• Title/Summary/Keyword: Attack tolerance

Search Result 33, Processing Time 0.038 seconds

Adaptive Consensus Bound PBFT Algorithm Design for Eliminating Interface Factors of Blockchain Consensus (블록체인 합의 방해요인 제거를 위한 Adaptive Consensus Bound PBFT 알고리즘 설계)

  • Kim, Hyoungdae;Yun, Jusik;Goh, Yunyeong;Chung, Jong-Moon
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.17-31
    • /
    • 2020
  • With the rapid development of block chain technology, attempts have been made to put the block chain technology into practical use in various fields such as finance and logistics, and also in the public sector where data integrity is very important. Defense Operations In addition, strengthening security and ensuring complete integrity of the command communication network is crucial for operational operation under the network-centered operational environment (NCOE). For this purpose, it is necessary to construct a command communication network applying the block chain network. However, the block chain technology up to now can not solve the security issues such as the 51% attack. In particular, the Practical Byzantine fault tolerance (PBFT) algorithm which is now widely used in blockchain, does not have a penalty factor for nodes that behave maliciously, and there is a problem of failure to make a consensus even if malicious nodes are more than 33% of all nodes. In this paper, we propose a Adaptive Consensus Bound PBFT (ACB-PBFT) algorithm that incorporates a penalty mechanism for anomalous behavior by combining the Trust model to improve the security of the PBFT, which is the main agreement algorithm of the blockchain.

A Resource Reallocation Scheme Enhancing the Survivability of Essential Services (필수 서비스 생존성 향상을 위한 자원 재할당 기법)

  • Kim, Sung-Ki;Min, Byoung-Joon;Choi, Joong-Sup;Kim, Hong-Geun
    • The KIPS Transactions:PartC
    • /
    • v.10C no.1
    • /
    • pp.95-102
    • /
    • 2003
  • In order to guarantee the survivability of essential services against attacks based on new methodology, we need a solution to recognize important resources for the services and to adapt the urgent situation properly. In this paper, we present a dynamic resource reallocation scheme which is one of the core technologies for the construction of intrusion tolerant systems. By means of resource reallocation within a host, this scheme enables selected essential services to survive even after the occurrence if a system attack. Experimental result obtained on a test-bed reveals the validity of the proposed scheme for resource reallocation. This scheme may work together with IDS (Intrusion Detection System) to produce more effective responsive mechanisms against attacks.

Fuzzy identity-based signature scheme from lattice and its application in biometric authentication

  • Zhang, Xiaojun;Xu, Chunxiang;Zhang, Yuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2762-2777
    • /
    • 2017
  • A fuzzy identity based signature (FIBS) scheme allows a signer with identity ${\omega}$ to generate a signature which could be verified under identity ${\omega}^{\prime}$ if and only if ${\omega}$ and ${\omega}^{\prime}$ are within a certain distance of each other as judged by some metric. In this paper, we propose an efficient FIBS scheme from lattice assumption, which can resist quantum-computer attacks. Without using the Bonsai Tree technique, we utilize the lattice basis delegation technique to generate the private key, which has the advantage of keeping the lattice dimension invariant. We also prove that our proposed scheme is existentially unforgeable under an adaptive chosen message and identity attack in the random oracle model. Compared with existing scheme, our proposed scheme is much more efficient, especially in terms of communication overhead. Since our FIBS scheme possesses similar error-tolerance property, it can be well applied in post-quantum communication biometric authentication environments, where biometric identifiers such as fingerprints, voice, iris and gait are used in human identification.

Treatment of the Headache (두통의 치료)

  • Chung, Kyung-Cheon
    • Korean Journal of Psychosomatic Medicine
    • /
    • v.7 no.2
    • /
    • pp.263-273
    • /
    • 1999
  • Headache is a symptom with varied etiologies and extraordinarily frequent. Headaches can be a symptom of another diseases, such as meningitis, subarachnoid hemorrhage or brain tumor, may represent the disease entity itself as the case in migraine. The international Headache Society criteria were the first to distinguish between primary and secondary headache disorders. When evaluating a patient who presents with headache, the physician abviously needs to identify or exclude the myriad conditions that can cause secondary headache and initial diagnostic workup should be considered. If patient meets the criteria for a primary headache disorder, treatment commonly initiated without additional neurodiagnostic tests. The headache type, its associated feature, and the duration and the intensity of the pain attack all can influence the choice of acute therapy in migraine. Pharmacologically, such as NSAIDs, combination analgesics, vasoactive antimigraineous drugs, neuroleptics, antidepressants, or corticosteroids. Other approches to managing headache include a headache diary to identify triggers, biofeedback, relaxation technique and behavioral modification. Daily preventive medication should be considered by his attack frequency and intensity, and maintained for 4 to 6 months. Tension-type headaches are distinguished between episodic and chronic tension-type headache, but physician must make sure that patient is not drug-overuse or independent during symptomatic abortive therapy or preventive medication. The most difficult headache patients to treat are those with chronic daily headache. They often have physical dependency, low frustration tolerance, sleep problems, and depression. So discontinuation of overused medication is crucial. New developments in migraine therapy are broadening the scope of abortive and prophylactic treatment choices available to the physician. The enhanced ease of the use of sumatriptan and DHE will likely increase patient compliance and satisfaction.

  • PDF

Preparation and characterization of PVDF/alkali-treated-PVDF blend membranes

  • Liu, Q.F.;Li, F.Z.;Guo, Y.Q.;Dong, Y.L.;Liu, J.Y.;Shao, H.B.;Fu, Z.M.
    • Membrane and Water Treatment
    • /
    • v.7 no.5
    • /
    • pp.417-431
    • /
    • 2016
  • Poly(vinylidene fluoride) (PVDF) powder was treated with aqueous sodium hydroxide to obtain partially defluorinated fluoropolymers with expected properties such as improving hydrophilicity and fouling resistance. Raman spectrum and FT-IR results confirmed the existence of conjugated carbon double bonds after alkaline treatment. As the concentration increased, the degree of defluorination increased. The morphology and structure of membranes were examined. The permeation performance was investigated. The results showed that membrane's hydrophilicity increased with increase of the percentage of alkaline treated PVDF powder. Moreover, in terms of the water contact angle, it decreased from $92^{\circ}$ to a minimum of $68^{\circ}$; while water up take increased from 128 to 138%. Fluxof pure water and the cleaning efficiency increased with the increase of alkaline treated PVDF powder. The fouling potential also decreased with the increase of the percentage of alkaline treated PVDF powder. The reason that makes blending PVDF show different characteristics because of partial defluorination, which led the formation of conjugated C = C bonds and the inclusion of oxygen functionalities. The polyene structure followed by hydroxide attack to yield hydroxyl and carbonyl groups. Therefore, the hydrophilicity of blending membrane was improved. The SEM and porosity measurements showed that no obvious variations of the pore dimensions and structures for blend membranes were observed. Mechanical tests suggest that the high content of the alkaline treated PVDF result in membranes with less tolerance of tensile stress and higher brittleness. TGA results exhibited that the blend of alkaline treated PVDF did not change membrane thermal stability.

A Scheme of Resource Reallocation and Server Replication against DoS Attacks (서비스 거부 공격에 대비한 자원 재할당 및 서버 중복 방안)

  • Min, Byoung-Joon;Kim, Sung-Ki;Na, Yong-Hi;Lee, Ho-Jae;Choi, Joong-Sup;Kim, Hong-Geun
    • The KIPS Transactions:PartA
    • /
    • v.10A no.1
    • /
    • pp.7-14
    • /
    • 2003
  • In order to cope with DoS (Denial of Service) attacks disturbing delivery of intended services by exhausting resources of computing nodes, we need a solution to recognize important resources for the essential services which have to be maintained under any circumstances and to adapt the system to the urgent situation and reconfigure itself properly. In this paper, we present a two-phase scheme to handle the problem. In the first phase, by means of dynamic resource reallocation within a computing node, we try to make the selected essential services survive even after the occurrence of an attack. For the second phase when it becomes impossible to continue the service in spite of the actions taken in the first phase, we apply server replication in order to continue the transparent provision of the essential services with the end users by utilizing redundant computing nodes previously arranged. Experimental result obtained on a testbed reveals the validity of the proposed scheme. A comparison with other proposed schemes has been conducted by analyzing the performance and the cost.

Resource Reallocation for the Protection of Essential Services (필수 서비스 보호를 위한 자원 재할당)

  • 민병준;김성기;최중섭;김홍근
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.12
    • /
    • pp.714-723
    • /
    • 2003
  • In order to guarantee system survivability against attacks based on new methodology, we need a solution to recognize important resources for essential services and to adapt the urgent situation properly. In this paper, we present a dynamic resource reallocation scheme which is one of the core technologies for the implementation of intrusion tolerant systems. By means of resource reallocation within a node, this scheme enables the essential services to survive even after the occurrence of a system attack. If the settlement does not work within the node, resource reallocation among nodes takes places, thus the essential services are transferred to another prepared server node. Experimental result obtained on a testbed reveals the validity of the proposed scheme for resource reallocation. This scheme may work together with IDS(Intrusion Detection System) to produce effective responsive mechanism against attacks.

Studies on a PR4 Gene for Breeding Disease Resistant Forage Crops (내병성 목초 품종개량을 위한 PR4 유전자의 연구)

  • Cha, Joon-Yung;Ermawati, Netty;Jung, Min-Hee;Kim, Ki-Yong;Son, Dae-Young
    • Journal of The Korean Society of Grassland and Forage Science
    • /
    • v.27 no.4
    • /
    • pp.241-248
    • /
    • 2007
  • Cytokinins are essential plant hormones that play crucial roles in various aspects of plant growth and development. By using mRNA differential display, we isolated a cytokinine-inducible cDNA encoding pathogenesis-related (PR) 4 from Arabidopsis amp1 mutant. The full-length PR4 cDNA, designated AtPR4, contains an open reading frame of 212 amino acids with calculated molecular mass of 22,900 Da and isoelectric point (pI) of 7.89. Genomic DNA blotting showed that the Arabidopsis genome has one copy of AtPR4. AtPR4 mRNA was induced by cytokinin and NaCl, but decreased by SA or JA treatment. PR proteins are induced in response to pathogen attack. Thus the AtPR4 gene isolated in this study may be a useful candidate for genetic engineering of forage crops for increased tolerance against pathogen.

A Correction Security Framework for Reliable Internet Services (신뢰성 있는 인터넷 서비스 제공을 위한 교정 보안 프레임워크)

  • Lee, Seung-Min;Nam, Taek-Yong;Sohn, Sung-Won;Han, Chi-Moon
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.779-786
    • /
    • 2003
  • We propose a correction security framework as next generation security technology to provide secure and reliable Internet services. The framework guarantees durability of the services in spite of external attack, intrusion, vulnerability for fault tolerance, and network management technology that covers the set of techniques aimed at providing rapid service recovery. The improvement technology includes system itself improvement and synamic improvement preventing faults from being re-activated, in cooperation with other systems such as vulnerability anaysis system, NMS, ESM. It is expected that our framework will be applied to global networks as well as system alone, and be able to guarantee the network survivability and reliable Internet services.

Numerical Study of the Aerodynamic Characteristics of an Airfoil with Thickness Uncertainty for a Wind Tunnel Testing (두께의 불확실성을 갖는 풍동시험 익형모델의 공력특성에 관한 수치해석 연구)

  • Yi, Tae-Hyeong;Kwon, Ki-Jung;Kim, Keun-Taek;Ahn, Seok-Min
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.40 no.6
    • /
    • pp.475-484
    • /
    • 2012
  • Numerical investigation is performed to understand the effects of thickness uncertainty of a supporting airfoil due to manufacturing processes on the aerodynamic characteristics of an airfoil used for measuring data in a wind tunnel testing. This is done by comparing the coefficients of lift, drag and moment of the airfoils. In this work, the airfoil model consists of three parts, one located in the center for measuring and two outer parts used for supporting. The study is carried out with a NACA64-418 airfoil and the turbulence model of Transition SST. It is found that the effect of thickness uncertainty of the airfoils used for supporting is not significant to the performance of the test airfoil at various angles of attack and Reynolds numbers.