• Title/Summary/Keyword: related-key attack

Search Result 67, Processing Time 0.033 seconds

Performance analysis of volleyball games using the social network and text mining techniques (사회네트워크분석과 텍스트마이닝을 이용한 배구 경기력 분석)

  • Kang, Byounguk;Huh, Mankyu;Choi, Seungbae
    • Journal of the Korean Data and Information Science Society
    • /
    • v.26 no.3
    • /
    • pp.619-630
    • /
    • 2015
  • The purpose of this study is to provide basic information to develop a game strategy plan of a team in a future by identifying the patterns of attack and pass of national men's professional volleyball teams and extracting core key words related with volleyball game performance to evaluate game performance using 'social network analysis' and 'text mining'. As for the analysis result of 'social network analysis' with the whole data, group '0' (6 players) and group '1' (11 players) were partitioned. A point of view the degree centrality and betweenness centrality in 'social network analysis' results, we can know that the group '1' more active game performance than the group '0'. The significant result for two group (win and loss) obtained by 'text mining' according to two groups ('0' and '1') obtained by 'social network analysis' showed significant difference (p-value: 0.001). As for clustering of each network, group '0' had the tendency to score points through set player D and E. In group '1', the player K had the tendency to fail if he attack through 'dig'; players C and D have a good performance through 'set' play.

Pattern of Cerebral Glucose Metabolism on F-18 FDG Brain PET during Vomiting and Symptom Free Periods in Cyclic Vomiting Syndrome (주기성 구토 증후군 환아에서 보인 F-18 FDG PET에서의 뇌 포도당 대사 소견)

  • Kim, Yu-Kyeong;Lee, Dong-Soo;Kang, Eun-Joo;Seo, Jeong-Kee;Yeo, Jeong-Seok;Chung, June-Key;Lee, Myung-Chul
    • The Korean Journal of Nuclear Medicine
    • /
    • v.35 no.3
    • /
    • pp.198-204
    • /
    • 2001
  • Cyclic Vomiting Syndrome (CVS) is characterized by recurrent, periodic, self-limiting vomiting. However, its pathogenesis is not yet established. We investigated the changes of the cerebral glucose metabolism using F-18 FDG during the vomiting attack and symptom free period in two children with CVS. FDG PET study showed the markedly increased metabolism in both temporal lobes and also in the medulla and cerebellum during the vomiting period. Also, FDG PET showed the decreased metabolism un the parieto-occipital and occipital areas during the vomiting period. The area with decreased metabolism seemed to be related with the region showing abnormalities in EEG and perfusion SPECT studies. We expect that what we observed would be a helpful finding in clarifying the pathogenesis of the CVS.

  • PDF

An Efficient Authentication Mechanism Strengthen the Privacy Protection in 3G Network (3G 네트워크에서 프라이버시 보호를 강화한 효율적인 인증 메커니즘)

  • Jeon, Seo-Kwan;Oh, Soo-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.12
    • /
    • pp.5049-5057
    • /
    • 2010
  • As communication technologies are developed and variety of services to mobile devices are provided, mobile users is rapidly increasing every year. However, mobile services running on wireless network environment are exposed to various security threats, such as illegal tampering, eavesdropping, and disguising identity. Accordingly, the secure mobile communications services to 3GPP were established that the standard for 3GPP-AKA specified authentication and key agreement. But in the standard, sequence number synchronization problem using false base station attack and privacy problem were discovered through related researches. In this paper, we propose an efficient authentication mechanism for enhanced privacy protection in the 3G network. We solve the sequence number synchronization existing 3GPP authentication scheme using timestamp and strengthen a privacy problem using secret token. In addition, the proposed scheme can improve the bandwidth consumption between serving network and home network and the problem of authentication data overhead for the serving network because it uses only one authentication vector.

Security Analysis of the Whirlpool Hash Function in the Cloud of Things

  • Li, Wei;Gao, Zhiyong;Gu, Dawu;Ge, Chenyu;Liao, Linfeng;Zhou, Zhihong;Liu, Ya;Liu, Zhiqiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.536-551
    • /
    • 2017
  • With the advancement and deployment of leading-edge telecommunication technologies for sensing and collecting, computing related information, Cloud of Things (CoTs) has emerged as a typical application platform that is envisioned to revolutionize the daily activities of human society, such as intelligent transportation, modern logistics, food safety, environmental monitoring, etc. To avoid any possible malicious attack and resource abuse, employing hash functions is widely recognized as one of the most effective approaches for CoTs to achieve message integrity and data authentication. The Whirlpool hash function has served as part of the joint ISO/IEC 10118-3 International Standard by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). In this paper, we propose an effective differential fault analysis on Whirlpool in the byte-oriented random fault model. The mathematical analysis and experimental results show that 8 random faults on average are required to obtain the current 512-bit message input of whirlpool and the secret key of HMAC-Whirlpool. Our work demonstrates that Whirlpool and HMAC-Whirlpool are both vulnerable to the single byte differential fault analysis. It provides a new reference for the security analysis of the same structure of the hash functions in the CoTs.

A Case Study on FPV Drone Combats of the Ukrainian Forces (우크라이나군의 FPV드론 전투 사례 연구)

  • Kang-Il Seo;Sang-Keun Cho;Sang-Hyuk Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.263-270
    • /
    • 2023
  • The Ukraine-Russia war is a testing ground for High-Tech weapons and the first full-scale drone warfare. The Ukrainian military has been aggressively deploying a variety of reconnaissance and attack drones on the battlefield, and more recently, FPV drones, also known as racing drones, have been fitted with bombs as a game-changer in small-unit combat. To better understand these FPV drones, this article reviews their definition, aircraft components, and key characteristics, and draws implications from the Ukrainian military's FPV combat experience. In the future, the combination of artificial intelligence and swarming technology will make FPV drones even more lethal. Accordingly, the need to develop FPV drones suitable for the future operational environment on the Korean Peninsula is increasing, and follow-up research is needed to specify fighting methods and optimize related technologies.

Transcriptome Analysis of Early Responsive Genes in Rice during Magnaporthe oryzae Infection

  • Wang, Yiming;Kwon, Soon Jae;Wu, Jingni;Choi, Jaeyoung;Lee, Yong-Hwan;Agrawal, Ganesh Kumar;Tamogami, Shigeru;Rakwal, Randeep;Park, Sang-Ryeol;Kim, Beom-Gi;Jung, Ki-Hong;Kang, Kyu Young;Kim, Sang Gon;Kim, Sun Tae
    • The Plant Pathology Journal
    • /
    • v.30 no.4
    • /
    • pp.343-354
    • /
    • 2014
  • Rice blast disease caused by Magnaporthe oryzae is one of the most serious diseases of cultivated rice (Oryza sativa L.) in most rice-growing regions of the world. In order to investigate early response genes in rice, we utilized the transcriptome analysis approach using a 300 K tilling microarray to rice leaves infected with compatible and incompatible M. oryzae strains. Prior to the microarray experiment, total RNA was validated by measuring the differential expression of rice defense-related marker genes (chitinase 2, barwin, PBZ1, and PR-10) by RT-PCR, and phytoalexins (sakuranetin and momilactone A) with HPLC. Microarray analysis revealed that 231 genes were up-regulated (>2 fold change, p < 0.05) in the incompatible interaction compared to the compatible one. Highly expressed genes were functionally characterized into metabolic processes and oxidation-reduction categories. The oxidative stress response was induced in both early and later infection stages. Biotic stress overview from MapMan analysis revealed that the phytohormone ethylene as well as signaling molecules jasmonic acid and salicylic acid is important for defense gene regulation. WRKY and Myb transcription factors were also involved in signal transduction processes. Additionally, receptor-like kinases were more likely associated with the defense response, and their expression patterns were validated by RT-PCR. Our results suggest that candidate genes, including receptor-like protein kinases, may play a key role in disease resistance against M. oryzae attack.

A Study on the Change of Cyber Attacks in North Korea (북한의 사이버 공격 변화 양상에 대한 연구)

  • Chanyoung Park;Hyeonsik Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.175-181
    • /
    • 2024
  • The U.N. Security Council's North Korea Sanctions Committee estimated that the amount of North Korea's cyberattacks on virtual asset-related companies from 2017 to 2023 was about 4 trillion won. North Korea's cyberattacks have secured funds through cryptocurrency hacking as it has been restricted from securing foreign currency due to economic sanctions by the international community, and it also shows the form of technology theft against defense companies, and illegal assets are being used to maintain the Kim Jong-un regime and develop nuclear and missile development. When North Korea conducted its sixth nuclear test on September 3, 2017, and declared the completion of its national nuclear armament following the launch of an intercontinental ballistic missile on November 29 of the same year, the U.N. imposed sanctions on North Korea, which are considered the strongest economic sanctions in history. In these difficult economic situations, North Korea tried to overcome the crisis through cyberattacks, but as a result of analyzing the changes through the North's cyber attack cases, the strategic goal from the first period from 2009 to 2016 was to verify and show off North Korea's cyber capabilities through the neutralization of the national network and the takeover of information, and was seen as an intention to create social chaos in South Korea. When foreign currency earnings were limited due to sanctions against North Korea in 2016, the second stage seized virtual currency and secured funds to maintain the Kim Jong-un regime and advance nuclear and missile development. The third stage is a technology hacking of domestic and foreign defense companies, focusing on taking over key technologies to achieve the five strategic weapons tasks proposed by Chairman Kim Jong-un at the 8th Party Congress in 2021. At the national level, security measures for private companies as well as state agencies should be established against North Korea's cyberattacks, and measures for legal systems, technical problems, and budgets related to science are urgently needed. It is also necessary to establish a system and manpower to respond to the ever-developing cyberattacks by focusing on cultivating and securing professional manpower such as white hackers.