• Title/Summary/Keyword: System Attack Technique

Search Result 205, Processing Time 0.027 seconds

Study on security requirements for the web based operation system of a shipping company (웹 기반 해운 선사 운영시스템 보안 요구사항 연구)

  • Chung, Up;Moon, Jongsub
    • Journal of Internet Computing and Services
    • /
    • v.23 no.1
    • /
    • pp.49-68
    • /
    • 2022
  • The operation system of a shipping company is still maintaining the mainframe based terminal access environment or the client/server based environment. Nowadays shipping companies that try to migrate it into a web-based environment are increasing. However, in the transition, if the design is processed by the old configuration and knowledge without considering the characteristics of the web-based environment and shipping business, various security vulnerabilities will be revealed at the actual system operation stage, and system maintenance costs to fix them will increase significantly. Therefore, in the transition to a web-based environment, a security design must be carried out from the design stage to ensure system safety and to reduce security-related maintenance costs in the future. This paper examines the characteristics of various threat modeling techniques, selects suitable modeling technique for the operation system of a shipping company, applies data flow diagram and STRIDE threat modeling technique to shipping business, derives possible security threats from each component of the data flow diagram in the attacker's point of view, validates the derived threats by mapping them with attack library items, represents the attack tree having various attack scenarios that attackers can attempt to achieve their final goals, organizes into the checklist that has security check items, associated threats and security requirements, and finally presents 23 security requirements that can respond to threats. Unlike the existing general security requirements, the security requirements presented in this paper reflect the characteristics of shipping business because they are derived by analyzing the actual business of a shipping company and applying threat modeling technique. Therefore, I think that the presented security requirements will be of great help in the security design of shipping companies that are trying to proceed with the transition to a web-based environment in the future.

Discrete Wavelet Transform and a Singular Value Decomposition Technique for Watermarking Based on an Adaptive Fuzzy Inference System

  • Lalani, Salima;Doye, D.D.
    • Journal of Information Processing Systems
    • /
    • v.13 no.2
    • /
    • pp.340-347
    • /
    • 2017
  • A watermark is a signal added to the original signal in order to preserve the copyright of the owner of the digital content. The basic challenge for designing a watermarking system is a dilemma between transparency and robustness. If we want a higher rate of transparency, there has to be a compromise in terms of its robustness and vice versa. Also, until now, watermarking is generalized, resulting in the need for a specialized algorithm to work for a specialized image processing application domain. Our proposed technique takes into consideration the image characteristics for watermark insertion and it optimizes transparency and robustness. It achieved a 99.98% retrieval efficiency for an image blurring attack and counterfeits other attacks. Our proposed technique counterfeits almost all of the image processing attacks.

Design of Neural Network Adaptive Control Law for Aircraft System Including Uncertainty

  • Kim, You-Dan;Shin, Dong-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.125.3-125
    • /
    • 2001
  • Recently, aircraft is designed to have high maneuverable at high angle of attack. However, it is very hard to obtain the accurate dynamic model for the high performance, because aerodynamic characteristics are nonlinear and include a lot of uncertainties. Therefore, nonlinear controller without considering uncertainties may degrade the control system performance. On this paper, to overcome these defects, the neural networks based adaptive nonlinear controller is proposed making use of the backstepping technique. Neural networks are implemented to guarantee robustness to uncertainties caused by aerodynamic coefficients variation. The main feature of the proposed controller is that the adaptive controller is developed under the assumption ...

  • PDF

Active Network for IP Traceback (IP 역추적을 위한 액티브 네트워크 기법 적용 방안)

  • 최병선;이성현;이재광
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.420-423
    • /
    • 2004
  • Advance of computer technique becomes efficient of business in recent years. It has become high-speed data transmission and large data transmission. Network and computer system need to increasingly security because advance of computer technique. So this paper analyzes IP Traceback system that prevent cyber attack as hacking and security vulnerability of network. And this paper design IP Traceback system that based on active network.

  • PDF

Sound Watermarking Technique based on Blackfin Processor (블랙핀 프로세서 기반의 사운드 워터마킹 기법)

  • Kim, Ye-il;Seo, Jung-hee;Park, Hung-bog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.757-758
    • /
    • 2015
  • The digital watermark is one of important techniques to solve copyright authentication problems of digital media. Researches on the digital watermark are rapidly increasing in various media. The watermark system can resist some attacks such as signal attack, geometric attack and protocol attach. However, so far the robustness of the watermark needs to be improved. This paper suggests a watermarking technique with which a watermark is embedded on a coefficient of wavelet-based frequency band and extracted from it for protection of property rights and authentication of Blackfin processor-based digital sound. By carrying out hardware implementation of the suggested sound watermarking, the commercialization of protection of property rights and robustness of watermarks resulted from development of high-level programs can be confirmed.

  • PDF

Construct of Cooperative Security System for Secure MANET (안전한 MANET을 위한 협력적인 보안체계 구축)

  • Yang, Hwan Seok;Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.13 no.3
    • /
    • pp.33-38
    • /
    • 2013
  • Security between mobile nodes and efficient communication is one of the most important parts of the MANET. In particular, the wireless network is significantly higher for the attack threats because of collaborative structure for open communication media and communication. However, application of existing security mechanisms and intrusion detection system is not easy due to the characteristics of MANET. It is because collection and integration of adult data by the dynamic topology due to the mobility of nodes and many network sensors is difficult. In this study, we propose cooperative security system technique that can improve the reliability based on authentication assessing confidence about the whole nodes which joins to network and detect effectively this when intrusion occurs. Cluster head which manages the cluster performs CA role for the certificate issue and the gateway node performs role of intrusion detection system. Intrusion detection is performed by cooperating with neighboring nodes when attack is not detected in one intrusion detection node. The performance of the proposed method was confirmed through experiments comparing with the SRP technique.

Control of Small Scale Rotary Wing Unmanned Aerial Vehicle (R-UAV) Using Backstepping.

  • Kannan, Somasundar;Lian, Bao-Hua;Hwang, Tae-Won;Bang, Hyo-Choong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1005-1007
    • /
    • 2005
  • A Nonlinear approach to control of Small Scale Rotary Wing Unmanned Aerial Vehicle (R-UAV) is presented. Using Backstepping, a globally stabilizing control law is derived. We derive backstepping control law for angle of attack and sideslip control. The inherent nonlinear nature of the system are considered here which helps in naturally stabilizing without extensive external effort. Thus, the resulting control law is much simpler than if the feedback linearization had been used.

  • PDF

Design and Implementation of Fuzzy Logic Controller for Wing Rock

  • Anavatti, Sreenatha G.;Choi, Jin Young;Wong, Pupin P.
    • International Journal of Control, Automation, and Systems
    • /
    • v.2 no.4
    • /
    • pp.494-500
    • /
    • 2004
  • The wing rock phenomenon is a high angle of attack aerodynamic motion manifested by limit cycle roll oscillations. Experimental studies reveal that direct control and manipulation of leading edge vortices, through the use of 'blowing' techniques is effective in the suppression of wing rock. This paper presents the design of a robust controller for the experimental implementation of one such 'blowing' technique - recessed angle spanwise blowing (RASB), to achieve wing rock suppression over a range of operating conditions. The robust controller employs Takagi - Sugeno fuzzy system, which is fine-tuned by experimental simulations. Performance of the controller is assessed by real-time wind tunnel experiments with an 80 degree swept back delta wing. Robustness is demonstrated by the suppression of wing rock at a range of angles of attack and free stream velocities. Numerical simulation results are used to further substantiate the experimental findings.

Secure Cooperative Sensing Scheme for Cognitive Radio Networks (인지 라디오 네트워크를 위한 안전한 협력 센싱 기법)

  • Kim, Taewoon;Choi, Wooyeol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.8
    • /
    • pp.877-889
    • /
    • 2016
  • In this paper, we introduce the basic components of the Cognitive Radio Networks along with possible threats. Specifically, we investigate the SSDF (Spectrum Sensing Data Falsification) attack which is one of the easiest attack to carry out. Despite its simplicity, the SSDF attack needs careful attention in order to build a secure system that resists to it. The proposed scheme utilizes the Anomaly Detection technique to identify malicious users as well as their sensing reports. The simulation results shows that the proposed scheme can effectively detect erroneous sensing reports and thus result in correct detection of the active primary users.

RFID Mutual Authentication Protocol Using Nonfixed Symmetric Key Based on Shift Computation and Random Number (시프트 연산과 난수를 이용한 가변적 대칭키 기반의 RFID 상호인증 프로토콜)

  • Lee, Jae-Kang;Oh, Se-Jin;Chung, Kyung-Ho;Lee, Chang-Hee;Ahn, Kwang-Seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.5B
    • /
    • pp.377-384
    • /
    • 2012
  • RFID system is a technique to obtain information of tag using radio frequency. Specificity of RFID systems using radio frequency has many problems that is eavesdropping, location tracking, spoofing attack, replay attack, denial of service attack. So, RFID protocol should be used cryptographic methods and mutual authentication for security and privacy. In this paper, we explain the problem of past protocol and propose the nonfixed symmetric key-based RFID mutual authentication protocol using shift computation and random number. Proposed protocol is secure from various attacks. Because it use shift operation and non-fixed symmetric key.