• Title/Summary/Keyword: Dynamic Defense

Search Result 428, Processing Time 0.024 seconds

SOCMTD: Selecting Optimal Countermeasure for Moving Target Defense Using Dynamic Game

  • Hu, Hao;Liu, Jing;Tan, Jinglei;Liu, Jiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.10
    • /
    • pp.4157-4175
    • /
    • 2020
  • Moving target defense, as a 'game-changing' security technique for network warfare, realizes proactive defense by increasing network dynamics, uncertainty and redundancy. How to select the best countermeasure from the candidate countermeasures to maximize defense payoff becomes one of the core issues. In order to improve the dynamic analysis for existing decision-making, a novel approach of selecting the optimal countermeasure using game theory is proposed. Based on the signal game theory, a multi-stage adversary model for dynamic defense is established. Afterwards, the payoffs of candidate attack-defense strategies are quantified from the viewpoint of attack surface transfer. Then the perfect Bayesian equilibrium is calculated. The inference of attacker type is presented through signal reception and recognition. Finally the countermeasure for selecting optimal defense strategy is designed on the tradeoff between defense cost and benefit for dynamic network. A case study of attack-defense confrontation in small-scale LAN shows that the proposed approach is correct and efficient.

Experiments of Mixed Dynamic Stiffness of a Control Fin and Actuator and Correction of Experiment Results (구동장치 연동된 조종날개 혼합동강성 실험 및 특성보정)

  • Shin Young-Sug;Hwang Cheol-Gyu;Yang Hae-Seok;Lee Yeol-Wha
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.7 no.4 s.19
    • /
    • pp.107-113
    • /
    • 2004
  • In order to model a connection part between a control fin and actuator, the related characteristics of a dynamic stiffness were extracted from experiments. These characteristics include the static stiffness of a control fin and the dynamic stiffness of an actuator, so they are called the mixed dynamic stiffness here. This mixed dynamic stiffness is used as the boundary condition of a control fin connected to an actuator when the flutter characteristics are analyzed. The simulated stiffness of an actuator is corrected from the experiment results and the mixed dynamic is finally formulated in the domain of frequencies.

Defense Strategy of Network Security based on Dynamic Classification

  • Wei, Jinxia;Zhang, Ru;Liu, Jianyi;Niu, Xinxin;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.5116-5134
    • /
    • 2015
  • In this paper, due to the network security defense is mainly static defense, a dynamic classification network security defense strategy model is proposed by analyzing the security situation of complex computer network. According to the network security impact parameters, eight security elements and classification standard are obtained. At the same time, the dynamic classification algorithm based on fuzzy theory is also presented. The experimental analysis results show that the proposed model and algorithm are feasible and effective. The model is a good way to solve a safety problem that the static defense cannot cope with tactics and lack of dynamic change.

Microstructural Evolution during Hot Deformation of Molybdenum using Processing Map Approach (변형지도 모델링을 통한 몰리브데늄의 고온 변형에 따른 미세조직 변화 연구)

  • Kim, Young-Moo;Lee, Sung-Ho;Lee, Seong;Noh, Joon-Woong
    • Journal of Powder Materials
    • /
    • v.15 no.6
    • /
    • pp.458-465
    • /
    • 2008
  • The hot deformation characteristics of pure molybdenum was investigated in the temperature range of $600{\sim}1200^{\circ}C$ and strain rate range of $0.01{\sim}10.0/s$ using a Gleeble test machine. The power dissipation map for hot working was developed on the basis of the Dynamic Materials Model. According to the map, dynamic recrystallization (DRX) occurs in the temperature range of $1000{\sim}1100^{\circ}C$ and the strain rate range of $0.01{\sim}10.0/s$, which are the optimum conditions for hot working of this material. The average grain size after DRX is $5{\mu}m$. The material undergoes flow instabilities at temperatures of $900{\sim}1200^{\circ}C$ and the strain rates of $0.01{\sim}10.0/s$, as calculated by the continuum instability criterion.

CacheSCDefender: VMM-based Comprehensive Framework against Cache-based Side-channel Attacks

  • Yang, Chao;Guo, Yunfei;Hu, Hongchao;Liu, Wenyan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.6098-6122
    • /
    • 2018
  • Cache-based side-channel attacks have achieved more attention along with the development of cloud computing technologies. However, current host-based mitigation methods either provide bad compatibility with current cloud infrastructure, or turn out too application-specific. Besides, they are defending blindly without any knowledge of on-going attacks. In this work, we present CacheSCDefender, a framework that provides a (Virtual Machine Monitor) VMM-based comprehensive defense framework against all levels of cache attacks. In designing CacheSCDefender, we make three key contributions: (1) an attack-aware framework combining our novel dynamic remapping and traditional cache cleansing, which provides a comprehensive defense against all three cases of cache attacks that we identify in this paper; (2) a new defense method called dynamic remapping which is a developed version of random permutation and is able to deal with two cases of cache attacks; (3) formalization and quantification of security improvement and performance overhead of our defense, which can be applicable to other defense methods. We show that CacheSCDefender is practical for deployment in normal virtualized environment, while providing favorable security guarantee for virtual machines.

Definition and Verification of the Dynamic Characteristics of the Anti-Vibration Mount for the Numerical Analysis (수치해석을 위한 방진 마운트의 동적 특성 결정 및 검증)

  • Han, Hyung-Suk;Park, Mi-Yoo;Cho, Heung-Gi;Kim, Joong-Gil;Im, Dong-Been
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.9
    • /
    • pp.3190-3195
    • /
    • 2010
  • Because the non-linear property of the rubber, the elastic modulus and damping factor of the rubber mount are dependent on the frequency. Therefore, the dynamic properties of the rubber mount should be considered when the anti-vibration mount is designed. Especially, when the numerical analysis is performed, the results can have much errors not considering the dynamic characteristics of the rubber mount. In this paper, the dynamic properties of typical standard rubber mount approved by ROK navy are defined experimentally and the results from the numerical analysis and experiment are compared for considering and non-considering the dynamic properties of the rubber mount respectively.

Real-Time Simulation Algorithm for an Aircraft and a Missile

  • Ueda, Yukio;Baba, Yoriaki;Takano, Hiroyuki
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2002.10a
    • /
    • pp.47.5-47
    • /
    • 2002
  • Some integration methods for the linear subsystems are examined and which algorithm is optimal for real-time simulation is considered. First, a number of typical integration methods for a linear time-invariant system are given. Then, the dynamic errors are shown both from the point of view of characteristic root errors and transfer function errors. After that we compute the dynamic errors of integration and choose the appropriate method for each system.

  • PDF

A Dynamic Defense Using Client Puzzle for Identity-Forgery Attack on the South-Bound of Software Defined Networks

  • Wu, Zehui;Wei, Qiang;Ren, Kailei;Wang, Qingxian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.846-864
    • /
    • 2017
  • Software Defined Network (SDN) realizes management and control over the underlying forwarding device, along with acquisition and analysis of network topology and flow characters through south bridge protocol. Data path Identification (DPID) is the unique identity for managing the underlying device, so forged DPID can be used to attack the link of underlying forwarding devices, as well as carry out DoS over the upper-level controller. This paper proposes a dynamic defense method based on Client-Puzzle model, in which the controller achieves dynamic management over requests from forwarding devices through generating questions with multi-level difficulty. This method can rapidly reduce network load, and at the same time separate attack flow from legal flow, enabling the controller to provide continuous service for legal visit. We conduct experiments on open-source SDN controllers like Fluid and Ryu, the result of which verifies feasibility of this defense method. The experimental result also shows that when cost of controller and forwarding device increases by about 2%-5%, the cost of attacker's CPU increases by near 90%, which greatly raises the attack difficulty for attackers.

An OpenFlow User-Switch Remapping Approach for DDoS Defense

  • Wei, Qiang;Wu, Zehui;Ren, Kalei;Wang, Qingxian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4529-4548
    • /
    • 2016
  • DDoS attacks have had a devastating effect on the Internet, which can cause millions of dollars of damage within hours or even minutes. In this paper we propose a practical dynamic defense approach that overcomes the shortage of static defense mechanisms. Our approach employs a group of SDN-based proxy switches to relay data flow between users and servers. By substituting backup proxy switches for attacked ones and reassigning suspect users onto the new proxy switches, innocent users are isolated and saved from malicious attackers through a sequence of remapping process. In order to improve the speed of attacker segregation, we have designed and implemented an efficient greedy algorithm which has been demonstrated to have little influence on legitimate traffic. Simulations, which were then performed with the open source controller Ryu, show that our approach is effective in alleviating DDoS attacks and quarantining the attackers by numerable remapping process. The simulations also demonstrate that our dynamic defense imposes little effect on legitimate users, and the overhead introduced by remapping procedure is acceptable.

Performance Analysis of WADGPS System for Improving Positioning Accuracy

  • So, Hyoungmin;Jang, Jaegyu;Lee, Kihoon;Park, Junpyo;Song, Kiwon
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.5 no.1
    • /
    • pp.21-28
    • /
    • 2016
  • The Wide Area Differential Global Positioning System (WADGPS) that uses a number of Global Navigation Satellite System (GNSS) reference stations are implemented with various types and provide services as it can service a wide range of areas relatively. This paper discusses a constellation design of reference stations and performance analysis of the WADGPS. It presented performance results of static and dynamic users when wide area correction algorithm was applied using eight reference stations.