• Title/Summary/Keyword: Mutation attack

Search Result 11, Processing Time 0.026 seconds

A Study on the Impact of Applying Network Address Mutation Technology within the Network Protection System (네트워크 보호체계에서 네트워크 주소변이 기술 적용에 대한 영향성 연구)

  • Suwon Lee;Seyoung Hwang;SeukGue Hong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.939-946
    • /
    • 2023
  • In the hyper-connected network, which network equipment is diverse and network structure is complex, the attack surface has also increased. In this environment, MTD(Moving Target Defense) technology is being researched as a method to fundamentally defend against cyber attacks by actively changing the attack surface. network-based MTD technologies are being widely studied. However, in order for network address mutation technology to be applied within the existing fixed IP-based system, research is needed to determine what impact it will have. In this paper, we studied the impact of applying network address mutation technology to the existing network protection system. As a result of the study, factors to be considered when firewall, NAC, IPS, and network address mutation technologies are operated together were derived, and elements that must be managed in network address mutation technology for interoperability with the network analysis system were suggested.

Polymorphic Path Transferring for Secure Flow Delivery

  • Zhang, Rongbo;Li, Xin;Zhan, Yan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2805-2826
    • /
    • 2021
  • In most cases, the routing policy of networks shows a preference for a static one-to-one mapping of communication pairs to routing paths, which offers adversaries a great advantage to conduct thorough reconnaissance and organize an effective attack in a stress-free manner. With the evolution of network intelligence, some flexible and adaptive routing policies have already proposed to intensify the network defender to turn the situation. Routing mutation is an effective strategy that can invalidate the unvarying nature of routing information that attackers have collected from exploiting the static configuration of the network. However, three constraints execute press on routing mutation deployment in practical: insufficient route mutation space, expensive control costs, and incompatibility. To enhance the availability of route mutation, we propose an OpenFlow-based route mutation technique called Polymorphic Path Transferring (PPT), which adopts a physical and virtual path segment mixed construction technique to enlarge the routing path space for elevating the security of communication. Based on the Markov Decision Process, with considering flows distribution in the network, the PPT adopts an evolution routing path scheduling algorithm with a segment path update strategy, which relieves the press on the overhead of control and incompatibility. Our analysis demonstrates that PPT can secure data delivery in the worst network environment while countering sophisticated attacks in an evasion-free manner (e.g., advanced persistent threat). Case study and experiment results show its effectiveness in proactively defending against targeted attacks and its advantage compared with previous route mutation methods.

Analysis of Threat Model and Requirements in Network-based Moving Target Defense

  • Kang, Koo-Hong;Park, Tae-Keun;Moon, Dae-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.10
    • /
    • pp.83-92
    • /
    • 2017
  • Reconnaissance is performed gathering information from a series of scanning probes where the objective is to identify attributes of target hosts. Network reconnaissance of IP addresses and ports is prerequisite to various cyber attacks. In order to increase the attacker's workload and to break the attack kill chain, a few proactive techniques based on the network-based moving target defense (NMTD) paradigm, referred to as IP address mutation/randomization, have been presented. However, there are no commercial or trial systems deployed in real networks. In this paper, we propose a threat model and the request for requirements for developing NMTD techniques. For this purpose, we first examine the challenging problems in the NMTD mechanisms that were proposed for the legacy TCP/IP network. Secondly, we present a threat model in terms of attacker's intelligence, the intended information scope, and the attacker's location. Lastly, we provide seven basic requirements to develop an NMTD mechanism for the legacy TCP/IP network: 1) end-host address mutation, 2) post tracking, 3) address mutation unit, 4) service transparency, 5) name and address access, 6) adaptive defense, and 7) controller operation. We believe that this paper gives some insight into how to design and implement a new NMTD mechanism that would be deployable in real network.

An Approach for Applying Network-based Moving Target Defense into Internet of Things Networks

  • Park, Tae-Keun;Park, Kyung-Min;Moon, Dae-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.9
    • /
    • pp.35-42
    • /
    • 2019
  • In this paper, we propose an approach to apply network-based moving target defense into Internet of Things (IoT) networks. The IoT is a technology that provides the high interconnectivity of things like electronic devices. However, cyber security risks are expected to increase as the interconnectivity of such devices increases. One recent study demonstrated a man-in-the-middle attack in the statically configured IoT network. In recent years, a new approach to cyber security, called the moving target defense, has emerged as a potential solution to the challenge of static systems. The approach continuously changes system's attack surface to prevent attacks. After analyzing IPv4 / IPv6-based moving target defense schemes and IoT network-related technologies, we present our approach in terms of addressing systems, address mutation techniques, communication models, network configuration, and node mobility. In addition, we summarize the direction of future research in relation to the proposed approach.

Engineering of the Phytase YiAPPA to Improve Thermostability and Activity and Its Application Potential in Dephytinization of Food Ingredients

  • Jing Zeng;Jianjun Guo;Lin Yuan
    • Journal of Microbiology and Biotechnology
    • /
    • v.34 no.8
    • /
    • pp.1660-1670
    • /
    • 2024
  • The aim of this study was to modify phytase YiAPPA via protein surficial residue mutation to obtain phytase mutants with improved thermostability and activity, enhancing its application potential in the food industry. First, homology modeling of YiAPPA was performed. By adopting the strategy of protein surficial residue mutation, the lysine (Lys) and glycine (Gly) residues on the protein surface were selected for site-directed mutagenesis to construct single-site mutants. Thermostability screening was performed to obtain mutants (K189R and K216R) with significantly elevated thermostability. The combined mutant K189R/K216R was constructed via beneficial mutation site stacking and characterized. Compared with those of YiAPPA, the half-life of K189R/K216R at 80℃ was extended from 14.81 min to 23.35 min, half-inactivation temperature (T5030) was increased from 55.12℃ to 62.44℃, and Tm value was increased from 48.36℃ to 53.18℃. Meanwhile, the specific activity of K189R/K216R at 37℃ and pH 4.5 increased from 3960.81 to 4469.13 U/mg. Molecular structure modeling analysis and molecular dynamics simulation showed that new hydrogen bonds were introduced into K189R/K216R, improving the stability of certain structural units of the phytase and its thermostability. The enhanced activity was primarily attributed to reduced enzyme-substrate binding energy and shorter nucleophilic attack distance between the catalytic residue His28 and the phytate substrate. Additionally, the K189R/K216R mutant increased the hydrolysis efficiency of phytate in food ingredients by 1.73-2.36 times. This study established an effective method for the molecular modification of phytase thermostability and activity, providing the food industry with an efficient phytase for hydrolyzing phytate in food ingredients.

SD-MTD: Software-Defined Moving-Target Defense for Cloud-System Obfuscation

  • Kang, Ki-Wan;Seo, Jung Taek;Baek, Sung Hoon;Kim, Chul Woo;Park, Ki-Woong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.3
    • /
    • pp.1063-1075
    • /
    • 2022
  • In recent years, container techniques have been broadly applied to cloud computing systems to maximize their efficiency, flexibility, and economic feasibility. Concurrently, studies have also been conducted to ensure the security of cloud computing. Among these studies, moving-target defense techniques using the high agility and flexibility of cloud-computing systems are gaining attention. Moving-target defense (MTD) is a technique that prevents various security threats in advance by proactively changing the main attributes of the protected target to confuse the attacker. However, an analysis of existing MTD techniques revealed that, although they are capable of deceiving attackers, MTD techniques have practical limitations when applied to an actual cloud-computing system. These limitations include resource wastage, management complexity caused by additional function implementation and system introduction, and a potential increase in attack complexity. Accordingly, this paper proposes a software-defined MTD system that can flexibly apply and manage existing and future MTD techniques. The proposed software-defined MTD system is designed to correctly define a valid mutation range and cycle for each moving-target technique and monitor system-resource status in a software-defined manner. Consequently, the proposed method can flexibly reflect the requirements of each MTD technique without any additional hardware by using a software-defined approach. Moreover, the increased attack complexity can be resolved by applying multiple MTD techniques.

Mutagenicity and Antimutagenicity of Hydrophilic and Lipophilic Extracts of Thai Northern Purple Rice

  • Punvittayagul, Charatda;Sringarm, Korawan;Chaiyasut, Chaiyawat;Wongpoomchai, Rawiwan
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.21
    • /
    • pp.9517-9522
    • /
    • 2014
  • Purple rice (Oryza sativa L. var. indica) cv. Kum Doisaket is cultivated in northern Thailand. This study evaluated the mutagenic and antimutagenic properties of hydrophilic and lipophilic components of purple rice using the Ames test. The seed and hull of purple rice were extracted with hexane, methanol, ethanol, and water. The methanol extracts had the highest amounts of phenolic acids and flavonoids, while the hexane extracts contained large amount of tocols and ${\gamma}$-oryzanol. None of the extracts were mutagenic in Salmonella typhimurium strains TA98 and TA100. The hexane extract of rice hull and the methanol extract of rice seed were strongly effective against aflatoxin B1- and 2-amino-3, 4 dimethylimidazo (4, 5-f) quinoline-induced mutagenesis, while aqueous extracts showed weakly antimutagenic properties. All extracts with the exception of aqueous extracts enhanced the number of revertant colonies from benzo (a) pyrene induced-mutagenesis. None of the extracts inhibited mutagenesis induced by the direct mutagens 2-(2-furyl)-3-(5-nitro-2-furyl)-acrylamide and sodium azide. The hull extracts showed more potent antimutagenicity than the seed extracts. Based on a chemical analysis, ${\gamma}$-oryzanol and ${\gamma}$-tocotrienol in the hull and cyanidin-3-glucoside and peonidin-3-glucoside in the seed are candidate antimutagens in purple rice. The antimutagenic mechanisms of purple rice might be related to either modulation of mutagen metabolizing enzymes or direct attack on electrophiles. These findings supported the use of Thai purple rice as a cancer chemopreventive agent.

Robust DNA Watermarking based on Coding DNA Sequence (부호 영역 DNA 시퀀스 기반 강인한 DNA 워터마킹)

  • Lee, Suk-Hwan;Kwon, Seong-Geun;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.2
    • /
    • pp.123-133
    • /
    • 2012
  • This paper discuss about DNA watermarking using coding DNA sequence (CDS) for the authentication, the privacy protection, or the prevention of illegal copy and mutation of DNA sequence and propose a DNA watermarking scheme with the mutation robustness and the animo acid preservation. The proposed scheme selects a number of codons at the regular singularity in coding regions for the embedding target and embeds the watermark for watermarked codons and original codons to be transcribed to the same amino acids. DNA base sequence is the string of 4 characters, {A,G,C,T} ({A,G,C,U} in RNA). We design the codon coding table suitable to watermarking signal processing and transform the codon sequence to integer numerical sequence by this table and re-transform this sequence to floating numerical sequence of circular angle. A codon consists of a consecutive of three bases and 64 codons are transcribed to one from 20 amino acids. We substitute the angle of selected codon to one among the angle range with the same animo acid, which is determined by the watermark bit and the angle difference of adjacent codons. From in silico experiment by using HEXA and ANG sequences, we verified that the proposed scheme is more robust to silent and missense mutations than the conventional scheme and preserve the amino acids of the watermarked codons.

Hypokalemic periodic paralysis: two different genes responsible for similar clinical manifestations

  • Kim, Hun-Min;Hwang, Hee;Cheong, Hae-Il;Park, Hye-Won
    • Clinical and Experimental Pediatrics
    • /
    • v.54 no.11
    • /
    • pp.473-476
    • /
    • 2011
  • Primary hypokalemic periodic paralysis (HOKPP) is an autosomal dominant disorder manifesting as recurrent periodic flaccid paralysis and concomitant hypokalemia. HOKPP is divided into type 1 and type 2 based on the causative gene. Although 2 different ion channels have been identified as the molecular genetic cause of HOKPP, the clinical manifestations between the 2 groups are similar. We report the cases of 2 patients with HOKPP who both presented with typical clinical manifestations, but with mutations in 2 different genes ($CACNA1S$ p.Arg528His and $SCN4A$ p.Arg672His). Despite the similar clinical manifestations, there were differences in the response to acetazolamide treatment between certain genotypes of $SCN4A$ mutations and $CACNA1S$ mutations. We identified p.Arg672His in the $SCN4A$ gene of patient 2 immediately after the first attack through a molecular genetic testing strategy. Molecular genetic diagnosis is important for genetic counseling and selecting preventive treatment.

Upregulation of Dendritic Arborization by N-acetyl-D-Glucosamine Kinase Is Not Dependent on Its Kinase Activity

  • Lee, HyunSook;Dutta, Samikshan;Moon, Il Soo
    • Molecules and Cells
    • /
    • v.37 no.4
    • /
    • pp.322-329
    • /
    • 2014
  • N-acetylglucosamine kinase (GlcNAc kinase or NAGK; EC 2.7.1.59) is highly expressed and plays a critical role in the development of dendrites in brain neurons. In this study, the authors conducted structure-function analysis to verify the previously proposed 3D model structure of GlcNAc/ATP-bound NAGK. Three point NAGK mutants with different substrate binding capacities and reaction velocities were produced. Wild-type (WT) NAGK showed strong substrate preference for GlcNAc. Conversion of Cys143, which does not make direct hydrogen bonds with GlcNAc, to Ser (i.e., C143S) had the least affect on the enzymatic activity of NAGK. Conversion of Asn36, which plays a role in domain closure by making a hydrogen bond with GlcNAc, to Ala (i.e., N36A) mildly reduced NAGK enzyme activity. Conversion of Asp107, which makes hydrogen bonds with GlcNAc and would act as a proton acceptor during nucleophilic attack on the ${\gamma}$-phosphate of ATP, to Ala (i.e., D107A), caused a total loss in enzyme activity. The overexpression of EGFP-tagged WT or any of the mutant NAGKs in rat hippocampal neurons (DIV 5-9) increased dendritic architectural complexity. Finally, the overexpression of the small, but not of the large, domain of NAGK resulted in dendrite degeneration. Our data show the effect of structure on the functional aspects of NAGK, and in particular, that the small domain of NAGK, and not its NAGK kinase activity, plays a critical role in the upregulation of dendritogenesis.