• Title/Summary/Keyword: Generic attack

Search Result 18, Processing Time 0.032 seconds

Hybridized Decision Tree methods for Detecting Generic Attack on Ciphertext

  • Alsariera, Yazan Ahmad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.56-62
    • /
    • 2021
  • The surge in generic attacks execution against cipher text on the computer network has led to the continuous advancement of the mechanisms to protect information integrity and confidentiality. The implementation of explicit decision tree machine learning algorithm is reported to accurately classifier generic attacks better than some multi-classification algorithms as the multi-classification method suffers from detection oversight. However, there is a need to improve the accuracy and reduce the false alarm rate. Therefore, this study aims to improve generic attack classification by implementing two hybridized decision tree algorithms namely Naïve Bayes Decision tree (NBTree) and Logistic Model tree (LMT). The proposed hybridized methods were developed using the 10-fold cross-validation technique to avoid overfitting. The generic attack detector produced a 99.8% accuracy, an FPR score of 0.002 and an MCC score of 0.995. The performances of the proposed methods were better than the existing decision tree method. Similarly, the proposed method outperformed multi-classification methods for detecting generic attacks. Hence, it is recommended to implement hybridized decision tree method for detecting generic attacks on a computer network.

On the Security Proof of the Cramer-Shoup Public Key Cryptosystem (Cramer-Shoup 공개키 암호 시스템의 안전성 증명에 관한 고찰)

  • Hwang, Seong Oun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.6
    • /
    • pp.15-20
    • /
    • 2008
  • Provable security has widely been used to prove a cryptosystem's security formally in crpytography. In this paper, we analyze the Cramer-Shoup public key cryptosystem that has been known to be provable secure against adaptive chosen ciphertext attack and argue that its security proof is not complete in the generic sense of adaptive chosen ciphertext attack. Future research should be directed toward two directions: one is to make the security proof complete even against generic sense of adaptive chosen ciphertext attack, and another is to try finding counterexamples of successful adaptive chosen ciphertext attack on the Cramer-Shoup cryptosystem.

  • PDF

Quantum rebound attacks on reduced-round ARIA-based hash functions

  • Seungjun Baek;Jongsung Kim
    • ETRI Journal
    • /
    • v.45 no.3
    • /
    • pp.365-378
    • /
    • 2023
  • ARIA is a block cipher proposed by Kwon et al. at ICISC 2003 that is widely used as the national standard block cipher in the Republic of Korea. Herein, we identify some flaws in the quantum rebound attack on seven-round ARIA-DM proposed by Dou et al. and reveal that the limit of this attack is up to five rounds. Our revised attack applies to not only ARIA-DM but also ARIA-MMO and ARIA-MP among the PGV models, and it is valid for all ARIA key lengths. Furthermore, we present dedicated quantum rebound attacks on seven-round ARIA-Hirose and ARIA-MJH for the first time. These attacks are only valid for the 256-bit key length of ARIA because they are constructed using the degrees of freedom in the key schedule. All our attacks are faster than the generic quantum attack in the cost metric of the time-space tradeoff.

Study on Hit Judgement Model of MMORPG - in case of Travia Online - (MMORPG 히트판정 모델에 관한 연구 - 트라비아 온라인을 중심으로 -)

  • Sohn Hyoung-Ryul
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.6
    • /
    • pp.172-177
    • /
    • 2005
  • Hit judgement is essential factor in design for battle-style MMORPG game system and sets foundation for other game systems. Hit judgement model consists of attack power and attack rate. The former contains minimum, maximum, and critical attack, the latter has miss, hit, and critical blow rate. Random function generates one value of attack rate and consequently the damage is calculated. In this article, we propose hit judgement model which Is widely acceptable for generic MMORPG and describe the effort of applying the proposed model to Travia Online in detail.

  • PDF

An Experimental Study on High Angle of Attack Static Stability Analysis For the Aerodynamic Design of Canard Type High Maneuver Aircraft (카나드 형상 고시동 항공기 공력설계를 우한 높은 받음각 정적 안정성 분석 실험 연구)

  • Chung, In-Jae
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.35 no.7
    • /
    • pp.575-580
    • /
    • 2007
  • During the conceptual design phase of a canard type high maneuverable aircraft, the low speed small scale wind tunnel test was conducted to investigate the high angle-of-attack static stability of the aircraft. In this study, 1/50th scale generic canard-body-wing model was used for the small scale wind tunnel test. For the analysis of static stability including high angle-of-attack nonlinear characteristics, the vertical tail effects were studied due to canard deflections. In addition, the nose chine effects were studied at high angle-of-attack. Based on the results obtained from the experimental study, the configuration change effects for canard type aircraft on high angle-of-attack static stability have been able to analyze.

Numerical investigations on the effect of mean incident wind on flutter onset of bridge deck sections

  • Keerthana, M.;Harikrishna, P.
    • Structural Engineering and Mechanics
    • /
    • v.82 no.4
    • /
    • pp.517-542
    • /
    • 2022
  • The effect of mean angle of wind attack on the flutter critical wind speed of two generic bridge deck cross-sections, viz, one closed box type streamlined section (deck-1) and closed box trapezoidal bluff type section with extended flanges/overhangs (deck-2) type of section have been studied using Computational Fluid Dynamics (CFD) based forced vibration simulation method. Owing to the importance of the effect of the amplitude of forcing oscillation on the flutter onset, its effect on the flutter derivatives and flutter onset have been studied, especially at non-zero mean angles of wind attack. The flutter derivatives obtained have been used to evaluate flutter critical wind speeds and flutter index of the deck sections at non-zero mean angles of wind attack studied and the same have been validated with those based on experimental results reported in literature. The value of amplitude of forcing oscillation in torsional degree of freedom for CFD based simulations is suggested to be in the range of 0.5° to 2°, especially for bluff bridge deck sections. Early onset of flutter from numerical simulations, thereby conservative estimate of occurrence of instability has been observed from numerical simulations in case of bluff bridge deck section. The study aids in gaining confidence and the extent of applicability of CFD during early stages of bridge design, especially towards carrying out studies on mean incident wind effects.

Development of Intrusion Detection System for GOOSE Protocol Based on the Snort (GOOSE 프로토콜 환경에서 Snort 기반의 침입 탐지 시스템 개발)

  • Kim, Hyeong-Dong;Kim, Ki-Hyun;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1181-1190
    • /
    • 2013
  • The GOOSE(Generic Object Oriented Substation Event) is used as a network protocol to communicate between IEDs(Intelligent Electronic Devices) in international standard IEC 61850 of substation automation system. Nevertheless, the GOOSE protocol is facing many similar threats used in TCP/IP protocol due to ethernet-based operation. In this paper, we develop a IDS(Intrusion Detection System) for secure GOOSE Protocol using open software-based IDS Snort. In this IDS, two security functions for keyword search and DoS attack detection are implemented through improvement of decoding and preprocessing component modules. And we also implement the GOOSE IDS and verify its accuracy using GOOSE packet generation and communication experiment.

Randomization of Elliptic Curve Secret Key to Efficiently Resist Power Analysis (전력분석공격을 효율적으로 방어하는 타원곡선 비밀키의 랜덤화)

  • 장상운;정석원;박영호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.5
    • /
    • pp.169-177
    • /
    • 2003
  • We establish the security requirements and derive a generic condition of elliptic curve scalar multiplication to resist against DPA and Goubin’s attack. Also we show that if a scalar multiplication algorithm satisfies our generic condition, then both attacks are infeasible. Showing that the randomized signed scalar multiplication using Ha-Moon's receding algorithm satisfies the generic condition, we recommend the randomized signed scalar multiplication using Ha-Moon's receding algorithm to be protective against both attacks. Also we newly design a random recoding method to Prevent two attacks. Finally, in efficiency comparison, it is shown that the recommended method is a bit faster than Izu-Takagi’s method which uses Montgomery-ladder without computing y-coordinate combined with randomized projective coordinates and base point blinding or isogeny method. Moreover. Izu-Takagi’s method uses additional storage, but it is not the case of ours.

Air-Data Estimation for Air-Breathing Hypersonic Vehicles

  • Kang, Bryan-Heejin
    • Transactions on Control, Automation and Systems Engineering
    • /
    • v.1 no.1
    • /
    • pp.75-86
    • /
    • 1999
  • An air-data estimator for generic air-breathing hypersonic vehicles (AHSVs) is developed and demonstrated with an example vehicle configuration. The AHSV air-data estimation strategy emphasized improvement of the angle of attack estimate accuracy to a degree necessitated by the stringent operational requirements of the air-breathing propulsion. the resulting estimation problem involves highly nonlinear diffusion process (propagation); consequently, significant distortion of a posteriori conditional density is suspected. A simulation based statistical analysis tool is developed to characterize the nonlinear diffusion process. The statistical analysis results indicate that the diffusion process preserves the symmetry and unimodality of initial probability density shape state variables, and provide the basis for applicability of an Extended Kalman Filter (EKF). An EKF is designed for the AHSV air-data system and the air data estimation capabilities are demonstrated.

  • PDF

Trailing edge geometry effect on the aerodynamics of low-speed BWB aerial vehicles

  • Ba Zuhair, Mohammed A.
    • Advances in aircraft and spacecraft science
    • /
    • v.6 no.4
    • /
    • pp.283-296
    • /
    • 2019
  • The influence of different planform parameters on the aerodynamic performance of large-scale subsonic and transonic Blended Wing Body (BWB) aircraft have gained comprehensive research in the recent years, however, it is not the case for small-size low subsonic speed Unmanned Aerial Vehicles (UAVs). The present work numerically investigates aerodynamics governing four different trailing edge geometries characterizing BWB configurations in standard flight conditions at angles of attack from $-4^{\circ}$ to $22^{\circ}$ to provide generic information that can be essential for making well-informed decisions during BWB UAV conceptual design phase. Simulation results are discussed and comparatively analyzed with useful implications for formulation of proper mission profile specific to every BWB configuration.