• Title/Summary/Keyword: Physical attack

Search Result 312, Processing Time 0.031 seconds

Detecting Anomalies, Sabotage, and Malicious Acts in a Cyber-physical System Using Fractal Dimension Based on Higuchi's Algorithm

  • Marwan Albahar
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.69-78
    • /
    • 2023
  • With the global rise of digital data, the uncontrolled quantity of data is susceptible to cyber warfare or cyber attacks. Therefore, it is necessary to improve cyber security systems. This research studies the behavior of malicious acts and uses Higuchi Fractal Dimension (HFD), which is a non-linear mathematical method to examine the intricacy of the behavior of these malicious acts and anomalies within the cyber physical system. The HFD algorithm was tested successfully using synthetic time series network data and validated on real-time network data, producing accurate results. It was found that the highest fractal dimension value was computed from the DoS attack time series data. Furthermore, the difference in the HFD values between the DoS attack data and the normal traffic data was the highest. The malicious network data and the non-malicious network data were successfully classified using the Receiver Operating Characteristics (ROC) method in conjunction with a scaling stationary index that helps to boost the ROC technique in classifying normal and malicious traffic. Hence, the suggested methodology may be utilized to rapidly detect the existence of abnormalities in traffic with the aim of further using other methods of cyber-attack detection.

The Influence of Carbonation on Physical and Chemical Property in Mortar (모르터의 물리.화학적 특성에 미치는 중성화의 영향)

  • 문소현;소승영;소양섭
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 1995.10a
    • /
    • pp.30-34
    • /
    • 1995
  • There are carbonatiion, salt attack, freezing & thawing and alkali-aggregate reactions as the cautions of durability lowering of concret structure. Generally, these cautions complicatedly lower the durability of structure and among these cautions the most serious problem is salt attack and carbonation. This study is intending to get the carbonation phenominon, that among cement calcium hydroxides change into calcium carbonate by responding to carbon mitrogen in the air.

  • PDF

A Study on Risk Factor Found in the Patients with Stroke in Physical Therapy (물리치료를 받는 뇌졸중 환자의 발병 관계요인에 관한 조사연구)

  • Kim, Yong-Nam
    • Journal of Korean Physical Therapy Science
    • /
    • v.3 no.3
    • /
    • pp.57-64
    • /
    • 1996
  • The purpose of this study is to investigate risk factor found in the patients with stroke in physical therapy. A questionnaire survey was carried out for 130 the patients, who had comparatively alert mentality, hospitalized in kyung hee oriental medical hospital with stroke from January, 1st to May 31st, 1996. Major findings of this stuty were as follows. 1. The stroke patients 67(51.5%)were males and 63(48.5%) femals. The age groups of 50 to 69 years accounted for 67.6% of the total stroke patients are the highest. The job groups of commerce and business of patients 58.5%. The living groups of major citys of the revealed the highest incidence(40.8%). 2. There were 40 patients (30.8 %) who had hemorrhage related condions as the direct cause of their stroke, and 90 patients (69.2 %) who had cerebral infarction with no hemorrhaging as the cause. of the disease that the patients suffered from before their stroke, blood pressure related problems were most numberous 76 patients(58.5%) had such problems. 3. A month before their attack of stroke, were asked what thay thought could become the causes of their strokes. The most frequently mentioned answers were fatigue, drinking too much, and smoking, as chosen by 45 patients(34.6 %). 4. In regarding the relation between stress and stroke, (37.7%), of the surveyed belonged to the most numerous group had of people who said they were not under stress. Yet this group had a large number of parents. And 22.3 % of the surveyed named conflicts among parents, siblings, and relatives. 5. Questions were asked to find out the relationship between complications of stroke and smoking or drinking. It was surprising to see a high rate of attack among the 55.4 % majority who answered that they did not smoke nor drink. 6. To sum up the affect of food on attack of stroke, 42.5% of the people who had a sprcey and salty diet had a higher rate of attack then the group of people with leisurely nature. 7. Looking at the family history, 40.4% of the patients said their parents also suffered the disease. This percentage is the highest. And 40.0% answered that there is no one who suffered in their family history. Judging from the percentages and family.

  • PDF

Differential Power Analysis Attack on Cryptosystem adopted NAF Algorithm as a Secret Key Recoding Method (비밀키를 NAF로 사용하는 암호시스템의 차분 전력분석 공격)

  • Ahn Mahn-Ki;Ha Jae-Cheol;Lee Hoon-Jae;Moon Sang-Jae
    • Journal of Internet Computing and Services
    • /
    • v.4 no.3
    • /
    • pp.1-8
    • /
    • 2003
  • The power analysis attack is a physical attack which can be applied to the cryptosystems such as smartcard. We try to experimental attack to a smart card which implemented Elliptic Curve Cryptosystem adopting NAF algorithm as a secret key recording method. Our differential power analysis attack is a potential threat to that implementation. The attacker measures the power traces during the multiplication with secret key bits in a target smart card and the multiplication with the guessed bits in other experimental one. The comparison of these two traces gives a secret bit, which means that attacker can find all secret key bits successively.

  • PDF

Fault Analysis Attacks on Control Statement of RSA Exponentiation Algorithm (RSA 멱승 알고리즘의 제어문에 대한 오류 주입 공격)

  • Gil, Kwang-Eun;Baek, Yi-Roo;Kim, Hwan-Koo;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.63-70
    • /
    • 2009
  • Many research results show that RSA system mounted using conventional binary exponentiation algorithm is vulnerable to some physical attacks. Recently, Schmidt and Hurbst demonstrated experimentally that an attacker can exploit secret key using faulty signatures which are obtained by skipping the squaring operations. Based on similar assumption of Schmidt and Hurbst's fault attack, we proposed new fault analysis attacks which can be made by skipping the multiplication operations or computations in looping control statement. Furthermore, we applied our attack to Montgomery ladder exponentiation algorithm which was proposed to defeat simple power attack. As a result, our fault attack can extract secret key used in Montgomery ladder exponentiation.

Escape Behavior of Medaka (Oryzias latipes) in Response to Aerial Predators of Different Sizes and with Different Attack Speeds

  • Lee, Sang-Hee
    • Proceedings of the National Institute of Ecology of the Republic of Korea
    • /
    • v.3 no.1
    • /
    • pp.47-53
    • /
    • 2022
  • The escape behavior of prey fish to predator attack is directly linked to the survival of the fish. In this study, I explored the escape behavior of Medaka fish to bird attacks. To simulate the attack, I designed a model triangular-shaped bird to slide along a fishing line connected between rods at both ends of the tank. The triangular shape was set to 10×15 (S=1), 15×20 (S=2), and 20×25 cm (S=3) with base×height. The slope (θ) of the fishing line, which determines the attack speed of the model bird, was set to values of 15° (θ=1), 30° (θ=2), and 45° (θ=3). The escape behavior was characterized using five variables: escape speed (ν), escape acceleration (α), responsiveness (γ), branch length similarity entropy (ε), and alignment (ϕ). The experimental results showed when (S, θ)=(fixed, varied), the change in values of the five variables were not significant. Thus, the fish respond more sensitively to S than to θ In contrast, when (S, θ)=(varied, fixed), ν, α, and γ showed increasing trends but ε and ϕ did not change much. This indicates the nature of fish escape behavior irrespective of the threat is inherent in ε and ϕ. I found that fish escape behavior can be divided into two types for the five physical quantities. In particular, the analysis showed that the type was mainly determined by the size of the model bird.

Improving the Cyber Security over Banking Sector by Detecting the Malicious Attacks Using the Wrapper Stepwise Resnet Classifier

  • Damodharan Kuttiyappan;Rajasekar, V
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1657-1673
    • /
    • 2023
  • With the advancement of information technology, criminals employ multiple cyberspaces to promote cybercrime. To combat cybercrime and cyber dangers, banks and financial institutions use artificial intelligence (AI). AI technologies assist the banking sector to develop and grow in many ways. Transparency and explanation of AI's ability are required to preserve trust. Deep learning protects client behavior and interest data. Deep learning techniques may anticipate cyber-attack behavior, allowing for secure banking transactions. This proposed approach is based on a user-centric design that safeguards people's private data over banking. Here, initially, the attack data can be generated over banking transactions. Routing is done for the configuration of the nodes. Then, the obtained data can be preprocessed for removing the errors. Followed by hierarchical network feature extraction can be used to identify the abnormal features related to the attack. Finally, the user data can be protected and the malicious attack in the transmission route can be identified by using the Wrapper stepwise ResNet classifier. The proposed work outperforms other techniques in terms of attack detection and accuracy, and the findings are depicted in the graphical format by employing the Python tool.

An Experimental Study on the Salt Resistance Properties with Concrete Materials under Marine Environment (해양환경에 노출시킨 콘크리트의 내염성능 평가)

  • Ko Jeong-Jae;Kim Young-Ung;Kim Dong-Chul;Shin Do-Chul;Kim Sang-Yong;Byun Dae-Bong
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2004.05a
    • /
    • pp.790-793
    • /
    • 2004
  • The factors influencing concrete deterioration in marine environment can be generally divided into the physical and chemical action. The physical attack due to drying and wetting would increase the internal stress of concrete. The chemical attack resulting from the diffusion of ions$(i,e,\;Cl^-,SO_4^{2-},Mg^+)$ from seawater through the pores in concrete. The objective of this study is to evaluate corrosion characteristics of steel when using the various concrete materials under marine exposure environment. After 3 years of exposure, concrete specimen incorporating $40\%$ blast-furnace slag as replacement for type I cement with low w/c ratio of 0.42 and using the inhibitor shows excellent performance.

  • PDF

Multi-modal Authentication Using Score Fusion of ECG and Fingerprints

  • Kwon, Young-Bin;Kim, Jason
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.2
    • /
    • pp.132-146
    • /
    • 2020
  • Biometric technologies have become widely available in many different fields. However, biometric technologies using existing physical features such as fingerprints, facial features, irises, and veins must consider forgery and alterations targeting them through fraudulent physical characteristics such as fake fingerprints. Thus, a trend toward next-generation biometric technologies using behavioral biometrics of a living person, such as bio-signals and walking characteristics, has emerged. Accordingly, in this study, we developed a bio-signal authentication algorithm using electrocardiogram (ECG) signals, which are the most uniquely identifiable form of bio-signal available. When using ECG signals with our system, the personal identification and authentication accuracy are approximately 90% during a state of rest. When using fingerprints alone, the equal error rate (EER) is 0.243%; however, when fusing the scores of both the ECG signal and fingerprints, the EER decreases to 0.113% on average. In addition, as a function of detecting a presentation attack on a mobile phone, a method for rejecting a transaction when a fake fingerprint is applied was successfully implemented.

Counterattack Method against Hacked Node in CAN Bus Physical Layer (CAN 버스 물리 계층에서 해킹된 노드의 대처 기법)

  • Kang, Tae-Wook;Lee, Jong-Bae;Lee, Seongsoo
    • Journal of IKEEE
    • /
    • v.23 no.4
    • /
    • pp.1469-1472
    • /
    • 2019
  • CAN bus in automotive applications does not assign node addresses. When a node is hacked and it transmits malicious data frame, it is difficult to resolve which node is hacked. However, this CAN bus internal attack seriously threatens the safety of a car, so a prompt counterattack is necessary in the CAN bus physical layer. This paper proposes a counterattack method against malicious CAN bus internal attack. When a malicious data frame is detected, an intrusion detection system in the CAN bus increases the error counter of the malicious node. Then, the malicious node is off from the bus when its error counter exceeds its limit. A CAN controller with the proposed method is implemented in Verilog HDL, and the proposed method is proved to counterattack against malicious CAN bus internal attack.