• Title/Summary/Keyword: first attack

Search Result 602, Processing Time 0.03 seconds

Security Analysis of Block Cipher KT-64 (블록 암호 KT-64에 대한 안전성 분석)

  • Kang, Jin-Keon;Jeong, Ki-Tae;Lee, Chang-Hoon
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.55-62
    • /
    • 2012
  • KT-64 is a 64-bit block cipher which use CSPNs suitable for the efficient FPGA implementation. In this paper, we propose a related-key amplified boomerang attack on the full-round KT-64. The attack on the full-round KT-64 requires $2^{45.5}$ related-key chosen plaintexts and $2^{65.17}$ KT-64 encryptions. This work is the first known cryptanalytic result on KT-64.

Defense Mechanism against Replay Attack on Remote Keyless Entry System (원격 키리스 엔트리시스템에 대한 재생공격 무력화 기법)

  • Kim, Young Min;Kim, Seong Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.247-250
    • /
    • 2019
  • The first-generation RKE(Remote Keyless Entry) system is very vulnerable to replay attacks and the encryption of the second-generation RKE system is known to be disabled by four to eight signal receptions and analysis. In order to enhance the security of the RKE system, we introduce a physical-layer security methods in the RKE system and propose a technique to disable the replay attack by reducing the quality of the signal received by an eavesdropper.

  • PDF

Minority First Gateway for Protecting QoS of Legitimate Traffic from Intentional Network Congestion (인위적인 네트워크 혼잡으로부터 정상 트래픽의 서비스 품질을 보호하기 위한 소수자 우선 게이트웨이)

  • Ann Gae-Il
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.7B
    • /
    • pp.489-498
    • /
    • 2005
  • A Denial of Sewice (DoS) attack attempts to prevent legitimate users of a sewice from being adequately served by monopolizing networks resources and, eventually, resulting in network or system congestion. This paper proposes a Minority First (MF) gateway, which is capable of guaranteeing the Quality of Service (QoS) of legitimate service traffic under DoS situations. A MF gateway can rapidly determine whether an aggregated flow is a congestion-inducer and can protect the QoS of legitimate traffic by providing high priority service to the legitimate as aggregate flows, and localize network congestion only upon attack traffic by providing low priority to aggregate flows regarded as congestion-inducer. We verify through simulation that the suggested mechanism possesses excellence in that it guarantees the QoS of legitimate traffic not only under a regular DoS occurrence, but also under a Distributed DoS (DDoS) attack which brings about multiple concurrent occurrences of network congestion.

A Numerical Performance Study on Rudder with Wavy Configuration at High Angles of Attack (Wavy 형상 적용에 따른 대 각도에서의 러더 성능에 대한 수치해석 연구)

  • Tae, Hyun June;Shin, Young Jin;Kim, Beom Jun;Kim, Moon-Chan
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.54 no.1
    • /
    • pp.18-25
    • /
    • 2017
  • This study deals with numerically comparing performance according to rudder shape called 'Twisted rudder and Wavy twisted rudder'. In comparison with conventional rudder, rudder with wavy shape has showed a better performance at high angles of attack($30^{\circ}{\sim}40^{\circ}$) due to delaying stall. But most of study concerned with wavy shape had been performed in uniform flow condition. In order to identify the characteristics behind a rotating propeller, the present study numerically carries out an analysis of resistance and self-propulsion for KCS with twisted rudder and wavy twisted rudder. The turbulence closure model, Realizable $k-{\epsilon}$, is employed to simulate three-dimensional unsteady incompressible viscous turbulent and separation flow around the rudder. The simulation of self-propulsion analysis is performed in two step, because of finding optimization case of wavy shape. The first step presents there are little difference between twisted rudder and case of H_0.65 wavy twisted rudder in delivered power. So two kind of rudders are employed from first step to compare lift-to-drag ratio and torque at high angles of attack. Consequently, the wavy twisted rudder is presented as a possible way of delaying stall, allowing a rudder to have a better performance containing superior lift-to-drag ratio and torque than twisted rudder at high angles of attack. Also, as we indicate the flow visualization, check the quantity of separation flow around the rudder.

Clinical Study of Stroke Type (뇌졸중(腦卒中) 환자(患者) 형태(形態)에 관(關)한 임상연구(臨床硏究))

  • Youn, Hyoun-min;Ahn, Chang-beohm;Song, Choon-ho;Son, In-seok;Jang, Kyung-jeon
    • Journal of Acupuncture Research
    • /
    • v.20 no.2
    • /
    • pp.29-41
    • /
    • 2003
  • Clinical observation was made on 52 cases of Stroke that were confined through brain CT, MRI scan. The Stroke cases wee classified into the following kinds cerebral infarction, cerebral hemorrhage, cerebellar or brain stem infarction, cerebellar or brain stem hemorrhage. And among the 52 cases of Stroke cerebral infarction was noticed in 75.00%, cerebral hemorrhage in 11.54%, cerebellar or brain stem infarction in 9.52%, cerebellar or brain stem hemorrhage in 3.85%. The ratio between males and females was 1.74:1 in the whole groups of Stroke and most cases were over 60 of age. As the time of hospitalization, most patients hospitalized from 1 day after stroke to 7 days after stroke. And as the course of hospitalization, most patients hospitalized first. Among the preceding disease at the onset of Stroke hypertention was noted in 32.69%, and deabetes mellitus or heart problem was noted frequently(15.39%). Electrocardiography findings were as follows: The normal was noted in 53.85%, the abnormal in 46.15%. And as the abnormal, left ventricular hypertrophy was noted in 17.54%. The predisposing factors or conditions at the onset of brain infarction were usually initiated during the time of sleeping and those of brain hemorrhage chiefly during the time of exercising like overwork or walking etc. It was noted that smoking a pack of cigarette showed highest disease rate(33.33%) among the average of smoking amount of one day in case of man. Prior to attack, the most chiefly complain was dyspnea or discomfort on chest region. And 30.70% of patients had no previous sign. There were a large number of recurrent cases. The first attack was noted in 71.15%, the 2nd attack in 23.08%, the 3rd attack in 5.77%.

  • PDF

Analysis and prospect of North Korea's Cyber threat (북한의 사이버전 위협에 대한 분석과 전망)

  • Lee, Dae Sung;Ahn, Young Kyu;Kim, Minsu
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.11-16
    • /
    • 2016
  • In modern society, the development of Information and Communication Technology has given people a lot of opportunities. But on the other side cyber attack also gives enormous damage to people. Recently Korea has become the target of cyber attack. The threat of it is growing. Especially North Korea has committed hostile actions against South Korea. North Korea has recently attacked the computer networks of South Korea's important national facilities. The types of North Korea's cyber attacks include the followings. First, if we see it with the viewpoint of software, it tries to destroy or control the Internet, infects the networks with viruses, worms, Trojan Horse and Distributed Denial of Service. I suggest the following to solve the problem. First, South Korea should unify the organizations to respond to the attacks of North Korea, as North Korea has a unified organization for the cyber attack. Second, they should think about the establishment of "Cyber Terrorism Prevention Act" to systematically respond to the software attacks.

Password-based Authenticated Key Agreement Protocol Secure Against Advanced Modification Attack (Advanced Modification 공격에 안전한 패스워드 기반 키 동의 프로토콜)

  • Kwak, Jin;Oh, Soo-Hyun;Yang, Hyung-Kyu;Won, Dong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.11C no.3
    • /
    • pp.277-286
    • /
    • 2004
  • Password-based mechanism is widely used methods for user authentication. Password-based mechanisms are using memorable passwords(weak ferrets), therefore Password-based mechanism are vulnerable to the password guessing attack. To overcome this problem, man password-based authenticated key exchange protocols have been proposed to resist password guessing attacks. Recently, Seo-Sweeny proposed password-based Simple Authenticated Key Agreement(SAKA) protocol. In this paper, first, we will examine the SAKA and authenticated key agreement protocols, and then we will show that the proposed simple authenticated key agreement protocols are still insecure against Advanced Modification Attack. And we propose a password-based Simple Authenticated Key Agreement Protocol secure against Advanced Modification Attack.

Network Attack and Defense Game Theory Based on Bayes-Nash Equilibrium

  • Liu, Liang;Huang, Cheng;Fang, Yong;Wang, Zhenxue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.10
    • /
    • pp.5260-5275
    • /
    • 2019
  • In the process of constructing the traditional offensive and defensive game theory model, these are some shortages for considering the dynamic change of security risk problem. By analysing the critical indicators of the incomplete information game theory model, incomplete information attack and defense game theory model and the mathematical engineering method for solving Bayes-Nash equilibrium, the risk-averse income function for information assets is summarized as the problem of maximising the return of the equilibrium point. To obtain the functional relationship between the optimal strategy combination of the offense and defense and the information asset security probability and risk probability. At the same time, the offensive and defensive examples are used to visually analyse and demonstrate the incomplete information game and the Harsanyi conversion method. First, the incomplete information game and the Harsanyi conversion problem is discussed through the attack and defense examples and using the game tree. Then the strategy expression of incomplete information static game and the engineering mathematics method of Bayes-Nash equilibrium are given. After that, it focuses on the offensive and defensive game problem of unsafe information network based on risk aversion. The problem of attack and defense is obtained by the issue of maximizing utility, and then the Bayes-Nash equilibrium of offense and defense game is carried out around the security risk of assets. Finally, the application model in network security penetration and defense is analyzed by designing a simulation example of attack and defense penetration. The analysis results show that the constructed income function model is feasible and practical.

The Analysis of the APT Prelude by Big Data Analytics (빅데이터 분석을 통한 APT공격 전조 현상 분석)

  • Choi, Chan-young;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.317-320
    • /
    • 2016
  • The NH-NongHyup network and servers were paralyzed in 2011, in the 2013 3.20 cyber attack happened and Classified documents of Korea Hydro & Nuclear Power Co. Ltd were leaked on December in 2015. All of them were conducted by a foreign country. These attacks were planned for a long time compared to the script kids attacks and the techniques used were very complex and sophisticated. However, no successful solution has been implemented to defend an APT attack thus far. Therefore, we will use big data analytics to analyze whether or not APT attack has occurred in order to defend against the manipulative attackers. This research is based on the data collected through ISAC monitoring among 3 hierarchical Korean defense system. First, we will introduce related research about big data analytics and machine learning. Then, we design two big data analytics models to detect an APT attack and evaluate the models' accuracy and other results. Lastly, we will present an effective response method to address a detected APT attack.

  • PDF

Analyzing of connected car vulnerability and Design of Security System (커네티트 카의 취약점 분석 및 보안 시스템 설계)

  • Kim, Tae-Hyoung;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.241-243
    • /
    • 2016
  • In the Past, Trend of car security was Physical Something like doorlock system, and The Generation did not have skills connecting External devices. Through Car Development is up, that trend of car security Changed Physical Security to Intelligence Security. This Changes give a chance to hackers to attack this system. This System use CAN(Controller Area Network) Protocol which have three vulnerabilities. First, ID Spoofing, Twice, D - Dos Attack, Third, Android Application Injected Modern cars have many ECU(Electronic Control Unit) to control devices like Engine ON/OFF, Door Lock Handling, and Controlling Handle. Because CAN Protocol spread signal using broadcast, Hackers can get the signal very easily, and Those often use Mobile devices like Android or IOS to attack this system. if bluetooth signal is spread wide, hackers get the signal, and analysis the bluetooth data, so then They makes certain data to attack ECU, they send the data to ECU, and control ECU installed car. so I suggest that I will prevent this attack to make Auth system and prevent this attack in end of Android.

  • PDF