• Title/Summary/Keyword: Injection Attack

Search Result 121, Processing Time 0.022 seconds

Study on the Flow Around an Elliptic Wing Using Flow Visualization Technique (유동가시화를 통한 타원형날개주위 유동연구)

  • Beom-Soo Hyun;Moon-Chan Kim
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.30 no.1
    • /
    • pp.94-103
    • /
    • 1993
  • This study deals with an investigation on the tip vortex generated by an elliptic wing with section shapes of NACA 0020. The flow structure on the wing surface is investigated by using tufts test as well as observing the cavitation pattern. The surface pressure on a foil surface is measured to complement the visualized flow field. Results show that a strong spanwise pressure gradient is a definite contributor on the formation of tip vorex, and the fluids from both sides contribute to the evolutionary process of tip vortex. On the other hand, a series of experiments are conducted to investigate the detailed structure of tip-vortex at various angles of attack. The tip-vortex formation and development are observed by producing a cavitation, and then by a laser sheet technique in conduction with a dye injection method. The shape of tip-vortex and the distance between a vortex core and the trailing vortex sheet are found to vary with the angle of attack. Overall features of tip flow are evaluated to complement the vortex model based on inviscid theory.

  • PDF

Analysis of the Connectivity of Monitoring Nodes and the Coverage of Normal Nodes for Behavior-based Attack Detection in Wireless Sensor Networks (무선 센서 네트워크에서 행위 기반 공격 탐지를 위한 감시 노드의 연결성과 일반 노드의 커버리지 분석)

  • Chong, Kyun-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.12
    • /
    • pp.27-34
    • /
    • 2013
  • In wireless sensor networks, sensors need to communicate with each other to send their sensing data to the administration node and so they are susceptible to many attacks like garbage packet injection that cannot be prevented by using traditional cryptographic approaches. A behavior-based detection is used to defend against such attacks in which some specialized monitoring nodes overhear the communications of their neighbors to detect bad packets. As monitoring nodes use more energy, it is desirable to use the minimal number of monitoring nodes to cover the whole or maximal part of the network. The monitoring nodes can either be selected among the deployed normal nodes or differ in type from normal nodes. In this study, we have developed an algorithm for selecting the predefined number of monitoring nodes needed to cover the maximum number of normal nodes when the different types of normal nodes and monitoring nodes are deployed. We also have investigated experimentally how the number of monitoring nodes and their transmission range affect the connection ratio of the monitoring nodes and the coverage of the normal nodes.

Novelty Detection on Web-server Log Dataset (웹서버 로그 데이터의 이상상태 탐지 기법)

  • Lee, Hwaseong;Kim, Ki Su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.10
    • /
    • pp.1311-1319
    • /
    • 2019
  • Currently, the web environment is a commonly used area for sharing information and conducting business. It is becoming an attack point for external hacking targeting on personal information leakage or system failure. Conventional signature-based detection is used in cyber threat but signature-based detection has a limitation that it is difficult to detect the pattern when it is changed like polymorphism. In particular, injection attack is known to the most critical security risks based on web vulnerabilities and various variants are possible at any time. In this paper, we propose a novelty detection technique to detect abnormal state that deviates from the normal state on web-server log dataset(WSLD). The proposed method is a machine learning-based technique to detect a minor anomalous data that tends to be different from a large number of normal data after replacing strings in web-server log dataset with vectors using machine learning-based embedding algorithm.

Building of Remote Control Attack System for 2.4 GHz Wireless Keyboard Using an Android Smart Phone (안드로이드 스마트폰을 이용한 2.4 GHz 무선 키보드 원격제어 공격 시스템 구축)

  • Lee, Su-Jin;Park, Aesun;Sim, Bo-Yeon;Kim, Sang-su;Oh, Seung-Sup;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.871-883
    • /
    • 2016
  • It has been steadily increasing to use a wireless keyboard via Radio Frequency which is the input device. Especially, wireless keyboards that use 2.4 GHz frequency band are the most common items and their vulnerabilities have been reported since 2010. In this paper, we propose a 2.4 GHz wireless keyboard keystroke analysis and injection system based on the existing vulnerability researches of the Microsoft 2.4 GHz wireless keyboards. This system is possible to control on the remote. We also show that, via experiments using our proposed system, sensitive information of user can be revealed in the real world when using a 2.4 GHz wireless keyboard.

A Method to Improve Energy Efficiency Using a Function that Evaluate the Probability of Attempts to Verify a Report at Intermediate Node in USN (USN에서 중간 노드에서의 보고서 검증 시도 확률 평가 함수를 이용한 에너지 효율 향상 기법)

  • Lee, Hyun-Woo;Moon, Soo-Young;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.4
    • /
    • pp.21-29
    • /
    • 2011
  • Wireless sensor nodes operate in open environments. The deployed sensor nodes are very vulnerable to physical attacks from outside. Attackers compromise some sensor nodes. The compromised nodes by attackers can lead to false data injection into sensor networks. These attacks deplete the limited energy of sensor nodes. Ye et al. proposed the Statistical En-Route Filtering (SEF) as a countermeasure of the attacks. The sensor node in SEF examines the event reports based on certain uniform probability. Thus, the same energies are consumed in both legitimate reports and false reports. In this paper, we propose a method that each node controls the probability of attempts to verify a report to reduce energy consumption of sensor nodes. The probability is determined in consideration of the remaining energy of the node, the number of hops from the node to SINK node, the ratio of false reports. the proposed method can have security which is similar with SEF and consumes lower energy than SEF.

A Study on Web Vulnerability Assessment and Prioritization of Measures by Vulnerabilities (웹 취약점 점검 및 취약점별 조치 우선 순위 산정에 관한 연구)

  • Seong, JongHyuk;Lee, HooKi;Ko, InJe;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.37-44
    • /
    • 2018
  • Today we live in a flood of web sites and access numerous websites through the Internet to obtain various information. However, unless the security of the Web site is secured, Web site security can not be secured from various malicious attacks. Hacking attacks, which exploit Web site security vulnerabilities for various reasons, such as financial and political purposes, are increasing. Various attack techniques such as SQL-injection, Cross-Site Scripting(XSS), and Drive-By-Download are being used, and the technology is also evolving. In order to defend against these various hacking attacks, it is necessary to remove the vulnerabilities from the development stage of the website, but it is not possible due to various problems such as time and cost. In order to compensate for this, it is important to identify vulnerabilities in Web sites through web vulnerability checking and take action. In this paper, we investigate web vulnerabilities and diagnostic techniques and try to understand the priorities of vulnerabilities in the development stage according to the actual status of each case through cases of actual web vulnerability diagnosis.

  • PDF

Determination Method of Authentication Key Re-Distribution Period in Dynamic En-route Filtering Scheme on WSN (무선 센서 네트워크에서 동적 여과 프로토콜의 인증키 재배포 주기 결정 기법)

  • Lee, Sun-Ho;Cho, Tae-Ho
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.355-358
    • /
    • 2009
  • 센서 네트워크에 대한 연구가 활발히 이루어지면서 센서 네트워크 보안에 대한 문제점이 많이 야기되고 있다. 무선 센서 네트워크에서는 개방된 환경에서 제한적인 자원을 가지는 노드들로 구성되어 있다. 개방된 환경에 배치된 노드들은 공격자에게 쉽게 노출되어질 수 있다. 공격자는 노드를 물리적으로 포획하여 데이터 인증에 사용하는 인증키와 같은 보안 정보들을 획득할 수 있다. 공격자는 포획된 노드를 통하여 허위 보고서로 무선 센서 네트워크에 쉽게 삽입시킬 수 있다. 이는 허위 보고서로 인한 혼란 및 위조 정보의 전달과정에서 발생하는 에너지 고갈 등의 문제점을 유발시키게 된다. 이러한 허위 보고서를 조기에 탐지 및 폐기하기 위하여 동적 여과 프로토콜(DEF: Dynamic En-route Filtering scheme)이 제안되었다. DEF에서 인증키를 재배포 하는 주기는 보안 강도와 비용을 트레이드-오프 하는 관계에 놓여있으므로 매우 중요하다. 본 논문에서는 센서네트워크에서 동적 여과 프로토콜의 인증키 재배포 주기를 결정하는 기법을 제안한다. 배포된 노드들의 위상변화, BS까지 도달한 허위보고서 비율, 공격자에게 포획된 노드의 수 등을 고려하여 재배포 여부를 결정하고 재배포가 결정되면 각 클러스터 헤드들에게 재배포를 명령하게 된다.

  • PDF

Treatment of Acute Calcific Tendinitis of the Shoulder with Barbotage (다발성 탐침술을 이용한 견관절 급성 석회화 건염의 치료)

  • Tae, Suk-Kee;Jung, Young-Bok;Kim, Kyoung-Hwan;Kim, Tae-Ho
    • Clinics in Shoulder and Elbow
    • /
    • v.5 no.1
    • /
    • pp.42-46
    • /
    • 2002
  • Purpose : To analyze the outcome after barbotage and subacromial corticosteroid injection in acute pain attack with calcific tendinitis of the shoulder. Materials and Methods : Twenty-two patients with acute calcific tendinitis were analyzed with average follow-up of Twenty-two months. The shape and size of calcific deposits were classified. The outcome was assessed by UCLA shoulder score and pain in visual analogue scale(VAS). Results : Sixteen patients(73%) had permanent relief of pain. The results assessed by UCLA score were excellent in fourteen patients and good in two patients. Average VAS for pain was 0.6 ± 0.73 (range:0-2). No complication was enccpuntered, but six patients underwent surgical treatment due to lack of improvement or recurrence. Conclusion : Barbotage as a primary treatment in acute calcific tendinits of the shoulder is simple and effective, and therefore should be tried before surgical intervention.

Critical Cleaning Requirements for Back End Wafer Bumping Processes

  • Bixenman, Mike
    • Proceedings of the International Microelectronics And Packaging Society Conference
    • /
    • 2000.04a
    • /
    • pp.57-64
    • /
    • 2000
  • As integrated circuits become more complex, the number of I/O connections per chip grow. Conventional wire-bonding, lead-frame mounting techniques are unable to keep up. The space saved by shrinking die size is lost when the die is packaged in a huge device with hundreds of leads. The solution is bumps; gold, conductive adhesive, but most importantly solder bumps. Virtually every semiconductor manufacturer in the world is using or planning to use bump technology fur their larger and more complex devices. Several wafer-bumping processes used in the manufacture of bumped wafer. Some of the more popular techniques are evaporative, stencil or screen printing, electroplating, electrodes nickel, solder jetting, stud bumping, decal transfer, punch and die, solder injection or extrusion, tacky dot process and ball placement. This paper will discuss the process steps for bumping wafers using these techniques. Critical cleaning is a requirement for each of these processes. Key contaminants that require removal are photoresist and flux residue. Removal of these contaminants requires wet processes, which will not attack, wafer metallization or passivation. research has focused on enhanced cleaning solutions that meet this critical cleaning requirement. Process parameters defining time, temperature, solvency and impingement energy required to solvate and remove residues from bumped wafers will be presented herein.

  • PDF

Critical Cleaning Requirements for Back End Wafer Bumping Processes

  • Bixenman, Mike
    • Journal of the Microelectronics and Packaging Society
    • /
    • v.7 no.1
    • /
    • pp.51-59
    • /
    • 2000
  • As integrated circuits become more complex, the number of I/O connections per chip grow. Conventional wire-bonding, lead-frame mounting techniques are unable to keep up. The space saved by shrinking die size is lost when the die is packaged in a huge device with hundreds of leads. The solution is bumps; gold, conductive adhesive, but most importantly solder bumps. Virtually every semiconductor manufacturer in the world is using or planning to use bump technology for their larger and more complex devices. Several wafer-bumping processes used in the manufacture of bumped wafer. Some of the more popular techniques are evaporative, stencil or screen printing, electroplating, electroless nickel, solder jetting, stud humping, decal transfer, punch and die, solder injection or extrusion, tacky dot process and ball placement. This paper will discuss the process steps for bumping wafers using these techniques. Critical cleaning is a requirement for each of these processes. Key contaminants that require removal are photoresist and flux residue. Removal of these contaminants requires wet processes, which will not attack, wafer metallization or passivation. Research has focused on enhanced cleaning solutions that meet this critical cleaning requirement. Process parameters defining time, temperature, solvency and impingement energy required to solvate and remove residues from bumped wafers will be presented herein.

  • PDF