• 제목/요약/키워드: Attack vector

검색결과 87건 처리시간 0.019초

Prediction of compressive strength of lightweight mortar exposed to sulfate attack

  • Tanyildizi, Harun
    • Computers and Concrete
    • /
    • 제19권2호
    • /
    • pp.217-226
    • /
    • 2017
  • This paper summarizes the results of experimental research, and artificial intelligence methods focused on determination of compressive strength of lightweight cement mortar with silica fume and fly ash after sulfate attack. The artificial neural network and the support vector machine were selected as artificial intelligence methods. Lightweight cement mortar mixtures containing silica fume and fly ash were prepared in this study. After specimens were cured in $20{\pm}2^{\circ}C$ waters for 28 days, the specimens were cured in different sulfate concentrations (0%, 1% $MgSO_4^{-2}$, 2% $MgSO_4^{-2}$, and 4% $MgSO_4^{-2}$ for 28, 60, 90, 120, 150, 180, 210 and 365 days. At the end of these curing periods, the compressive strengths of lightweight cement mortars were tested. The input variables for the artificial neural network and the support vector machine were selected as the amount of cement, the amount of fly ash, the amount of silica fumes, the amount of aggregates, the sulfate percentage, and the curing time. The compressive strength of the lightweight cement mortar was the output variable. The model results were compared with the experimental results. The best prediction results were obtained from the artificial neural network model with the Powell-Beale conjugate gradient backpropagation training algorithm.

무선 네트워크에서 파이프라인 네트워크 코딩 기반 메시지 및 노드 인증 (PNC(Pipeline Network Coding)-Based Message and Node Authentication in Wireless Networks)

  • 안명기;조영종;강경란
    • 한국통신학회논문지
    • /
    • 제42권5호
    • /
    • pp.999-1008
    • /
    • 2017
  • 본 논문에서는 무선 네트워크 환경에서 효율적인 데이터 전달을 위한 파이프라인 네트워크 코딩(Pipeline Network Coding) 기법과 데이터의 무결성을 검증하기 위한 데이터 인증 기법, 가상 송신자에 대한 노드 인증 기법을 제안한다. 파이프라인 네트워크 코딩 기법은 네트워크 코딩을 수행하는 중계 노드가 송신자 대신 데이터를 전달함으로써 전체적인 네트워크 성능을 향상시키는 기법이다. 그러나 네트워크 코딩은 악의적인 공격자가 데이터를 위 변조하여 네트워크에 주입하는 공격인 오염 공격(pollution attack)에 취약하다. 이를 방어하기 위해 HMAC(Hash-based Message Authentication Code)을 사용한다. 이때 데이터 인증에 사용되는 태그를 생성하기 위해서는 인증을 수행하는 노드들에게 키를 분배해야한다. 키 분배에 따른 오버헤드를 최소화하기 위해 해쉬 체인을 적용하였다. 가상 송신자에 대한 인증 기법으로는 null 벡터를 사용한다. 최종적으로 제안 기법에 대한 안전성과 복잡도를 분석하고, 시뮬레이션을 통해 성능을 분석하였다.

W-TMS(Wireless-Threat Management System)에서의 효율적 관리를 위한 위협 분류기법 (Threat Classification Schemes for Effective Management based on W-TMS(Wireless-Threat Management System))

  • 서종원;조제경;이형우
    • 한국콘텐츠학회논문지
    • /
    • 제7권3호
    • /
    • pp.93-100
    • /
    • 2007
  • 지난 10년 동안 인터넷은 빠른 속도로 모든 분야에 확산되어 왔으면 이와 비슷한 현상으로 최근 몇 년 동안 무선 네트워크의 확산 역시 빠른 속도로 보급되고 있는 추세이다. 그리고, 무선 네트워크 공격 시도 및 침입에 성공하는 공격의 횟수도 증가하고 있다. 이런 무선 네트워크 위협을 극복하기 위해 기존의 TMS는 필요에 따라 자동화되고 능동적인 대응 수단을 제공하기도 하지만, 새로운 형태의 무선 공격 등에는 효율적으로 대응하지 못한다는 취약점을 가지고 있다. 따라서 본 연구에서는 정보검색분야에서 사용되는 Vector Space모델을 이용해 실시간으로 유입되는 패킷과의 유사도를 비교하여, 분석된 유사도의 패턴을 분석해 무선 네트워크의 이상 징후를 탐지하고 자동으로 분류하는 기법을 설계했다.

A Secure Authentication Method for Smart Phone based on User's Behaviour and Habits

  • Lee, Geum-Boon
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권9호
    • /
    • pp.65-71
    • /
    • 2017
  • This paper proposes a smart phone authentication method based on user's behavior and habit that is an authentication method against shoulder surfing attack and brute force attack. As smart phones evolve not only storage of personal data but also a key means of financial services, the importance of personal information security in smart phones is growing. When user authentication of smart phone, pattern authentication method is simple to use and memorize, but it is prone to leak and vulnerable to attack. Using the features of the smart phone pattern method of the user, the pressure applied when touching the touch pad with the finger, the size of the area touching the finger, and the time of completing the pattern are used as feature vectors and applied to user authentication security. First, a smart phone user models and stores three parameter values as prototypes for each section of the pattern. Then, when a new authentication request is made, the feature vector of the input pattern is obtained and compared with the stored model to decide whether to approve the access to the smart phone. The experimental results confirm that the proposed technique shows a robust authentication security using subjective data of smart phone user based on habits and behaviors.

Ensemble of Degraded Artificial Intelligence Modules Against Adversarial Attacks on Neural Networks

  • Sutanto, Richard Evan;Lee, Sukho
    • Journal of information and communication convergence engineering
    • /
    • 제16권3호
    • /
    • pp.148-152
    • /
    • 2018
  • Adversarial attacks on artificial intelligence (AI) systems use adversarial examples to achieve the attack objective. Adversarial examples consist of slightly changed test data, causing AI systems to make false decisions on these examples. When used as a tool for attacking AI systems, this can lead to disastrous results. In this paper, we propose an ensemble of degraded convolutional neural network (CNN) modules, which is more robust to adversarial attacks than conventional CNNs. Each module is trained on degraded images. During testing, images are degraded using various degradation methods, and a final decision is made utilizing a one-hot encoding vector that is obtained by summing up all the output vectors of the modules. Experimental results show that the proposed ensemble network is more resilient to adversarial attacks than conventional networks, while the accuracies for normal images are similar.

Fluid mapper에 의한 철극형 전기기기의 자극 주변에서의 자속분포의 결정 (Determination of Magnetic Flux Distribution around the Salent Pole by means of the Fluid Mapper)

  • 우형주;고명삼
    • 전기의세계
    • /
    • 제14권1호
    • /
    • pp.35-39
    • /
    • 1965
  • Field problems are solved by a variety of methods. In the relatively small number of cases that are simiple enough, the mathematical attack may be the method of choice. But many field problems with irregular boundary condition must be handled by the use of the electrolitic tank analog, conducting paper or the fluid mapper analog for the purpose of effectiveness and convenience. The method of choice depends on the actual of the problems. There is no one best way to solve all problems. The following points have been described in this apepr, 1. Theoretical studies are made of the vector which is produced by leading the fluid flow vector by a right angle. 2. Curvilinear square method is described., 3. Determination on magnetic flux distribution and variation according to the magnitude of exciting currents.

  • PDF

Study of Hollow Letter CAPTCHAs Recognition Technology Based on Color Filling Algorithm

  • Huishuang Shao;Yurong Xia;Kai Meng;Changhao Piao
    • Journal of Information Processing Systems
    • /
    • 제19권4호
    • /
    • pp.540-553
    • /
    • 2023
  • The hollow letter CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) is an optimized version of solid CAPTCHA, specifically designed to weaken characteristic information and increase the difficulty of machine recognition. Although convolutional neural networks can solve CAPTCHA in a single step, a good attack result heavily relies on sufficient training data. To address this challenge, we propose a seed filling algorithm that converts hollow characters to solid ones after contour line restoration and applies three rounds of detection to remove noise background by eliminating noise blocks. Subsequently, we utilize a support vector machine to construct a feature vector for recognition. Security analysis and experiments show the effectiveness of this algorithm during the pre-processing stage, providing favorable conditions for subsequent recognition tasks and enhancing the accuracy of recognition for hollow CAPTCHA.

Improved Single Feistel Circuit Supporter by A Chaotic Genetic Operator

  • JarJar, Abdellatif
    • Journal of Multimedia Information System
    • /
    • 제7권2호
    • /
    • pp.165-174
    • /
    • 2020
  • This document outlines a new color image encryption technology development. After splitting the original image into 240-bit blocks and modifying the first block by an initialization vector, an improved Feistel circuit is applied, sponsored by a genetic crossover operator and then strong chaining between the encrypted block and the next clear block is attached to set up the confusion-diffusion and heighten the avalanche effect, which protects the system from any known attack. Simulations carried out on a large database of color images of different sizes and formats prove the robustness of such a system.

IV 해쉬를 통한 IV 공격 방어 (IV attack protection through IV having)

  • 이영지;김태윤
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2001년도 봄 학술발표논문집 Vol.28 No.1 (A)
    • /
    • pp.421-423
    • /
    • 2001
  • IPSec(IP Security)은 데이터가 공개적으로 전송되는 네트워크 데이터에 암호화와 인증, 무결성을 제공하기 위해 사용되는 프로토콜이다. IPSec 안에는 여러 프로토콜이 있는데, 그 중에 실제 패킷에 암호화와 인증, 무결성을 추가해 전달하기 위해서는 ESP(Encapsulation Security Payload)라는 프로토콜이 사용된다. 이 ESP(Encapsulation Security Payload)라는 프로토콜이 사용된다. 이 ESP는 패킷을 암호화하기 위해 DES-CBC 모드를 사용하는데, 여기에서 IV(Initialization Vector) 값이 쓰인다. 이 값은 패킷 복호화를 하기 위해 공개적으로 전달이 되기 때문에 중간에 공격자에 의해 공격 당할 위험이 많다. 본 논문에서는 IV 공격을 방지하기 위해 IV의 값을 해쉬 함수를 통해 한번 해슁을 한 다음에, IV 값을 안전하게 전달하는 방법을 제시하고자 한다.

Analysis of NTRUSign signature scheme

  • Sungjun Min;Go Yamamoto;Kim, Kwangjo
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2003년도 동계학술대회
    • /
    • pp.399-405
    • /
    • 2003
  • A new type of signature scheme, called NTRUSign, based on solving the approximately closest vector problem in an NTRU lattice was proposed in[7],[8]. However no security proof against chosen messages attack has been made for this scheme. In this paper, we show that NTRUSign signature scheme contains the weakness of malleability. From this, one can derive new valid signatures from any previous message-signature pair which means that NTRUSign is not secure against strongly existential forgery.

  • PDF