• Title/Summary/Keyword: Attack type

Search Result 495, Processing Time 0.039 seconds

Kinetics and Mechanism of the Anilinolysis of Diethyl Thiophosphinic Chloride in Acetonitrile

  • Hoque, Md. Ehtesham Ul;Lee, Hai-Whang
    • Bulletin of the Korean Chemical Society
    • /
    • v.32 no.7
    • /
    • pp.2306-2310
    • /
    • 2011
  • The nucleophilic substitution reactions of diethyl thiophosphinic chloride with substituted anilines ($XC_6H_4NH_2$) and deuterated anilines ($XC_6H_4ND_2$) are investigated kinetically in acetonitrile at 55.0 $^{\circ}C$. The values of deuterium kinetic isotope effects (DKIEs; $k_H/k_D$) invariably increase from secondary inverse ($k_H/k_D$ < 1) to primary normal (kH/kD > 1) as the nucleophiles change from the strongly basic to weakly basic anilines. The secondary inverse with the strongly basic anilines and primary normal DKIEs with the weakly basic anilines are rationalized by the gradual transition state (TS) variation from a predominant backside attack, via invariably increasing the fraction of a frontside attack, to a predominant frontside attack, in which the reaction mechanism is a concerted $S_N2$ pathway. A frontside attack involving a hydrogen bonded, four-center-type TS is substantiated by the primary normal DKIEs.

The Pattern Analysis for Gameplay of RPG(Role-Play Game) Genre base on Smart-phone : Toward 'Blade for Kakao' (스마트폰 기반 RPG 장르의 게임플레이 패턴 분석 : '블레이드 for Kakao'를 중심으로)

  • Han, Sang-Geun;Song, Seung-Keun
    • Cartoon and Animation Studies
    • /
    • s.38
    • /
    • pp.237-258
    • /
    • 2015
  • This research aims to analyze gamer's behavior pattern on 'Blade for Kakao' RPG genre based on smart-phone. Three subjects were recruited using the concurrent protocol method to conduct ten episodes in region 1. As a result, it derived four behavior patterns according to the combination of space type affordance and the arrangement affordance of obstacle(monster). The result of this research revealed the forward attack arranged for the fixed obstacles in the wide space, the indirect attack as avoid-type arranged for scattered obstacles in the same space, the hunting up attack once arranged for the crowded obstacles in the same space, and the pulling attack arranged for obstacles in the narrow space. Moreover, it revealed the character growth and the optimization of attack method according to the attribute affordance of the obstacle(monster). This research expect to offer the design guideline for game level design to investigate the relationship between the game play and affordance in RPG genre based on smart-phone.

Response and Threat of Home Network System in Ubiquitous Environment (유비쿼터스 환경에서의 홈네트워크 시스템 침해 위협 및 대응 방안)

  • Oh, Dae-Gyun;Jeong, Jin-Young
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.27-32
    • /
    • 2005
  • Recently The social interest regarding is coming to be high about Home Network accordong to intelligence anger of diffusions and the family home appliance machineries and tools of the superhigh speed Internet In the ubiquitous computing socioty, only neither the threat of the private life which is caused by in cyber attack will be able to increase according to the computer environment dependence degree of the individual increases in the ubiquitous computing socioty, only neither the threat of the private life which is caused by in cyber attack will be able to increase according to the computer environment dependence degree of the individual increases Beacaues of Home network is starting point to go ubiquitous computing enviorment, The Increase of Cyber attack through Internet will raise its head with the obstacle to disrupt the activation of the groove network. So there is a possibility of saying that the counter-measure preparation is urgent, In the various environment like this, It means the threat which present time than is complicated will exist. So it will analyze the Home network system environment of present time and observe the Security threat and attack type in the ubiquitous computing enviorment. So it will analyze the Home network system environment of present time and observe the Security threat and attack type in the ubiquitous computing enviorment.

  • PDF

Research on countermeasures against malicious file upload attacks (악성 파일 업로드 공격 대응방안 연구)

  • Kim, Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.2
    • /
    • pp.53-59
    • /
    • 2020
  • Malicious file upload attacks mean that the attacker to upload or transfer files of dangerous types that can be automatically processed within the web server's environment. Uploaded file content can include exploits, malware and malicious scripts. An attacker can user malicious content to manipulate the application behavior. As a method of detecting a malicious file upload attack, it is generally used to find a file type by detecting a file extension or a signature of the file. However, this type of file type detection has the disadvantage that it can not detect files that are not encoded with a specific program, such as PHP files. Therefore, in this paper, research was conducted on how to detect and block any program by using essential commands or variable names used in the corresponding program when writing a specific program. The performance evaluation results show that it detected specific files effectively using the suggested method.

The effect of aerodynamic characteristics on the insect wing tip trajectory in hovering flight (정지 비행에서의 곤충 날개 궤적에 따른 공기역학적 특성)

  • Cho, Hun-Kee;Joo, Won-Gu
    • Proceedings of the KSME Conference
    • /
    • 2008.11a
    • /
    • pp.1441-1445
    • /
    • 2008
  • Insect flight is adapted to cope with each circumstance by controlling a variety of the parameters of wing motion in nature. Many researchers have struggled to solve the fundamental concept of insect flight, but it has not been solved yet clearly. In this study, to find the most effective flapping wing kinematics, we conducted to analyze CFD data on fixing some of the optimal parameters of wing motion such as stoke amplitude, flip duration and wing rotation type and then controlled the deviation angle by fabricating wing tip motion. Although all patterns have the similar value of lift coefficient and drag coefficient, pattern A(pear-shape type) indicates the highest lift coefficient and pattern H(pear-shape type) has the lowest lift coefficient among four wing tip motions and three deviation angles. This result suggest that the lift and drag coefficient depends on the angle of attack and the deviation angle combined, and it could be explained by delayed stall effect.

  • PDF

Hydrodynamic characteristics of cambered NACA0012 for flexible-wing application of a flapping-type tidal stream energy harvesting system

  • Sitorus, Patar Ebenezer;Park, JineSoon;Ko, Jin Hwan
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.11 no.1
    • /
    • pp.225-232
    • /
    • 2019
  • In recent years, nonlinear dynamic models have been developed for flapping-type energy harvesting systems with a rigid wing, but not for those with a flexible wing. Thus, in this study, flexible wing designs of NACA0012 section are proposed and measurements of the forces of rigid cambered wings, which are used to estimate the performance of the designed wings, are conducted. Polar curves from the measured lift and drag coefficients show that JavaFoil estimation is much closer to the measured values than Eppler over the entire given range of angles of attack. As the camber of the rigid cambered wings is increased, both the lift and drag coefficients increase, in turn increasing the resultant forces. Moreover, the maximum resultant forces for all rigid cambered wings are achieved at the same angle of attack as the maximum lift coefficient, meaning that the lift coefficient is dominant in representations of the wing characteristics.

Secure ID-based Strong Designated Verifier Signature Scheme Against Key-compromise Attack (키 노출 공격에 안전한 ID-기반의 강한 지정된 검증자 서명 기법)

  • Lee, Ji-Seon;Chang, Jik-Hyun;Lee, Dong-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.10
    • /
    • pp.59-66
    • /
    • 2009
  • A strong designated verifier signature scheme is a special type of signature scheme which provides signer anonymity by enabling the specified recipient, called a designated verifier, to simulate a signature which is indistinguishable from the signer's signature. It has many applications such as software distribution or electronic voting. In this paper, we consider two important security properties of strong designated verifier signature scheme - source hiding and security against key-compromise attack. We show that the two properties cannot be achieved at the same time. Finally, we present a new ID-based strong designated verifier signature scheme which is secure against key-compromise attack.

The Case of Novel Attack Detection using Virtual Honeynet (Virtual Honeynet을 이용한 신종공격 탐지 사례)

  • Kim, Chun-Suk;Kang, Dae-Kwon;Euom, Ieck-Chae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.2
    • /
    • pp.279-285
    • /
    • 2012
  • Most national critical key infrastructure, such like electricity, nuclear power plant, and petroleum is run on SCADA (Supervisory Control And Data Acquisition) system as the closed network type. These systems have treated the open protocols like TCP/IP, and the commercial operating system, which due to gradually increasing dependence on IT(Information Technology) is a trend. Recently, concerns have been raised about the possibility of these facilities being attacked by cyber terrorists, hacking, or viruses. In this paper, the method to minimize threats and vulnerabilities is proposed, with the virtual honeynet system architecture and the attack detection algorithm, which can detect the unknown attack patterns of Zero-Day Attack are reviewed.

Phishing Attack Detection Using Deep Learning

  • Alzahrani, Sabah M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.213-218
    • /
    • 2021
  • This paper proposes a technique for detecting a significant threat that attempts to get sensitive and confidential information such as usernames, passwords, credit card information, and more to target an individual or organization. By definition, a phishing attack happens when malicious people pose as trusted entities to fraudulently obtain user data. Phishing is classified as a type of social engineering attack. For a phishing attack to happen, a victim must be convinced to open an email or a direct message [1]. The email or direct message will contain a link that the victim will be required to click on. The aim of the attack is usually to install malicious software or to freeze a system. In other instances, the attackers will threaten to reveal sensitive information obtained from the victim. Phishing attacks can have devastating effects on the victim. Sensitive and confidential information can find its way into the hands of malicious people. Another devastating effect of phishing attacks is identity theft [1]. Attackers may impersonate the victim to make unauthorized purchases. Victims also complain of loss of funds when attackers access their credit card information. The proposed method has two major subsystems: (1) Data collection: different websites have been collected as a big data corresponding to normal and phishing dataset, and (2) distributed detection system: different artificial algorithms are used: a neural network algorithm and machine learning. The Amazon cloud was used for running the cluster with different cores of machines. The experiment results of the proposed system achieved very good accuracy and detection rate as well.

Monitoring and Tracking of Time Series Security Events using Visualization Interface with Multi-rotational and Radial Axis (멀티 회전축 및 방사축 시각화 인터페이스를 이용한 시계열 보안이벤트의 감시 및 추적)

  • Chang, Beom-Hwan
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.33-43
    • /
    • 2018
  • In this paper, we want to solve the problems that users want to search the progress of attack, continuity of attack, association between attackers and victims, blocking priority and countermeasures by using visualization interface with multi-rotational axis and radial axis structure. It is possible to effectively monitor and track security events by arranging a time series event based on a multi-rotational axis structured by an event generation order, a subject of an event, an event type, and an emission axis, which is an objective time indicating progress of individual events. The proposed interface is a practical visualization interface that can apply attack blocking and defense measures by providing the progress and progress of the whole attack, the details and continuity of individual attacks, and the relationship between attacker and victim in one screen.

  • PDF