• Title/Summary/Keyword: Attack Model

Search Result 1,005, Processing Time 0.03 seconds

Study on the Angle-of-Attack Characteristics of the Rudder in Rotating Propeller Flow (프로펠러 회전류에서 작동하는 방향타의 받음각 특성 연구)

  • Jung, Jae Hwan;Baek, Dong Geun;Yoon, Hyun Sik;Kim, Ki-Sup;Paik, Bu-Geun
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.50 no.6
    • /
    • pp.421-428
    • /
    • 2013
  • This study aims at numerically investigating the angle of attack characteristics of the rudder behind a rotating propeller. The rotating propeller of 5 blades and the full spade rudder are placed in the numerical water tunnel with a uniform flow condition to consider propeller-rudder interaction. The turbulence closure model is employed to simulate the three-dimensional unsteady incompressible viscous turbulent flow around the propeller and the rudder. The present numerical method are well verified by comparing with the experimental results. In order to identify the dependence of the angle of attack of the rudder on the rudder angle, a wide range of rudder angles is considered. The present study carried out the quantitative and qualitative analysis of the angle of attack in terms of the pressure distribution, streamlines and the evaluation of the flow incidence, resulting in that the angle of attack increases as we move from the root and the tip to the center of the rudder, regardless of the rudder angle. The distribution of the angle-of-attack along the span is strongly affected by rotating propeller flow and rudder angle. Consequently, the distribution of the angle-of-attack of the oncoming flow against the rudder leading edge plays a role in determination of rudder performance.

Optimization of Cyber-Attack Detection Using the Deep Learning Network

  • Duong, Lai Van
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.159-168
    • /
    • 2021
  • Detecting cyber-attacks using machine learning or deep learning is being studied and applied widely in network intrusion detection systems. We noticed that the application of deep learning algorithms yielded many good results. However, because each deep learning model has different architecture and characteristics with certain advantages and disadvantages, so those deep learning models are only suitable for specific datasets or features. In this paper, in order to optimize the process of detecting cyber-attacks, we propose the idea of building a new deep learning network model based on the association and combination of individual deep learning models. In particular, based on the architecture of 2 deep learning models: Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM), we combine them into a combined deep learning network for detecting cyber-attacks based on network traffic. The experimental results in Section IV.D have demonstrated that our proposal using the CNN-LSTM deep learning model for detecting cyber-attacks based on network traffic is completely correct because the results of this model are much better than some individual deep learning models on all measures.

A Robust Bayesian Probabilistic Matrix Factorization Model for Collaborative Filtering Recommender Systems Based on User Anomaly Rating Behavior Detection

  • Yu, Hongtao;Sun, Lijun;Zhang, Fuzhi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.9
    • /
    • pp.4684-4705
    • /
    • 2019
  • Collaborative filtering recommender systems are vulnerable to shilling attacks in which malicious users may inject biased profiles to promote or demote a particular item being recommended. To tackle this problem, many robust collaborative recommendation methods have been presented. Unfortunately, the robustness of most methods is improved at the expense of prediction accuracy. In this paper, we construct a robust Bayesian probabilistic matrix factorization model for collaborative filtering recommender systems by incorporating the detection of user anomaly rating behaviors. We first detect the anomaly rating behaviors of users by the modified K-means algorithm and target item identification method to generate an indicator matrix of attack users. Then we incorporate the indicator matrix of attack users to construct a robust Bayesian probabilistic matrix factorization model and based on which a robust collaborative recommendation algorithm is devised. The experimental results on the MovieLens and Netflix datasets show that our model can significantly improve the robustness and recommendation accuracy compared with three baseline methods.

A Study on Mathematical Model of Manoeuvring Motion of Manta-type Unmanned Undersea Vehicle at Large Attack Angles (Manta형 무인잠수정의 대각도 받음각을 갖는 조종운동 수학모델에 관한 연구)

  • Bae, Jun-Young;Sohn, Kyoung-Ho;Kim, June
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.47 no.3
    • /
    • pp.328-341
    • /
    • 2010
  • The authors adopt the Unmanned Undersea Vehicle(UUV), which has taken the shape of manta(Sohn et al. 2006). They call here it Manta-type Unmanned Undersea Test Vehicle(MUUTV). MUUTV is designed with the similar concept of UUV called Manta Test Vehicle(MTV), which was originally built by the Naval Undersea Warfare Center, USA(Lisiewicz and French 2000, Sirmalis et al. 2001, U.S. Navy 2004). The present study deals with evaluation of extreme motion of MUUTV at large attack angles. Extreme motion contains, for example, rising and depth change due to operation of hovering thrusters attached to MUUTV, lateral motion due to ocean current applied to MUUTV at low advance velocity, and so on. Numerical simulation technique has been utilized. The previous mathematical model on manoeuvring motion of MUUTV(Bae et al. 2009a) is basically adopted. Based on the results of present model experiment on extreme motion, the mathematical model is revised and supplemented in order to describe extreme motion. The hydrodynamic derivatives related to extreme motion are obtained from present model experiment and the other derivatives are referred to previous work(Bae et al. 2009a).

A DDoS Attack Detection Technique through CNN Model in Software Define Network (소프트웨어-정의 네트워크에서 CNN 모델을 이용한 DDoS 공격 탐지 기술)

  • Ko, Kwang-Man
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.605-610
    • /
    • 2020
  • Software Defined Networking (SDN) is setting the standard for the management of networks due to its scalability, flexibility and functionality to program the network. The Distributed Denial of Service (DDoS) attack is most widely used to attack the SDN controller to bring down the network. Different methodologies have been utilized to detect DDoS attack previously. In this paper, first the dataset is obtained by Kaggle with 84 features, and then according to the rank, the 20 highest rank features are selected using Permutation Importance Algorithm. Then, the datasets are trained and tested with Convolution Neural Network (CNN) classifier model by utilizing deep learning techniques. Our proposed solution has achieved the best results, which will allow the critical systems which need more security to adopt and take full advantage of the SDN paradigm without compromising their security.

The Combat Effectiveness Analysis of Attack Helicopter Using Simulation and AHP (시뮬레이션 및 AHP기법을 이용한 공격헬기 전투효과 분석)

  • Lee, Jae-Moon;Jung, Chi-Young;Lee, Jae-Yeong
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.3
    • /
    • pp.63-70
    • /
    • 2010
  • The purpose of this paper is to propose a methodology that can measure the combat effectiveness of attack helicopter which Korea army will be operating in the near future. To measure the combat effectiveness, firstly, we use a wargame model, AAsim (Army Aviation simulation), as a analytic simulation model which is used to analyze DOTMLPF and operation in army aviation field, secondly we use an Analytic Hierarchy Process by opinion of experts. For simulation and AHP, we consider anti armored corps operation reflecting attack helicopter's combat effectiveness. As a result of this study, the combat effectiveness per each attack helicopter can be measured and this combat effectiveness is useful for reasonable decision making such as selection helicopter type, quantity when acquiring new weapon system.

A Study on Defense and Attack Model for Cyber Command Control System based Cyber Kill Chain (사이버 킬체인 기반 사이버 지휘통제체계 방어 및 공격 모델 연구)

  • Lee, Jung-Sik;Cho, Sung-Young;Oh, Heang-Rok;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.1
    • /
    • pp.41-50
    • /
    • 2021
  • Cyber Kill Chain is derived from Kill chain of traditional military terms. Kill chain means "a continuous and cyclical process from detection to destruction of military targets requiring destruction, or dividing it into several distinct actions." The kill chain has evolved the existing operational procedures to effectively deal with time-limited emergency targets that require immediate response due to changes in location and increased risk, such as nuclear weapons and missiles. It began with the military concept of incapacitating the attacker's intended purpose by preventing it from functioning at any one stage of the process of reaching it. Thus the basic concept of the cyber kill chain is that the attack performed by a cyber attacker consists of each stage, and the cyber attacker can achieve the attack goal only when each stage is successfully performed, and from a defense point of view, each stage is detailed. It is believed that if a response procedure is prepared and responded, the chain of attacks is broken, and the attack of the attacker can be neutralized or delayed. Also, from the point of view of an attack, if a specific response procedure is prepared at each stage, the chain of attacks can be successful and the target of the attack can be neutralized. The cyber command and control system is a system that is applied to both defense and attack, and should present defensive countermeasures and offensive countermeasures to neutralize the enemy's kill chain during defense, and each step-by-step procedure to neutralize the enemy when attacking. Therefore, thist paper proposed a cyber kill chain model from the perspective of defense and attack of the cyber command and control system, and also researched and presented the threat classification/analysis/prediction framework of the cyber command and control system from the defense aspect

Effects of corner cuts and angles of attack on the Strouhal number of rectangular cylinders

  • Choi, Chang-Koon;Kwon, Dae-Kun
    • Wind and Structures
    • /
    • v.6 no.2
    • /
    • pp.127-140
    • /
    • 2003
  • An investigation into the effect of corner cuts on the Strouhal number of rectangular cylinders with various dimensional ratios and various angles of attack is described. The Strouhal number given as a function of corner cut size is obtained directly from the aerodynamic behavior of the body in a uniform flow through a series of wind-induced vibration tests. For a quick verification of the validity of the Strouhal numbers obtained in this way, they are compared with the approximated the Strouhal numbers based on Shiraishi's early research. The test results show that the Strouhal number of the model with various corner cuts has a fluctuating trend as the angle of attack changes. For each cutting ratio as the angle of attack increases at each cutting ratio above $15^{\circ}$, the Strouhal number decreases gradually, and these trends are more evident for larger corner cut sizes. However, a certain corner cut size which is effective in reducing the wind-induced vibration can be identified by larger Strouhal numbers than those of other corner cut sizes. Three distinct characteristics of Strouhal number variation can be identified in three regions which are termed as Region I, II, and III based on the general trend of the test results. It is also found that the corner cut is effective in one region (Region-II) and less effective in another one (Region-III) when only the vortex-induced vibration occurs.

The Variation of Flow Field and Hydrodynamic Coefficients of Submarine by Changes of Angle of Attack and Yaw Angle (유동 방향 변화에 따른 잠수함 주위의 유동 특성과 유체동역학적 계수의 변화)

  • Jang Jin-Ho;Park Warn-Gyu
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.43 no.4 s.148
    • /
    • pp.460-466
    • /
    • 2006
  • The three-dimensional RANS equations were applied to analyze the flow field of a submarine. To validate the code, the DARPA SUBOFF bare hull and an eliipsoid at angles of attack of $10^{\circ}\;and\;30^{\circ}$ were simulated and good agreement with experiments was obtained. After the code validation, the flows over the full configuration of DARPA SUBOFF model having a fairwater and four stern appendages were simulated at four angles of attack $(0^{\circ},\;10^{\circ},\;20^{\circ},\;30^{\circ})$ and three yaw angles $(10^{\circ},\;20^{\circ},\;30^{\circ})$ Specifically, the pressure contours and streamlines of fairwater and stern appendage were compared as the angle of attack and yaw angle changed. The variations of hydrodynamic forces were also calculated.

Analysis of Certificateless Signcryption Schemes and Construction of a Secure and Efficient Pairing-free one based on ECC

  • Cao, Liling;Ge, Wancheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4527-4547
    • /
    • 2018
  • Signcryption is a cryptographic primitive that provides authentication (signing) and confidentiality (encrypting) simultaneously at a lower computational cost and communication overhead. With the proposition of certificateless public key cryptography (CLPKC), certificateless signcryption (CLSC) scheme has gradually become a research hotspot and attracted extensive attentions. However, many of previous CLSC schemes are constructed based on time-consuming pairing operation, which is impractical for mobile devices with limited computation ability and battery capacity. Although researchers have proposed pairing-free CLSC schemes to solve the issue of efficiency, many of them are in fact still insecure. Therefore, the challenging problem is to keep the balance between efficiency and security in CLSC schemes. In this paper, several existing CLSC schemes are cryptanalyzed and a new CLSC scheme without pairing based on elliptic curve cryptosystem (ECC) is presented. The proposed CLSC scheme is provably secure against indistinguishability under adaptive chosen-ciphertext attack (IND-CCA2) and existential unforgeability under adaptive chosen-message attack (EUF-CMA) resting on Gap Diffie-Hellman (GDH) assumption and discrete logarithm problem in the random oracle model. Furthermore, the proposed scheme resists the ephemeral secret leakage (ESL) attack, public key replacement (PKR) attack, malicious but passive KGC (MPK) attack, and presents efficient computational overhead compared with the existing related CLSC schemes.