• 제목/요약/키워드: Mutation attack

검색결과 11건 처리시간 0.025초

네트워크 보호체계에서 네트워크 주소변이 기술 적용에 대한 영향성 연구 (A Study on the Impact of Applying Network Address Mutation Technology within the Network Protection System)

  • 이수원;황세영;홍석규
    • 정보보호학회논문지
    • /
    • 제33권6호
    • /
    • pp.939-946
    • /
    • 2023
  • IT 기술이 급속히 발전하는 현대 초연결 환경은 네트워크 장비들이 다양해지고 네트워크 구성이 복잡해짐에 따라 사이버 공격자가 침투경로로 활용될 수 있는 공격표면(attack surface) 또한 증가하게 되었다. 이러한 환경에서 사이버 공격을 원천적으로 방어하기 위해 공격표면을 변이하는 MTD(Moving Target Defense) 기술이 연구되고 있다. 그중에 네트워크를 통해 공격이 시작됨에 따라 주요 속성 네트워크 주소를 변이하는 기술이 있으나, 대부분 운용환경이 기존 고정 IP 기반으로 운용되기 때문에 주소변이 기술이 기존 네트워크 보호체계 내에 적용되었을 때 어떠한 영향이 있는지 연구가 필요하다. 본 논문에서는 기존 네트워크 보호체계에서 네트워크 주소변이 기술이 적용되었을 때의 영향성을 연구하였고 연구 결과로서 네트워크 보호체계의 주요 시스템인 방화벽, NAC, IPS와 네트워크 주소변이 기술이 동시 적용되었을 때 운용 측면에서 고려해야 할 요소를 도출하였다. 또한 사이버 대응체계 내에서 네트워크 분석시스템과의 연동성을 위해 네트워크 주소변이 기술에서 관리해야하는 요소를 제안하였다.

Polymorphic Path Transferring for Secure Flow Delivery

  • Zhang, Rongbo;Li, Xin;Zhan, Yan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권8호
    • /
    • pp.2805-2826
    • /
    • 2021
  • In most cases, the routing policy of networks shows a preference for a static one-to-one mapping of communication pairs to routing paths, which offers adversaries a great advantage to conduct thorough reconnaissance and organize an effective attack in a stress-free manner. With the evolution of network intelligence, some flexible and adaptive routing policies have already proposed to intensify the network defender to turn the situation. Routing mutation is an effective strategy that can invalidate the unvarying nature of routing information that attackers have collected from exploiting the static configuration of the network. However, three constraints execute press on routing mutation deployment in practical: insufficient route mutation space, expensive control costs, and incompatibility. To enhance the availability of route mutation, we propose an OpenFlow-based route mutation technique called Polymorphic Path Transferring (PPT), which adopts a physical and virtual path segment mixed construction technique to enlarge the routing path space for elevating the security of communication. Based on the Markov Decision Process, with considering flows distribution in the network, the PPT adopts an evolution routing path scheduling algorithm with a segment path update strategy, which relieves the press on the overhead of control and incompatibility. Our analysis demonstrates that PPT can secure data delivery in the worst network environment while countering sophisticated attacks in an evasion-free manner (e.g., advanced persistent threat). Case study and experiment results show its effectiveness in proactively defending against targeted attacks and its advantage compared with previous route mutation methods.

Analysis of Threat Model and Requirements in Network-based Moving Target Defense

  • Kang, Koo-Hong;Park, Tae-Keun;Moon, Dae-Sung
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권10호
    • /
    • pp.83-92
    • /
    • 2017
  • Reconnaissance is performed gathering information from a series of scanning probes where the objective is to identify attributes of target hosts. Network reconnaissance of IP addresses and ports is prerequisite to various cyber attacks. In order to increase the attacker's workload and to break the attack kill chain, a few proactive techniques based on the network-based moving target defense (NMTD) paradigm, referred to as IP address mutation/randomization, have been presented. However, there are no commercial or trial systems deployed in real networks. In this paper, we propose a threat model and the request for requirements for developing NMTD techniques. For this purpose, we first examine the challenging problems in the NMTD mechanisms that were proposed for the legacy TCP/IP network. Secondly, we present a threat model in terms of attacker's intelligence, the intended information scope, and the attacker's location. Lastly, we provide seven basic requirements to develop an NMTD mechanism for the legacy TCP/IP network: 1) end-host address mutation, 2) post tracking, 3) address mutation unit, 4) service transparency, 5) name and address access, 6) adaptive defense, and 7) controller operation. We believe that this paper gives some insight into how to design and implement a new NMTD mechanism that would be deployable in real network.

An Approach for Applying Network-based Moving Target Defense into Internet of Things Networks

  • Park, Tae-Keun;Park, Kyung-Min;Moon, Dae-Sung
    • 한국컴퓨터정보학회논문지
    • /
    • 제24권9호
    • /
    • pp.35-42
    • /
    • 2019
  • In this paper, we propose an approach to apply network-based moving target defense into Internet of Things (IoT) networks. The IoT is a technology that provides the high interconnectivity of things like electronic devices. However, cyber security risks are expected to increase as the interconnectivity of such devices increases. One recent study demonstrated a man-in-the-middle attack in the statically configured IoT network. In recent years, a new approach to cyber security, called the moving target defense, has emerged as a potential solution to the challenge of static systems. The approach continuously changes system's attack surface to prevent attacks. After analyzing IPv4 / IPv6-based moving target defense schemes and IoT network-related technologies, we present our approach in terms of addressing systems, address mutation techniques, communication models, network configuration, and node mobility. In addition, we summarize the direction of future research in relation to the proposed approach.

Engineering of the Phytase YiAPPA to Improve Thermostability and Activity and Its Application Potential in Dephytinization of Food Ingredients

  • Jing Zeng;Jianjun Guo;Lin Yuan
    • Journal of Microbiology and Biotechnology
    • /
    • 제34권8호
    • /
    • pp.1660-1670
    • /
    • 2024
  • The aim of this study was to modify phytase YiAPPA via protein surficial residue mutation to obtain phytase mutants with improved thermostability and activity, enhancing its application potential in the food industry. First, homology modeling of YiAPPA was performed. By adopting the strategy of protein surficial residue mutation, the lysine (Lys) and glycine (Gly) residues on the protein surface were selected for site-directed mutagenesis to construct single-site mutants. Thermostability screening was performed to obtain mutants (K189R and K216R) with significantly elevated thermostability. The combined mutant K189R/K216R was constructed via beneficial mutation site stacking and characterized. Compared with those of YiAPPA, the half-life of K189R/K216R at 80℃ was extended from 14.81 min to 23.35 min, half-inactivation temperature (T5030) was increased from 55.12℃ to 62.44℃, and Tm value was increased from 48.36℃ to 53.18℃. Meanwhile, the specific activity of K189R/K216R at 37℃ and pH 4.5 increased from 3960.81 to 4469.13 U/mg. Molecular structure modeling analysis and molecular dynamics simulation showed that new hydrogen bonds were introduced into K189R/K216R, improving the stability of certain structural units of the phytase and its thermostability. The enhanced activity was primarily attributed to reduced enzyme-substrate binding energy and shorter nucleophilic attack distance between the catalytic residue His28 and the phytate substrate. Additionally, the K189R/K216R mutant increased the hydrolysis efficiency of phytate in food ingredients by 1.73-2.36 times. This study established an effective method for the molecular modification of phytase thermostability and activity, providing the food industry with an efficient phytase for hydrolyzing phytate in food ingredients.

SD-MTD: Software-Defined Moving-Target Defense for Cloud-System Obfuscation

  • Kang, Ki-Wan;Seo, Jung Taek;Baek, Sung Hoon;Kim, Chul Woo;Park, Ki-Woong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권3호
    • /
    • pp.1063-1075
    • /
    • 2022
  • In recent years, container techniques have been broadly applied to cloud computing systems to maximize their efficiency, flexibility, and economic feasibility. Concurrently, studies have also been conducted to ensure the security of cloud computing. Among these studies, moving-target defense techniques using the high agility and flexibility of cloud-computing systems are gaining attention. Moving-target defense (MTD) is a technique that prevents various security threats in advance by proactively changing the main attributes of the protected target to confuse the attacker. However, an analysis of existing MTD techniques revealed that, although they are capable of deceiving attackers, MTD techniques have practical limitations when applied to an actual cloud-computing system. These limitations include resource wastage, management complexity caused by additional function implementation and system introduction, and a potential increase in attack complexity. Accordingly, this paper proposes a software-defined MTD system that can flexibly apply and manage existing and future MTD techniques. The proposed software-defined MTD system is designed to correctly define a valid mutation range and cycle for each moving-target technique and monitor system-resource status in a software-defined manner. Consequently, the proposed method can flexibly reflect the requirements of each MTD technique without any additional hardware by using a software-defined approach. Moreover, the increased attack complexity can be resolved by applying multiple MTD techniques.

Mutagenicity and Antimutagenicity of Hydrophilic and Lipophilic Extracts of Thai Northern Purple Rice

  • Punvittayagul, Charatda;Sringarm, Korawan;Chaiyasut, Chaiyawat;Wongpoomchai, Rawiwan
    • Asian Pacific Journal of Cancer Prevention
    • /
    • 제15권21호
    • /
    • pp.9517-9522
    • /
    • 2014
  • Purple rice (Oryza sativa L. var. indica) cv. Kum Doisaket is cultivated in northern Thailand. This study evaluated the mutagenic and antimutagenic properties of hydrophilic and lipophilic components of purple rice using the Ames test. The seed and hull of purple rice were extracted with hexane, methanol, ethanol, and water. The methanol extracts had the highest amounts of phenolic acids and flavonoids, while the hexane extracts contained large amount of tocols and ${\gamma}$-oryzanol. None of the extracts were mutagenic in Salmonella typhimurium strains TA98 and TA100. The hexane extract of rice hull and the methanol extract of rice seed were strongly effective against aflatoxin B1- and 2-amino-3, 4 dimethylimidazo (4, 5-f) quinoline-induced mutagenesis, while aqueous extracts showed weakly antimutagenic properties. All extracts with the exception of aqueous extracts enhanced the number of revertant colonies from benzo (a) pyrene induced-mutagenesis. None of the extracts inhibited mutagenesis induced by the direct mutagens 2-(2-furyl)-3-(5-nitro-2-furyl)-acrylamide and sodium azide. The hull extracts showed more potent antimutagenicity than the seed extracts. Based on a chemical analysis, ${\gamma}$-oryzanol and ${\gamma}$-tocotrienol in the hull and cyanidin-3-glucoside and peonidin-3-glucoside in the seed are candidate antimutagens in purple rice. The antimutagenic mechanisms of purple rice might be related to either modulation of mutagen metabolizing enzymes or direct attack on electrophiles. These findings supported the use of Thai purple rice as a cancer chemopreventive agent.

부호 영역 DNA 시퀀스 기반 강인한 DNA 워터마킹 (Robust DNA Watermarking based on Coding DNA Sequence)

  • 이석환;권성근;권기룡
    • 전자공학회논문지CI
    • /
    • 제49권2호
    • /
    • pp.123-133
    • /
    • 2012
  • 본 논문에서는 DNA 시퀀스의 불법 복제 및 변이 방지와 개인 정보 침해 방지, 또는 인증을 위한 DNA 워터마킹에 대하여 논의하며, 변이에 강인하고 아미노산 보존성을 가지는 부호영역 DNA 시퀀스 기반 DNA 워터마킹 기법을 제안한다. 제안한 DNA 워터마킹은 부호 영역의 코돈 서열에서 정규 특이점에 해당되는 코돈들을 삽입 대상으로 선택되며, 워터마크된 코돈이 원본 코돈과 동일한 아미노산으로 번역되도록 워터마크가 삽입된다. DNA 염기 서열은 4개의 문자 {A,G,C,T}로 (RNA은 {A,C,G,U}) 구성된 문자열이다. 제안한 방법에서는 워터마킹 신호처리에 적합한 코돈 부호 테이블을 설계하였으며, 이 테이블에 따라 코돈 서열들을 정수열로 변환한 다음 원형 각도 형태의 실수열로 재변환한다. 여기서 코돈은 3개의 염기들로 구성되며, 64개의 코돈들은 20개의 아미노산으로 번역된다. 선택된 코돈들은 아미노산 보존성을 가지는 원형 각도 실수 범위 내에서 인접 코돈과의 원형 거리차 기준으로 워터마크에 따라 변경된다. HEXA와 ANG 시퀀스를 이용한 $in$ $silico$ 실험을 통하여 제안한 방법이 기존 방법에 비하여 아미노산 보존성을 가지면서 침묵 변이와 미스센스 변이에 보다 강인함을 확인하였다.

Hypokalemic periodic paralysis: two different genes responsible for similar clinical manifestations

  • Kim, Hun-Min;Hwang, Hee;Cheong, Hae-Il;Park, Hye-Won
    • Clinical and Experimental Pediatrics
    • /
    • 제54권11호
    • /
    • pp.473-476
    • /
    • 2011
  • Primary hypokalemic periodic paralysis (HOKPP) is an autosomal dominant disorder manifesting as recurrent periodic flaccid paralysis and concomitant hypokalemia. HOKPP is divided into type 1 and type 2 based on the causative gene. Although 2 different ion channels have been identified as the molecular genetic cause of HOKPP, the clinical manifestations between the 2 groups are similar. We report the cases of 2 patients with HOKPP who both presented with typical clinical manifestations, but with mutations in 2 different genes ($CACNA1S$ p.Arg528His and $SCN4A$ p.Arg672His). Despite the similar clinical manifestations, there were differences in the response to acetazolamide treatment between certain genotypes of $SCN4A$ mutations and $CACNA1S$ mutations. We identified p.Arg672His in the $SCN4A$ gene of patient 2 immediately after the first attack through a molecular genetic testing strategy. Molecular genetic diagnosis is important for genetic counseling and selecting preventive treatment.

Upregulation of Dendritic Arborization by N-acetyl-D-Glucosamine Kinase Is Not Dependent on Its Kinase Activity

  • Lee, HyunSook;Dutta, Samikshan;Moon, Il Soo
    • Molecules and Cells
    • /
    • 제37권4호
    • /
    • pp.322-329
    • /
    • 2014
  • N-acetylglucosamine kinase (GlcNAc kinase or NAGK; EC 2.7.1.59) is highly expressed and plays a critical role in the development of dendrites in brain neurons. In this study, the authors conducted structure-function analysis to verify the previously proposed 3D model structure of GlcNAc/ATP-bound NAGK. Three point NAGK mutants with different substrate binding capacities and reaction velocities were produced. Wild-type (WT) NAGK showed strong substrate preference for GlcNAc. Conversion of Cys143, which does not make direct hydrogen bonds with GlcNAc, to Ser (i.e., C143S) had the least affect on the enzymatic activity of NAGK. Conversion of Asn36, which plays a role in domain closure by making a hydrogen bond with GlcNAc, to Ala (i.e., N36A) mildly reduced NAGK enzyme activity. Conversion of Asp107, which makes hydrogen bonds with GlcNAc and would act as a proton acceptor during nucleophilic attack on the ${\gamma}$-phosphate of ATP, to Ala (i.e., D107A), caused a total loss in enzyme activity. The overexpression of EGFP-tagged WT or any of the mutant NAGKs in rat hippocampal neurons (DIV 5-9) increased dendritic architectural complexity. Finally, the overexpression of the small, but not of the large, domain of NAGK resulted in dendrite degeneration. Our data show the effect of structure on the functional aspects of NAGK, and in particular, that the small domain of NAGK, and not its NAGK kinase activity, plays a critical role in the upregulation of dendritogenesis.