• Title/Summary/Keyword: Adversary

Search Result 185, Processing Time 0.028 seconds

Probability Adjustment Scheme for the Dynamic Filtering in Wireless Sensor Networks Using Fuzzy Logic (무선 센서 네트워크에서 동적 여과를 위한 퍼지 기반 확률 조절 기법)

  • Han, Man-Ho;Lee, Hae-Young;Cho, Tae-Ho
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.159-162
    • /
    • 2008
  • Generally, sensor nodes can be easily compromised and seized by an adversary because sensor nodes are hostile environments after dissemination. An adversary may be various security attacks into the networks using compromised node. False data injection attack using compromised node, it may not only cause false alarms, but also the depletion of the severe amount of energy waste. Dynamic en-route scheme for Filtering False Data Injection (DEF) can detect and drop such forged report during the forwarding process. In this scheme, each forwarding nodes verify reports using a regular probability. In this paper, we propose verification probability adjustment scheme of forwarding nodes though a fuzzy rule-base system for the Dynamic en-route filtering scheme for Filtering False Data Injection in sensor networks. Verification probability determination of forwarding nodes use false traffic rate and distance form source to base station.

  • PDF

Approximation Algorithms for Scheduling Parallel Jobs with More Machines

  • Kim, Jae-Hoon
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.4
    • /
    • pp.471-474
    • /
    • 2011
  • In parallel job scheduling, each job can be executed simultaneously on multiple machines at a time. Thus in the input instance, a job $J_i$ requires the number $m_i$ of machines on which it shall be processed. The algorithm should determine not only the execution order of jobs but also the machines on which the jobs are executed. In this paper, when the jobs have deadlines, the problem is to maximize the total work of jobs which is completed by their deadlines. The problem is known to be strongly NP-hard [5] and we investigate the approximation algorithms for the problem. We consider a model in which the algorithm can have more machines than the adversary. With this advantage, the problem is how good solution the algorithm can produce against the optimal algorithm.

Instrumental Measurements of Hand Attributes on Microfiber Polyester/Cotton Blend Fabric Finished with Silicone Mixed Fluorochemical

  • Ahn, Young-Moo
    • Journal of Fashion Business
    • /
    • v.10 no.6
    • /
    • pp.16-27
    • /
    • 2006
  • The purpose of this study was to examine the effects of chemical finishes on performance characteristics of microfiber blend fabrics. A 60% polyester microfiber /40% cotton blend woven fabric was finished by ten chemicals: three silicone softeners, one fluorochemical, and their mixtures. Performance characteristics examined were fabric hand attributes. Fabric hand was evaluated by instrumental measures using Kawabata KES-F system instruments. Silicone-only finishes did not change the bending properties significantly from those of the control fabric. The fluorochemical-only finish made the fabric stiffer and crisper. When the two chemicals were mixed they tended to offset this adversary effect. Most of the chemical finishes made the surface finer and smoother. Fluorochemical-only finish improved fabric strength. Likewise, dimethylpolysiloxane silicone improved fabric strength. Amino-functional hydrophilic and diamino-functional silicone softeners, on the other hand, reduced fabric strength. However, when mixed with the fluorochemical, the adversary effect was diminished.

A Cache Privacy Protection Mechanism based on Dynamic Address Mapping in Named Data Networking

  • Zhu, Yi;Kang, Haohao;Huang, Ruhui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.6123-6138
    • /
    • 2018
  • Named data networking (NDN) is a new network architecture designed for next generation Internet. Router-side content caching is one of the key features in NDN, which can reduce redundant transmission, accelerate content distribution and alleviate congestion. However, several security problems are introduced as well. One important security risk is cache privacy leakage. By measuring the content retrieve time, adversary can infer its neighbor users' hobby for privacy content. Focusing on this problem, we propose a cache privacy protection mechanism (named as CPPM-DAM) to identify legitimate user and adversary using Bloom filter. An optimization for storage cost is further provided to make this mechanism more practical. The simulation results of ndnSIM show that CPPM-DAM can effectively protect cache privacy.

Security analysis on the Gu-Xue improved secret handshakes scheme (Gu-Xue의 개선된 Secret Handshake 기법의 안전성 분석)

  • Youn, Taek-Young;Park, Young-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.655-658
    • /
    • 2012
  • Recently, Gu and Xue proposed an improved secret handshakes scheme with unlinkability by modifying the Huang-Cao scheme. Their proposal not only solves security weakness in the Huang-Cao scheme but also is more efficient than previously proposed secret handshakes schemes. In this letter, we examine the correctness of Gu and Xue's security requirements and show that the adversary model is not correctly defined. We also show that the Gu-Xue scheme is not secure against the attacks under correctly defined adversary model.

XML-based Windows Event Log Forensic tool design and implementation (XML기반 Windows Event Log Forensic 도구 설계 및 구현)

  • Kim, Jongmin;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.27-32
    • /
    • 2020
  • The Windows Event Log is a Log that defines the overall behavior of the system, and these files contain data that can detect various user behaviors and signs of anomalies. However, since the Event Log is generated for each action, it takes a considerable amount of time to analyze the log. Therefore, in this study, we designed and implemented an XML-based Event Log analysis tool based on the main Event Log list of "Spotting the Adversary with Windows Event Log Monitoring" presented at the NSA.

When Diplomats Go MAD: How the Crisis Framing of Ministries of Foreign Affairs Results in Mutually Assured Delegitimization

  • Manor, Ilan
    • Journal of Public Diplomacy
    • /
    • v.1 no.2
    • /
    • pp.75-116
    • /
    • 2021
  • This study argues that scholars lack an adequate conceptualization of the strategic use of social media framing by Ministries of Foreign Affairs (MFAs) during crises. As a theoretical starting point, this article employs the concept of soft disempowerment to suggest that MFAs may use online framing to limit an adversary's range of possible actions during a crisis by depicting that adversary as violating norms and values deemed desirable by the international community. Next, the article introduces the concept of mutually assured delegitimization (MAD), which suggests that actors may call into question one another's adherence with certain norms and values during crises, which results in the mutual depletion of soft power resources. Importantly, this article proposes a novel, methodological approach for the analysis of individual tweets during crises. To illustrate its methodological and conceptual innovations, the study analyzes tweets published by the MFAs of the United States (US) and Russia during the Crimea crisis and demonstrates that both MFAs used Twitter to negatively frame each other by calling their morals into question, which resulted in MAD.

Generation of security system defense strategies based on evolutionary game theory

  • Bowen Zou;Yongdong Wang;Chunqiang Liu;Mingguang Dai;Qianwen Du;Xiang Zhu
    • Nuclear Engineering and Technology
    • /
    • v.56 no.9
    • /
    • pp.3463-3471
    • /
    • 2024
  • The physical protection systems of Nuclear Power Plant are utilized to safeguard targets against intrude by attacker. As the methods employed by attackers to intrude Nuclear Power Plant become increasingly complex and diverse, there is an urgent need to identify optimal defense strategies to interrupt adversary intrusions. This paper focuses on studying the defense of security personnel against adversary intrusions and utilizes an evolutionary game approach to select the optimal defense decisions for physical protection systems. Under the assumption of bounded rationality for both the attacker and defender, the paper constructs replication dynamic equations for attack and defense strategies, investigating the process of strategy selection and the stability of evolution. Finally, a minimal model is proposed to validate the feasibility of utilizing the evolutionary game model for defense strategy selection.

New Secure Network Coding Scheme with Low Complexity (낮은 복잡도의 보안 네트워크 부호화)

  • Kim, Young-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.4
    • /
    • pp.295-302
    • /
    • 2013
  • In the network coding, throughput can be increased by allowing the transformation of the received data at the intermediate nodes. However, the adversary can obtain more information at the intermediate nodes and make troubles for decoding of transmitted data at the sink nodes by modifying transmitted data at the compromised nodes. In order to resist the adversary activities, various information theoretic or cryptographic secure network coding schemes are proposed. Recently, a secure network coding based on the cryptographic hash function can be used at the random network coding. However, because of the computational resource requirement for cryptographic hash functions, networks with limited computational resources such as sensor nodes have difficulties to use the cryptographic solution. In this paper, we propose a new secure network coding scheme which uses linear transformations and table lookup and safely transmits n-1 packets at the random network coding under the assumption that the adversary can eavesdrop at most n-1 nodes. It is shown that the proposed scheme is an all-or-nothing transform (AONT) and weakly secure network coding in the information theory.

Physical protection system vulnerability assessment of a small nuclear research reactor due to TNT-shaped charge impact on its reinforced concrete wall

  • Moo, Jee Hoon;Chirayath, Sunil S.;Cho, Sung Gook
    • Nuclear Engineering and Technology
    • /
    • v.54 no.6
    • /
    • pp.2135-2146
    • /
    • 2022
  • A nuclear energy facility is one of the most critical facilities to be safely protected during and after operation because the physical destruction of its barriers by an external attack could release radioactivity into the environment and can cause harmful effects. The barrier walls of nuclear energy facilities should be sufficiently robust to protect essential facilities from external attack or sabotage. Physical protection system (PPS) vulnerability assessment of a typical small nuclear research reactor was carried out by simulating an external attack with a tri-nitro toluene (TNT) shaped charge and results are presented. The reinforced concrete (RC) barrier wall of the research reactor located at a distance of 50 m from a TNT-shaped charge was the target of external attack. For the purpose of the impact assessment of the RC barrier wall, a finite element method (FEM) is utilized to simulate the destruction condition. The study results showed that a hole-size of diameter 342 mm at the front side and 364 mm at the back side was created on the RC barrier wall as a result of a 143.35 kg TNT-shaped charge. This aperture would be large enough to let at least one person can pass through at a time. For the purpose of the PPS vulnerability assessment, an Estimate of Adversary Sequence Interruption (EASI) model was used, which enabled the determination of most vulnerable path to the target with a probability of interruption equal to 0.43. The study showed that the RC barrier wall is vulnerable to a TNT-shaped charge impact, which could in turn reduce the effectiveness of the PPS.