• Title/Summary/Keyword: 회피 공격

Search Result 91, Processing Time 0.022 seconds

The Pattern Analysis for Gameplay of RPG(Role-Play Game) Genre base on Smart-phone : Toward 'Blade for Kakao' (스마트폰 기반 RPG 장르의 게임플레이 패턴 분석 : '블레이드 for Kakao'를 중심으로)

  • Han, Sang-Geun;Song, Seung-Keun
    • Cartoon and Animation Studies
    • /
    • s.38
    • /
    • pp.237-258
    • /
    • 2015
  • This research aims to analyze gamer's behavior pattern on 'Blade for Kakao' RPG genre based on smart-phone. Three subjects were recruited using the concurrent protocol method to conduct ten episodes in region 1. As a result, it derived four behavior patterns according to the combination of space type affordance and the arrangement affordance of obstacle(monster). The result of this research revealed the forward attack arranged for the fixed obstacles in the wide space, the indirect attack as avoid-type arranged for scattered obstacles in the same space, the hunting up attack once arranged for the crowded obstacles in the same space, and the pulling attack arranged for obstacles in the narrow space. Moreover, it revealed the character growth and the optimization of attack method according to the attribute affordance of the obstacle(monster). This research expect to offer the design guideline for game level design to investigate the relationship between the game play and affordance in RPG genre based on smart-phone.

An analysis of the effectiveness for an anti-ARM technique using decoy antennas (디코이 안테나를 이용한 ARM 방어 기술의 효과도 분석)

  • Lim, Joong-Soo;Chae, Gyoo-Soo;Kim, Min-Nyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.2
    • /
    • pp.491-496
    • /
    • 2010
  • This paper describes an analysis of the effectiveness for an anti-ARM technique to protect a radar system. We investigate the optimum deployment of decoy antennas which are widely using for anti-ARM and the electromagnetic field at the ARM receiver. To verify the effect of decoy antennas, we analyze the field intensity and phase at the receiver and develop a numerical simulation program using Matlab. We conduct an analysis of ARM attack in case of using multiple decoy antennas and these results can be used to decide the optimum positions of the decoys for anti-ARM.

The Effects of Adolescent's Big-Five Personality Factors, Self-Esteem and Self-Monitoring on Their Conflict Resolution Management Style (갈등관리스타일에 영향을 미치는 퍼스낼리티 요인: 성격 5요인(Big Five Factors), 자아존중감, 자기감시를 중심으로)

  • Jang, Hae-Soon;Han, Ju-Lie;Hur, Gyeong-Ho
    • Korean journal of communication and information
    • /
    • v.37
    • /
    • pp.418-451
    • /
    • 2007
  • The current study examined the relationships between the adolescent's conflict resolution style and Big-Five personality factors, self-monitoring and self-esteem. Firstly, results showed that adolescent's big-five personality model affects their conflict resolution styles with their friends and peer group. In detail, the higher the neuroticism was, the stronger became the attack and avoidance strategies. The higher the extraversion was, the higher became the collaborative strategy and the lower became the attack and avoidance strategies. The higher the agreeableness was, the higher became the collaborative strategy and the lower became the attack strategy. The higher the conscientiousness was, the higher became the collaborative strategy and the lower became the avoidance strategy. The higher the openness to experience was, the higher became the collaborative strategy and the lower became the avoidance strategy. The higher the self-esteem was, the higher became the collaborative strategy and the lower became the avoidance and attack strategies. The higher the self-monitoring was, the higher became the collaborative strategy and the lower became the avoidance strategy. Secondly, the big-five personality factors also affected the adolescent's conflict resolution styles. The extraversion, conscientiousness, and agreeableness positively affected the collaborative strategy. The neuroticism was positively related with the attack strategy, whereas agreeableness was negatively affected the attack strategy. The neuroticism and agreeableness were positively related with the avoidance strategy, whereas the extraversion was negatively affected the avoidance strategy. Limitations and suggestions for future study were discussed thereafter.

  • PDF

A Study on Effective Adversarial Attack Creation for Robustness Improvement of AI Models (AI 모델의 Robustness 향상을 위한 효율적인 Adversarial Attack 생성 방안 연구)

  • Si-on Jeong;Tae-hyun Han;Seung-bum Lim;Tae-jin Lee
    • Journal of Internet Computing and Services
    • /
    • v.24 no.4
    • /
    • pp.25-36
    • /
    • 2023
  • Today, as AI (Artificial Intelligence) technology is introduced in various fields, including security, the development of technology is accelerating. However, with the development of AI technology, attack techniques that cleverly bypass malicious behavior detection are also developing. In the classification process of AI models, an Adversarial attack has emerged that induces misclassification and a decrease in reliability through fine adjustment of input values. The attacks that will appear in the future are not new attacks created by an attacker but rather a method of avoiding the detection system by slightly modifying existing attacks, such as Adversarial attacks. Developing a robust model that can respond to these malware variants is necessary. In this paper, we propose two methods of generating Adversarial attacks as efficient Adversarial attack generation techniques for improving Robustness in AI models. The proposed technique is the XAI-based attack technique using the XAI technique and the Reference based attack through the model's decision boundary search. After that, a classification model was constructed through a malicious code dataset to compare performance with the PGD attack, one of the existing Adversarial attacks. In terms of generation speed, XAI-based attack, and reference-based attack take 0.35 seconds and 0.47 seconds, respectively, compared to the existing PGD attack, which takes 20 minutes, showing a very high speed, especially in the case of reference-based attack, 97.7%, which is higher than the existing PGD attack's generation rate of 75.5%. Therefore, the proposed technique enables more efficient Adversarial attacks and is expected to contribute to research to build a robust AI model in the future.

The Effect of Coping Strategies on the Outcome of Stressful Life Events and Mental Health (삶의 사건에 대한 대응양식이 문제해결과 정신건강에 미치는 영향)

  • Lee, In-Jeong
    • Korean Journal of Social Welfare
    • /
    • v.36
    • /
    • pp.285-307
    • /
    • 1998
  • This study explored three issues in regard to the relationship among stressful life events, coping, successful outcomes, life satisfaction and depression. The first issue was about the differences in the level of use among eight coping strategies according to the type of stressful life events. The second issue dealt with the differences between those who achieved successful outcomes and those who did not in the use of coping strategies. The third issue was if the different use of coping strategies was related to the level of life satisfaction and depression. Stressful life events were divided into problems of four areas such as health, finance, family relations including well-being of family members, and work Coping was assessed by eight factors. The survey data collected from 221 community residing adults was used for analyses. Findings suggested that the level of the use of escape-avoidance was very low while the level of the use of planful problem solving, seeking positive meaning, self control, and accepting responsibility was high for all stressful life events. It was also found that in some stressful life events those who achieved successful outcomes used more planful problem solving, more seeking positive meaning and less escape-avoidance than those who did not achieve successful outcomes. Finally, for almost all of the stressful life events, the use of more planful problem solving was related to either higher level of life-satisfaction or lower level of depression while the use of more escape-avoidance was related to lower level of life-satisfaction and higher level of depression. According to the results, implication for social work intervention was discussed.

  • PDF

Study of Conversions Security Management System, Co-Relation Rule-Set scenario and architecture for incidence detection (융합보안관제환경을 위한 아키텍처 구축 및 활용 방안에 대한 연구)

  • Hwang, Donguk;Lee, Sanghun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.353-371
    • /
    • 2014
  • We already have seen many studies and articles about the methodology responding the security risks and threats. But we still have some controversial subjects to be settled. Now, we are living in the era that we should focus on how to use the security systems instead of how to make it. In this point of view, a company need to find out the answer for these questions, which security risks have to be handled in a corporate, which system is better for responding the security threats, and how we can build necessary security architecture in case of developing systems. In this article, we'd like to study on-site scenarios threatening the corporate assets, the limit on dealing with these threats, and how to consolidate the security events and information from enormous assets. Also, we'd like to search for the direction form the actual cases which have shown the desired effect from converging the assets and network informations.

Effectiveness Analysis for Survival Probability of a Surface Warship Considering Static and Mobile Decoys (부유식 및 자항식 기만기의 혼합 운용을 고려한 수상함의 생존율에 대한 효과도 분석)

  • Shin, MyoungIn;Cho, Hyunjin;Lee, Jinho;Lim, Jun-Seok;Lee, Seokjin;Kim, Wan-Jin;Kim, Woo Shik;Hong, Wooyoung
    • Journal of the Korea Society for Simulation
    • /
    • v.25 no.3
    • /
    • pp.53-63
    • /
    • 2016
  • We consider simulation study combining static and mobile decoys for survivability of a surface warship against torpedo attack. It is assumed that an enemy torpedo is a passive acoustic homing torpedo and detects a target within its maximum target detection range and search beam angle by computing signal excess via passive sonar equation, and a warship conducts an evasive maneuvering with deploying static and mobile decoys simultaneously to counteract a torpedo attack. Suggesting the four different decoy deployment plans to achieve the best plan, we analyze an effectiveness for a warship's survival probability through Monte Carlo simulation, given a certain experimental environment. Furthermore, changing the speed and the source level of decoys, the maximum torpedo detection range of warship, and the maximum target detection range of torpedo, we observe the corresponding survival probabilities, which can provide the operational capabilities of an underwater defense system.

Polymorphic Wonn Detection Using A Fast Static Analysis Approach (고속 정적 분석 방법을 이용한 폴리모픽 웹 탐지)

  • Oh, Jin-Tae;Kim, Dae-Won;Kim, Ik-Kyun;Jang, Jong-Soo;Jeon, Yong-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.4
    • /
    • pp.29-39
    • /
    • 2009
  • In order to respond against worms which are malicious programs automatically spreading across communication networks, worm detection approach by generating signatures resulting from analyzing worm-related packets is being mostly used. However, to avoid such signature-based detection techniques, usage of exploits employing mutated polymorphic types are becoming more prevalent. In this paper, we propose a novel static analysis approach for detecting the decryption routine of polymorphic exploit code, Our approach detects a code routine for performing the decryption of the encrypted original code which are contained with the polymorphic exploit code within the network flows. The experiment results show that our approach can detect polymorphic exploit codes in which the static analysis resistant techniques are used. It is also revealed that our approach is more efficient than the emulation-based approach in the processing performance.

Detecting Collaborative Privacy Information Leaks on Android Applications (안드로이드 애플리케이션의 협력적인 개인 정보 유출 탐지)

  • Jeon, Cheol;Cho, Yoo-Kun;Hong, Ji-Man
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06a
    • /
    • pp.92-94
    • /
    • 2012
  • 안드로이드 운영체제는 애플리케이션들이 서로의 코드와 데이터를 공유할 수 있도록 애플리케이션 컴포넌트간의 통신을 지원한다. 또한 보안을 위해 컴포넌트간의 통신을 엄격하게 제어하기 위한 퍼미션을 제공한다. 하지만 개발자의 보안의식 부재에 따른 퍼미션의 잘못된 사용은 애플리케이션 컴포넌트를 노출시켜 검증되지 않은 애플리케이션이 코드와 데이터에 접근할 수 있게 만드는 문제를 야기할 수 있다. 특히, 노출된 컨텐트 프로바이더(content provider)는 악성 애플리케이션이 기존 탐지 툴을 회피하여 개인정보를 임시로 보관하는 저장소로 악용될 수 있다. 따라서 하나의 애플리케이션만을 분석하는 기존 탐지 툴로는 이와 같이 협력적으로 동작하는 악성 애플리케이션을 탐지 할 수 없다. 본 논문에서는 노출된 컨텐트 프로바이더를 이용한 협력적 개인정보 유출 공격 시나리오를 제시하고 이를 탐지하기 위한 기법을 제안한다. 제안한 기법을 토대로 만든 탐지 툴 사용해 총 189개의 안드로이드 애플리케이션을 분석하였고 그 결과로 컨텐트 프로바이더를 노출시킨 32개의 애플리케이션과 개인정보를 유출할 가능성이 있는 애플리케이션 4개를 탐지하였다.

Computer Game Immersion and Children's Psychosocial/Behavioral Characteristics (아동의 컴퓨터게임 몰두성향과 심리사회 및 행동적 특성에 관한 연구)

  • Song, Suk-Ja;Sim, Hee-og
    • Korean Journal of Child Studies
    • /
    • v.24 no.5
    • /
    • pp.27-41
    • /
    • 2003
  • Data for this study on computer game immersion were collected from 538 1st through 6th grade students with the use of questionnaires. Instruments included the computer immersion scale, and the self-concept, social avoidance and anxiety, aggression, and impulsiveness scales. Results showed that boys were more involved in computer games than girls, and 6th graders were more immersed than 1st through 5th graders. Self-concept, social anxiety, aggression, and impulsivity differed by degree of computer game immersion. Aggression was the most powerful explanation of computer game immersion. Children higher in impulsivity and social anxiety were more involved in computer games. Children higher in self-concept were less involved in computer games.

  • PDF