38 no.1
    • /
    • pp.43-57
    • /
    • 2002
  • This paper introduces an analysis method to predicting the flow characteristic of flow field around otter board In order to develope a high performance model. In this experiment, it is used a numerical analysis of flow field through CFD(Computational Fluid Dynamic), PIV method in which quantitative, qualitative evaluation is possible. In this experiment, it is used PIV method with flow filed image around otter board in order to analysis of flow characteristic. The result compared flow pattern with analysis result through CFD and also measurement result of lift and drag force coefficient carried out in CWC(Circulating Water Channel). The numerical analysis result is matched well with experiment result of PIV in the research and it is able to verify In the physical aspect. The result is as follows ; (1) It was carried out visibility experiment using laser light sheet, and picture analysis through PIV method in order to analysis fluid field of otter-board. As a result, the tendency of qualitative fluid movement only through the fluid particle's flow could be known. (2) Since PIV analysis result is quantitative, this can be seen in velocity vector distributions, instantaneous streamline contour, and average vorticity distributions through various post processing method. As a result, the change of flow field could be confirmed. (3) At angle of attack 24$^{\circ}$ where It Is shown maximum spreading force coefficient, the analysis result of CFD and PIV had very similar flow pattern. In both case, at the otter-board post edge a little boundary layer separation was seen, but, generally they had a good flow (4) As the result of post processing with velocity vector distributions, instantaneous streamline contour and average vorticity distributions by PIV, boundary layer separation phenomenon started to happen from angle of attack 24$^{\circ}$, and from over angle of attack 28$^{\circ}$, it happen at leading edge side with the width enlarged.

Analysis of Posting Preferences and Prediction of Update Probability on Blogs (블로그에서 포스팅 성향 분석과 갱신 가능성 예측)

  • Lee, Bum-Suk;Hwang, Byung-Yeon
    • Journal of KIISE:Databases
    • /
    • v.37 no.5
    • /
    • pp.258-266
    • /
    • 2010
  • In this paper, we introduce a novel method to predict next update of blogs. The number of RSS feeds registered on meta-blogs is on the order of several million. Checking for updates is very time consuming and imposes a heavy burden on network resources. Since blog search engine has limited resources, there is a fix number of blogs that it can visit on a day. Nevertheless we need to maximize chances of getting new data, and the proposed method which predicts update probability on blogs could bring better chances for it. Also this work is important to avoid distributed denial-of-service attack for the owners of blogs. Furthermore, for the internet as whole this work is important, too, because our approach could minimize traffic. In this study, we assumed that there is a specific pattern to when a blogger is actively posting, in terms of days of the week and, more specifically, hours of the day. We analyzed 15,119 blogs to determine a blogger's posting preference. This paper proposes a method to predict the update probability based on a blogger's posting history and preferred days of the week. We applied proposed method to 12,115 blogs to check the precision of our predictions. The evaluation shows that the model has a precision of 0.5 for over 93.06% of the blogs examined.

A Macro Attacks Detection Model Based on Trace Back Information (트레이스 백 정보에 기반한 매크로 공격 탐지 모델)

  • Baek, Yong Jin;Hong, Suk Won;Park, Jae Heung;Kang, Gyeong Won;Kim, Sang Bok
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.113-120
    • /
    • 2018
  • Today, the development of information and communication technology is rapidly increasing the number of users of network-based service, and enables real-time information sharing among users on the Internet. There are various methods in the information sharing process, and information sharing based on portal service is generally used. However, the process of information sharing serves as a cause of illegal activities in order to amplify the social interest of the relevant stakeholders. Public opinion attack using macro function can distort normal public opinion, so security measures are urgent. Therefore, security measures are urgently needed. Macro attacks are generally defined as attacks in which illegal users acquire multiple IP or ID to manipulate public opinion on the content of a particular web page. In this paper, we analyze network path information based on traceback for macro attack of a specific user, and then detect multiple access of the user. This is a macro attack when the access path information for a specific web page and the user information are matched more than once. In addition, when multiple ID is accessed for a specific web page in the same region, it is not possible to distort the overall public opinion on a specific web page by analyzing the threshold count value.

  • PDF

Measurement and Numerical Model on Wave Interaction with Coastal Structure (해안구조물과 파랑상호작용에 관한 수치모델 및 실험)

  • Kim, In-Chul
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.21 no.1
    • /
    • pp.30-38
    • /
    • 2009
  • In recent years, there's been strong demand for coastal structures that have a permeability that serves water affinity and disaster prevention from wave attack. The aim of this study is to examine the wave transformation, including wave run-up that propagates over the coastal structures with a steep slope. A numerical model based on the nonlinear shallow water equation, together with the unsteady nonlinear Darcy law for fluid motion in permeable underlayer and laboratory measurements was carried out in terms of the free surface elevations and fluid particle velocities for the cases of regular and irregular waves over 1:5 impermeable and permeable slopes. The numerical results were used to evaluate the application and limitations of the PBREAK numerical model. The numerical model could predict the cross-shore variation of the wave profile reasonably, but showed less accurate results in the breaking zone that the mass and momentum influx is exchanged the most. Except near the wave crest, the computed depth averaged velocities could represent the measured profile below the trough level fairly well.

Wave Attenuation due to Water-Front Vegetation (수변식생에 의한 파랑감쇠 특성)

  • Lee, Seong-Dae
    • Journal of Navigation and Port Research
    • /
    • v.32 no.5
    • /
    • pp.341-347
    • /
    • 2008
  • Recently, it has been widely recognized that water-front and coastal vegetations may have great value in supporting fisheries, protecting from wave attack, stabilizing the sea bed and maintaining good scenery. Hydrodynamic factors playa major role in the functions of water quality and ecosystems. However, the studies on numerical and analytical process of wave propagation are few and far behind compared to those on the hydrodynamic roles of water-front vegetations. In this study, in order to express wave attenuation into water-front vegetation, a numerical model based on the unsteady mild slope equation is developed. This result is compared with an analytical model for describing the wave attenuation by assumed simple long wave condition. Based on both the analytical and numerical results, the physical properties of the wave attenuation are examined under various wave, geometric and vegetation conditions. Through comparisons between the analytical and numerical results, the effects of the vegetation properties, wave properties and model parameters such as the momentum exchange coefficient have been clarified.

The Performance Estimation of Rotor in Wind Fence by Rotor Analysis Solver based on Actuator Disk Model (Actuator Disk Model 기반의 로터 해석자를 사용한 방풍 구조물 내부의 로터 성능 예측)

  • Kim, Taewoo;Oh, Sejong;Kang, Hee Jung;Yee, Kwanjung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.41 no.6
    • /
    • pp.429-439
    • /
    • 2013
  • The purpose of current study is to develop the rotor analysis solver and perform a rotor aerodynamic analysis in the wind fence. To this end, the rotor analysis solver based on actuator disk model was employed. To consider the asymmetric effect of the rotor in the wind fence, the flapping motion analysis was conducted with blade element theory for the effective angle of attack calculation. The validation cases which are the rotor with wall and ground were accomplished by developed solver. The decrease of rotor performance by wind fence was confirmed. The wind fence configuration was suggested which guarantees more than 95% rotor performance compared with the no fence case.