• Title/Summary/Keyword: countermeasure method

Search Result 501, Processing Time 0.028 seconds

PingPong 256 shuffling method with Image Encryption and Resistance to Various Noise (이미지 암호화 및 다양한 잡음에 내성을 갖춘 PingPong 256 Shuffling 방법)

  • Kim, Ki Hwan;Lee, Hoon Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.11
    • /
    • pp.1507-1518
    • /
    • 2020
  • High-quality images have a lot of information, so sensitive data is stored by encryption for private company, military etc. Encrypted images can only be decrypted with a secret key, but the original data cannot be retained when attacked by the Shear attack and Noise pollution attack techniques that overwrite some pixel data with arbitrary values. Important data is the more necessary a countermeasure for the recovery method against attack. In this paper, we propose a random number generator PingPong256 and a shuffling method that rearranges pixels to resist Shear attack and Noise pollution attack techniques so that image and video encryption can be performed more quickly. Next, the proposed PingPong256 was examined with SP800-22, tested for immunity to various noises, and verified whether the image to which the shuffling method was applied satisfies the Anti-shear attack and the Anti-noise pollution attack.

Optimal Design Method of Dynamic Vibration Absorber to Reduce Resonant Vibration Response of Ship Local Structure (선박 국부구조의 공진응답 저감을 위한 동흡진기 최적 설계 방법)

  • Kwon, Hyuk;Cho, Daeseung
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.59 no.3
    • /
    • pp.134-140
    • /
    • 2022
  • Ship local structure sometimes experiences severe vibration due to the resonance with an excitation force generated by the propulsion system. In that case, the installation of dynamic vibration absorber such as Tuned Mass Damper (TMD) on the structure can be considered as an effective alternative countermeasure to reduce the troublesome vibration if structural modification or change of excitation frequencies is difficult. Meanwhile, the conventional optimal design method of TMD premises the target structure exposed on an excitation force without the constraint of its magnitude and frequency range. However, the frequencies of major ship excitation forces due to propulsion system are normally bounded and its magnitude is varied according to its operation speed. Hence, the optimal design of TMD to reduce the resonant vibration of ship local structure should be differently approached compared with the conventional ones. For the purpose, this paper proposes an optimal design method of TMD considering maximum frequency and magnitude variation of a target harmonic excitation component. It is done by both lowering the resonant response at the 1st natural frequency and locating the 2nd natural frequency over maximum excitation frequency for the idealized 2 degree of freedom system consisted of the structure and the TMD. For the validation of the proposed method, a numerical design case of TMD for a ship local structure exposed on resonant vibration due to a propeller excitation force is introduced and its performance is compared with the conventionally designed one.

A Method for Generating Malware Countermeasure Samples Based on Pixel Attention Mechanism

  • Xiangyu Ma;Yuntao Zhao;Yongxin Feng;Yutao Hu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.2
    • /
    • pp.456-477
    • /
    • 2024
  • With information technology's rapid development, the Internet faces serious security problems. Studies have shown that malware has become a primary means of attacking the Internet. Therefore, adversarial samples have become a vital breakthrough point for studying malware. By studying adversarial samples, we can gain insights into the behavior and characteristics of malware, evaluate the performance of existing detectors in the face of deceptive samples, and help to discover vulnerabilities and improve detection methods for better performance. However, existing adversarial sample generation methods still need help regarding escape effectiveness and mobility. For instance, researchers have attempted to incorporate perturbation methods like Fast Gradient Sign Method (FGSM), Projected Gradient Descent (PGD), and others into adversarial samples to obfuscate detectors. However, these methods are only effective in specific environments and yield limited evasion effectiveness. To solve the above problems, this paper proposes a malware adversarial sample generation method (PixGAN) based on the pixel attention mechanism, which aims to improve adversarial samples' escape effect and mobility. The method transforms malware into grey-scale images and introduces the pixel attention mechanism in the Deep Convolution Generative Adversarial Networks (DCGAN) model to weigh the critical pixels in the grey-scale map, which improves the modeling ability of the generator and discriminator, thus enhancing the escape effect and mobility of the adversarial samples. The escape rate (ASR) is used as an evaluation index of the quality of the adversarial samples. The experimental results show that the adversarial samples generated by PixGAN achieve escape rates of 97%, 94%, 35%, 39%, and 43% on the Random Forest (RF), Support Vector Machine (SVM), Convolutional Neural Network (CNN), Convolutional Neural Network and Recurrent Neural Network (CNN_RNN), and Convolutional Neural Network and Long Short Term Memory (CNN_LSTM) algorithmic detectors, respectively.

A Study of Analysis and Countermeasure of the Collapsed inclined shaft by a Heavy Rain (집중호우로 인한 OO터널 사갱 붕괴 원인 분석 및 대책에 관한 연구)

  • Yoon, Tae-Gook;Lee, You-Suk;Oh, Hyuk-Hee;Kim, Dong-Soo;Lee, Song
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2003.03a
    • /
    • pp.241-248
    • /
    • 2003
  • In August 2002, side wall of OO tunnel, at the Bonghwa, Kungbuk province, Korea, was collapsed by abruptly applied heavy soil and water pressure to side wall from a inclined shaft when there was a heavy rain. These days, Inclined shaft is used for the purpose of reducing construction time, using ventilation system, using the out of carrying equipment and mucking when we construct tunnel in the world. Recently constructed tunnel has the source of inclined shafts, but the more time elapse, we lose the source of the inclined shaft such as exact position, condition, and the fact that whether inclined shaft is exist or not. Therefore, this study inspected the interior's appearance, analyzed structure to evaluate the reason of collapsing side wall and this study also performed the repairing work. Finally, we show improving maintenance method to prevent that similar accident that might be happened.

  • PDF

A Comparative Study on the Noise Exposed Population for Noise Map Types (소음지도 형태에 따른 소음노출인구 비교 연구)

  • Park, In Sun;Park, Jae Sik;Park, Sang Kyu
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.23 no.2
    • /
    • pp.99-104
    • /
    • 2013
  • Assessment of noise exposed population is to check the environmental noise level and social influence in order to reduce the risks such as annoyance and disturbance that are generated by environmental noise. Also, this method suggests the preferential noise abatement policy and action plan by accurately finding the area that the noise causes harmful effect to human health. Recently, a noise map, which can predict noise in comprehensive areas, is used for the assessment of noise exposed population, breaking from the methods using existing measures. In particular, countermeasure for the noise can be considered more effectively by using assessment methods of noise exposed population for specific noise levels, areas, and building types which are the main input factors in noise maps. In this study, assessment methods of noise exposed population by using 2 dimensional noise map are compared with those by 3 dimensional noise map.

Disconnection of Wireless LAN Attack and Countermeasure (무선 LAN 연결 해제 공격과 보안)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.453-458
    • /
    • 2013
  • In a wireless LAN environment, security is the most important. Security of 802.11 standard has many vulnerabilities of the network attack. IEEE has created mechanisms to security for this vulnerability. But the vulnerabilities is characteristic of broadcast in the air in wireless LAN, it is more disclosure then other network environments. In a wireless LAN environment, it can be accessed to the wireless LAN after authentication. Authentication process is one of most important because of the first security step. However, in the authentication process is not mentioned in the method of reducing the disclosure maximum fundamental. Therefore, in this research, the vulnerability of 802.11 are presented and how to do de-authentication in 802.11.

A Case Study for the Application of Storage Tiering based on ILM through Data Value Analysis (데이터 가치분석에 따른 정보수명주기 기반 스토리지 계층화 적용에 대한 사례 연구)

  • Kim, Ho-Yeon;Youn, Chun-Kyun
    • Journal of Digital Convergence
    • /
    • v.10 no.8
    • /
    • pp.159-172
    • /
    • 2012
  • In the recent, due to explosion of Digital Universe, the performance of computer and storage system is reducing. Therefore, the upgrade and capacity expansion needs is growing. Countermeasure for this problem is required fundamental and long-term solutions rather than piecemeal expansion. In this paper, we establish a data management policy for an enterprise through the operational status of storage system and the analysis of data value of it, and implement ILM-based tiered storage system on the basis of these. The results of this study shows the overall throughput was improved about 21% compared to the existing system, it is very effective to maintain continuous quality and reduce operating costs in the long term aspect.

A Study on Anomaly Signal Detection and Management Model using Big Data (빅데이터를 활용한 이상 징후 탐지 및 관리 모델 연구)

  • Kwon, Young-baek;Kim, In-seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.287-294
    • /
    • 2016
  • APT attack aimed at the interruption of information and communication facilities and important information leakage of companies. it performs an attack using zero-day vulnerabilities, social engineering base on collected information, such as IT infra, business environment, information of employee, for a long period of time. Fragmentary response to cyber threats such as malware signature detection methods can not respond to sophisticated cyber-attacks, such as APT attacks. In this paper, we propose a cyber intrusion detection model for countermeasure of APT attack by utilizing heterogeneous system log into big-data. And it also utilizes that merging pattern-based detection methods and abnormality detection method.

A Study on Impersonation Attack of Linux Sudoers Through Shadow File Manipulation (Shadow 파일 조작을 통한 리눅스 Sudoer의 위장공격에 대한 연구)

  • Kim, Sanghun;Cho, Taenam
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.7
    • /
    • pp.149-156
    • /
    • 2020
  • All operating systems have privileged administrator accounts for efficient management. Dangerous or sensitive tasks or resources should be banned from normal users and should only be accessible by administrators. One example of this privilege is to reset a user's password when the user loses his/her password. In this paper, the privileges of the sudoer group, the administrator group of Linux Ubuntu, and the management system of the sudoer group were analyzed. We show the danger that a sudoer can use the privilege to change the password of other users, including other sudoers, and modify the log, and suggest a countermeasure to prevent the manipulation of shadow files as a solution to this. In addition, the proposed method was implemented and the possibility of practical use was confirmed with excellent performance.

A Study on Positioning of Restaurants Based on Their Competitive Relationships and Consumer Preferences - Focused on Six Family Restaurants in the Metropolitan Area - (패밀리 레스토랑의 경쟁 관계와 고객 선호도에 대한 포지셔닝 연구 - 수도권의 6개 패밀리 레스토랑을 중심으로 -)

  • Ahn, Sung-Sik;Ra, Young-Sun
    • Culinary science and hospitality research
    • /
    • v.13 no.1 s.32
    • /
    • pp.24-40
    • /
    • 2007
  • This study investigated an effective countermeasure of each restaurant under the present market conditions by grasping consumers‘ brand recognition and preferences over six restaurants in the metropolitan area centering around Seoul and comparing and analyzing selection properties that satisfy customers. The survey used a self-recording method that respondents write in the answers in person, and its subjects were the customers of restaurants in the metropolitan area from July to August, 2006. We made the MDS(multidimensional scaling) analysis of the available data from 408 respondents, using the SPSS statistical analysis program. The result was as follows. First, there were intensely competitive relationships between Nolboo Bossam and Wonhalmeoni Bossam, and between Outback Steakhouse and TGIF. Marche and Bennigan’s, however, didn‘t have a competitive relationship but kept a complementary one. Second, Wonhalmeoni Bossam was most favorably commented upon in its facilities, atmosphere, location, services, convenience(business hours, parking, transportation), recognition(popularity, fame, advertisement), sanitation and cleanliness, reasonable prices (food and drinks), etc., and then came Nolboo Bossam, TGIF, Outback Steakhouse, Bennigan’s, and Marche in that order. Third, in case of selection properties on taste of food, TGIF was estimated as the best, and then came Outback Steakhouse, Bennigan's, Marche, Wonhalmeoni Bossam, and Nolboo Bossam.

  • PDF