• Title/Summary/Keyword: direct attack

Search Result 135, Processing Time 0.028 seconds

Phishing Attack Detection Using Deep Learning

  • Alzahrani, Sabah M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.213-218
    • /
    • 2021
  • This paper proposes a technique for detecting a significant threat that attempts to get sensitive and confidential information such as usernames, passwords, credit card information, and more to target an individual or organization. By definition, a phishing attack happens when malicious people pose as trusted entities to fraudulently obtain user data. Phishing is classified as a type of social engineering attack. For a phishing attack to happen, a victim must be convinced to open an email or a direct message [1]. The email or direct message will contain a link that the victim will be required to click on. The aim of the attack is usually to install malicious software or to freeze a system. In other instances, the attackers will threaten to reveal sensitive information obtained from the victim. Phishing attacks can have devastating effects on the victim. Sensitive and confidential information can find its way into the hands of malicious people. Another devastating effect of phishing attacks is identity theft [1]. Attackers may impersonate the victim to make unauthorized purchases. Victims also complain of loss of funds when attackers access their credit card information. The proposed method has two major subsystems: (1) Data collection: different websites have been collected as a big data corresponding to normal and phishing dataset, and (2) distributed detection system: different artificial algorithms are used: a neural network algorithm and machine learning. The Amazon cloud was used for running the cluster with different cores of machines. The experiment results of the proposed system achieved very good accuracy and detection rate as well.

A Study on the Penetratrion Testing Next-generation IoT environment(ARMv7 Thumb Architecture) (차세대 IoT환경(ARMv7 Thumb Architecture) 침투테스트에 관한 연구)

  • Kim, Si-Wan;Seong, Ki-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.585-588
    • /
    • 2016
  • Due to the nature IoT Device (or Sensor) of the IoT System it may be susceptible (or attached) to our daily lives, so easy to direct physical access to IoT Device, which caused physical security is very weak. In this study, we implemented "Zero-Day Attack" on the ARMv7 Thumb Architecture as a direct target local system.

  • PDF

3-D Optimal Evasion of Air-to-Surface Missiles against Proportionally Navigated Defense Missiles

  • Cho, Sung-Bong;Ryoo, Chang-Kyung;Tahk, Min-Jea
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.514-518
    • /
    • 2003
  • In this paper, we investigate three dimensional optimal evasive maneuver patterns for air-to-surface attack missiles against proportionally navigated anti-air defense missiles. Interception error of the defense missile can be generated by evasive maneuver of the attack missile during the time of flight for which the defense missile intercepts the attack missile. Time varying weighted sum of the inverse of these interception errors forms a performance index to be minimized. Direct parameter optimization technique using CFSQP is adopted to get the attack missile's optimal evasive maneuver patterns according to parameter changes of both the attack missile and the defense missile such as maneuver limit and time constant of autopilot approximated by the 1st order lag system. The overall shape of resultant optimal evasive maneuver to enhance the survivability of air-to-surface missiles against proportionally navigated anti-air missiles is a kind of deformed barrel roll.

  • PDF

Performance Comparison of 3-D Optimal Evasion against PN Guided Defense Missiles Using SQP and CEALM Optimization Methods (SQP와 CEALM 최적화 기법에 의한 대공 방어 유도탄에 대한 3차원 최적 회피 성능 비교)

  • Cho, Sung-Bong;Ryoo, Chang-Kyung;Tahk, Min-Jea
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.3
    • /
    • pp.272-281
    • /
    • 2009
  • In this paper, three-dimensional optimal evasive maneuver patterns for air-to-surface attack missiles against proportionally navigated anti-air defense missiles were investigated. An interception error of the defense missile is produced by an evasive maneuver of the attack missile. It is assumed that the defense missiles are continuously launched during the flight of attack missile. The performance index to be minimized is then defined as the negative square integral of the interception errors. The direct parameter optimization technique based on SQP and a co-evolution method based on the augmented Lagrangian formulation are adopted to get the attack missile's optimal evasive maneuver patterns. The overall shape of the resultant optimal evasive maneuver is represented as a deformed barrel-roll.

Analysis on Mobile Forensic of Smishing Hacking Incident (Smishing 사고에 대한 Mobile Forensic 분석)

  • Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.207-210
    • /
    • 2014
  • Damage is increasing by (Smishing) hacking attack Smishing you use a smart phone after entering 2013. Takeover of personal information and direct financial damage in collaboration with graphics sewing machine hacking attack has occurred. Monetary damage that leads to Internet payment service (ISP) and secure payment system in conjunction with graphics sewing machine hacking attack on a smartphone has occurred. In this paper, I will study analysis in the laboratory examples of actual infringement vinegar sewing machine hacking attack. It is a major power security measures to prevent damage to the secure payment system that a case analysis and practical principle technical nest sewing machine hacking attack, using Smishing. In this paper, I will be to research to be able to through a smart phone, to the online payment safer and more convenient.

  • PDF

A Study of Intrusion Security Research and Smishing Hacking Attack on a Smartphone (스마트폰에서 Smishing 해킹 공격과 침해사고 보안 연구)

  • Park, In-Woo;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.11
    • /
    • pp.2588-2594
    • /
    • 2013
  • Damage is increasing by (Smishing) hacking attack Smishing you use a smart phone after entering 2013. Takeover of personal information and direct financial damage in collaboration with graphics sewing machine hacking attack has occurred. Monetary damage that leads to Internet payment service (ISP) and secure payment system in conjunction with graphics sewing machine hacking attack on a smartphone has occurred. In this paper, I will study analysis in the laboratory examples of actual infringement vinegar sewing machine hacking attack. It is a major power security measures to prevent damage to the secure payment system that a case analysis and practical principle technical nest sewing machine hacking attack, using Smishing. In this paper, I will be to research to be able to through a smart phone, to the online payment safer and more convenient.

A Study of Intrusion Security Research and Smishing Hacking Attack on a Smartphone (스마트폰에서 Smishing 해킹 공격과 침해사고 보안 연구)

  • Park, In-Woo;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.141-145
    • /
    • 2013
  • Damage is increasing by (Smishing) hacking attack Smishing you use a smart phone after entering 2013. Takeover of personal information and direct financial damage in collaboration with graphics sewing machine hacking attack has occurred. Monetary damage that leads to Internet payment service (ISP) and secure payment system in conjunction with graphics sewing machine hacking attack on a smartphone has occurred. In this paper, I will study analysis in the laboratory examples of actual infringement vinegar sewing machine hacking attack. It is a major power security measures to prevent damage to the secure payment system that a case analysis and practical principle technical nest sewing machine hacking attack, using Smishing. In this paper, I will be to research to be able to through a smart phone, to the online payment safer and more convenient.

  • PDF

Evaluation of performance characteristics in the success of team attack during women's volleyball competition (여자배구 경기에서 팀 공격 성공을 위한 선수들의 수행 특성 평가)

  • Lee, Ki-Chung;Bae, Sung-Jae
    • Korean Journal of Applied Biomechanics
    • /
    • v.15 no.1
    • /
    • pp.1-18
    • /
    • 2005
  • The purpose of this study was to evaluate performance characteristics. in the success of team attack during volleyball competition. For this, real game was analyzed using S-VHS video camera for three dimensional cinematography. The contents of this research were receive to set time, set to spike time, setter moving distance, ball position during set and attacker's relative ball position during jump and spike, and open area at spike. Among the various kinematical factors considered in this study, the ball height relative spiker and open area were found to be related to offensive performance. This finding implies that although their direct impact were not significant the other factors could have indirect impact on offensive performance by increasing open area. Thus, receiver, setter, assistant attacker, and main attacker should practice for successful performance in each stage. Lastly, it is necessary to develop kinematic variables to evaluate performance characteristics of players. Further study may consider the best defense position against the attack of the opponent player.

Modeling and Simulation of Firewall System and Security Functions of Operating System for Network Security (네트워크 보안을 위한 침입차단 시스템과 운영체제 보안 기능 모델링 및 시뮬레이션)

  • 김태헌;이원영;김형종;김홍근;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.11 no.2
    • /
    • pp.1-16
    • /
    • 2002
  • The need for network security is being increasing due to the development of information communication and internet technology. In this paper, firewall models, operating system models and other network component models are constructed. Each model is defined by basic or compound model, referencing DEVS formalism. These models and the simulation environment are implemented with MODSIM III, a general purpose, modular, block-structured high-level programming language which provides direct support for object-oriented programming and discrete-event simulation. In this simulation environment with representative attacks, the following three attacks are generated, SYN flooding and Smurf attack as an attack type of denial of service, Mail bomb attack as an attack type of e-mail. The simulation is performed with the models that exploited various security policies against these attacks. The results of this study show that the modeling method of packet filtering system, proxy system, unix and windows NT operating system. In addition, the results of the simulation show that the analysis of security performance according to various security policies, and the analysis of correlation between availability and confidentiality according to security empowerment.

  • PDF

Effects of unconfined blast on strategic structures and its protective measures

  • Choubey, Bishwajeet;Dutta, Sekhar C.;Hussain, Md. Ahsaan
    • Structural Engineering and Mechanics
    • /
    • v.84 no.2
    • /
    • pp.167-180
    • /
    • 2022
  • A strategic structure when exposed to direct hit of conventional bomb/projectile are severely damaged because of large amounts of energy released by the impact and penetration of bomb. When massive concrete slabs suffer a direct hit, the energy released during impact and penetration process are able to easily break up large mass of concrete. When over stressed under such impact of bombs, the concrete structure fails showing brittle behavioural nature. This paper is intended to study and suggest the protective measures for structures used for strategic application by adopting a means to dissipate the large quantum of energy released. To quantitatively evaluate the force, displacement and energy in such scenario, a fine numerical model of the proposed layered structure of different combinations was built in ANSYS programme in which tri-nitrotoluene (TNT) explosive was detonated at penetration depth calculated for GP1000 Lbs bomb. The distinct blast mitigation effect of the proposed structure was demonstrated by adopting various layers/barriers created as protective measures for the strategic structure. The calculated result shows that the blast effect on the structure is potentially reduced due to provision of buster slab with sand cushioning provided as protective measure to the main structure. This concept of layered protective measures may be adopted for safeguarding strategic structures such as Domes, Tunnels and Underground Structures.