Showing 1,021 - 1,040 results of 3,648 for search '"Attacker"', query time: 0.06s Refine Results
  1. 1021

    Malicious code within model detection method based on model similarity by Degang WANG, Yi SUN, Chuanxin ZHOU, Qi GAO, Fan YANG

    Published 2023-08-01
    “…The privacy of user data in federated learning is mainly protected by exchanging model parameters instead of source data.However, federated learning still encounters many security challenges.Extensive research has been conducted to enhance model privacy and detect malicious model attacks.Nevertheless, the issue of risk-spreading through malicious code propagation during the frequent exchange of model data in the federated learning process has received limited attention.To address this issue, a method for detecting malicious code within models, based on model similarity, was proposed.By analyzing the iterative process of local and global models in federated learning, a model distance calculation method was introduced to quantify the similarity between models.Subsequently, the presence of a model carrying malicious code is detected based on the similarity between client models.Experimental results demonstrate the effectiveness of the proposed detection method.For a 178MB model containing 0.375MB embedded malicious code in a training set that is independent and identically distributed, the detection method achieves a true rate of 82.9% and a false positive rate of 1.8%.With 0.75MB of malicious code embedded in the model, the detection method achieves a true rate of 96.6% and a false positive rate of 0.38%.In the case of a non-independent and non-identically distributed training set, the accuracy of the detection method improves as the rate of malicious code embedding and the number of federated learning training rounds increase.Even when the malicious code is encrypted, the accuracy of the proposed detection method still achieves over 90%.In a multi-attacker scenario, the detection method maintains an accuracy of approximately 90% regardless of whether the number of attackers is known or unknown.…”
    Get full text
    Article
  2. 1022

    Research on IoT security situation awareness method based on evidence theory by Jian LI, Tinglu DONG, Jie LI

    Published 2022-04-01
    “…The security problem of IoT became more and more serious with its rapid development.Considering that the current IoT security situation awareness system lacks generality and excessively relies on expert knowledge, a IoT security situation awareness method based on improved D-S evidence theory was proposed in this paper.Fuzzy Gaussian membership function was used to calculate the vulnerability information membership matrix, which was normalized as evidence distribution matrix.The improved Topsis method was used to measure the evidence credibility.In order to fully restrain the credibility of conflicting evidence and improve the credibility of mutually supporting evidence, local credibility between two evidence was aggregated and the expected positive and negative solution vectors were improved according to the situation assessment scenario.And the weighted average method was used for vulnerability information fusion, to obtain the result of situational assessment.The result of situational awareness was fused with the time discount and high-risk vulnerability information discount evidence theory.At the same time, the IoT vulnerability information at different moments was considered comprehensively, the evidence was adaptively and dynamically weighted with the ratio information of high-risk vulnerability.The experimental results show that in the fusion of different numbers of evidence bodies and four common conflicting evidence, the improved Topsis method has higher fusion probability on credible proposition.In the aspect of situation assessment, the risk degree of current system is accurately assessed.And in the aspect of situational awareness, this discount evidence theory can predict the probability of high risk and critical risk, which is more effective than the traditional D-S evidence theory.According to this theory, a IoT security situational awareness method process was proposed, which would be used to guide engineering practice.In the future, the relationship between vulnerabilities can be considered and richer information between vulnerabilities can be extracted for vulnerability exploiting, so that the result of situation assessment is more accurate and reasonable.On the other hand, for situational awareness, game theory can be adopted in the process of dynamic game between the attacker and defender.…”
    Get full text
    Article
  3. 1023

    Extremist Legitimate Defense in Iran's Criminal Proceedings (with an Emphasis on Intentional Homicide) by Saeed Ghaedi

    Published 2024-09-01
    “…The current research, using the analytical-descriptive method and collecting the required information in the library method, and relying on the cases of intentional homicide in the criminal justice system, Iran tries to evaluate the impact and impression of the judicial procedure of legal duality with the approaches of punishment based on defense conditions. and show the levels of defense, and at the end, while emphasizing the need for consistent criminal policy in order to protect the rights of walid the conclusion is reached that Note 2 of Article 302 is only about crimes and is based on non-observance of the levels of defense despite the necessity and truth of the principle of defense And the position of Note 2 of Article 156 also applies to other crimes in the absence of one of the conditions of legitimate defense .The effect of extreme legitimate defense in crimes is the deliberate impunity of revenge, and in other crimes, it is simply the imposition of the burden of the lack of defense conditions on the defender from the attacker.…”
    Get full text
    Article
  4. 1024

    5G-based smart airport network security scheme design and security analysis by Xinxin XING, Qingya ZUO, Jianwei LIU

    Published 2023-10-01
    “…To meet the security requirements of smart airports, a 5G-based smart airport network security solution was proposed.The security characteristics and security requirements of the 5G scenario in smart airport were analyzed, and the pain points of security requirements in the current scenario were summarized in five aspects:unified security management and control, network slicing security, security monitoring and early warning, edge computing security, and IoT-aware node security.And then a 5G network security system was designed for smart airports.The functional components of this system included 5G network unified security management and control functions for ubiquitous networks, lightweight 5G network identity authentication and authentication functions, 5G network slice security protection for multi-service requirements, 5G network security monitoring and early warning based on big data analysis, integrated security protection function based on edge computing, and sensory node security protection function based on device behavior analysis.This comprehensive approach built an all-in-one security platform covering business encryption, network security, terminal trustworthiness, identity trustworthiness, and security management and control.Additionally, the potential counterfeit base station attacks in the existing 5G authentication and key agreement (AKA) were analyzed.Due to the lack of authenticity verification of the messages forwarded by the SN, the attacker can pretend to be the real SN to communicate with the UE and the HN, thus carrying out the base station masquerading attack.This kind of attack may lead to the leakage of smart airport network data, and encounter problems such as tampering and deception by opponents.Aiming at the network security requirements of smart airports and the security issues of 5G authentication and key agreement protocol, an improved 5G authentication and key agreement protocol was designed.Formal security models, security goal definitions, and analysis were performed to ensure the robustness and effectiveness of the protocol against attacks.…”
    Get full text
    Article
  5. 1025

    Capsular polysaccharide restrains type VI secretion in Acinetobacter baumannii by Nicolas Flaugnatti, Loriane Bader, Mary Croisier-Coeytaux, Melanie Blokesch

    Published 2025-01-01
    “…To function effectively, the T6SS must penetrate the membranes of both attacker and target bacteria. Structures associated with the cell envelope, like polysaccharides chains, can therefore introduce spatial separation and steric hindrance, potentially affecting the efficacy of the T6SS. …”
    Get full text
    Article
  6. 1026

    Asirtmali Aba Wrestling in Turkish sports history and culture by Haci Sahın

    Published 2014-02-01
    “…Aşırtmalı aba wrestling receives its name from clothing made by aba, a loose-fitting garment woven of camel or goat hair, which pehlivan, a wrestler of Turkish traditional wrestling, has worn as well as from technical term called 'el aşırma', an act performed by the attacker to grab the belt of his opponent in the back by moving his hand over opponent's shoulder and reaching his hand to opponent's belt in the back. …”
    Get full text
    Article
  7. 1027

    A privacy-enhanced framework with deep learning for botnet detection by Guangli Wu, Xingyue Wang

    Published 2025-01-01
    “…This algorithm simulates the game between the attacker trying to infer private information through the attack model and the data processor retaining the original content of the traffic to the maximum extent. …”
    Get full text
    Article
  8. 1028

    Implementasi Algoritme Spongent sebagai Algoritme Hashing untuk Integritas pada Modul Komunikasi Lora by Ari Kusyanti, I Putu Agrahita Wiguna, Fariz Andri Bakhtiar

    Published 2023-12-01
    “…Testing of data security with active attack testing is successful because when the attacker sends the modified data, it has been checked on the gateway node and the resulting data is invalid. …”
    Get full text
    Article
  9. 1029

    An artificial insurance framework for a hydrogen-based microgrid to detect the advanced cyberattack model by Mahan Fakhrooeian, Ali Basem, Mohammad Mahdi Gholami, Nahal Iliaee, Alireza Mohammadi Amidi, Amin Heydarian Hamzehkanloo, Akbar Karimipouya

    Published 2025-01-01
    “…Albeit microgrids can gain beneficial results in cost and energy schedules once operating in grid-connected mode, such systems are vulnerable to malicious attacks from the viewpoint of cybersecurity. With this in mind, this paper explores a novel advanced attack model named the false transferred data injection (FTDI) attack aiming to manipulatively alter the power flowing from the microgrid to the upstream grid to raise voltage usability probability. …”
    Get full text
    Article
  10. 1030

    Balancing Privacy and Utility in Split Learning: An Adversarial Channel Pruning-Based Approach by Afnan Alhindi, Saad Al-Ahmadi, Mohamed Maher Ben Ismail

    Published 2025-01-01
    “…In particular, the SSIM between the original data and the data reconstructed by the attacker, achieved by our approach, decreased significantly by 57%. …”
    Get full text
    Article
  11. 1031

    Pengamanan Citra Berwarna Menggunakan Kriptografi Visual Skema Meaningful Shares dan Steganografi LSB by Fariz Abid Darmawan, Ari Kusyanti, Rakhmadhanny Primananda

    Published 2022-12-01
    “…So that it raises the suspicion of an attacker who threatens the security of the information in it. …”
    Get full text
    Article
  12. 1032

    Is low‐rate distributed denial of service a great threat to the Internet? by Ming Chen, Jing Chen, Xianglin Wei, Bing Chen

    Published 2021-09-01
    “…Abstract Low‐rate Distributed Denial of Service (LDDoS) attacks, in which the attackers send packets to a victim at a sufficiently low rate to avoid being detected, are considered to be a subtype of DDoS attacks and a potential threat to Internet security. …”
    Get full text
    Article
  13. 1033

    Revisit two memoryless state‐recovery cryptanalysis methods on A5/1 by Yanbin Xu, Yonglin Hao, Mingxing Wang

    Published 2023-07-01
    “…Soon after its proposal, Zhang's near collision attack was severely challenged by Derbez et al. who claimed that Zhang's attack cannot have a time complexity lower than Golic's memoryless guess‐and‐determine attack dating back to EUROCRYPT 1997. …”
    Get full text
    Article
  14. 1034

    Research and design of the protection scheme on bluetooth location privacy by YU Bin, ZHANG Shun

    Published 2011-01-01
    “…The attack mechanism of bluetooth location privacy and the disadvantages of the current protection scheme were analyzed and a model of hierarchical address was established.On the basis of the model,a protection scheme on bluetooth location privacy was designed.Compared with others,this scheme can not only resist eavesdroping,replay attack,frequency hop sequence attack,conversation address tracking attack,dictionary attack and man in the middle attack,but also need little computing and storage.…”
    Get full text
    Article
  15. 1035

    Cyber Threat Inference Focused on Threat Class Sequence With Threat Class Sequence System by Hyoungjun Kim, Jae-Yeol Kim, Kyung-Ho Lee

    Published 2025-01-01
    “…These attacks have a tendency to continuously expand the scale of the damage during the attack stage. …”
    Get full text
    Article
  16. 1036

    The Security Weakness of Block Cipher Piccolo against Fault Analysis by Junghwan Song, Kwanhyung Lee, Younghoon Jung

    Published 2014-03-01
    “…Fault analysis is a type of side channel attack and cube attack is an algebraic attack finding sufficiently low-degree polynomials in a cipher. …”
    Get full text
    Article
  17. 1037

    Analysis of the Magnus Moment Aerodynamic Characteristics of Rotating Missiles at High Altitudes by Yihang Xu, Shaosong Chen, Hang Zhou

    Published 2021-01-01
    “…The Magnus force direction did not change with the change of the altitude and the angle of attack at low angles of attack; however, it changed with altitude at an angle of attack of 30°. …”
    Get full text
    Article
  18. 1038

    Sustainability of Mahogany Production in Plantations: Does Resource Availability Influence Susceptibility of Young Mahogany Plantation Stands to Hypsipyla robusta Infestation? by C. B. Darko, E. Opuni-Frimpong, S. A. Owusu, B. Kyere, A. J. Storer

    Published 2022-01-01
    “…The analysis of variance (ANOVA) at a P-value of 0.05 was used to test the significance of differences in infestation by H. robusta between the species. H. robusta attacks were recorded by month 12 after planting in the field, and only Khaya spp. was attacked, with attacks evident on 15.5% of K grandifoliola and 6.6% K. ivorensis. …”
    Get full text
    Article
  19. 1039

    RPRep: A Robust and Privacy-Preserving Reputation Management Scheme for Pseudonym-Enabled VANETs by Jin Wang, Yonghui Zhang, Youyuan Wang, Xiang Gu

    Published 2016-03-01
    “…One is that they are vulnerable to tactical attacks such as self-promoting attacks and bad-mouthing attacks. …”
    Get full text
    Article
  20. 1040

    Robust multi-dimensional trust model for improving the survivability of ad hoc networks by CHEN Shen-long1, ZHANG Yu-qing1

    Published 2010-01-01
    “…Attackers could perform the blended attack against ad hoc networks through utilizing several attack methods together.Under this circumstance,a robust multi-dimensional trust model(RMTM) to improve the survivability of ad hoc networks was proposed.RMTM was based on D-S theory.Nodes’ attack evidences were classified into several dimen-sions and the trust of each dimension was computed according to basic probability assignment function.Then RMTM implemented the comprehensive evaluation through the multi-dimensional trust fusion.In order to resist the attacks against trust models themselves,the corresponding tolerant algorithms were designed to enhance the RMTM’s robustness.The simulations show that RMTM can effectively defense against both ad hoc network blended attack and trust model attacks with limited overload and consequently it significantly improves the survivability of ad hoc networks.…”
    Get full text
    Article