• Title/Summary/Keyword: CW attack

Search Result 3, Processing Time 0.016 seconds

Study on the White Noise effect Against Adversarial Attack for Deep Learning Model for Image Recognition (영상 인식을 위한 딥러닝 모델의 적대적 공격에 대한 백색 잡음 효과에 관한 연구)

  • Lee, Youngseok;Kim, Jongweon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.1
    • /
    • pp.27-35
    • /
    • 2022
  • In this paper we propose white noise adding method to prevent missclassification of deep learning system by adversarial attacks. The proposed method is that adding white noise to input image that is benign or adversarial example. The experimental results are showing that the proposed method is robustness to 3 adversarial attacks such as FGSM attack, BIN attack and CW attack. The recognition accuracies of Resnet model with 18, 34, 50 and 101 layers are enhanced when white noise is added to test data set while it does not affect to classification of benign test dataset. The proposed model is applicable to defense to adversarial attacks and replace to time- consuming and high expensive defense method against adversarial attacks such as adversarial training method and deep learning replacing method.

Damage Analysis of CCD Image Sensor Irradiated by Continuous Wave Laser (연속발진 레이저에 의한 CCD 영상센서의 손상 분석)

  • Yoon, Sunghee;Jhang, Kyung-Young;Shin, Wan-Soon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.19 no.6
    • /
    • pp.690-697
    • /
    • 2016
  • EOIS(electro-optical imaging system) is the main target of the laser weapon. Specially, the image sensor will be vulnerable because EOIS focuses the incident laser beam onto the image sensor. Accordingly, the laser-induced damage of the image sensor needs to be identified for the counter-measure against the laser attack. In this study, the laser-induced damage of the CCD image sensor irradiated by the CW(continuous wave) NIR(near infrared) laser was experimentally investigated and mechanisms of those damage occurrences were analyzed. In the experiment, the near infrared CW fiber laser was used as a laser source. As the fluence, which is the product of the irradiance and the irradiation time, increased, the permanent damages such as discoloration and breakdown appeared sequentially. The discoloration occurred when the color filter was damaged and then the breakdown occurred when the photodiode and substrate were damaged. From the experimental results, LIDTs(laser-induced damage thresholds) of damages were roughly determined.

Vulnerability Analysis and Detection Mechanism against Denial of Sleep Attacks in Sensor Network based on IEEE 802.15.4 (IEEE 802.15.4기반 센서 네트워크에서 슬립거부 공격의 취약성 분석 및 탐지 메커니즘)

  • Kim, A-Reum;Kim, Mi-Hui;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.1-14
    • /
    • 2010
  • IEEE 802.15.4[1] has been standardized for the physical layer and MAC layer of LR-PANs(Low Rate-Wireless Personal Area Networks) as a technology for operations with low power on sensor networks. The standardization is applied to the variety of applications in the shortrange wireless communication with limited output and performance, for example wireless sensor or virtual wire, but it includes vulnerabilities for various attacks because of the lack of security researches. In this paper, we analyze the vulnerabilities against the denial of sleep attacks on the MAC layer of IEEE 802.15.4, and propose a detection mechanism against it. In results, we analyzed the possibilities of denial of sleep attacks by the modification of superframe, the modification of CW(Contention Window), the process of channel scan or PAN association, and so on. Moreover, we comprehended that some of these attacks can mount even though the standardized security services such as encryption or authentication are performed. In addition to, we model for denial of sleep attacks by Beacon/Association Request messages, and propose a detection mechanism against them. This detection mechanism utilizes the management table consisting of the interval and node ID of request messages, and signal strength. In simulation results, we can show the effect of attacks, the detection possibility and performance superiorities of proposed mechanism.