-
1021
Malicious code within model detection method based on model similarity
Published 2023-08-01“…The privacy of user data in federated learning is mainly protected by exchanging model parameters instead of source data.However, federated learning still encounters many security challenges.Extensive research has been conducted to enhance model privacy and detect malicious model attacks.Nevertheless, the issue of risk-spreading through malicious code propagation during the frequent exchange of model data in the federated learning process has received limited attention.To address this issue, a method for detecting malicious code within models, based on model similarity, was proposed.By analyzing the iterative process of local and global models in federated learning, a model distance calculation method was introduced to quantify the similarity between models.Subsequently, the presence of a model carrying malicious code is detected based on the similarity between client models.Experimental results demonstrate the effectiveness of the proposed detection method.For a 178MB model containing 0.375MB embedded malicious code in a training set that is independent and identically distributed, the detection method achieves a true rate of 82.9% and a false positive rate of 1.8%.With 0.75MB of malicious code embedded in the model, the detection method achieves a true rate of 96.6% and a false positive rate of 0.38%.In the case of a non-independent and non-identically distributed training set, the accuracy of the detection method improves as the rate of malicious code embedding and the number of federated learning training rounds increase.Even when the malicious code is encrypted, the accuracy of the proposed detection method still achieves over 90%.In a multi-attacker scenario, the detection method maintains an accuracy of approximately 90% regardless of whether the number of attackers is known or unknown.…”
Get full text
Article -
1022
Research on IoT security situation awareness method based on evidence theory
Published 2022-04-01“…The security problem of IoT became more and more serious with its rapid development.Considering that the current IoT security situation awareness system lacks generality and excessively relies on expert knowledge, a IoT security situation awareness method based on improved D-S evidence theory was proposed in this paper.Fuzzy Gaussian membership function was used to calculate the vulnerability information membership matrix, which was normalized as evidence distribution matrix.The improved Topsis method was used to measure the evidence credibility.In order to fully restrain the credibility of conflicting evidence and improve the credibility of mutually supporting evidence, local credibility between two evidence was aggregated and the expected positive and negative solution vectors were improved according to the situation assessment scenario.And the weighted average method was used for vulnerability information fusion, to obtain the result of situational assessment.The result of situational awareness was fused with the time discount and high-risk vulnerability information discount evidence theory.At the same time, the IoT vulnerability information at different moments was considered comprehensively, the evidence was adaptively and dynamically weighted with the ratio information of high-risk vulnerability.The experimental results show that in the fusion of different numbers of evidence bodies and four common conflicting evidence, the improved Topsis method has higher fusion probability on credible proposition.In the aspect of situation assessment, the risk degree of current system is accurately assessed.And in the aspect of situational awareness, this discount evidence theory can predict the probability of high risk and critical risk, which is more effective than the traditional D-S evidence theory.According to this theory, a IoT security situational awareness method process was proposed, which would be used to guide engineering practice.In the future, the relationship between vulnerabilities can be considered and richer information between vulnerabilities can be extracted for vulnerability exploiting, so that the result of situation assessment is more accurate and reasonable.On the other hand, for situational awareness, game theory can be adopted in the process of dynamic game between the attacker and defender.…”
Get full text
Article -
1023
Extremist Legitimate Defense in Iran's Criminal Proceedings (with an Emphasis on Intentional Homicide)
Published 2024-09-01“…The current research, using the analytical-descriptive method and collecting the required information in the library method, and relying on the cases of intentional homicide in the criminal justice system, Iran tries to evaluate the impact and impression of the judicial procedure of legal duality with the approaches of punishment based on defense conditions. and show the levels of defense, and at the end, while emphasizing the need for consistent criminal policy in order to protect the rights of walid the conclusion is reached that Note 2 of Article 302 is only about crimes and is based on non-observance of the levels of defense despite the necessity and truth of the principle of defense And the position of Note 2 of Article 156 also applies to other crimes in the absence of one of the conditions of legitimate defense .The effect of extreme legitimate defense in crimes is the deliberate impunity of revenge, and in other crimes, it is simply the imposition of the burden of the lack of defense conditions on the defender from the attacker.…”
Get full text
Article -
1024
5G-based smart airport network security scheme design and security analysis
Published 2023-10-01“…To meet the security requirements of smart airports, a 5G-based smart airport network security solution was proposed.The security characteristics and security requirements of the 5G scenario in smart airport were analyzed, and the pain points of security requirements in the current scenario were summarized in five aspects:unified security management and control, network slicing security, security monitoring and early warning, edge computing security, and IoT-aware node security.And then a 5G network security system was designed for smart airports.The functional components of this system included 5G network unified security management and control functions for ubiquitous networks, lightweight 5G network identity authentication and authentication functions, 5G network slice security protection for multi-service requirements, 5G network security monitoring and early warning based on big data analysis, integrated security protection function based on edge computing, and sensory node security protection function based on device behavior analysis.This comprehensive approach built an all-in-one security platform covering business encryption, network security, terminal trustworthiness, identity trustworthiness, and security management and control.Additionally, the potential counterfeit base station attacks in the existing 5G authentication and key agreement (AKA) were analyzed.Due to the lack of authenticity verification of the messages forwarded by the SN, the attacker can pretend to be the real SN to communicate with the UE and the HN, thus carrying out the base station masquerading attack.This kind of attack may lead to the leakage of smart airport network data, and encounter problems such as tampering and deception by opponents.Aiming at the network security requirements of smart airports and the security issues of 5G authentication and key agreement protocol, an improved 5G authentication and key agreement protocol was designed.Formal security models, security goal definitions, and analysis were performed to ensure the robustness and effectiveness of the protocol against attacks.…”
Get full text
Article -
1025
Capsular polysaccharide restrains type VI secretion in Acinetobacter baumannii
Published 2025-01-01“…To function effectively, the T6SS must penetrate the membranes of both attacker and target bacteria. Structures associated with the cell envelope, like polysaccharides chains, can therefore introduce spatial separation and steric hindrance, potentially affecting the efficacy of the T6SS. …”
Get full text
Article -
1026
Asirtmali Aba Wrestling in Turkish sports history and culture
Published 2014-02-01“…Aşırtmalı aba wrestling receives its name from clothing made by aba, a loose-fitting garment woven of camel or goat hair, which pehlivan, a wrestler of Turkish traditional wrestling, has worn as well as from technical term called 'el aşırma', an act performed by the attacker to grab the belt of his opponent in the back by moving his hand over opponent's shoulder and reaching his hand to opponent's belt in the back. …”
Get full text
Article -
1027
A privacy-enhanced framework with deep learning for botnet detection
Published 2025-01-01“…This algorithm simulates the game between the attacker trying to infer private information through the attack model and the data processor retaining the original content of the traffic to the maximum extent. …”
Get full text
Article -
1028
Implementasi Algoritme Spongent sebagai Algoritme Hashing untuk Integritas pada Modul Komunikasi Lora
Published 2023-12-01“…Testing of data security with active attack testing is successful because when the attacker sends the modified data, it has been checked on the gateway node and the resulting data is invalid. …”
Get full text
Article -
1029
An artificial insurance framework for a hydrogen-based microgrid to detect the advanced cyberattack model
Published 2025-01-01“…Albeit microgrids can gain beneficial results in cost and energy schedules once operating in grid-connected mode, such systems are vulnerable to malicious attacks from the viewpoint of cybersecurity. With this in mind, this paper explores a novel advanced attack model named the false transferred data injection (FTDI) attack aiming to manipulatively alter the power flowing from the microgrid to the upstream grid to raise voltage usability probability. …”
Get full text
Article -
1030
Balancing Privacy and Utility in Split Learning: An Adversarial Channel Pruning-Based Approach
Published 2025-01-01“…In particular, the SSIM between the original data and the data reconstructed by the attacker, achieved by our approach, decreased significantly by 57%. …”
Get full text
Article -
1031
Pengamanan Citra Berwarna Menggunakan Kriptografi Visual Skema Meaningful Shares dan Steganografi LSB
Published 2022-12-01“…So that it raises the suspicion of an attacker who threatens the security of the information in it. …”
Get full text
Article -
1032
Is low‐rate distributed denial of service a great threat to the Internet?
Published 2021-09-01“…Abstract Low‐rate Distributed Denial of Service (LDDoS) attacks, in which the attackers send packets to a victim at a sufficiently low rate to avoid being detected, are considered to be a subtype of DDoS attacks and a potential threat to Internet security. …”
Get full text
Article -
1033
Revisit two memoryless state‐recovery cryptanalysis methods on A5/1
Published 2023-07-01“…Soon after its proposal, Zhang's near collision attack was severely challenged by Derbez et al. who claimed that Zhang's attack cannot have a time complexity lower than Golic's memoryless guess‐and‐determine attack dating back to EUROCRYPT 1997. …”
Get full text
Article -
1034
Research and design of the protection scheme on bluetooth location privacy
Published 2011-01-01“…The attack mechanism of bluetooth location privacy and the disadvantages of the current protection scheme were analyzed and a model of hierarchical address was established.On the basis of the model,a protection scheme on bluetooth location privacy was designed.Compared with others,this scheme can not only resist eavesdroping,replay attack,frequency hop sequence attack,conversation address tracking attack,dictionary attack and man in the middle attack,but also need little computing and storage.…”
Get full text
Article -
1035
Cyber Threat Inference Focused on Threat Class Sequence With Threat Class Sequence System
Published 2025-01-01“…These attacks have a tendency to continuously expand the scale of the damage during the attack stage. …”
Get full text
Article -
1036
The Security Weakness of Block Cipher Piccolo against Fault Analysis
Published 2014-03-01“…Fault analysis is a type of side channel attack and cube attack is an algebraic attack finding sufficiently low-degree polynomials in a cipher. …”
Get full text
Article -
1037
Analysis of the Magnus Moment Aerodynamic Characteristics of Rotating Missiles at High Altitudes
Published 2021-01-01“…The Magnus force direction did not change with the change of the altitude and the angle of attack at low angles of attack; however, it changed with altitude at an angle of attack of 30°. …”
Get full text
Article -
1038
Sustainability of Mahogany Production in Plantations: Does Resource Availability Influence Susceptibility of Young Mahogany Plantation Stands to Hypsipyla robusta Infestation?
Published 2022-01-01“…The analysis of variance (ANOVA) at a P-value of 0.05 was used to test the significance of differences in infestation by H. robusta between the species. H. robusta attacks were recorded by month 12 after planting in the field, and only Khaya spp. was attacked, with attacks evident on 15.5% of K grandifoliola and 6.6% K. ivorensis. …”
Get full text
Article -
1039
RPRep: A Robust and Privacy-Preserving Reputation Management Scheme for Pseudonym-Enabled VANETs
Published 2016-03-01“…One is that they are vulnerable to tactical attacks such as self-promoting attacks and bad-mouthing attacks. …”
Get full text
Article -
1040
Robust multi-dimensional trust model for improving the survivability of ad hoc networks
Published 2010-01-01“…Attackers could perform the blended attack against ad hoc networks through utilizing several attack methods together.Under this circumstance,a robust multi-dimensional trust model(RMTM) to improve the survivability of ad hoc networks was proposed.RMTM was based on D-S theory.Nodes’ attack evidences were classified into several dimen-sions and the trust of each dimension was computed according to basic probability assignment function.Then RMTM implemented the comprehensive evaluation through the multi-dimensional trust fusion.In order to resist the attacks against trust models themselves,the corresponding tolerant algorithms were designed to enhance the RMTM’s robustness.The simulations show that RMTM can effectively defense against both ad hoc network blended attack and trust model attacks with limited overload and consequently it significantly improves the survivability of ad hoc networks.…”
Get full text
Article