• Title/Summary/Keyword: Attack potential

Search Result 252, Processing Time 0.028 seconds

Modified Multi-Chaotic Systems that are Based on Pixel Shuffle for Image Encryption

  • Verma, Om Prakash;Nizam, Munazza;Ahmad, Musheer
    • Journal of Information Processing Systems
    • /
    • v.9 no.2
    • /
    • pp.271-286
    • /
    • 2013
  • Recently, a pixel-chaotic-shuffling (PCS) method has been proposed by Huang et al. for encrypting color images using multiple chaotic systems like the Henon, the Lorenz, the Chua, and the Rossler systems. All of which have great encryption performance. The authors claimed that their pixel-chaotic-shuffle (PCS) encryption method has high confidential security. However, the security analysis of the PCS method against the chosen-plaintext attack (CPA) and known-plaintext attack (KPA) performed by Solak et al. successfully breaks the PCS encryption scheme without knowing the secret key. In this paper we present an improved shuffling pattern for the plaintext image bits to make the cryptosystem proposed by Huang et al. resistant to chosen-plaintext attack and known-plaintext attack. The modifications in the existing PCS encryption method are proposed to improve its security performance against the potential attacks described above. The Number of Pixel Change Rate (NPCR), Unified Average Changed Intensity (UACI), information entropy, and correlation coefficient analysis are performed to evaluate the statistical performance of the modified PCS method. The simulation analysis reveals that the modified PCS method has better statistical features and is more resistant to attacks than Huang et al.'s PCS method.

Non-uniform wind environment in mountainous terrain and aerostatic stability of a bridge

  • Chen, Xingyu;Guo, Junjie;Tang, Haojun;Li, Yongle;Wang, Lei
    • Wind and Structures
    • /
    • v.30 no.6
    • /
    • pp.649-662
    • /
    • 2020
  • The existence of a dam has potential effects on the surrounding wind environment especially when it is located in mountainous areas. In this situation, the long-span bridge over the reservoir can easily be exposed to non-uniform incoming flows, affecting its wind-resistance performance. This paper presents a study on the aerostatic stability of such a bridge. Wind tunnel tests were first carried out to investigate the wind environment above a mountainous reservoir. The results show that the angle of attack and the wind speed along the bridge axis show obvious non-uniform characteristics, which is related to the inflow direction. When winds come from the south where the river is winding, the angle of attack varies along the span direction significantly. The finite element model for the bridge was established using ANSYS software, and effects of non-uniform wind loads on the aerostatic stability were computed. Non-uniform angle of attack and wind speed are unfavorable to the aerostatic stability of the bridge, especially the former. When the combined action of non-uniform angle of attack and wind speed is considered, the critical wind speed of aerostatic instability is further reduced. Moreover, the aerostatic stability of the bridge is closely related to the dam height.

A Method for Preemptive Intrusion Detection and Protection Against DDoS Attacks (DDoS 공격에 대한 선제적 침입 탐지·차단 방안)

  • Kim, Dae Hwan;Lee, Soo Jin
    • Journal of Information Technology Services
    • /
    • v.15 no.2
    • /
    • pp.157-167
    • /
    • 2016
  • Task environment for enterprises and public institutions are moving into cyberspace-based environment and structing the LTE wireless network. The applications "App" operated in the LTE wireless network are mostly being developed with Android-based. But Android-based malwares are surging and they are the potential DDoS attacks. DDoS attack is a major information security threat and a means of cyber attacks. DDoS attacks are difficult to detect in advance and to defense effectively. To this end, a DMZ is set up in front of a network infrastructure and a particular server for defensive information security. Because There is the proliferation of mobile devices and apps, and the activation of android diversify DDoS attack methods. a DMZ is a limit to detect and to protect against DDoS attacks. This paper proposes an information security method to detect and Protect DDoS attacks from the terminal phase using a Preemptive military strategy concept. and then DDoS attack detection and protection app is implemented and proved its effectiveness by reducing web service request and memory usage. DDoS attack detection and protecting will ensure the efficiency of the mobile network resources. This method is necessary for a continuous usage of a wireless network environment for the national security and disaster control.

A Security Vulnerability Analysis for Printer Kiosks (무인 복합 출력기 솔루션의 취약성 분석)

  • Ji, Woojoong;Kim, Hyoungshick
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.165-174
    • /
    • 2019
  • They are frequently used today in public places such as street, subway, school or library. Since users can sometimes print documents that contain confidential data using Printer Kiosks, the devices should store and manage the documents securely. In this paper, we identify potential security threats in Printer Kiosks and suggest practical attack scenarios that can take place. To show the feasibility of suggested attack, we analyzed network traffic that were generated by the real Printer Kiosk device. As a result of our analysis, we have found that attackers can access other users' scanned files and access other users' documents from Printer Kiosk's home page. We confirmed that using our attack, we could retrieve other users' personal data.

Probabilistic safety assessment-based importance analysis of cyber-attacks on nuclear power plants

  • Park, Jong Woo;Lee, Seung Jun
    • Nuclear Engineering and Technology
    • /
    • v.51 no.1
    • /
    • pp.138-145
    • /
    • 2019
  • With the application of digital technology to safety-critical infrastructures, cyber-attacks have emerged as one of the new dangerous threats. In safety-critical infrastructures such as a nuclear power plant (NPP), a cyber-attack could have serious consequences by initiating dangerous events or rendering important safety systems unavailable. Since a cyber-attack is conducted intentionally, numerous possible cases should be considered for developing a cyber security system, such as the attack paths, methods, and potential target systems. Therefore, prior to developing a risk-informed cyber security strategy, the importance of cyber-attacks and significant critical digital assets (CDAs) should be analyzed. In this work, an importance analysis method for cyber-attacks on an NPP was proposed using the probabilistic safety assessment (PSA) method. To develop an importance analysis framework for cyber-attacks, possible cyber-attacks were identified with failure modes, and a PSA model for cyber-attacks was developed. For case studies, the quantitative evaluations of cyber-attack scenarios were performed using the proposed method. By using quantitative importance of cyber-attacks and identifying significant CDAs that must be defended against cyber-attacks, it is possible to develop an efficient and reliable defense strategy against cyber-attacks on NPPs.

Mitigation of Phishing URL Attack in IoT using H-ANN with H-FFGWO Algorithm

  • Gopal S. B;Poongodi C
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.7
    • /
    • pp.1916-1934
    • /
    • 2023
  • The phishing attack is a malicious emerging threat on the internet where the hackers try to access the user credentials such as login information or Internet banking details through pirated websites. Using that information, they get into the original website and try to modify or steal the information. The problem with traditional defense systems like firewalls is that they can only stop certain types of attacks because they rely on a fixed set of principles to do so. As a result, the model needs a client-side defense mechanism that can learn potential attack vectors to detect and prevent not only the known but also unknown types of assault. Feature selection plays a key role in machine learning by selecting only the required features by eliminating the irrelevant ones from the real-time dataset. The proposed model uses Hyperparameter Optimized Artificial Neural Networks (H-ANN) combined with a Hybrid Firefly and Grey Wolf Optimization algorithm (H-FFGWO) to detect and block phishing websites in Internet of Things(IoT) Applications. In this paper, the H-FFGWO is used for the feature selection from phishing datasets ISCX-URL, Open Phish, UCI machine-learning repository, Mendeley website dataset and Phish tank. The results showed that the proposed model had an accuracy of 98.07%, a recall of 98.04%, a precision of 98.43%, and an F1-Score of 98.24%.

Threats of MANPADS and Its Counter-Measures

  • Choi, Jin-Tai
    • International Journal of Contents
    • /
    • v.6 no.3
    • /
    • pp.89-96
    • /
    • 2010
  • The International air transportation industry provides a vital communication link which brings prosperity to many states in our modern age. This invaluable link has been threatened by terrorism. Airlines have been one of the most attractive targets in the eyes of terrorists for several reasons, including particularly the international and symbolic nature of aviation, and the potential of multigovernmental involvement which can inevitably generate wide publicity. Terrorist attacks against civil aviation have been committed since the earliest days of civil aviation history. The first attack against civil aircraft dates back to the early 1930s. Since then, aircraft hijacking and other forms of attack against air transport operations have become one of the most serious challenges to the safety of flying. In recent years, a new form of threats against civil aviation has appeared. Man-portable air defense systems (MANPADS) in the hands of criminals, terrorists, and other non-state actors pose a serious potential threat to passenger air travel, the commercial aviation industry, and military aircraft around the world. The purpose of this study is to provide some countermeasures against such attacks. In order to foster a better understanding of the problem, an introduction of MANPADS and a brief history of attacks using MANPADS are presented. It also examines the level of threats, trends of attacks using MANPADS and the possible countermeasures to be taken by the international community.

Optimal Collision-Free Path Planning of Redundant Robotic Manipulators (여유 자유도를 갖는 Robot Manipulator 최적 충돌 회피 경로 계획에 관한 연구)

  • 장민근;기창두;기석호
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 1996.11a
    • /
    • pp.743-747
    • /
    • 1996
  • A Potential Field Method is applied to the proposed algorithm for the planning of collision-free paths of redundant manipulators. The planning is carried out on the base of kinematic configuration. To make repulsive potentials, sources are distributed on the boundaries of obstacles. To escape from local minimum of the main potential and to attack other difficulties of the planning, various potentials are defined simultaneously, Inverse Kinematics Problems of the redundant manipulators are solved by unconstrained optimization method. Computer simulation result of the path planning is presented.

  • PDF

On discrete nonlinear self-tuning control

  • Mohler, R.-R.;Rajkumar, V.;Zakrzewski, R.-R.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1991.10b
    • /
    • pp.1659-1663
    • /
    • 1991
  • A new control design methodology is presented here which is based on a nonlinear time-series reference model. It is indicated by highly nonlinear simulations that such designs successfully stabilize troublesome aircraft maneuvers undergoing large changes in angle of attack as well as large electric power transients due to line faults. In both applications, the nonlinear controller was significantly better than the corresponding linear adaptive controller. For the electric power network, a flexible a.c. transmission system (FACTS) with series capacitor power feedback control is studied. A bilinear auto-regressive moving average (BARMA) reference model is identified from system data and the feedback control manipulated according to a desired reference state. The control is optimized according to a predictive one-step quadratic performance index (J). A similar algorithm is derived for control of rapid changes in aircraft angle of attack over a normally unstable flight regime. In the latter case, however, a generalization of a bilinear time-series model reference includes quadratic and cubic terms in angle of attack. These applications are typical of the numerous plants for which nonlinear adaptive control has the potential to provide significant performance improvements. For aircraft control, significant maneuverability gains can provide safer transportation under large windshear disturbances as well as tactical advantages. For FACTS, there is the potential for significant increase in admissible electric power transmission over available transmission lines along with energy conservation. Electric power systems are inherently nonlinear for significant transient variations from synchronism such as may result for large fault disturbances. In such cases, traditional linear controllers may not stabilize the swing (in rotor angle) without inefficient energy wasting strategies to shed loads, etc. Fortunately, the advent of power electronics (e.g., high-speed thyristors) admits the possibility of adaptive control by means of FACTS. Line admittance manipulation seems to be an effective means to achieve stabilization and high efficiency for such FACTS. This results in parametric (or multiplicative) control of a highly nonlinear plant.

  • PDF

Numerical Analysis of Lifting Potential Flow around a Three-Dimensional Body moving beneath the Free Surface (자유표면하에서 전진하는 3차원 물체 주위의 양력 흐름 수치 해석)

  • B.K. Kim
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.29 no.3
    • /
    • pp.21-32
    • /
    • 1992
  • Numerical solutions are presented for solving the free surface flow created by a three-dimensional body moving beneath the free surface with constant velocity at an angle of attack. The solution is obtained using a panel method based on the perturbation potential, which employs Havelock sources and normal dipoles distributed on the body surface and Havelock normal dipoles in the wake downstream of the trailing edge. A pressure Kutta condition with an iterative solution procedure is implemented to satisfy equal pressure condition on the upper and lower surfaces at the trailing edge. Numerical calculation examples in the present paper include an ellipsoid at zero angle of attack, a rectangular planform wing at a small angle of attack in the limit of zero Froude number and then free surface flows and hydrodynamic forces acting on the submerged spheroid and parabolic strut are calculated. Discussions are made about the validity of the present method.

  • PDF