• Title/Summary/Keyword: ATTACK AREA

Search Result 348, Processing Time 0.037 seconds

Definition of aggressive response scale through quantitative evaluation of cyber attack (사이버공격의 정량적 피해평가를 통한 공세적 대응규모 산정)

  • Hong, Byoungjin;Lim, Jaesung;Kim, Wanju;Cho, Jaemyoung
    • Convergence Security Journal
    • /
    • v.17 no.4
    • /
    • pp.17-29
    • /
    • 2017
  • Various cyber attacks against our society and the government are continuing, and cases and damages are reported from time to time. And the area of cyber attack is not limited to cyberspace, but it is expanding into physical domain and affecting it. In the military arena, we have established and implemented the principle of responding proportionally to enemy physical attacks. This proportionality principle is also required in the version where the region is expanding. In order to apply it, it is necessary to have a quantitative and qualitative countermeasure against cyber attack. However, due to the nature of cyber attacks, it is not easy to assess the damage accurately and it is difficult to respond to the proportionality principle and the proportional nature. In this study, we calculated the damage scale by quantitatively and qualitatively evaluating the cyber attack damage using the Gorden-Lobe model and the security scoring technique based on the scenario. It is expected that the calculated results will be provided as appropriate level and criterion to counteract cyber attack.

Analyzing of connected car vulnerability and Design of Security System (커네티트 카의 취약점 분석 및 보안 시스템 설계)

  • Kim, Tae-Hyoung;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.241-243
    • /
    • 2016
  • In the Past, Trend of car security was Physical Something like doorlock system, and The Generation did not have skills connecting External devices. Through Car Development is up, that trend of car security Changed Physical Security to Intelligence Security. This Changes give a chance to hackers to attack this system. This System use CAN(Controller Area Network) Protocol which have three vulnerabilities. First, ID Spoofing, Twice, D - Dos Attack, Third, Android Application Injected Modern cars have many ECU(Electronic Control Unit) to control devices like Engine ON/OFF, Door Lock Handling, and Controlling Handle. Because CAN Protocol spread signal using broadcast, Hackers can get the signal very easily, and Those often use Mobile devices like Android or IOS to attack this system. if bluetooth signal is spread wide, hackers get the signal, and analysis the bluetooth data, so then They makes certain data to attack ECU, they send the data to ECU, and control ECU installed car. so I suggest that I will prevent this attack to make Auth system and prevent this attack in end of Android.

  • PDF

Multiple ASR for efficient defense against brute force attacks (무차별 공격에 효과적인 다중 Address Space Randomization 방어 기법)

  • Park, Soo-Hyun;Kim, Sun-Il
    • The KIPS Transactions:PartC
    • /
    • v.18C no.2
    • /
    • pp.89-96
    • /
    • 2011
  • ASR is an excellent program security technique that protects various data memory areas without run-time overhead. ASR hides the addresses of variables from attackers by reordering variables within a data memory area; however, it can be broken by brute force attacks because of a limited data memory space. In this paper, we propose Multiple ASR to overcome the limitation of previous ASR approaches. Multiple ASR separates a data memory area into original and duplicated areas, and compares variables in each memory area to detect an attack. In original and duplicated data memory areas variables are arranged in the opposite order. This makes it impossible to overwrite the same variables in the different data areas in a single attack. Although programs with Multiple ASR show a relatively high run-time overhead due to duplicated execution, programs with many I/O operations such as web servers, a favorite attack target, show 40~50% overhead. In this paper we develop and test a tool that transforms a program into one with Multiple ASR applied.

A Study on the Medical Accident Attack Rate in a Korean rural Area through the Sam Wha Medicare Insurance Union (충남 서산군 삼화의료보험조합을 통해본 일부 농촌지역 주민의 의료사고 발생율 및 진료수혜 실태 조사)

  • Ahn, Moon-Young;Lee, Jung-Ja;Nam, Taik-Sung
    • Journal of agricultural medicine and community health
    • /
    • v.6 no.1
    • /
    • pp.33-41
    • /
    • 1981
  • To investigate the status of medical accident attack rate and medicare utilization during last 27months from 1st Oct., 1977 to 31st Dec. 1979 in the area under Sam Wha Medicare Insurance Union, the study was carried out through analyzing the medicare records of patients who were enrolled. "The medical accident" in this study was used as the meaning of the state that the people who have been treated morbid condition with insurance money. For the study, 2 doctors and one nurse were mobilized and the results are as follows: 1) The total number of the Medicare Insurance Union members among the 37,044 total population of the study area, (Hea-mi, Unsan, Eumam Myun) were 57, 35 composed of 3,000 males (52.3%) and 27, 35 females (47.7%) in 1977, 3,383 composed of 2,006 males (59.3%) 1,377 females (40.7%) in 1978, 2,573 composed of 1,437 males and 1,336 females (44.2%) in 1979. 2) Total number of medical accident attack cases were 6,774 case (partially overlapped the number of the 1977 with that of the 1978) and average annual medical accident attack rate per 1,000 population was 700.9. 3) Five major disease group in the past three years were disease of the respiratory system (177.7), disease of the digestive system (165.8), disease of the skin and subcutaneous(64.9), symptoms, signs and ill-defined conditions (64.6), any injury and poisoning (51.9). Mental disorders (32.6) was the 6th order disease group. 4) The order of the medical accident attack rate of age group per 1,000 population per year was the year group of 0~4(877.8), 45~64(832.6), 25~44(810.3), 5~14(495.1) 15~24(494.7) 65 and over (460.7). 5) Medical accident attack rate of age group per 1,000 population in the 5 major disease groups were the year group of 45~64 (100.0) in the mental disorders 0~4(525.1) in the disease of the respiratory system 45~64 (328.5) in the disease of the digestive system 0~4 (202.8) in the disease of the skin and subcutanous tissue, 25~44 (98.3) in the accidents and poisoning. 6) Monthly medical accidents attack rate were 87.0 in the winter (Dsc., Jan., Feb.) and 86.2 in the summer (Jun., July, Aug.). So the trend of the medical accidents attack rate during the year was bimount figure. 7) Monthly medical accidents attack rate in the major disease group were highest in Jan., Apr., (31.1) in the disease of the respiratory system, in Jan., Feb., Mar. (24.9) in the disease of the digestive system, in Jan., Jun., Aug. (9.8) in the injury and poisoning. 8) Duration of the treatment of the 93.1% of the total cases were within 5 days. 9) 299 cases (4.5%) of the total number of cases, 6,587 cases were referred to secondary and tertiary medicare facilities. 10) The order of the major 10 kinds of diagnosis of the disease, 6,587 cases during 27 months, were URI and chillness (1,063 cases, 16.1%), gastritis(830 cases, 12. 6%) dermatitis(360 cases, 5.5%), bronchitis(291 cases, 4.4%), neurosis (284 cases, 4.3%), contusion (165 cases, 2.5%), tooth extraction (157 cases, 2.4%), tonsillitis (109 cases, 0.7%), laceration (107 cases, 1.6%), neuralgia (105 cases, 1.6%), arthritis (104 cases, 1.6%), otitis media and mastoiditis (103 cases, 1.6%), so total case were 3,678 cases (55.9%).

  • PDF

A Study on the Effect of Format String on Secure Programming in C Language (C언어에서 포맷 스트링이 프로그램 보안에 미치는 영향)

  • Lee, Hyung-Bong;Cha, Hong-Jun;Choi, Hyung-Jin
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.693-702
    • /
    • 2001
  • One of the major characteristics of C language is that it allows us to use pointer type variables to access any area of virtual address space. So, we can read/write/execute from/to virtual memory area not controlled delicately by operating system. We can access such memory area by using format string and it can be a vulnerability of C language from the point of secure programming. In this paper, we analyze in detail the process of security attack based on format string and then exploit a new virus style attack which is stepwise and durable with some actual scenarios to warn the severity of it, and grope for some preliminary responding actions.

  • PDF

A Experimental Study on the Seawater Attack Resistance of Grouting Mixtures (내해수성 주입재 배합에 관한 실험적 연구)

  • Chun, Byungsik;Choi, Dongchan;Kim, Younghun;Kim, Jinchun
    • Journal of the Korean GEO-environmental Society
    • /
    • v.11 no.1
    • /
    • pp.53-59
    • /
    • 2010
  • In seawater deposition condition, the corrosion and chemical attack of grouts are similar to those of concrete structure. Used in domestic MSG (Micro Silica Grouting) mixtured large amounts of silicate materials containing as cement powder is $8,000cm^2/g$ of the specific surface area or more due to the high hydration activity and high-strength, high durability, and features, $C_3A$ content of less than 5% to meet the standards chemical attack of seawater was evaluated as a cement material. Therefore, in this paper, with excellent seawater attack resistant MSG in combination with rapid hardening mineral was used, those of seawater characteristics were evaluated experimentally. Typically, sodium-silicate minerals or rapid hardening cements are used in domestic. About the homogel specimens with combination of MSG and rapid hardening agents for compressive strength, weight and length change characteristics were evaluated experimentally, and so we could present the excellent seawater resistant grouts combination.

Study on Neuron Activities for Adversarial Examples in Convolutional Neural Network Model by Population Sparseness Index (개체군 희소성 인덱스에 의한 컨벌루션 신경망 모델의 적대적 예제에 대한 뉴런 활동에 관한 연구)

  • Youngseok Lee
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.16 no.1
    • /
    • pp.1-7
    • /
    • 2023
  • Convolutional neural networks have already been applied to various fields beyond human visual processing capabilities in the image processing area. However, they are exposed to a severe risk of deteriorating model performance due to the appearance of adversarial attacks. In addition, defense technology to respond to adversarial attacks is effective against the attack but is vulnerable to other types of attacks. Therefore, to respond to an adversarial attack, it is necessary to analyze how the performance of the adversarial attack deteriorates through the process inside the convolutional neural network. In this study, the adversarial attack of the Alexnet and VGG11 models was analyzed using the population sparseness index, a measure of neuronal activity in neurophysiology. Through the research, it was observed in each layer that the population sparsity index for adversarial examples showed differences from that of benign examples.

Hardware Implementation of Optical Fault Injection Attack-resistant Montgomery exponentiation-based RSA (광학 오류 주입 공격에 강인한 몽고메리 지수승 기반 RSA 하드웨어 구현)

  • Lee, Dong-Geon;Choi, Yong-Je;Choi, Doo-Ho;Kim, Minho;Kim, Howon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.1
    • /
    • pp.76-89
    • /
    • 2013
  • In this paper, we propose a novel optical fault detection scheme for RSA hardware based on Montgomery exponentiation, which can effectively detect optical fault injection during the exponent calculation. To protect the RSA hardware from the optical fault injection attack, we implemented integrity check logic for memory and optical fault detection logic for Montgomery-based multiplier. The proposed scheme is considered to be safe from various type of attack and it can be implemented with no additional operation time and small area overhead which is less than 3%.

The nose-up effect in twin-box bridge deck flutter: Experimental observations and theoretical model

  • Ronne, Maja;Larsen, Allan;Walther, Jens H.
    • Wind and Structures
    • /
    • v.32 no.4
    • /
    • pp.293-308
    • /
    • 2021
  • For the past three decades a significant amount of research has been conducted on bridge flutter. Wind tunnel tests for a 2000 m class twin-box suspension bridge have revealed that a twin-box deck carrying 4 m tall 50% open area ratio wind screens at the deck edges achieved higher critical wind speeds for onset of flutter than a similar deck without wind screens. A result at odds with the well-known behavior for the mono-box deck. The wind tunnel tests also revealed that the critical flutter wind speed increased if the bridge deck assumed a nose-up twist relative to horizontal when exposed to high wind speeds - a phenomenon termed the "nose-up" effect. Static wind tunnel tests of this twin-box cross section revealed a positive moment coefficient at 0° angle of attack as well as a positive moment slope, ensuring that the elastically supported deck would always meet the mean wind flow at ever increasing mean angles of attack for increasing wind speeds. The aerodynamic action of the wind screens on the twin-box bridge girder is believed to create the observed nose-up aerodynamic moment at 0° angle of attack. The present paper reviews the findings of the wind tunnel tests with a view to gain physical insight into the "nose-up" effect and to establish a theoretical model based on numerical simulations allowing flutter predictions for the twin-box bridge girder.

Data Preprocessing Method for Lightweight Automotive Intrusion Detection System (차량용 경량화 침입 탐지 시스템을 위한 데이터 전처리 기법)

  • Sangmin Park;Hyungchul Im;Seongsoo Lee
    • Journal of IKEEE
    • /
    • v.27 no.4
    • /
    • pp.531-536
    • /
    • 2023
  • This paper proposes a sliding window method with frame feature insertion for immediate attack detection on in-vehicle networks. This method guarantees real-time attack detection by labeling based on the attack status of the current frame. Experiments show that the proposed method improves detection performance by giving more weight to the current frame in CNN computation. The proposed model was designed based on a lightweight LeNet-5 architecture and it achieves 100% detection for DoS attacks. Additionally, by comparing the complexity with conventional models, the proposed model has been proven to be more suitable for resource-constrained devices like ECUs.