• Title/Summary/Keyword: Internal Attack

Search Result 241, Processing Time 0.025 seconds

Intelligent Internal Stealthy Attack and its Countermeasure for Multicast Routing Protocol in MANET

  • Arthur, Menaka Pushpa;Kannan, Kathiravan
    • ETRI Journal
    • /
    • v.37 no.6
    • /
    • pp.1108-1119
    • /
    • 2015
  • Multicast communication of mobile ad hoc networks is vulnerable to internal attacks due to its routing structure and high scalability of its participants. Though existing intrusion detection systems (IDSs) act smartly to defend against attack strategies, adversaries also accordingly update their attacking plans intelligently so as to intervene in successful defending schemes. In our work, we present a novel indirect internal stealthy attack on a tree-based multicast routing protocol. Such an indirect stealthy attack intelligently makes neighbor nodes drop their routing-layer unicast control packets instead of processing or forwarding them. The adversary targets the collision avoidance mechanism of the Medium Access Control (MAC) protocol to indirectly affect the routing layer process. Simulation results show the success of this attacking strategy over the existing "stealthy attack in wireless ad hoc networks: detection and countermeasure (SADEC)" detection system. We design a cross-layer automata-based stealthy attack on multicast routing protocols (SAMRP) attacker detection system to identify and isolate the proposed attacker. NS-2 simulation and analytical results show the efficient performance, against an indirect internal stealthy attack, of SAMRP over the existing SADEC and BLM attacker detection systems.

Guess and Determine Attack on Bivium

  • Rohani, Neda;Noferesti, Zainab;Mohajeri, Javad;Aref, Mohammad Reza
    • Journal of Information Processing Systems
    • /
    • v.7 no.1
    • /
    • pp.151-158
    • /
    • 2011
  • Bivium is a simplified version of Trivium, a hardware profile finalist of the eSTREAM project. Bivium has an internal state size of 177 bits and a key length of 80 bits. In this paper, a guess and determine attack on this cipher is introduced. In the proposed method, the best linear approximations for the updating functions are first defined. Then by using these calculated approximations, a system of linear equations is built. By guessing 30 bits of internal state, the system is solved and all the other 147 remaining bits are determined. The complexity of the attack is O ($2^{30}$), which is an improvement to the previous guess and determine attack with a complexity of order O($2^{52.3}$).

A comparative study of effects using physical treatmental apparatus and diagnosis of shoulder pain on cerebrovascular attack patients (뇌졸중환자중(腦卒中患者中) 견관절동통(肩關節疼痛)에 관(關)한 진단(診斷) 및 치료기기효과(治療器機效果)에 대(對)한 비교(比較) 연구(硏究))

  • Kang, Jae-Chun;Baik, Tai-Hyun
    • The Journal of Internal Korean Medicine
    • /
    • v.20 no.1
    • /
    • pp.244-260
    • /
    • 1999
  • This study was to investigate diagnosis of shoulder pain on cerebrovascular attack patients and treatment effects by using physical treatment and orienatal diagnosis aparatus, as oriental diagnosis equipments, these were used thermography, maegzin and yangdorag machine. as physical treatment equipments, these were used Hot pack, TENS (Transcutaneous electrical nerve stimulation), ICT(Interferential current therapy) the results were followed 1. In Sex and Age distribution on cerebrovascular attack patients with shoulder pain, male(51.7%)had many than female(48.3%) and 60s were the top, next 70s 50s 40s. 2. In the reason of cerebrovascular attack and the type of motor paresis, cerebrovascular infarction(73.3%) had many than hemorrhage(26.7%) 3. In hospitalizied period of cerebrovascular attack patients with shoulder pain, the period from 11 to 60 days had almost occupied. 4. Oriental medical diagnositic propriety of shoulder pain by using maegzin and yangdorag machine were not recognized. 5. In measuring passive range of motion of pre and post treatment, improvement effect on Hot pack was not showed, but effects on TENS, ICT were showed. 6. In measuring temperature of painful shouler joint of pre and post treatment by using thermography, the effect of Hot pack was not recognized but the effects of TENS, ICT were recognized.

  • PDF

A Questionaire Analysis for the Vertigo as the prodrome of Stroke (뇌졸중(腦卒中) 전조증상(前兆症狀)으로서의 현훈(眩暈)에 대한 설문조사분석(設問調査分析))

  • Ko, Sung-Gyu;Yong, Hyung-Soon
    • The Journal of Internal Korean Medicine
    • /
    • v.21 no.1
    • /
    • pp.135-145
    • /
    • 2000
  • Objective : This study has been made to analysis of clinical type of vertigo prodromic Cerebral Vascular Disease in stroke patients who admitted to sangji oriental hospital department of circulatoty internal medicine in the period from July. 1999 to October 1999. Methods : A Questionaire was done after explanationin details to patients and agreement of patients. The inquire was done as follows. Sex and age, risk factor of stroke, type of stroke, existence of vertigo last three years before stroke attack, the beginning age of vertigo and period of prevalence, frequency, continuance time of vertigo, predilection season and time, factor of causing vertigo, accompanying symptoms of vertigo, severity of vertigo. Result and Conclusion : The existence of Rotation sense(Rotation group and non-Rotation group) and the type of Stroke is no difference significantly but the Rotation vertigo group and non-Rotation vertigo group is difference significantly in distribution. The sixties in age of vertigo attack, previous vertigo before 3 year Stroke attack, irregular in predilection season of vertigo, have a high frequency significantly in distribution and previous period of vertigo has no significantly difference in distribution. One or two per a month in frequency of vertigo, below 5 minute in continuance time of vertigo, irregular in predilection time of vertigo, stand up and sit down in causing vertigo position have a high frequency significantly in distribution.

  • PDF

A Case Report of a Chronic Migraine Patient Who Did Not Respond to Triptan (트립탄 계열 약물에 반응하지 않는 만성 편두통 환자 치험 1례)

  • Kim, Cheol-hyun;Moon, Yeon-ju;Chu, Hong-min;Yang, Mu-hack
    • The Journal of Internal Korean Medicine
    • /
    • v.39 no.2
    • /
    • pp.154-158
    • /
    • 2018
  • Introduction: This case report assessed the effects of Korean medicine treatments on a chronic migraine patient who did not respond to triptan. Case Presentation: The patient received Korean medicine treatments, such as acupuncture, moxibustion, cupping, and herbal medication, during a hospitalization period. The effects of treatments were assessed with the Numerical Rating Scale (NRS) and migraine attack frequency. The intensity and attack frequency of migraines were significantly reduced after the complete treatment. Conclusions: For migraines, Korean medicine such as acupuncture and herbal medication could be an alternative to conventional therapy.

APT attacks and Countermeasures (APT 공격과 대응 방안 연구)

  • Han, Kun-Hee
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.1
    • /
    • pp.25-30
    • /
    • 2015
  • The APT attacks are hackers created a variety of security threats will continue to attack applied to the network of a particular company or organization. It referred to as intelligent sustained attack. After securing your PC after a particular organization's internal staff access to internal server or database through the PC or remove and destroy the confidential information. The APT attack is so large, there are two zero-day attacks and rootkits. APT is a process of penetration attack, search, acquisition, and is divided into outlet Step 4. It was defined in two ways how you can respond to APT through the process. Technical descriptions were divided into ways to delay the attacker's malicious code attacks time and plan for attacks to be detected and removed through.

  • PDF

A Study on Building an Integration Security System Applying Virtual Clustering (Virtual Clustering 기법을 적용한 Integration Security System 구축에 관한 연구)

  • Seo, Woo-Seok;Park, Dea-Woo;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.101-110
    • /
    • 2011
  • Recently, an attack to an application incapacitates the intrusion detection rule, the defense policy for a network and database and induces intrusion incidents. Thus, it is necessary to study integration security to ensure the security of an internal network and database from that attack. This article is about building an integration security system to prevent an attack to an application set with intrusion detection rules. It responds to network-based attack through detection, disperses attack with the internal integration security system through virtual clustering and load balancing, and sets up defense policy for attacking destination packets, analyzes and records attack packets, and updates rules through monitoring and analysis. Moreover, this study establishes defense policy according to attacking types to settle access traffic through virtual machine partition policy and suggests an integration security system applied to prevent attack and tests its defense. The result of this study is expected to provide practical data for integration security defense for hacking attack from outside.

Improved Conditional Differential Attacks on Round-Reduced Grain v1

  • Li, Jun-Zhi;Guan, Jie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4548-4559
    • /
    • 2018
  • Conditional differential attack against NFSR-based cryptosystems proposed by Knellwolf et al. in Asiacrypt 2010 has been widely used for analyzing round-reduced Grain v1. In this paper, we present improved conditional differential attacks on Grain v1 based on a factorization simplification method, which makes it possible to obtain the expressions of internal states in more rounds and analyze the expressions more precisely. Following a condition-imposing strategy that saves more IV bits, Sarkar's distinguishing attack on Grain v1 of 106 rounds is improved to a key recovery attack. Moreover, we show new distinguishing attack and key recovery attack on Grain v1 of 107 rounds with lower complexity O($2^{34}$) and appreciable theoretical success probability 93.7%. Most importantly, our attacks can practically recover key expressions with higher success probability than theoretical results.

Cross-sectional and Comparative Study between First Attack and Reattack Groups in Acute Stroke Patients - Multi-Center Trials (급성기 중풍환자의 재발군과 초발군에 대한 단면조사연구 - 다기관 임상연구)

  • Lee, In-Whan;Gwak, Ja-Young;Cho, Seung-Yeon;Shin, Ae-Sook;Kim, Na-Hee;Kim, Hye-Mi;Na, Byung-Jo;Park, Seong-Uk;Jung, Woo-Sang;Moon, Sang-Kwan;Park, Jung-Mi;Ko, Chang-Nam;Cho, Ki-Ho;Kim, Young-Suk;Bae, Hyung-Sup
    • The Journal of Internal Korean Medicine
    • /
    • v.30 no.4
    • /
    • pp.696-707
    • /
    • 2009
  • Objective : We designed this study to investigate differences between stroke reattack and stroke first attack group to establish fundamental data and prevent a secondary stroke. Methods : 826 subjects were recruited from the patients admitted to the department of internal medicine at Kyung Hee University Oriental Medical Center, Kyung Hee University East-West Neo Medical Center, Kyungwon University Incheon Oriental Medical Center, Kyungwon University Songpa Oriental Medical Center and Dongguk University Ilsan Oriental Medical Center from 1 April 2007 to 31 August 2009. We compared general characteristics, classification of diagnosis, subtypes of cerebral infarction, risk factors, Sasang constitution, diagnostic classifications between stroke reattck and stroke first attack groups. Results : 1. In general characteristics, age differed significantly between the reattck and first attack groups. 2. Classification of diagnosis differed significantly between reattck and first attack groups. 3. In risk factors, hypertension, diabetes mellitus, alcohol drinking, and stress were significantly different between reattck and first attack groups. 4. Diagnostic classifications were significantly different between reattck and first attack groups. Conclusion : To prevent recurrence of stroke, education on stroke risk factors associated with recurrence is needed. In addition, those who are diagnosed as Dampness-Phlegm need to be well-controlled.

  • PDF

Counterattack Method against Hacked Node in CAN Bus Physical Layer (CAN 버스 물리 계층에서 해킹된 노드의 대처 기법)

  • Kang, Tae-Wook;Lee, Jong-Bae;Lee, Seongsoo
    • Journal of IKEEE
    • /
    • v.23 no.4
    • /
    • pp.1469-1472
    • /
    • 2019
  • CAN bus in automotive applications does not assign node addresses. When a node is hacked and it transmits malicious data frame, it is difficult to resolve which node is hacked. However, this CAN bus internal attack seriously threatens the safety of a car, so a prompt counterattack is necessary in the CAN bus physical layer. This paper proposes a counterattack method against malicious CAN bus internal attack. When a malicious data frame is detected, an intrusion detection system in the CAN bus increases the error counter of the malicious node. Then, the malicious node is off from the bus when its error counter exceeds its limit. A CAN controller with the proposed method is implemented in Verilog HDL, and the proposed method is proved to counterattack against malicious CAN bus internal attack.