• Title/Summary/Keyword: Attack

Search Result 6,391, Processing Time 0.04 seconds

A Study on Improvement of Submarine Attack Periscope Operation Performance using Installing Protector on Sail (잠수함 공격잠망경 함교 보호구조물 설치를 통한 장비 운용성능 향상에 관한 연구)

  • Choi, Woo-Seok;Chang, Ho-Seong;Lee, Young-Suk;Kim, Sang-Il
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.5
    • /
    • pp.199-206
    • /
    • 2021
  • This paper describes the feasibility and reliability verification of installing a protective structure to protect attack periscopes. The attack periscope is the critical equipment of a submarine to enable the user to monitor surface and air activity, collect navigational data, and detect and identify targets. The attack periscope provides target information acquired through TV, IR camera, and laser range finder to the combat system. In the product improvement program, the upper part of the masts was exposed to the outside of the sail because the existing attack periscope was replaced with a new one. On the other hand, the head sensor can be damaged by floating objects, such as fishing nets, during sea navigation. Therefore, the installation of a protective structure for an attack periscope improved the equipment operation performance. The feasibility and reliability of the installation of the protective structure were verified by examining the influence of URN.

Quantum Cryptanalysis for DES Through Attack Cost Estimation of Grover's Algorithm (Grover 알고리즘 공격 비용 추정을 통한 DES에 대한 양자 암호 분석)

  • Jang, Kyung-bae;Kim, Hyun-Ji;Song, Gyeong-Ju;Sim, Min-Ju;Woo, Eum-Si;Seo, Hwa-Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1149-1156
    • /
    • 2021
  • The Grover algorithm, which accelerates the brute force attack, is applicable to key recovery of symmetric key cryptography, and NIST uses the Grover attack cost for symmetric key cryptography to estimate the post-quantum security strength. In this paper, we estimate the attack cost of Grover's algorithm by implementing DES as a quantum circuit. NIST estimates the post-quantum security strength based on the attack cost of AES for symmetric key cryptography using 128, 192, and 256-bit keys. The estimated attack cost for DES can be analyzed to see how resistant DES is to attacks from quantum computers. Currently, since there is no post-quantum security index for symmetric key ciphers using 64-bit keys, the Grover attack cost for DES using 64-bit keys estimated in this paper can be used as a standard. ProjectQ, a quantum programming tool, was used to analyze the suitability and attack cost of the quantum circuit implementation of the proposed DES.

Analysis and Improved Solution of Hussian et al.'s Authentication Protocol for Digital Rights Management

  • Mi-Og Park
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.5
    • /
    • pp.67-74
    • /
    • 2023
  • In this paper, we analyze the authentication protocol for DRM proposed by Hussain et al. in 2022, and present an improved solution. Hussain et al. argued that their authentication protocol guarantees man-in-the-middle attack, replay attacks, and mutual authentication. However, as a result of analyzing Hussain et al.'s authentication protocol in this paper, Hussain et al.'s authentication protocol still has an insider attack problem, a problem with Yu et al.'s authentication protocol that they pointed out. For this reason, when an inside attacker acquires information on a mobile device, a user impersonation attack was also possible. In addition, there were problems with the user's lack of ID format verification and the problem of the secret key mismatch of the digital contents between the server and the user. Therefore, this paper proposes an improved solution to solve these problems. As a result of analysis in this paper, the improved solution is safe from various attacks such as smart card attack, insider attack, and password guessing attack and can safely authenticate users of DRM.

Mitigating the ICA Attack against Rotation-Based Transformation for Privacy Preserving Clustering

  • Mohaisen, Abedelaziz;Hong, Do-Won
    • ETRI Journal
    • /
    • v.30 no.6
    • /
    • pp.868-870
    • /
    • 2008
  • The rotation-based transformation (RBT) for privacy preserving data mining is vulnerable to the independent component analysis (ICA) attack. This paper introduces a modified multiple-rotation-based transformation technique for special mining applications, mitigating the ICA attack while maintaining the advantages of the RBT.

  • PDF

Characteristics of the Air Flow around Square Prism (정사각 기둥주위의 공기흐름 특성에 관한 연구)

  • Lee, Kang-Ju;Kim, Seong-Cheon
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.4 no.1
    • /
    • pp.42-52
    • /
    • 1987
  • Experimental investigation on the characteristics of the air flow around a square prism located in a uniform flow with various angles of attack was carried out. Experimental results were obtained for the angle of attack from 0 .deg. to 45 .deg. and for Reynolds No. from $2.6{\times}^4$to $12.8^4$. Seperation and reattachment was occurred on the forward face (face AB). Reattachment phenomenon was not developed in the range of attack angle lower 13 .deg. . But, for the range, 13 .deg. .approx. 35 .deg. , the reattachment developed and its position was moved forward the angle of attack increases. Pressure distributions on the reattachment face has a maxium at the reattachment point and a minimum at the separation point. Pressurea on two back faces are nearly symmetric in spite of the changes of the angle of attack and are influenced by the turbulence in rearward flow field.

  • PDF

Stepping Stones Attack Simulator for TCP Connection Traceback Test

  • Choi, Byeong-cheol;Seo, Dong-Il;Sohn, Sung-Won;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2112-2115
    • /
    • 2003
  • In this paper, we describe a SSAS (stepping stones attack simulator) that is automatic tool for testing and evaluation in TCP connection traceback system. The SSAS can pass multiple hosts that are included with hacker, middle-path hosts and victim’s system. And SSAS can also attack through commands to exploit the victim’s system. Usually, hackers do not expose their real attack positions through compromising the middle-path hosts like stepping-stones. Namely, hackers perform the stepping stones attacks in Internet. The SSAS can be utilized by developments and tests of the various countermeasure techniques of hacking. Specially, in this paper, it is used to test the performance of TCP connection traceback system.

  • PDF

3-D Optimal Evasion of Air-to-Surface Missiles against Proportionally Navigated Defense Missiles

  • Cho, Sung-Bong;Ryoo, Chang-Kyung;Tahk, Min-Jea
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.514-518
    • /
    • 2003
  • In this paper, we investigate three dimensional optimal evasive maneuver patterns for air-to-surface attack missiles against proportionally navigated anti-air defense missiles. Interception error of the defense missile can be generated by evasive maneuver of the attack missile during the time of flight for which the defense missile intercepts the attack missile. Time varying weighted sum of the inverse of these interception errors forms a performance index to be minimized. Direct parameter optimization technique using CFSQP is adopted to get the attack missile's optimal evasive maneuver patterns according to parameter changes of both the attack missile and the defense missile such as maneuver limit and time constant of autopilot approximated by the 1st order lag system. The overall shape of resultant optimal evasive maneuver to enhance the survivability of air-to-surface missiles against proportionally navigated anti-air missiles is a kind of deformed barrel roll.

  • PDF

Report on Two Cases of Treatment of Anxiety Disorder with Panic Attacks-on the Basis of Breath-Counting Meditation (Anapanasati)

  • Yoo, Song-Wun;Kim, Dong-Uk;Park, Se-Jin
    • Journal of Oriental Neuropsychiatry
    • /
    • v.26 no.1
    • /
    • pp.1-10
    • /
    • 2015
  • Objectives: The purpose of this study was to evaluate the effect of breath-counting meditation on anxiety disorder patients with panic attack. Methods: Two anxiety disorder patients with panic attack were treated with Breath-counting Meditation, acupunctures, and herb-medications. The patients have been predicted for anxiety disorder with panic attack through Dignosis and Statistical Manual (DSM-IV), Panic Disorder Severity Scale (PDSS), BDI (Beck Depression Inventory), and BAI (Beck Anxiety Inventory) on their 1st and 6th treatments. Results: After the treatments, both the physical and psychological symptoms have decreased. Conclusions: This study suggests that the breath-counting meditation is an effective way for treating patients who are suffering from anxiety disorder with panic attack.

An Adaptive Probe Detection Model using Fuzzy Cognitive Maps

  • Lee, Se-Yul;Kim, Yong-Soo
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.660-663
    • /
    • 2003
  • The advanced computer network technology enables connectivity of computers through an open network environment. There has been growing numbers of security threat to the networks. Therefore, it requires intrusion detection and prevention technologies. In this paper, we propose a network based intrusion detection model using Fuzzy Cognitive Maps(FCM) that can detect intrusion by the Denial of Service(DoS) attack detection method adopting the packet analyses. A DoS attack appears in the form of the Probe and Syn Flooding attack which is a typical example. The Sp flooding Preventer using Fuzzy cognitive maps(SPuF) model captures and analyzes the packet information to detect Syn flooding attack. Using the result of analysis of decision module, which utilized FCM, the decision module measures the degree of danger of the DoS and trains the response module to deal with attacks. The result of simulating the "KDD ′99 Competition Data Set" in the SPuF model shows that the Probe detection rates were over 97 percentages.

  • PDF

A Study on Aerodynamic Properties of Two-Dimensional Rectangular Prism in Various Angles of Attack (다양한 영각을 갖는 2차원 장방형 각주의 공력특성에 관한 연구)

  • 송근택;김유택;이영호
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.26 no.4
    • /
    • pp.485-492
    • /
    • 2002
  • The present study is aimed to reveal macroscopic aerodynamic characteristics of two-dimensional rectangular prisms with three aspect ratios(D/H=1, 2 and 3) and six angles of attack($0^{circ}, 10^{circ}, 13.5^{circ}, 20^{circ}, 30^{circ} and 45^{\circ}$). The Reynolds number is fixed as $1\times10^4$. The SOLA-based revised finite difference method for the conservation form on irregular grid was adopted as a new numerical method. Instantaneous flow patterns at $45^{\circ}$ in case of D/H=2 and D/H=3 show larger asymmetric wake development which is closely related to the sharp decrease of drag coefficients at higher angles of attack range. Vorticity propagation into enlarged wake region is conjectured to be responsible for this phenomenon. The Strouhal number is found to be sensitive to the angle of attack at higher aspect ratios(D/H=2 and 3).