• Title/Summary/Keyword: Attack Model

Search Result 1,005, Processing Time 0.038 seconds

Influences of Self-esteem, Rehabilitation Motivation on Quality of Life in Stroke Pateints with Rehabilitation Therapy (재활치료 중인 뇌졸중 환자의 자아존중감, 재활동기가 삶의 질에 미치는 영향)

  • An, Eun-Seo;Suh, Soon-Rim;Kim, Eun-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.3
    • /
    • pp.176-187
    • /
    • 2019
  • This study was conducted to investigate the levels of self-esteem, rehabilitation motivation and quality of life and to identify the influencing factors of quality of life in stroke patients who were receiving rehabilitation therapy. Data were collected from February 22 to March 20, 2016 using self-administered questionares and the data from 216 participants were analyzed using SPSS WIN 21.0 program(SPSS Inc., Chicago, IL, USA). The results of this study were as follows: the mean self-esteem was 3.09/5, rehabilitation motivation was 3.60/5, and quality of life was 2.95/5. Sex, age, education, caregiver, occupation, duration after attack, the degree of disability(dependence), and cognitive function were significantly associated with quality of life. There was positive correlation between quality of life and self-esteem(r=.45, p<.001) and there was positive correlation between quality of life and rehabilitation motivation(r=.27, p<.001). Variables such as self-esteem, duration after attack, the degree of disability(dependence), and cognitive function explained 43.6%(F=14.87 p=<.001) of the variance in quality of life in model 3. Consequently, it is needed to develop and apply nursing intervention and programs for improving self-esteem during rehabilitation in order to improve quality of life of stroke patients.

Development of a DEVS Simulator for Electronic Warfare Effectiveness Analysis of SEAD Mission under Jamming Attacks (대공제압(SEAD) 임무에서의 전자전 효과도 분석을 위한 DEVS기반 시뮬레이터 개발)

  • Song, Hae Sang;Koo, Jung;Kim, Tag Gon;Choi, Young Hoon;Park, Kyung Tae;Shin, Dong Cho
    • Journal of the Korea Society for Simulation
    • /
    • v.29 no.4
    • /
    • pp.33-46
    • /
    • 2020
  • The purpose of Electronic warfare is to disturbe, neutralize, attack, and destroy the opponent's electronic warfare weapon system or equipment. Suppression of Enemy Air Defense (SEAD) mission is aimed at incapacitating, destroying, or temporarily deteriorating air defense networks such as enemy surface-to-air missiles (SAMs), which is a representative mission supported by electronic warfare. This paper develops a simulator for analyzing the effectiveness of SEAD missions under electronic warfare support using C++ language based on the DEVS (Discrete Event Systems Specification) model, the usefulness of which has been proved through case analysis with examples. The SEAD mission of the friendly forces is carried out in parallel with SSJ (Self Screening Jamming) electronic warfare under the support of SOJ (Stand Off Jamming) electronic warfare. The mission is assumed to be done after penetrating into the enemy area and firing HARM (High Speed Anti Radiation Missile). SAM response is assumed to comply mission under the degraded performance due to the electronic interference of the friendly SSJ and SOJ. The developed simulator allows various combinations of electronic warfare equipment specifications (parameters) and operational tactics (parameters or algorithms) to be input for the purpose of analysis of the effect of these combinations on the mission effectiveness.

A study on machine learning-based defense system proposal through web shell collection and analysis (웹쉘 수집 및 분석을 통한 머신러닝기반 방어시스템 제안 연구)

  • Kim, Ki-hwan;Shin, Yong-tae
    • Journal of Internet Computing and Services
    • /
    • v.23 no.4
    • /
    • pp.87-94
    • /
    • 2022
  • Recently, with the development of information and communication infrastructure, the number of Internet access devices is rapidly increasing. Smartphones, laptops, computers, and even IoT devices are receiving information and communication services through Internet access. Since most of the device operating environment consists of web (WEB), it is vulnerable to web cyber attacks using web shells. When the web shell is uploaded to the web server, it is confirmed that the attack frequency is high because the control of the web server can be easily performed. As the damage caused by the web shell occurs a lot, each company is responding to attacks with various security devices such as intrusion prevention systems, firewalls, and web firewalls. In this case, it is difficult to detect, and in order to prevent and cope with web shell attacks due to these characteristics, it is difficult to respond only with the existing system and security software. Therefore, it is an automated defense system through the collection and analysis of web shells based on artificial intelligence machine learning that can cope with new cyber attacks such as detecting unknown web shells in advance by using artificial intelligence machine learning and deep learning techniques in existing security software. We would like to propose about. The machine learning-based web shell defense system model proposed in this paper quickly collects, analyzes, and detects malicious web shells, one of the cyberattacks on the web environment. I think it will be very helpful in designing and building a security system.

Extraction and Taxonomy of Ransomware Features for Proactive Detection and Prevention (사전 탐지와 예방을 위한 랜섬웨어 특성 추출 및 분류)

  • Yoon-Cheol Hwang
    • Journal of Industrial Convergence
    • /
    • v.21 no.9
    • /
    • pp.41-48
    • /
    • 2023
  • Recently, there has been a sharp increase in the damages caused by ransomware across various sectors of society, including individuals, businesses, and nations. Ransomware is a malicious software that infiltrates user computer systems, encrypts important files, and demands a ransom in exchange for restoring access to the files. Due to its diverse and sophisticated attack techniques, ransomware is more challenging to detect than other types of malware, and its impact is significant. Therefore, there is a critical need for accurate detection and mitigation methods. To achieve precise ransomware detection, an inference engine of a detection system must possess knowledge of ransomware features. In this paper, we propose a model to extract and classify the characteristics of ransomware for accurate detection of ransomware, calculate the similarity of the extracted characteristics, reduce the dimension of the characteristics, group the reduced characteristics, and classify the characteristics of ransomware into attack tools, inflow paths, installation files, command and control, executable files, acquisition rights, circumvention techniques, collected information, leakage techniques, and state changes of the target system. The classified characteristics were applied to the existing ransomware to prove the validity of the classification, and later, if the inference engine learned using this classification technique is installed in the detection system, most of the newly emerging and variant ransomware can be detected.

AutoML Machine Learning-Based for Detecting Qshing Attacks Malicious URL Classification Technology Research and Service Implementation (큐싱 공격 탐지를 위한 AutoML 머신러닝 기반 악성 URL 분류 기술 연구 및 서비스 구현)

  • Dong-Young Kim;Gi-Seong Hwang
    • Smart Media Journal
    • /
    • v.13 no.6
    • /
    • pp.9-15
    • /
    • 2024
  • In recent trends, there has been an increase in 'Qshing' attacks, a hybrid form of phishing that exploits fake QR (Quick Response) codes impersonating government agencies to steal personal and financial information. Particularly, this attack method is characterized by its stealthiness, as victims can be redirected to phishing pages or led to download malicious software simply by scanning a QR code, making it difficult for them to realize they have been targeted. In this paper, we have developed a classification technique utilizing machine learning algorithms to identify the maliciousness of URLs embedded in QR codes, and we have explored ways to integrate this with existing QR code readers. To this end, we constructed a dataset from 128,587 malicious URLs and 428,102 benign URLs, extracting 35 different features such as protocol and parameters, and used AutoML to identify the optimal algorithm and hyperparameters, achieving an accuracy of approximately 87.37%. Following this, we designed the integration of the trained classification model with existing QR code readers to implement a service capable of countering Qshing attacks. In conclusion, our findings confirm that deriving an optimized algorithm for classifying malicious URLs in QR codes and integrating it with existing QR code readers presents a viable solution to combat Qshing attacks.

Print-Scan Resilient Curve Watermarking using B-Spline Curve Model and its 2D Mesh-Spectral Transform (B-스프라인 곡선 모델링 및 메시-스펙트럼 변환을 이용한 프린트-스캔에 강인한 곡선 워터마킹)

  • Kim, Ji-Young;Lee, Hae-Yeoun;Im, Dong-Hyuck;Ryu, Seung-Jin;Choi, Jung-Ho;Lee, Heung-Kyu
    • The KIPS Transactions:PartB
    • /
    • v.15B no.4
    • /
    • pp.307-314
    • /
    • 2008
  • This paper presents a new robust watermarking method for curves that uses informed-detection. To embed watermarks, the presented algorithm parameterizes a curve using the B-spline model and acquires the control points of the B-spline model. For these control points, 2D mesh are created by applying Delaunay triangulation and then the mesh spectral analysis is performed to calculate the mesh spectral coefficients where watermark messages are embedded in a spread spectrum way. The watermarked coefficients are inversely transformed to the coordinates of the control points and the watermarked curve is reconstructed by calculating B-spline model with the control points. To detect the embedded watermark, we apply curve matching algorithm using inflection points of curve. After curve registration, we calculate the difference between the original and watermarked mesh spectral coefficients with the same process for embedding. By calculating correlation coefficients between the detected and candidate watermark, we decide which watermark was embedded. The experimental results prove the proposed scheme is more robust than previous watermarking schemes against print-scan process as well as geometrical distortions.

Short-term Effects of Ambient Air Pollution on Emergency Department Visits for Asthma: An Assessment of Effect Modification by Prior Allergic Disease History

  • Noh, Juhwan;Sohn, Jungwoo;Cho, Jaelim;Cho, Seong-Kyung;Choi, Yoon Jung;Kim, Changsoo;Shin, Dong Chun
    • Journal of Preventive Medicine and Public Health
    • /
    • v.49 no.5
    • /
    • pp.329-341
    • /
    • 2016
  • Objectives: The goal of this study was to investigate the short-term effect of ambient air pollution on emergency department (ED) visits in Seoul for asthma according to patients' prior history of allergic diseases. Methods: Data on ED visits from 2005 to 2009 were obtained from the Health Insurance Review and Assessment Service. To evaluate the risk of ED visits for asthma related to ambient air pollutants (carbon monoxide [CO], nitrogen dioxide [$NO_2$], ozone [$O_3$], sulfur dioxide [$SO_2$], and particulate matter with an aerodynamic diameter <$10{\mu}m$ [$PM_{10}$]), a generalized additive model with a Poisson distribution was used; a single-lag model and a cumulative-effect model (average concentration over the previous 1-7 days) were also explored. The percent increase and 95% confidence interval (CI) were calculated for each interquartile range (IQR) increment in the concentration of each air pollutant. Subgroup analyses were done by age, gender, the presence of allergic disease, and season. Results: A total of 33 751 asthma attack cases were observed during the study period. The strongest association was a 9.6% increase (95% CI, 6.9% to 12.3%) in the risk of ED visits for asthma per IQR increase in $O_3$ concentration. IQR changes in $NO_2$ and $PM_{10}$ concentrations were also significantly associated with ED visits in the cumulative lag 7 model. Among patients with a prior history of allergic rhinitis or atopic dermatitis, the risk of ED visits for asthma per IQR increase in $PM_{10}$ concentration was higher (3.9%; 95% CI, 1.2% to 6.7%) than in patients with no such history. Conclusions: Ambient air pollutants were positively associated with ED visits for asthma, especially among subjects with a prior history of allergic rhinitis or atopic dermatitis.

Development of Flow Visualization Device with Smoke Generator in Learning Wind Tunnel (학습용 풍동의 연기 유동가시화 장치 개발)

  • Lim, Chang-Su;Choi, Jun-Seop
    • 대한공업교육학회지
    • /
    • v.32 no.2
    • /
    • pp.87-103
    • /
    • 2007
  • The purpose of this study was to develop of the smoke flow visualization device of learning wind tunnel, teaching-learning materials in order to demonstrate air-flow around the fluid-flow field qualitatively and understand the resistance concepts of fluid-flow in secondary school. The contents of this study were consisted of the development and experiment of smoke flow visualization for learning wind tunnel. The main results of this study were as follows: First, this developed teaching-learning material here will help students understand the fundamental physical phenomena related with the resistance of fluid and the various patterns of air-flow in the field of transportation technology. Second, flow visualization has shown the same tendency in both of theoretical and experimental patterns. Third, the airfoil model has the smallest wake region meaning resistance against air-flow of circular cylinder and square rod model. Forth, flow separation point at leading edge and wide wake region began to show under the angle of attack of airfoil model ${\alpha}$ is $20^{\circ}$. Fifth, the wake width of the flow field behind a golf ball with dimple became slightly narrower than that without dimple. Sixth, the developed device was made to apply the teaching and learning materials for the experiment and practice in order to increase students' interest and attitude.

Dynamic analysis of a cage affected by the current (조류의 영향을 바든 가두리의 거동해석)

  • Lee, Mi-Kyung;Lee, Chun-Woo
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.40 no.3
    • /
    • pp.214-224
    • /
    • 2004
  • A large cage system for the purpose of fishes farming in the open sea was influenced by various forces from the ocean environment. The deformation of the cage by these forces affects the safety of the cage itself, as well as that of the cultivated creatures. In this research, theoretical model was established to analyzing dynamic movement influenced by current for cage. Also, to increase the accuracy of calculations, the reduction ratio of flow speed acquired using the flume tank experiment. Applying the reduction ratio of flow speed to the numerical calculation, the calculation values were compared with the measured values in the flume tank experiment using cage model. The results were as follows ; 1. When the flow speed of the flume tank is fixed, the decrease of the velocity of flow which is passed the upper panel side is proportion to the increase of porosity ratio of netting. 2. When the porosity ratio is fixed, the increase of the velocity of flow which is passed the upper panel side is proportion to the increase of velocity of flow. 3. When the porosity ratio and the flow speed of the flume tank are fixed, the decrease of the velocity of flow which is passed the upper panel side is proportion to the increase of attack angle. 4. As a result of comparison between the underwater shape by simulation which is applying the reduction ratio of flow speed from the experiment using plane netting and that by model experiment, it was found out that the result of the simulation was very close to that of model gear within ${\pm}$ 5 % error range.

A Study on the Methods to Improve High-Wave Reproducibility during Typhoon (태풍 내습 시의 고파 재현성 개선방안 연구)

  • Jong-Dai, Back;Kyong-Ho, Ryu;Jong-In, Lee;Weon-Mu, Jeong;Yeon-S., Chang
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.34 no.6
    • /
    • pp.177-187
    • /
    • 2022
  • This study estimates the design wave in the event of a typhoon attack at Busan new port using the wind field, the revised shallow water design wave estimation method proposed by the Ministry of Oceans and Fisheries in 2020, and proposed a reliable method of calculating the shallow water design through verification with the wave observation data. As a result of estimating typhoon wave using the wind field and SWAN numerical model, which are commonly used in the field work, for typhoon that affected Busan new port, it was found that reproducibility was not good except typhoons KONG-REY(1825) and MAYSAK(2009). In particular, in the case of typhoon MAEMI(0314), which had the greatest impact on Busan new port, the maximum significant wave height was estimated to be about 35.0% smaller than that of the observed wave data. Therefore, a plan to improve the reproducibility of typhoon wave was reviewed by applying the method of correcting the wind field and the method of using the Boussinesq equation numerical model, respectively. As a result of the review, it was found that the reproducibility of the wind field was not good as before when the wind field correction. However as a method of linking wind field data, SWAN model results, and Boussinesq numerical model, typhoon wave was estimated during typhoon MAEMI(0314), and the maximum significant wave was similar to the wave observations, so it was reviewed to have good reproducibility.