• Title/Summary/Keyword: Attack time

Search Result 1,140, Processing Time 0.026 seconds

Definition of aggressive response scale through quantitative evaluation of cyber attack (사이버공격의 정량적 피해평가를 통한 공세적 대응규모 산정)

  • Hong, Byoungjin;Lim, Jaesung;Kim, Wanju;Cho, Jaemyoung
    • Convergence Security Journal
    • /
    • v.17 no.4
    • /
    • pp.17-29
    • /
    • 2017
  • Various cyber attacks against our society and the government are continuing, and cases and damages are reported from time to time. And the area of cyber attack is not limited to cyberspace, but it is expanding into physical domain and affecting it. In the military arena, we have established and implemented the principle of responding proportionally to enemy physical attacks. This proportionality principle is also required in the version where the region is expanding. In order to apply it, it is necessary to have a quantitative and qualitative countermeasure against cyber attack. However, due to the nature of cyber attacks, it is not easy to assess the damage accurately and it is difficult to respond to the proportionality principle and the proportional nature. In this study, we calculated the damage scale by quantitatively and qualitatively evaluating the cyber attack damage using the Gorden-Lobe model and the security scoring technique based on the scenario. It is expected that the calculated results will be provided as appropriate level and criterion to counteract cyber attack.

MAC Address Spoofing Attack Detection and Prevention Mechanism with Access Point based IEEE 802.11 Wireless Network (Access Point 기반 무선 네트워크 환경에서의 MAC Address Spoofing 공격 탐지 및 차단 기법)

  • Jo, Je-Gyeong;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.9 no.4
    • /
    • pp.85-96
    • /
    • 2008
  • An authentication procedure on wired and wireless network will be done based on the registration and management process storing both the user's IP address and client device's MAC address information. However, existent MAC address registration/administration mechanisms were weak in MAC Spoofing attack as the attacker can change his/her own MAC address to client's MAC address. Therefore, an advanced mechanism should be proposed to protect the MAC address spoofing attack. But, existing techniques sequentially compare a sequence number on packet with previous one to distinguish the alteration and modification of MAC address. However, they are not sufficient to actively detect and protect the wireless MAC spoofing attack. In this paper, both AirSensor and AP are used in wireless network for collecting the MAC address on wireless packets. And then proposed module is used for detecting and protecting MAC spoofing attack in real time based on MAC Address Lookup table. The proposed mechanism provides enhanced detection/protection performance and it also provides a real time correspondence mechanism on wireless MAC spoofing attack with minimum delay.

  • PDF

Stress-Strain Relationship of Alkali-Activated Hwangtoh Concrete under Chemical Attack (화학적 침해를 받은 알칼리활성 황토콘크리트의 응력-변형률 관계)

  • Mun, Ju-Hyun;Yang, Keun-Hyeok
    • Journal of the Korea Institute of Building Construction
    • /
    • v.14 no.2
    • /
    • pp.170-176
    • /
    • 2014
  • This study examined the effect of chemical attack on the stress-strain relationship of alkali-activated Hwangtoh concrete. Water-to-binder ratio and air content were selected as mixture parameters. The stress-strain relationship of concrete was measured at chemical immersion times of 0, 7, 28, 56, and 91 days from an age of 28 days. Based on the test results, the reduction in compressive strength of alkali-activated hwangtoh concrete owing to chemical attack was formulated. In sddition the present study demonstrated that the stress-strain behavior of concrete under chemical attack is significantly dependent on the air content and chemical immersion time, indicating the rate of decrease of modulus of elasticity was greater than that of compressive strength at the same immersion time. As a result, the stress-strain behavior of concrete under chemical attack was significantly inconsistent with the conventional models specified in the CEB-FIP provision.

Improving a Forward & Backward Secure Key Management Scheme for Wireless Sensor Networks

  • Park, Dong-Gook
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.4
    • /
    • pp.521-524
    • /
    • 2009
  • Park proposed a forward & backward Secure key management scheme in wireless sensor networks for Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems [7]. The scheme, however, is still vulnerable to an attack called "sandwich attack": two nodes captured at times $t_1$ and $t_2$, respectively, surrenders all the group keys used between times $t_1$ and $t_2$. In this paper, we propose a fix to the scheme, which can limit the vulnerable time duration to an arbitrarily chosen time span while keeping the forward and backward secrecy of the scheme untouched.

Adaptive Filtering Scheme for Defense of Energy Consumption Attacks against Wireless Computing Devices

  • Lee, Wan Yeon
    • International journal of advanced smart convergence
    • /
    • v.7 no.3
    • /
    • pp.101-109
    • /
    • 2018
  • In this paper, we propose an adaptive filtering scheme of connection requests for the defense of malicious energy consumption attacks against wireless computing devices with limited energy budget. The energy consumption attack tries to consume the battery energy of a wireless device with repeated connection requests and shut down the wireless device by exhausting its energy budget. The proposed scheme blocks a connection request of the energy consumption attack in the middle, if the same connection request is repeated and its request result is failed continuously. In order to avoid the blocking of innocuous mistakes of normal users, the scheme gives another chance to allow connection request after a fixed blocking time. The scheme changes the blocking time adaptively by comparing the message arriving ate during non-blocking period and that during blocking period. Evaluation shows that the proposed defense scheme saves up to 94% energy consumption compared to the non-defense case.

High Rate Denial-of-Service Attack Detection System for Cloud Environment Using Flume and Spark

  • Gutierrez, Janitza Punto;Lee, Kilhung
    • Journal of Information Processing Systems
    • /
    • v.17 no.4
    • /
    • pp.675-689
    • /
    • 2021
  • Nowadays, cloud computing is being adopted for more organizations. However, since cloud computing has a virtualized, volatile, scalable and multi-tenancy distributed nature, it is challenging task to perform attack detection in the cloud following conventional processes. This work proposes a solution which aims to collect web server logs by using Flume and filter them through Spark Streaming in order to only consider suspicious data or data related to denial-of-service attacks and reduce the data that will be stored in Hadoop Distributed File System for posterior analysis with the frequent pattern (FP)-Growth algorithm. With the proposed system, we can address some of the difficulties in security for cloud environment, facilitating the data collection, reducing detection time and consequently enabling an almost real-time attack detection.

A Questionaire Analysis for the Vertigo as the prodrome of Stroke (뇌졸중(腦卒中) 전조증상(前兆症狀)으로서의 현훈(眩暈)에 대한 설문조사분석(設問調査分析))

  • Ko, Sung-Gyu;Yong, Hyung-Soon
    • The Journal of Internal Korean Medicine
    • /
    • v.21 no.1
    • /
    • pp.135-145
    • /
    • 2000
  • Objective : This study has been made to analysis of clinical type of vertigo prodromic Cerebral Vascular Disease in stroke patients who admitted to sangji oriental hospital department of circulatoty internal medicine in the period from July. 1999 to October 1999. Methods : A Questionaire was done after explanationin details to patients and agreement of patients. The inquire was done as follows. Sex and age, risk factor of stroke, type of stroke, existence of vertigo last three years before stroke attack, the beginning age of vertigo and period of prevalence, frequency, continuance time of vertigo, predilection season and time, factor of causing vertigo, accompanying symptoms of vertigo, severity of vertigo. Result and Conclusion : The existence of Rotation sense(Rotation group and non-Rotation group) and the type of Stroke is no difference significantly but the Rotation vertigo group and non-Rotation vertigo group is difference significantly in distribution. The sixties in age of vertigo attack, previous vertigo before 3 year Stroke attack, irregular in predilection season of vertigo, have a high frequency significantly in distribution and previous period of vertigo has no significantly difference in distribution. One or two per a month in frequency of vertigo, below 5 minute in continuance time of vertigo, irregular in predilection time of vertigo, stand up and sit down in causing vertigo position have a high frequency significantly in distribution.

  • PDF

Implementation of OTP Detection System using Imaging Processing (영상처리를 이용한 비밀번호 인식시스템 개발)

  • Choe, Yeong-Been;Kim, Ji-Hye;Kim, Jin-Wook;Moon, Byung-Hyun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.6
    • /
    • pp.17-22
    • /
    • 2017
  • In this paper, a password recognition system that can overcome a shoulder-surfing attack is developed. During the time period of password insertion, the developed system can prevent the attack and enhance the safety of the password. In order to raise the detection rate of the password image, the mopology technique is utilized. By adapting 4 times of the expansion and dilation, the niose from the binary image of the password is removed. Finally, the mobile phone application is also developed to recognize the one time password and the detection rate is measured. It is shown that the detection rate of 90% is achieved under the dark light condition.

Analysis of DDoS Attack and Countermeasure: Survey (DDoS 공격에 대한 분석 및 대응방안)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.423-429
    • /
    • 2014
  • DDoS attacks is upgrade of DoS attacks. Botnet is being used by DDoS attack, so it is able to attack a millions of PCs at one time. DDoS attacks find the root the cause of the attack because it is hard to find sources for it, even after the treatment wavelength serious social problem in this study, the analysis and countermeasures for DDoS attack is presented.

Real Time Related Key Attack on Hummingbird-2

  • Zhang, Kai;Ding, Lin;Li, Junzhi;Guan, Jie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.8
    • /
    • pp.1946-1963
    • /
    • 2012
  • Hummingbird is a lightweight encryption and message authentication primitive published in RISC'09 and WLC'10. In FSE'11, Markku-Juhani O.Saarinen presented a differential divide-and-conquer method which has complexity upper bounded by $2^{64}$ operations and requires processing of few megabytes of chosen messages under two related nonces (IVs). The improved version, Hummingbird-2, was presented in RFIDSec 2011. Based on the idea of differential collision, this paper discovers some weaknesses of the round function WD16. Combining with the simple key loading algorithm, a related-key chosen-IV attack which can recover the full secret key is proposed. Under 15 pairs of related keys, the 128 bit initial key can be recovered, requiring $2^{27}$ chosen IV and the computational complexity is $O(2^{27})$. In average, the attack needs several minutes to recover the full 128-bit secret key on a PC. The experimental result corroborates our attack. The result shows that the Hummingbird-2 cipher can't resist related key attack.