• Title/Summary/Keyword: Attack Model

Search Result 1,005, Processing Time 0.026 seconds

A Basic Study on Wheel Flange Climbing using Model Wheelset

  • Nagumo, Yosuke;Tanifuji, Katsuya;Imai, Junichi
    • International Journal of Railway
    • /
    • v.3 no.2
    • /
    • pp.60-67
    • /
    • 2010
  • This paper deals with an experimental study on the wheel flange climbing of railway vehicles, which is a major factor leading to derailment. An experiment is carried out on a 1/5-scale model wheelset of a truck used on a standard-gauge track, which is placed on a roller rig. The lateral external force acting on the wheelset is ramped up until derailment occurs under the condition of a fixed attack angle and wheel-load unbalance ratio. Three parameters, the height of wheel lift, the lateral force, and the wheel load acting on the outer rail, are measured until derailment occurs. From these measurements, it is possible to observe the behavior of the wheelset and to elucidate how the attack angle, the wheel-load unbalance ratio and the lateral external force affect flange-climb derailment. Then, a numerical simulation is carried out using an analytical model based on a single wheelset. As a result, the flange-climb behavior observed in the experiment can be explained theoretically on the bases of the analytical results, although further improvement of the model is desired.

  • PDF

A Study on Anomaly Signal Detection and Management Model using Big Data (빅데이터를 활용한 이상 징후 탐지 및 관리 모델 연구)

  • Kwon, Young-baek;Kim, In-seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.287-294
    • /
    • 2016
  • APT attack aimed at the interruption of information and communication facilities and important information leakage of companies. it performs an attack using zero-day vulnerabilities, social engineering base on collected information, such as IT infra, business environment, information of employee, for a long period of time. Fragmentary response to cyber threats such as malware signature detection methods can not respond to sophisticated cyber-attacks, such as APT attacks. In this paper, we propose a cyber intrusion detection model for countermeasure of APT attack by utilizing heterogeneous system log into big-data. And it also utilizes that merging pattern-based detection methods and abnormality detection method.

Strategic Decision Making Model Among Collective Intelligences Using The Game Theory in Cyber Attacks - Case study of KHNP Hacking - (사이버공격시 게임이론을 활용한 집단지성간 전략결정 모델 연구 - 한수원 해킹사건을 중심으로 -)

  • Park, Sang-min;Lee, Kyung-ho;Lim, Jong-in
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.237-246
    • /
    • 2016
  • Recently various types of cyber attacks have occurred. The strategic goals & tactical means of these have evolved. Especially KHNP cyber attack was the type of hacktivism combined hack and psychological warfare. The cyber attackers have forecd the nation to participate in the cyber warfare and the government to make strategic decisions to the releases of confidential information and the threats of stopping KHNP. In this paper, we would like to study the effective strategic decision-making model utilizing the game theory and including an attack intelligence on open policy Decision framework.

Effect of windshields on the aerodynamic performance of a four-box bridge deck

  • Chen, Xi;Dragomirescu, Elena
    • Wind and Structures
    • /
    • v.31 no.1
    • /
    • pp.31-41
    • /
    • 2020
  • A new type of bridge deck section consisting of four-box decks, two side decks for vehicular traffic lanes and two middle decks for railway traffic, has been experimentally investigated for determining its aerodynamic properties. The eight flutter derivatives were determined by the Iterative Least Squares (ILS) method for this new type of four-box deck model, with two windshields of 30 mm and 50 mm height respectively. Wind tunnel experiments were performed for angles of attack α = ±6°, ±4°, ±2° and 0° and Re numbers of 4.85×105 to 6.06×105 and it was found that the four-box deck with the 50 mm windshields had a better aerodynamic performance. Also, the results showed that the installation of the windshields reduced the values of the lift coefficient CL for the negative angles attack in the range of -6° to 0°, but the drag coefficient CD increased in the positive angle of attack range. However, galloping instability was not encountered for the tested reduced wind speeds, of up to 9.8. The aerodynamic force coefficients and the flutter derivatives for the four-box deck model were consistent with the results reported for the Messina triple-box bridge deck, but were different from those reported for the twin-box bridge decks.

CAVITATION FLOW ANALYSIS OF HYDROFOIL WITH CHANGE OF ANGLE OF ATTACK (받음각 변화에 대한 수중익형의 캐비테이션 해석)

  • Kang, T.J.;Park, W.G.;Jung, C.M.
    • Journal of computational fluids engineering
    • /
    • v.19 no.2
    • /
    • pp.17-23
    • /
    • 2014
  • Cavitation causes a great deal of noise, damage to components, vibrations, and a loss of efficiency in devices, such as propellers, pump impellers, nozzles, injectors, torpedoes, etc. Thus, the cavitating flow simulation is of practical importance for many engineering systems. In the present work, a two-phase flow solver based on the homogeneous mixture model has been developed. The solver employs an implicit preconditioning, dual time stepping algorithm in curvilinear coordinates. The flow characteristics around Clark-Y hydrofoil were calculated and then validated by comparing with the experimental data. The lift and drag coefficients with changes of angle of attack and cavitation number were obtained. The results show that cavity length and lift, drag coefficient increase with increasing angle of attack.

The nose-up effect in twin-box bridge deck flutter: Experimental observations and theoretical model

  • Ronne, Maja;Larsen, Allan;Walther, Jens H.
    • Wind and Structures
    • /
    • v.32 no.4
    • /
    • pp.293-308
    • /
    • 2021
  • For the past three decades a significant amount of research has been conducted on bridge flutter. Wind tunnel tests for a 2000 m class twin-box suspension bridge have revealed that a twin-box deck carrying 4 m tall 50% open area ratio wind screens at the deck edges achieved higher critical wind speeds for onset of flutter than a similar deck without wind screens. A result at odds with the well-known behavior for the mono-box deck. The wind tunnel tests also revealed that the critical flutter wind speed increased if the bridge deck assumed a nose-up twist relative to horizontal when exposed to high wind speeds - a phenomenon termed the "nose-up" effect. Static wind tunnel tests of this twin-box cross section revealed a positive moment coefficient at 0° angle of attack as well as a positive moment slope, ensuring that the elastically supported deck would always meet the mean wind flow at ever increasing mean angles of attack for increasing wind speeds. The aerodynamic action of the wind screens on the twin-box bridge girder is believed to create the observed nose-up aerodynamic moment at 0° angle of attack. The present paper reviews the findings of the wind tunnel tests with a view to gain physical insight into the "nose-up" effect and to establish a theoretical model based on numerical simulations allowing flutter predictions for the twin-box bridge girder.

Neural Network and Cloud Computing for Predicting ECG Waves from PPG Readings

  • Kosasih, David Ishak;Lee, Byung-Gook;Lim, Hyotaek
    • Journal of Multimedia Information System
    • /
    • v.9 no.1
    • /
    • pp.11-20
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.

The Intelligent Blockchain for the Protection of Smart Automobile Hacking

  • Kim, Seong-Kyu;Jang, Eun-Sill
    • Journal of Multimedia Information System
    • /
    • v.9 no.1
    • /
    • pp.33-42
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.

Data Preprocessing Method for Lightweight Automotive Intrusion Detection System (차량용 경량화 침입 탐지 시스템을 위한 데이터 전처리 기법)

  • Sangmin Park;Hyungchul Im;Seongsoo Lee
    • Journal of IKEEE
    • /
    • v.27 no.4
    • /
    • pp.531-536
    • /
    • 2023
  • This paper proposes a sliding window method with frame feature insertion for immediate attack detection on in-vehicle networks. This method guarantees real-time attack detection by labeling based on the attack status of the current frame. Experiments show that the proposed method improves detection performance by giving more weight to the current frame in CNN computation. The proposed model was designed based on a lightweight LeNet-5 architecture and it achieves 100% detection for DoS attacks. Additionally, by comparing the complexity with conventional models, the proposed model has been proven to be more suitable for resource-constrained devices like ECUs.

Building On/off Attacks Detector for Effective Trust Evaluation in Cloud Services Environment

  • SALAH T. ALSHAMMARI;AIIAD ALBESHRI;KHALID ALSUBHI
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.101-107
    • /
    • 2024
  • Cloud computing is a widely used technology that has changed the way people and organizations store and access information. This technology is quite versatile, which is why extensive amounts of data can be stored in the cloud. Furthermore, businesses can access various services over the cloud without having to install applications. However, the cloud computing services are provided over a public domain, which means that both trusted and non-trusted users can access the services. Though there are several advantages of cloud computing services, especially to business owners, various challenges are also posed in terms of the privacy and security of information and online services. A kind of threat that is widely faced in the cloud environment is the on/off attack. In this kind of attack, a few entities exhibit proper behavior for a given time period to develop a highly a positive reputation and gather trust, after which they exhibit deception. A viable solution is provided by the given trust model for preventing the attacks. This method works by providing effective security to the cloud services by identifying malicious and inappropriate behaviors through the application of trust algorithms that can identify on-off attacks.