• Title/Summary/Keyword: Poison attack

Search Result 8, Processing Time 0.02 seconds

Client-Side Deduplication to Enhance Security and Reduce Communication Costs

  • Kim, Keonwoo;Youn, Taek-Young;Jho, Nam-Su;Chang, Ku-Young
    • ETRI Journal
    • /
    • v.39 no.1
    • /
    • pp.116-123
    • /
    • 2017
  • Message-locked encryption (MLE) is a widespread cryptographic primitive that enables the deduplication of encrypted data stored within the cloud. Practical client-side contributions of MLE, however, are vulnerable to a poison attack, and server-side MLE schemes require large bandwidth consumption. In this paper, we propose a new client-side secure deduplication method that prevents a poison attack, reduces the amount of traffic to be transmitted over a network, and requires fewer cryptographic operations to execute the protocol. The proposed primitive was analyzed in terms of security, communication costs, and computational requirements. We also compared our proposal with existing MLE schemes.

A study on The excluding effect of retention of Radix Aconiti as the viewpoint of Yoshimasu Todo (吉益東洞) (길익동동(吉益東洞)의 관점(觀點)에서 본 부자(附子)의 축수작용(逐水作用)에 대한 고찰(考察))

  • Boo, Siwon;Park, Kyoung Nam;Maeng, Woong Jae
    • The Journal of Korean Medical History
    • /
    • v.20 no.2
    • /
    • pp.116-132
    • /
    • 2007
  • In Yoshimasu Todo (吉益東洞)'s book, the doctors' commitment is said to attack the poison of illness and this can be realized only by using the poison of medicine. From this point of view, he had denied the preceding medicine books, since there was no distinction between the food that raise the body and the poison that attack the poison of illness in the preceding medicine books. In addition, Every medicine has the respective results and one medicine treats one disease, otherwise, in the preceding medicine books, one medicine deals with more than one illness and also they have denied that the characters of medicines are cold or hot because they couldn't be proven by tasting or seeing.

  • PDF

Efficient Poisoning Attack Defense Techniques Based on Data Augmentation (데이터 증강 기반의 효율적인 포이즈닝 공격 방어 기법)

  • So-Eun Jeon;Ji-Won Ock;Min-Jeong Kim;Sa-Ra Hong;Sae-Rom Park;Il-Gu Lee
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.25-32
    • /
    • 2022
  • Recently, the image processing industry has been activated as deep learning-based technology is introduced in the image recognition and detection field. With the development of deep learning technology, learning model vulnerabilities for adversarial attacks continue to be reported. However, studies on countermeasures against poisoning attacks that inject malicious data during learning are insufficient. The conventional countermeasure against poisoning attacks has a limitation in that it is necessary to perform a separate detection and removal operation by examining the training data each time. Therefore, in this paper, we propose a technique for reducing the attack success rate by applying modifications to the training data and inference data without a separate detection and removal process for the poison data. The One-shot kill poison attack, a clean label poison attack proposed in previous studies, was used as an attack model. The attack performance was confirmed by dividing it into a general attacker and an intelligent attacker according to the attacker's attack strategy. According to the experimental results, when the proposed defense mechanism is applied, the attack success rate can be reduced by up to 65% compared to the conventional method.

ARP Modification for Prevention of IP Spoofing

  • Kang, Jung-Ha;Lee, Yang Sun;Kim, Jae Young;Kim, Eun-Gi
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.3
    • /
    • pp.154-160
    • /
    • 2014
  • The address resolution protocol (ARP) provides dynamic mapping between two different forms of addresses: the 32-bit Internet protocol (IP) address of the network layer and the 48-bit medium access control (MAC) address of the data link layer. A host computer finds the MAC address of the default gateway or the other hosts on the same subnet by using ARP and can then send IP packets. However, ARP can be used for network attacks, which are one of the most prevalent types of network attacks today. In this study, a new ARP algorithm that can prevent IP spoofing attacks is proposed. The proposed ARP algorithm is a broadcast ARP reply and an ARP notification. The broadcast ARP reply was used for checking whether the ARP information was forged. The broadcast ARP notification was used for preventing a normal host's ARP table from being poisoned. The proposed algorithm is backward compatible with the current ARP protocol and dynamically prevents any ARP spoofing attacks. In this study, the proposed ARP algorithm was implemented on the Linux operating system; here, we present the test results with respect to the prevention of ARP spoofing attacks.

Secure and Efficient Client-side Deduplication for Cloud Storage (안전하고 효율적인 클라이언트 사이드 중복 제거 기술)

  • Park, Kyungsu;Eom, Ji Eun;Park, Jeongsu;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.83-94
    • /
    • 2015
  • Deduplication, which is a technique of eliminating redundant data by storing only a single copy of each data, provides clients and a cloud server with efficiency for managing stored data. Since the data is saved in untrusted public cloud server, however, both invasion of data privacy and data loss can be occurred. Over recent years, although many studies have been proposed secure deduplication schemes, there still remains both the security problems causing serious damages and inefficiency. In this paper, we propose secure and efficient client-side deduplication with Key-server based on Bellare et. al's scheme and challenge-response method. Furthermore, we point out potential risks of client-side deduplication and show that our scheme is secure against various attacks and provides high efficiency for uploading big size of data.

A Literatural study on the hemorrhoids and hemorrhoids complicated by anal fistula (痔瘡과 痔瘻에 對한 文獻的 考察)

  • No, Hyun-Chan;Rho, Sek-Seon
    • The Journal of Korean Medicine Ophthalmology and Otolaryngology and Dermatology
    • /
    • v.10 no.1
    • /
    • pp.284-305
    • /
    • 1997
  • A Literatural study on the etiological factors, classification, prescription of hemorrhoids and hemorrhoids complicated by anal fistula following results were obtained. 1. The cause of hemorrhoids are long time sit, long time gate, overfatigue, overeating, imbalance of stool( constipation or diarrhea), pregnant fertility(overfatigue after childbirth, insufficiency of middle warmer energy), uncontrol sexual excess, pathgenic factors of wetness, heat, wind, dry, genetic cause, excess of anxiety, pile up of heat poison, weakness of entrails and viscera. The cause of hemorrhoid complicated by anal fistula are attack of external wind, heatness, dry, fire, wetness(pathgenic factors), inapporiate treatment and chronic disease, greasy diet, excess of anxiety, constipation, uncontrol sexual excess, obstacle of circulation of vital energy and blood on anal site. 2. Classification of hemorrhoids are female hemorrhoids, male hemorrhoids, pulse hemorrhoids, intestines hemorrhoids, vital energy hemorrhoids, wine hemorrhoids, blood hemonhoids, flowing hemorrhoids. Classification with other method are external hemorrhoids, internal hemorrhoids, mixed hemorrhoids, excrescence hemorrhoids, nipple homorrhoids. External hemorrhoids is classified of varicosis of hemorrhoidal vein, connective tissue form, thrombus form. Classification of hemorrhoid complicated by anal fistula are simple lower hemorrhoid, lower mixed hemorrhoid, deep hemorrhoid, outer of one hole hemorrhoid, a horseshoe hemorrhoids. Once more classificated of four are space of sphincter muscle form, penetration sphincter muscle form, upper of sphincter muscle form, outer of sphincter muscle form. 3. Therapy method of hermorrhoid and hemorrhoid complicated by anal fistula are internal method, fumigation method method, ointment, method of close with medicine, necrotizing method, hot medicated compress( gxternal method), injection, insertion, bind, (operation) and acupuncture therapy (the others method) 4. Herb medicine for many used of internal method are Scutellaria baikalensis George(黃芩), Coptis japonia Makino(黃連), Rehmania giutinosa Liboschitz ex Fischer & Meyer(生地黃), Poncirus trifoliata Refinesque(枳殼), Sanguisorba officinalis Linne(地楡), Sophora japonica L.(槐花), Cnidium officinale Makino (川芎), Astragalus membranaceus Bunge(황기), Angelica gigas Nakai (當歸). 5. Herb medicine for many used of fumigation are Schlechtendalia Chinesis J. Bell (五倍子), Artemisia Vulgaris L. var indica Maxim(艾葉), Poncirus trifoliata Refinesque (枳殼), Nepeta japonica Maximowicy(荊芥), And herb medicine for many used of ointment are Calomelas(輕粉), Alum(白礬), Boswellia carterii Birdwood(乳香), Os Draconis Fossilia Ossis Mastodi(龍骨).

  • PDF

The Security Service History focused on 1930s in Korea (1930년대에 전개된 경호 활동 고찰)

  • Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.23-41
    • /
    • 2009
  • The purpose of this study is to investigate about security service history on 1930s in Korea. This study used materials by historical facts for the regulations, books and newspapers in 1930s. In 1930s, security service was unknown details of the historical contents so far. There are four parts conclusion of this study: police department of provisional government, security service agency in the provisional government, security service agents of an independence movement, the general society of Korea. Firstly, Korean regional government in Manchuria, which Kokminbu(國民府) organized the security service agency(警護局) for protect government and public security. Most importantly, the security service agency appearanced an important place which were the independence movement and self-governing administration for Koreans in Manchuria. And the security service agency was required by the security service regulations(警護條例) as law. Secondly, diversity activities of security service in police were exposed the duty as 'car escort service(車輛警護)' for offenders, the 'township office guard' from mobsters, 'woodland protect service(林野警護團)' for fire-raisers. security service as police officer were widely application for protection and safety from danger. Thirdly, Mass society was needed to service for public security in daily events such as 'noted singer meeting', 'funeral procession to the graveyard', 'athletic meeting' as private establishment of security service agency in nowadays. people were wanted the private security service(私警護) from 1930s to present. Fourthly, Overseas security service mentioned in attack of politician, protect from poison and security service about train vessel fleet. In 1930s, security service is comprehensive protection which were not only bodyguard, but also safeguard for hazardous materials.

  • PDF

A Study Security Measures for Protection of VIP in the G20 Summit (G20 정상회의 시 주(主)행사장에서의 VIP 안전대책 방안에 관한 연구)

  • Lee, Sun-Ki;Lee, Choong-Soo
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.91-123
    • /
    • 2010
  • The threat factors available for occurrence given G20 Summit Meeting are expected leader terrorism, hostage terrorism, bomb terrorism, public facilities terrorism, and aircraft terrorism. As for the threat groups, which are expected in Korea, the North Korea, Islam extremist group, and the group such as NGO organization of being opposed to international meeting are regarded as having possibility of causing hazard. Thus, the purpose of this study is to suggest VIP Security-measure plans in the main site in preparation for G20 Summit Meeting. Accordingly, each country in the world is adopting 'the principle of Triple Ring' in common. Thus, it elicited a coping plan by 1st line(inner ring) 2nd line(middle ring) 3rd line(outer ring) based on this principle, and proposed even an opinion together that will need to be reflected in light of policy for the VIP security measures. In conclusion, as for the VIP Security-measure plans in the main site in preparation for G20 Summit Meeting, In the inner ring(safety sector), first, an intercepting measure needs to be devised for a spot of getting into and out of vehicles given the Straight Street. Second, the Walking Formation needs to be reinforced boldly in the exposed area. In the middle ring(security sector), first, the control plan needs to be devised by considering particularity of the main site. Second, there is necessity for adopting the efficient security badge operation plan that is included RFID function within security badge. In the outer ring(aid protective sector), first, there is necessity of preparing for several VIP terrorisms, of collecting information and intelligence, and of reinforcing the information collection system against terrorism under the cooperation with the overseas information agency. Second, the urgent measure training in time of emergency needs to be carried out toward security agent event manpower. Third, to maintain the certain pace in VIP motorcade, the efficient traffic control system needs to be operated. Finally, as for what will need to be reflected in light of policy for VIP security measures, first, there is necessity for allowing VIP residence to be efficiently dispersed to be distributed and controlled. Second, there is necessity for allowing impure element to misjudge or attack to be failed by utilizing diverse deception operations. Third, according to the reorganization in North Korea's Organization of the South Directed Operations, the powerful 'military-support measure' needs to be driven from this G20 Summit Meeting. For this, the necessity was proposed for further reinforcing the front back defense posture under the supervision of the Ministry of National Defense and for positively coping even with detecting and removing poison in preparation for CBR (chemical, biological, and radio-logical) terrorism.

  • PDF