• Title/Summary/Keyword: 취약성 요소

Search Result 649, Processing Time 0.023 seconds

Autoencoder-Based Defense Technique against One-Pixel Adversarial Attacks in Image Classification (이미지 분류를 위한 오토인코더 기반 One-Pixel 적대적 공격 방어기법)

  • Jeong-hyun Sim;Hyun-min Song
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.1087-1098
    • /
    • 2023
  • The rapid advancement of artificial intelligence (AI) technology has led to its proactive utilization across various fields. However, this widespread adoption of AI-based systems has raised concerns about the increasing threat of attacks on these systems. In particular, deep neural networks, commonly used in deep learning, have been found vulnerable to adversarial attacks that intentionally manipulate input data to induce model errors. In this study, we propose a method to protect image classification models from visually imperceptible One-Pixel attacks, where only a single pixel is altered in an image. The proposed defense technique utilizes an autoencoder model to remove potential threat elements from input images before forwarding them to the classification model. Experimental results, using the CIFAR-10 dataset, demonstrate that the autoencoder-based defense approach significantly improves the robustness of pretrained image classification models against One-Pixel attacks, with an average defense rate enhancement of 81.2%, all without the need for modifications to the existing models.

On the Leakage Safety Analysis of $9\%$ Nickel Type LNG Storage Tank with Thermal Resistance Effects (열저항 효과를 고려한 $9\%$ 니켈강재식 LNG 저장탱크의 누설 안전성에 관한 연구)

  • Kim C.K.;Cho S.H.;Suh H.S.;Hong S.H.;Lee S.R.;Kim Y,G.;Kwon B.K.
    • Journal of the Korean Institute of Gas
    • /
    • v.9 no.1 s.26
    • /
    • pp.1-8
    • /
    • 2005
  • In this study, the FE analysis has been presented for the leakage safety of $9\%$ nickel type LNG storage tank based on the thermal resistance effects between insulation panels, comer protection and prestressed concrete(PC) structures. The FEM calculated results show that the leakage safety of fiber glass blanket, perlite powder and cellular glass insulators does not guarantee any more due to a strength failure of the insulation structure. But the corner protection and PC structure of outer tank may delay or sustain the leaked LNG of 10 days even though the inner tank and insulation structure are simultaneously failed. This means that $9\%$ nickel steel type LNG storage tank may be safe because of a high strength of the corner protection and outer tank structures.

  • PDF

A Study on Stability of Levee Revetment in Meandering Channel (만곡수로 내의 호안 안정성 연구)

  • Kim, Sooyoung;Yoon, Kwang Seok;Kim, Hyung-Jun
    • Journal of Korea Water Resources Association
    • /
    • v.48 no.12
    • /
    • pp.1077-1087
    • /
    • 2015
  • The levee protect lifes, houses, and properties by blocking overflow of river. The revetment is forced to be covered on the slope of levee in order to prevent erosion. The stability of revetment is very important enough to directly connected to the stability of levee. In this study, the weak points of revetment on meandering channel were found by movable revetment experiment and the velocity and the water surface elevation (WSE) were measured at main points. The 3-D numerical simulations were performed under same conditions with experiment. And unclear flow characteristics by the limit of measuring instruments were analyzed through numerical simulation. Consequently, the section of large wall shear stress and the failure section are almost the same. Despite of small wall shear stress, the revetments located at right bank were carried away because of circulation zone due to secondary flow by meandering. With existing riprap design formula, the sizes of riprap determined using maximum local velocity were 1.5~4.7 times greater than them using mean velocity. As a result of this study, it is necessary to calculate the size of riprap in other ways for meandering and straight channel. At a later study, if the weighted value considered the radius of curvature and shape of hydraulic structure is applied to riprap design formula, it is expected that the size of revetment was evaluated rationally and accurately.

Secure and Efficient V2V Message Authentication Scheme in Dense Vehicular Communication Networks (차량 밀집환경에서 안전하고 효율적인 V2V 메시지 인증기법)

  • Jung, Seock-Jae;Yoo, Young-Jun;Paik, Jung-Ha;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.41-52
    • /
    • 2010
  • Message authentication is an essential security element in vehicular ad-hoc network(VANET). For a secure message authentication, integrity, availability, privacy preserving skill, and also efficiency in various environment should be provided. RAISE scheme has been proposed to provide efficient message authentication in the environment crowded with lots of vehicles and generally considered to be hard to provide efficiency. However, as the number of vehicles communicating in the area increases, the overhead is also incurred in proportion to the number of vehicles so that it still needs to be reduced, and the scheme is vulnerable to some attacks. In this paper, to make up for the vulnerabilities in dense vehicular communication network, we propose a more secure and efficient scheme using a process that RSU(Road Side Unit) transmits the messages of neighbor vehicles at once with Bloom Filter, and timestamp to protect against replay attack. Moreover, by adding a handover function to the scheme, we simplify the authentication process as omitting the unnecessary key-exchange process when a vehicle moves to other area. And we confirm the safety and efficiency of the scheme by simulating the false positive probability and calculating the traffic.

A Key Pre-distribution Scheme Using Double Hash Chain for Strong Security Strength of Wireless Sensor Node (무선 센서 노드의 강한 보안 강도를 위해 이중 해쉬 체인을 적용한 키 사전 분배 기법)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.8C
    • /
    • pp.633-641
    • /
    • 2008
  • Since WSNs encounter attacks, such as jamming or eavesdropping without physical access occurs, security is one of the important requirements for WSNs. The key pre-distribution scheme that was recently researched for advance of security in WSNs distributes the keys and probability with the use of q-composite random key pre-distribution method, but there is a high probability that no key shared between sensor nodes, and it takes a lot of time and energy to find out the shared key. Therefore, it is not suitable for WSNs. In order to enhance stability of a node that plays a role of gateway without depending on probabilistic key, this paper proposesa key pre-distribution scheme combined with random key pre-distribution scheme and double hash chain. Since the proposed scheme can maintain a small storage place and strong security strengths, it is more efficient than the existing schemes with the same security strengths. In addition, since it uses a small size of key generation key set, it can reduce a great deal of storage overhead.

Structural Reinforcement Methods and Structural Safety Analysis for the Elevated Eaves Height 1-2W Type Plastic Greenhouse (측고를 높인 1-2W형 비닐하우스의 구조안전성 분석 및 구조보강 방법)

  • Ryu, Hee-Ryong;Yu, In-Ho;Cho, Myeong-Whan;Um, Yeong-Cheol
    • Journal of Bio-Environment Control
    • /
    • v.18 no.3
    • /
    • pp.192-199
    • /
    • 2009
  • This study was conducted to find proper structural reinforcement methods for the 4.5m-high (eaves height) 1-2W type plastic greenhouse. 3D finite element analysis was used to analyze the steel-tube structure. The 4.5m-high 1-2W type plastic greenhouse was modified by welding 1.5m-long steel-pipes into a 3.0m-tall columns of the standard 1-2W type plastic greenhouse. This remodeling method is widely used in Korea with farmer's discretion to increase the production when they grow paprika. But it is not based on the quantitative structural analysis. The proposed reinforcement methods were proved to stand against the design wind velocity of $40m{\cdot}s^{-1}$ and snow depth of 40cm. It strongly implies that the cross beam between side columns and wind resistance walls, and the lattice type cross beam should be good reinforcements to improve the structural safety of the elevated eaves height plastic greenhouse.

An Analysis of Vertical Position Accuracy for the Three-Dimensional Spatial Data Object Utilizing the Public Information (공공데이터를 활용한 3차원 공간정보 객체의 수직위치 정확도 분석)

  • Kim, Jeong Taek;Yi, Su Hyun;Kim, Jong Il;Bae, Sang Won
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.22 no.3
    • /
    • pp.137-143
    • /
    • 2014
  • Recently, as new paradigm for government operation called government 3.0, government is actively operating policy opening and sharing public data. In addition, the Ministry of Land are operating an open platform integrated map service (the VWorld) which provides a variety of video contents such as the country's national spatial information, traffic information and three-dimensional building for the public. According to W3C Foundation's Open Data Status Report(2013), our country has the evaluated results that the part of the government's policy support and planning is good while the part of the data management is vulnerable. So our country needs the quality improvement for the data management. In addition, a digital aerial photograph image data is required to be up-to-date for the three-dimensional spatial object data. In this paper, we present the method for enhancement of the accuracy of vertical position and for maintainment of up-to-date vertical position. Our methods evaluate the data quality and analyze the cause of error of measurement utilizing the national standard quality assessment method. The result of research shows that the accuracy of vertical position is improved if the height of the building captain is adjusted by the quality assessment values and a three-dimensional model has up-to-date data if reconstruction and extension information of construction register is utilized.

Characteristics Analysis of Mudstone Weathered Soils in the landslide Area using Statistical Technique (통계기법에 의한 산사태발생지역 이암 풍화토층의 토질특성 분석)

  • Hwang, Eui-Soon;Chung, Dae-Seouk;Kim, Kyeong-Su;Lee, Moon-Se;Song, Young-Suk
    • Journal of the Korean Geosynthetics Society
    • /
    • v.12 no.3
    • /
    • pp.31-41
    • /
    • 2013
  • In this study, the properties of mudstone weathered soils related to landslides were analyzed at the area of landslide induced by heavy rainfall in Pohang. The soil tests were carried out to the soils obtained from landslide and non landslide sites, and the soil properties were investigated. The correlation between soil properties and landslides were analyzed using statistical technique, and then the soil factors were extracted from the correlation analysis. The correlation equation which can calculate the coefficient of permeability influenced on landslides was proposed using the soil factors. As the result of analysis, the porosity and unit weight of soils from the landslide area is smaller than those of soils from the non landslide area. The soils with poor grain size distribution and loose unit weight are prone to landslides because the soils have a large void ratio and a low unit weight. The permeability of soils from the landslide area is larger than that of soils from the non landslide area. According to the result of correlation analysis, the effective grain size, the saturated unit weight and silt and clay contents are evaluated as the influence factors. These factors were considered to estimate the coefficient of permeability of mudstone weathered soils.

Control Method for the Number of Travel Hops for the ACK Packets in Selective Forwarding Detection Scheme (선택적 전달 공격 탐지기법에서의 인증 메시지 전달 홉 수 제어기법)

  • Lee, Sang-Jin;Kim, Jong-Hyun;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.2
    • /
    • pp.73-80
    • /
    • 2010
  • A wireless sensor network which is deployed in hostile environment can be easily compromised by attackers. The selective forwarding attack can jam the packet or drop a sensitive packet such as the movement of the enemy on data flow path through the compromised node. Xiao, Yu and Gao proposed the checkpoint-based multi-hop acknowledgement scheme(CHEMAS). In CHEMAS, each path node enable to be the checkpoint node according to the pre-defined probability and then can detect the area where the selective forwarding attacks is generated through the checkpoint nodes. In this scheme, the number of hops is very important because this parameter may trade off between energy conservation and detection capacity. In this paper, we used the fuzzy rule system to determine adaptive threshold value which is the number of hops for the ACK packets. In every period, the base station determines threshold value while using fuzzy logic. The energy level, the number of compromised node, and the distance to each node from base station are used to determine threshold value in fuzzy logic.

A Design of Authentication Mechanism for Secure Communication in Smart Factory Environments (스마트 팩토리 환경에서 안전한 통신을 위한 인증 메커니즘 설계)

  • Joong-oh Park
    • Journal of Industrial Convergence
    • /
    • v.22 no.4
    • /
    • pp.1-9
    • /
    • 2024
  • Smart factories represent production facilities where cutting-edge information and communication technologies are fused with manufacturing processes, reflecting rapid advancements and changes in the global manufacturing sector. They capitalize on the integration of robotics and automation, the Internet of Things (IoT), and the convergence of artificial intelligence technologies to maximize production efficiency in various manufacturing environments. However, the smart factory environment is prone to security threats and vulnerabilities due to various attack techniques. When security threats occur in smart factories, they can lead to financial losses, damage to corporate reputation, and even human casualties, necessitating an appropriate security response. Therefore, this paper proposes a security authentication mechanism for safe communication in the smart factory environment. The components of the proposed authentication mechanism include smart devices, an internal operation management system, an authentication system, and a cloud storage server. The smart device registration process, authentication procedure, and the detailed design of anomaly detection and update procedures were meticulously developed. And the safety of the proposed authentication mechanism was analyzed, and through performance analysis with existing authentication mechanisms, we confirmed an efficiency improvement of approximately 8%. Additionally, this paper presents directions for future research on lightweight protocols and security strategies for the application of the proposed technology, aiming to enhance security.