• Title/Summary/Keyword: Attack Model

Search Result 1,005, Processing Time 0.029 seconds

Network Security Modeling and Simulation Using the SES/MB Framework (SES/MB 프레임워크를 이용한 네트워크 보안 모델링 및 시뮬레이션)

  • 지승도;박종서;이장세;김환국;정기찬;정정례
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.2
    • /
    • pp.13-26
    • /
    • 2001
  • This paper presents the network security modeling methodology and simulation using the hierarchical and modular modeling and simulation framework. Recently, Howard and Amoroso developed the cause-effect model of the cyber attack, defense, and consequences, Cohen has been proposed the simplified network security simulation methodology using the cause-effect model, however, it is not clear that it can support more complex network security model and also the model-based cyber attack simulation. To deal with this problem, we have adopted the hierarchical and modular modeling and simulation environment so called the System Entity Structure/Model Base (SES/MB) framework which integrates the dynamic-based formalism of simulation with the symbolic formalism of AI. Several simulation tests performed on sample network system verify the soundness of our method.

Wind tunnel section model study of aeroelastic performance for Ting Kau Bridge Deck

  • Brownjohn, James Mark William;Choi, Cheong Chuen
    • Wind and Structures
    • /
    • v.4 no.5
    • /
    • pp.367-382
    • /
    • 2001
  • Wind tunnel tests were conducted on a model of deck section from the Ting Kau cable stayed bridge. The purpose of the tests was to determine the set of aerodynamic derivatives conventionally used to describe the motion-induced forces arising from the wind flow, and to investigate the stability of the deck under different conditions of turbulence and angle of attack. The study shows that except for large negative angles of attack the deck section itself is stable up to a high wind speed, and that when instability does occur it is essentially a single degree of freedom (torsional) flutter.

An Experiment of Improved Stow Net - Characteristics of Upthrust Float and Shearing Hood - (계량식 안강망의 실험연구)

  • Kim, Yong-Hae;Go, Gwan-Seo
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.16 no.2
    • /
    • pp.61-67
    • /
    • 1980
  • Previously, we had experimented on the model of stow net under the various combination including water velocity, spherical floats and elevating floats with the shearing hoods instead of the upper beam, however we couldn't concern with their characteristics. Spherical floats maintain their buoyancy at the same level when the speed increases, only the drag increases and effects some reduction in the fishing height. To eliminate this shortcoming, floats have to some hydrodynamic lifting force which increases with increasing speed. Phillips float with a dish-shaped metal plate welded on at the lower part and synthetic upthrusting float were used for the experiment to compare with their characteristics. Six kinds of model shearing hood depend on the angle of attack were used to test the characteristic of the shearing hood. According to their results, when the angle of attack is 30\ulcorner, the lift and drag coefficient reveal 1. 36, 0.84 respectively. And also experimented on the 5X8cm shearing hood to investigate the suitability for the model stow net.

  • PDF

Feature-selection algorithm based on genetic algorithms using unstructured data for attack mail identification (공격 메일 식별을 위한 비정형 데이터를 사용한 유전자 알고리즘 기반의 특징선택 알고리즘)

  • Hong, Sung-Sam;Kim, Dong-Wook;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.20 no.1
    • /
    • pp.1-10
    • /
    • 2019
  • Since big-data text mining extracts many features and data, clustering and classification can result in high computational complexity and low reliability of the analysis results. In particular, a term document matrix obtained through text mining represents term-document features, but produces a sparse matrix. We designed an advanced genetic algorithm (GA) to extract features in text mining for detection model. Term frequency inverse document frequency (TF-IDF) is used to reflect the document-term relationships in feature extraction. Through a repetitive process, a predetermined number of features are selected. And, we used the sparsity score to improve the performance of detection model. If a spam mail data set has the high sparsity, detection model have low performance and is difficult to search the optimization detection model. In addition, we find a low sparsity model that have also high TF-IDF score by using s(F) where the numerator in fitness function. We also verified its performance by applying the proposed algorithm to text classification. As a result, we have found that our algorithm shows higher performance (speed and accuracy) in attack mail classification.

Analysis of Scoring Difficulty in Different Match Situations in Relation to First Athlete to Score in World Taekwondo Athletes (세계태권도 겨루기 선수들의 선제득점에 따른 경기 내용별 득점 난이도 분석)

  • Mi-Na Jin;Jung-Hyun Yun;Chang-Jin Lee
    • Journal of Industrial Convergence
    • /
    • v.22 no.4
    • /
    • pp.21-29
    • /
    • 2024
  • This study analyzed the difficulty of scoring in different match situations in relation to which competitor scored first. The study analyzed the data from the 2022 Guadalajara World Taekwondo Championships. The analysis was performed for two separate weight classes: lightweight and heavyweight. Four game content variables were used: whether the athlete scored first, attack type, attack area, and game situation. Descriptive statistics, the Rasch model, and discrimination function questions were applied for data processing. SPSS and Winsteps were used for the statistical analysis, and the statistical significance level was set at 0.05. Consequently, in the lightweight class, the scoring frequency of the first scorer was high for all the game variables. In the heavyweight class, the scoring frequency for the first scorer was high for the attack type and attack area. By contrast, those who did not score first were more frequently found to be in a loss situation. By analyzing the scoring difficulties in different match situations based on whether the competitor scored first, the athletes who scored first in attack type most easily scored first. In losing situations, the athletes who scored first in attack area scored most easily, whereas those who did not score first scored most easily in body and match situations. For the heavyweight class, those who scored first in terms of attack type, counter-attack, and attack area scored the most easily while winning in body and match situations.

Flow Analysis of Three-Dimensional Wing in Ground Effect (지면 효과를 갖는 3차원 날개의 유동해석)

  • Im Ye-Hoon;Chang Keun-Shik
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2000.05a
    • /
    • pp.84-90
    • /
    • 2000
  • Ground effect of three-dimensional wing is studied. LU-factored Implicit upwind TVD scheme and Baldwin-Lomax turbulence model are used for this calculation. To investigate ground effect, NACA 4415 wing at M=0.5 calculated. Two different angles of attack and three cases of flight height are calculated. As increasing angle of attack, the ground effect becomes strong. In case of NACA 4415 wing in ground effect, strength of wing tip vortex becomes stronger than that of free flight.

  • PDF

Structural Modelling of Tapered Composite Aircraft Wings with Initial Angle of Attack using Thin-Walled Beam (얇은 벽 보를 이용한 초기 받음각이 있는 테이퍼형 복합재료 항공기 날개의 구조 모델링)

  • Kim, Keun-Taek;Song, Ohseop
    • Journal of Aerospace System Engineering
    • /
    • v.3 no.2
    • /
    • pp.1-11
    • /
    • 2009
  • A structural modelling for study on dynamic characteristics of tapered composite aircraft wings in the form of thin-walled beam is presented. The proposed structural model includes effects of transverse shear flexibility exhibited by the advanced composite materials and warping restraint characterizing elastic anisotropy and induced structural couplings. The complex effects of these factors could have a role in more efficient analysis on those structural models.

  • PDF

A 3D Watermarking on STL using Vertex domain (버텍스 영역을 이용한 STL에서의 3차원 디지털 워터마킹)

  • 김기석;천인국
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.05d
    • /
    • pp.901-906
    • /
    • 2002
  • This paper is a research about method, that is used in Rapid Prototyping system, that inserts and extracts watermark in STL(standard transform language) that has a 3D geometrical model. The proposed algorithm inserts watermark in the vertex domain of STL facet without the distortion of 3D model. If we make use of a established algorithm for watermarking of STL, a watermark inserted to 3D model can be removed by simple attack that change order of facet. The proposed algorithm has robustness about these attack. Experiment results verify that the proposed algorithm, to encode and decode watermark in STL 3D geometrical model, doesn't distort a 3D model at all. And it shows that the proposed algorithm is available.

  • PDF

DEVS-based Modeling Methodology for Cybersecurity Simulations from a Security Perspective

  • Kim, Jiyeon;Kim, Hyung-Jong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.2186-2203
    • /
    • 2020
  • Security administrators of companies and organizations need to come up with proper countermeasures against cyber-attacks considering infrastructures and security policies in their possession. In order to develop and verify such countermeasures, the administrators should be able to reenact both cyber-attacks and defenses. Simulations can be useful for the reenactment by overcoming its limitations including high risk and cost. If the administrators are able to design various scenarios of cyber-attacks and to develop simulation models from their viewpoints, they can simulate desired situations and observe the results more easily. It is challenging to simulate cyber-security issues, because there is lack of theoretical basis for modeling a wide range of the security field as well as pre-defined basic components used to model cyber-attacks. In this paper, we propose a modeling method for cyber-security simulations by developing a basic component and a composite model, called Abstracted Cyber-Security Unit Model (ACSUM) and Abstracted Cyber-security SIMulation model (ACSIM), respectively. The proposed models are based on DEVS(Discrete Event systems Specification) formalism, a modeling theory for discrete event simulations. We develop attack scenarios by sequencing attack behaviors using ACSUMs and then model ACSIMs by combining and abstracting the ACSUMs from a security perspective. The concepts of ACSUM and ACSIM enable the security administrators to simulate numerous cyber-security issues from their viewpoints. As a case study, we model a worm scenario using ACSUM and simulate three types of simulation models based on ACSIM from a different security perspective.

B-Corr Model for Bot Group Activity Detection Based on Network Flows Traffic Analysis

  • Hostiadi, Dandy Pramana;Wibisono, Waskitho;Ahmad, Tohari
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.10
    • /
    • pp.4176-4197
    • /
    • 2020
  • Botnet is a type of dangerous malware. Botnet attack with a collection of bots attacking a similar target and activity pattern is called bot group activities. The detection of bot group activities using intrusion detection models can only detect single bot activities but cannot detect bots' behavioral relation on bot group attack. Detection of bot group activities could help network administrators isolate an activity or access a bot group attacks and determine the relations between bots that can measure the correlation. This paper proposed a new model to measure the similarity between bot activities using the intersections-probability concept to define bot group activities called as B-Corr Model. The B-Corr model consisted of several stages, such as extraction feature from bot activity flows, measurement of intersections between bots, and similarity value production. B-Corr model categorizes similar bots with a similar target to specify bot group activities. To achieve a more comprehensive view, the B-Corr model visualizes the similarity values between bots in the form of a similar bot graph. Furthermore, extensive experiments have been conducted using real botnet datasets with high detection accuracy in various scenarios.