• Title/Summary/Keyword: Saturation attack

Search Result 10, Processing Time 0.02 seconds

FuzzyGuard: A DDoS attack prevention extension in software-defined wireless sensor networks

  • Huang, Meigen;Yu, Bin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3671-3689
    • /
    • 2019
  • Software defined networking brings unique security risks such as control plane saturation attack while enhancing the performance of wireless sensor networks. The attack is a new type of distributed denial of service (DDoS) attack, which is easy to launch. However, it is difficult to detect and hard to defend. In response to this, the attack threat model is discussed firstly, and then a DDoS attack prevention extension, called FuzzyGuard, is proposed. In FuzzyGuard, a control network with both the protection of data flow and the convergence of attack flow is constructed in the data plane by using the idea of independent routing control flow. Then, the attack detection is implemented by fuzzy inference method to output the current security state of the network. Different probabilistic suppression modes are adopted subsequently to deal with the attack flow to cost-effectively reduce the impact of the attack on the network. The prototype is implemented on SDN-WISE and the simulation experiment is carried out. The evaluation results show that FuzzyGuard could effectively protect the normal forwarding of data flow in the attacked state and has a good defensive effect on the control plane saturation attack with lower resource requirements.

Saturation Attacks on the reduced 5-round KASUMI (5라운드 KASUMI에 대한 포화공격)

  • 이제상;이창훈;이상진;임종인
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.118-124
    • /
    • 2004
  • KASUMI is a 64-bit iterated block cipher with a 128-bit key size and 8 rounds Feistel structure. In this paper, we describe saturation attacks on the five round KASUMI, which requires 10 $\times$$2^{32}$ chosen plaintexts and $2^{115}$ computational complexity We also improve this attack using meet-in-the-middle technique. This attack requires 7$\times$$2^{32}$ chosen plaintexts and $2^{90}$ computational complexity. Futhermore, we attack KASUMI by controlling the value of the fixed part of the key. This attack needs 3$\times$$2^{32}$ chosen plaintexts and $2^{57}$ computational complexity.

Saturation Attacks on the 27-round SKIPJACK (27라운드 SKIP JACK에 대한 포화 공격)

  • 황경덕;이원일;이성재;이상진;임종인
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.5
    • /
    • pp.85-96
    • /
    • 2001
  • This paper describes saturation attacks on reduced-round versions of SKIPJACK. To begin with, we will show how to construct a 16-round distinguisher which distinguishes 16 rounds of SKIPJACK from a random permutation. The distinguisher is used to attack on 18(5~22) and 23(5~27) rounds of SKIPJACK. We can also construct a 20-around distinguisher based on the 16-round distinguisher. This distinguisher is used to attack on 22(1~22) and 27(1~27) rounds of SKIPJACK. The 80-bit user key of 27 rounds of SKIPJACK can be recovered with $2^{50}$ chosen plaintexts and 3\cdot 2^{75}$ encryption times.

Aircraft CAS Design with Input Saturation Using Dynamic Model Inversion

  • Sangsoo Lim;Kim, Byoung-Soo
    • International Journal of Control, Automation, and Systems
    • /
    • v.1 no.3
    • /
    • pp.315-320
    • /
    • 2003
  • This paper presents a control augmentation system (CAS) based on the dynamic model inversion (DMI) architecture for a highly maneuverable aircraft. In the application of DMI not treating actuator dynamics, significant instabilities arise due to limitations on the aircraft inputs, such as actuator time delay based on dynamics and actuator displacement limit. Actuator input saturation usually occurs during high angles of attack maneuvering in low dynamic pressure conditions. The pseudo-control hedging (PCH) algorithm is applied to prevent or delay the instability of the CAS due to a slow actuator or occurrence of actuator saturation. The performance of the proposed CAS with PCH architecture is demonstrated through a nonlinear flight simulation.

Policy-based Reconfigurable Bandwidth-Controller for Network Bandwidth Saturation Attacks (네트워크 대역폭 고갈 공격에 대한 정책 기반 재구성 가능 대역폭제어기)

  • Park Sang-kil;Oh Jin-tae;Kim Ki-young
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.951-958
    • /
    • 2004
  • Nowadays NGN is developed for supporting the e-Commerce, Internet trading, e-Government, e-mail, virtual-life and multimedia. Internet gives us the benefit of remote access to the information but causes the attacks that can break server and modify information. Since 2000 Nimda, Code Red Virus and DSoS attacks are spreaded in Internet. This attack programs make tremendous traffic packets on the Internet. In this paper, we designed and developed the Bandwidth Controller in the gateway systems against the bandwidth saturation attacks. This Bandwidth con-troller is implemented in hardware chipset(FPGA) Virtex II Pro which is produced by Xilinx and acts as a policing function. We reference the TBF(Token Bucket Filter) in Linux Kernel 2.4 and implemented this function in HDL(Hardware Description Language) Verilog. This HDL code is synthesized in hardware chipset and performs the gigabit traffic in real time. This policing function can throttle the traffic at the rate of band width controlling policy in bps speed.

The Strategies of Manufacturers and Retailers for Customer Acquisition and Retention Using Scanner Panel Data (스캐너 패널 데이터를 이용한 유통업체와 제조업체간의 고객확보 및 유지 전략에 관한 연구)

  • Lee, Seung-yon;Son, Jungmin
    • Knowledge Management Research
    • /
    • v.12 no.3
    • /
    • pp.73-96
    • /
    • 2011
  • Recent market saturation makes the local retailers consider an attempt to innovate the market with the retailer's brand. This is the retailers' efforts to expand the market control through the enhancement of private brands. As the competition among manufacturers extends to the competition between manufacturers and retailers, the marketing knowledges of manufacturers need to be diversified to the ones that can be applied to the manufacturers and retailers due to their bilateral competition. This research concentrates on the customer acquisition strategy (attack strategy) and customer retention strategy (defense strategy) in the place of both sides of manufacturers and retailers. Also this research targets to develop the differential marketing strategies for target market's National Brand(NB)/Private Brand(PB) purchase by analyzing individual customer's purchase probability on repurchase and switch-purchase of NB and PB. This study is based on the data of frequently consumed product, tomato ketchup on scanner panel from the ERIM data of University of Chicago, USA. This study compares and analyzes the NB and PB repurchases and switch-purchase of 4 types. The comparisons provide the informations that which factors should be managed for the attack strategy, the defense strategy, and the differential marketing strategies both for manufacturers and retailers. This research is expected to contribute on cumulating the industrial knowledges of retailers' and manufacturers' survival strategy, expecially focusing on the effect of marketing factors and consumer-characteristic factors.

  • PDF

Saturation Attack against Full-Round ABCD (블록암호 ABCD에 대한 포화 공격)

  • Lee Je-Sang;Lee Chang-Hoon;Hong Seok-Hie;Sung Jae-Chul;Lee Snag-Jin
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.511-514
    • /
    • 2006
  • ABCD는 FGCS'2004에 이장두 등에 의하여 제안된 블록 암호이다. ABCD는 256비트의 평문을 입력받아 128비트의 키를 사용하여 256비트의 암호문을 출력하는 블록암호이다. ABCD는 지금가지 분석 결과가 알려져 있지 않으며, 본 논문에서는 $7{\times}2^{8}$의 선택 평문을 이용하여, 공격복잡도 $2^{54}$을 갖는 전체 라운드 포화공격을 소개한다.

  • PDF

A Numerical Study on Cavitation Suppression Using Local Cooling

  • Zhang, Yuan-Yuan;Sun, Xiao-Jing;Huang, Dian-Gui
    • International Journal of Fluid Machinery and Systems
    • /
    • v.3 no.4
    • /
    • pp.292-300
    • /
    • 2010
  • This study strives to develop an effective strategy to inhibit cavitation inception on hydrofoils by using local cooling technique. By setting up a temperature boundary condition and cooling a small area on the upper surface of a hydrofoil, the fluid temperature around the cooling surface will be decreased and thereby the corresponding liquid saturation pressure will drop below the lowest absolute pressure within the flow field. Hence, cavitation can never occur. In this paper, a NACA0015 hydrofoil at $4^{\circ}$ angle of attack was numerically investigated to verify the effectiveness of the proposed technique. The CFD results indicate that the cooling temperature and the cooling surface roughness are the critical factors affecting the success of such technique used for cavitation suppression.

A Study on Analysis Technique for Chloride Penetration in Cracked Concrete under Combined Deterioration (복합열화에 노출된 균열부 콘크리트 내의 염화물 침투 해석 기법에 대한 연구)

  • Kwon, Seung-Jun;Song, Ha-Won;Byun, Keun-Joo
    • Journal of the Korea Concrete Institute
    • /
    • v.19 no.3
    • /
    • pp.359-366
    • /
    • 2007
  • Recently, analysis researches on durability are focused on chloride attack and carbonation due to increased social and engineering significance. Generally, chloride penetration and carbonation occur simultaneously except for in submerged condition and chloride behavior in carbonated concrete is evaluated to be different from that in normal concrete. Furthermore, if unavoidable crack occurs in concrete, it influences not only single attack but also coupled deterioration more severely. This is a study on analysis technique with system dynamics for chloride penetration in concrete structures exposed to coupled chloride attack and carbonation through chloride diffusion, permeation, and carbonation reaction. For the purpose, a modeling for chloride behavior considering diffusion and permeation is performed through previous models for early-aged concrete such as MCHHM (multi component hydration heat model) and MPSFM (micro pore structure formation). Then model for combined deterioration is developed considering changed characteristics such as pore distribution, saturation and dissociation of bound chloride content under carbonation. The developed model is verified through comparison with previous experimental data. Additionally, simulation for combined deterioration in cracked concrete is carried out through utilizing previously developed models for chloride penetration and carbonation in cracked concrete. From the simulated results, CCTZ (chloride-carbonation transition zone) for evaluating combined deterioration is proposed. It is numerically verified that concrete with slag has better resistance to combined deterioration than concrete with OPC in sound and cracked concrete.