• Title/Summary/Keyword: Collaborative Attack

Search Result 26, Processing Time 0.022 seconds

Construct of Cooperative Security System for Secure MANET (안전한 MANET을 위한 협력적인 보안체계 구축)

  • Yang, Hwan Seok;Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.13 no.3
    • /
    • pp.33-38
    • /
    • 2013
  • Security between mobile nodes and efficient communication is one of the most important parts of the MANET. In particular, the wireless network is significantly higher for the attack threats because of collaborative structure for open communication media and communication. However, application of existing security mechanisms and intrusion detection system is not easy due to the characteristics of MANET. It is because collection and integration of adult data by the dynamic topology due to the mobility of nodes and many network sensors is difficult. In this study, we propose cooperative security system technique that can improve the reliability based on authentication assessing confidence about the whole nodes which joins to network and detect effectively this when intrusion occurs. Cluster head which manages the cluster performs CA role for the certificate issue and the gateway node performs role of intrusion detection system. Intrusion detection is performed by cooperating with neighboring nodes when attack is not detected in one intrusion detection node. The performance of the proposed method was confirmed through experiments comparing with the SRP technique.

A Study on Intrusion Detection Method using Collaborative Technique (협업 기법을 이용한 침입탐지 탐지 방법에 관한 연구)

  • Yang, Hwan Seok
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.121-127
    • /
    • 2021
  • MANET, which does not have any infrastructure other than wireless nodes, has the advantage of being able to construct a fast network. However, the movement of nodes and wireless media are also the causes of security vulnerabilities of MANET. In particular, the damage caused by the attacking nodes existing on the network is considerably greater than that of other networks. Therefore, it is necessary to detection technique for attacking nodes and techniques to reduce damage caused by attacks. In this paper, we proposed a hierarchical structure technique to increase the efficiency of intrusion detection and collaboration-based intrusion detection technique applying a P2P mesh network configuration technique to reduce damage caused by attacks. There was excluded the network participation of the attacking node in advance through the reliability evaluation of the nodes in the cluster. In addition, when an attack by an attacking node is detected, this paper was applied a method of minimizing the damage of the attacking node by transmitting quickly the attack node information to the global network through the P2P mesh network between cluster heads. The ns-2 simulator was used to evaluate the performance of the proposed technique, and the excellent performance of the proposed technique was confirmed through comparative experiments.

Korea-China Conflicts in Business: A Search after their Solutions (한·중 비즈니스 관계의 갈등과 그 해결방안에 대한 모색)

  • KIM, Ju-Won;KIM, Yong-June
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.66
    • /
    • pp.191-218
    • /
    • 2015
  • This research is, first of all, a theoretical study concerning 'conflict.' Only then, we could obtain ways in which we manage and resolve various problems arising from conflicts in business between Korean and Chinese companies. In doing this, we also tried to grasp cultural characteristics, or factors, in Chinese ways of carrying out negotiations that lead to conflicts with us. On the basis of these preliminary considerations, we developed practical techniques of conflict management and types of negotiation strategy. We thereby could suggest broader strategic implications for better performance in international business. Concretely, this research investigates techniques of conflict management and types of negotiation strategy. For such techniques and types, we suggest, (1) Sharing technique or reconciliatory compromising negotiation and its compromise strategy, (2) collaborative technique or cooperative negotiation and its win-win strategy, (3) competitive technique or competitive negotiation and its profit-seeking attack strategy, (4) accommodative technique or receptive negotiation and its relation-maintaining yield strategy, (5) avoidant technique or evasive negotiation and its indifference-showing avoidance strategy. This research contributes to promote understanding on negotiation culture of chinese corporate. and we provide the guideline of the conflict management and the insight for the efficiency strategy of chinese business negotiation. But, empirical data and statistical examinations should be added to our present research for the future prospective ones.

  • PDF

A Novel Smart Contract based Optimized Cloud Selection Framework for Efficient Multi-Party Computation

  • Haotian Chen;Abir EL Azzaoui;Sekione Reward Jeremiah;Jong Hyuk Park
    • Journal of Information Processing Systems
    • /
    • v.19 no.2
    • /
    • pp.240-257
    • /
    • 2023
  • The industrial Internet of Things (IIoT) is characterized by intelligent connection, real-time data processing, collaborative monitoring, and automatic information processing. The heterogeneous IIoT devices require a high data rate, high reliability, high coverage, and low delay, thus posing a significant challenge to information security. High-performance edge and cloud servers are a good backup solution for IIoT devices with limited capabilities. However, privacy leakage and network attack cases may occur in heterogeneous IIoT environments. Cloud-based multi-party computing is a reliable privacy-protecting technology that encourages multiparty participation in joint computing without privacy disclosure. However, the default cloud selection method does not meet the heterogeneous IIoT requirements. The server can be dishonest, significantly increasing the probability of multi-party computation failure or inefficiency. This paper proposes a blockchain and smart contract-based optimized cloud node selection framework. Different participants choose the best server that meets their performance demands, considering the communication delay. Smart contracts provide a progressive request mechanism to increase participation. The simulation results show that our framework improves overall multi-party computing efficiency by up to 44.73%.

Analyzing Key Variables in Network Attack Classification on NSL-KDD Dataset using SHAP (SHAP 기반 NSL-KDD 네트워크 공격 분류의 주요 변수 분석)

  • Sang-duk Lee;Dae-gyu Kim;Chang Soo Kim
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.4
    • /
    • pp.924-935
    • /
    • 2023
  • Purpose: The central aim of this study is to leverage machine learning techniques for the classification of Intrusion Detection System (IDS) data, with a specific focus on identifying the variables responsible for enhancing overall performance. Method: First, we classified 'R2L(Remote to Local)' and 'U2R (User to Root)' attacks in the NSL-KDD dataset, which are difficult to detect due to class imbalance, using seven machine learning models, including Logistic Regression (LR) and K-Nearest Neighbor (KNN). Next, we use the SHapley Additive exPlanation (SHAP) for two classification models that showed high performance, Random Forest (RF) and Light Gradient-Boosting Machine (LGBM), to check the importance of variables that affect classification for each model. Result: In the case of RF, the 'service' variable and in the case of LGBM, the 'dst_host_srv_count' variable were confirmed to be the most important variables. These pivotal variables serve as key factors capable of enhancing performance in the context of classification for each respective model. Conclusion: In conclusion, this paper successfully identifies the optimal models, RF and LGBM, for classifying 'R2L' and 'U2R' attacks, while elucidating the crucial variables associated with each selected model.

A study of Establishment and Acquisition for Disaster Collections on The National September 11 Memorial & Museum (미국 9/11 메모리얼의 설립과 재난컬렉션 수집에 관한 연구)

  • Jung, Hye-ji;Lee, Seung Hwi
    • The Korean Journal of Archival Studies
    • /
    • no.55
    • /
    • pp.235-273
    • /
    • 2018
  • The National September 11 Memorial is the institution that collects, assesses, arranges, uses, exhibits, and preserves collections related to the terror attack on September 11, 2001 (9/11), and the explosion incident at the World Trade Center (WTC) on February 26, 1996. After the 9/11 incident, various groups, including the LMDC and the PANYNJ, have participated in the establishment of this organization. Since its initial establishment, the necessity for memorial institutions and detailed characteristics had been discussed in meetings to gather citizens' opinions. Furthermore, the enactment of the 9/11 Memorial Act has secured the institution's stable operation and management. To properly manage disaster-related collections, a just agreement among the citizens and the government should be made to arrive at rational decision-making. This instution can provide answers regarding those ways. Moreover, managing disaster-related collections should be discussed as an important means of remembering, preserving memories, educating, revealing the truth, and preparing academic information and sources. As a result, collaborative governance in records management after a disaster is expected.