• Title/Summary/Keyword: Attack Model

Search Result 1,005, Processing Time 0.035 seconds

A New Wall-Distance Free One-Equation Turbulence Model

  • Nakanishi Tameo
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.107-109
    • /
    • 2003
  • We propose a wall distance free one-equation turbulence model. The model is organized in an extremely simple form. Only a few model constants were introduced into the model. The model is numerically tough and easy-of-use. The model also demonstrated the ability to simulate the laminar to turbulent flow transition. The model has been applied to the channel flow, the plane jet, the backward facing step flow, the flat plate boundary layer, as well as the flow around the 2D airfoil at large angles of attack, which obtained satisfactory results.

  • PDF

An Optimal Allocation Model for SAM-X (차기유도무기의 최적배치에 관한 모형)

  • 김승빈;전건욱
    • Journal of the military operations research society of Korea
    • /
    • v.30 no.1
    • /
    • pp.48-69
    • /
    • 2004
  • An optimal allocation model for SAM-X by using a set covering model is suggested. This allocation model considers to guarantee the maximum security of vital areas from the attack of enemy aircraft(s) and missiles. In order to formulate this model, we applied the concept of parallel structure reliability to set covering model. This model gives both direction of the primary target line and location of the facility. When applied this model to the real situation, the solution of this model can be used to the references of decision making for the optimal military facility allocation.

S-PRESENT Cryptanalysis through Know-Plaintext Attack Based on Deep Learning (딥러닝 기반의 알려진 평문 공격을 통한 S-PRESENT 분석)

  • Se-jin Lim;Hyun-Ji Kim;Kyung-Bae Jang;Yea-jun Kang;Won-Woong Kim;Yu-Jin Yang;Hwa-Jeong Seo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.193-200
    • /
    • 2023
  • Cryptanalysis can be performed by various techniques such as known plaintext attack, differential attack, side-channel analysis, and the like. Recently, many studies have been conducted on cryptanalysis using deep learning. A known-plaintext attack is a technique that uses a known plaintext and ciphertext pair to find a key. In this paper, we use deep learning technology to perform a known-plaintext attack against S-PRESENT, a reduced version of the lightweight block cipher PRESENT. This paper is significant in that it is the first known-plaintext attack based on deep learning performed on a reduced lightweight block cipher. For cryptanalysis, MLP (Multi-Layer Perceptron) and 1D and 2D CNN(Convolutional Neural Network) models are used and optimized, and the performance of the three models is compared. It showed the highest performance in 2D convolutional neural networks, but it was possible to attack only up to some key spaces. From this, it can be seen that the known-plaintext attack through the MLP model and the convolutional neural network is limited in attackable key bits.

The Vortical Flow Field of Delta Wing with Leading Edge Extension

  • Lee, Ki-Young;Sohn, Myong-Hwan
    • Journal of Mechanical Science and Technology
    • /
    • v.17 no.6
    • /
    • pp.914-924
    • /
    • 2003
  • The interaction and breakdown of vortices over the Leading Edge Extension (LEX) - Delta wing configuration has been investigated through wing-surface pressure measurements, the off-surface flow visualization, and 5-hole probe measurements of the wing wake section. The description focused on analyzing the interaction and the breakdown of vortices depending on the angle of attack and the sideslip angle. The Effect of angle of attack and sideslip angle on the aerodynamic load characteristics of the model is also presented. The sideslip angle was found to be a very influential parameter of the vortex flow over the LEX-delta wing configuration. The introduction of LEX vortex stabilized the vortex flow, and delayed the vortex breakdown up to a higher angle of attack. The vortex interaction and breakdown was promoted on the windward side, whereas it was suppressed on the leeward side.

Calculating Dynamic Derivatives of Flight Vehicle with New Engineering Strategies

  • Mi, Baigang;Zhan, Hao;Chen, Baibing
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.18 no.2
    • /
    • pp.175-185
    • /
    • 2017
  • This paper presents new differential methods for computing the combined and single dynamic stability derivatives of flight vehicle. Based on rigid dynamic mesh technique, the combined dynamic stability derivative can be achieved by imposing the aircraft pitching to the same angle of attack with two different pitching angular velocities and also translating it to the same additional angle of attack with two different rates of angle of attack. As a result, the acceleration derivative is identified. Moreover, the rotating reference frame is adopted to calculate the rotary derivatives when simulating the steady pull-up with different pitching angular velocities. Two configurations, the Hyper Ballistic Shape (HBS) and Finner missile model, are considered as evaluations and results of all the cases agree well with reference or experiment data. Compared to traditional ones, the new differential methods are of high efficiency and accuracy, and potential to be extended to the simulation of combined and single stability derivatives of directional and lateral.

A Study on DDoS(Distributed Denial of Service) Attack Detection Model Based on Statistical (통계 기반 분산서비스거부(DDoS)공격 탐지 모델에 관한 연구)

  • Kook, Yoon-Ju;Kim, Yong-Ho;Kim, Jeom-Goo;Kim, Kiu-Nam
    • Convergence Security Journal
    • /
    • v.9 no.2
    • /
    • pp.41-48
    • /
    • 2009
  • Distributed denial of service attack detection for more development and research is underway. The method of using statistical techniques, the normal packets and abnormal packets to identify efficient. In this paper several statistical techniques, using a mix of various offers a way to detect the attack. To verify the effectiveness of the proposed technique, it set packet filtering on router and the proposed DDoS attacks detection method on a Linux router. In result, the proposed technique was detect various attacks and provide normal service mostly.

  • PDF

Numerical Simulation of Flow Around a Slender Body at High Angle of Attack (큰 받음각을 갖는 세장형 물체 주위의 점성 유동장 수치 모사)

  • Rho Oh Hyun;Hwang Soo Jung
    • 한국전산유체공학회:학술대회논문집
    • /
    • 1995.10a
    • /
    • pp.3-10
    • /
    • 1995
  • The compressible laminar and turbulent viscous flow on a slender body in supersonic speed as well as subsonic speed has been numerically simulated at high angle of attack. The steady and time-accurate compressible thin-layer Navier-Stokes code based on an implicit upwind-biased LU-SGS algorithm has been developed and specifically applied at angles of attack of 20, 30, 40 deg, respectively. The modified eddy-viscosity turbulence model suggested by Degani and Schiff was used to simulate the case of turbulent flow. Any geometric asymmetry and numerical perturbation have not been intentionally or artificially imposed in the process of computation. The purely numerical results for laminar and turbulent cases, however, show clear asymmetric formation of vortices which were observed experimentally. Contrary to the subsonic results, the supersonic case shows the symmetric formation of vortices as indicated by the earlier experiments.

  • PDF

Self-Noise Prediction from Helicopter Rotor Blade (헬리콥터 로터 블레이드의 자려소음 예측)

  • Kim, Hyo-Young;Ryu, Ki-Wahn
    • Journal of Aerospace System Engineering
    • /
    • v.1 no.1
    • /
    • pp.73-78
    • /
    • 2007
  • Self-noise from the rotor blade of the UH-1H Helicopter is obtained numerically by using the Brooks' empirical noise model. All of the five noise sources are compared with each other in frequency domain. From the calculated results the bluntness noise reveals dominant noise sources at small angel of attack, whereas the separation noise shows main noise term with gradually increasing angel of attack. From the results of two different tip Mach numbers with the change of angel of attack, the OASPLs at M = 0.8 show about 15dB larger than those at M = 0.4.

  • PDF

Analysis of Unsteady Subsonic Flow Around a High Angle of Attack of the Oscillating Airfoil (진동하는 고 받음각 날개주위의 비정상 아음속 유동해석)

  • Moon, J.S.;Kim, J.S.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2011.05a
    • /
    • pp.434-440
    • /
    • 2011
  • Oscillating airfoil haw been challenged for the dynamic stalls of airfoil am wind turbines at high angle of attach. Especially, the pressure oscillation has a huge effect on noise generation, structure damage, aerodynamic performance am safety, because the flow has strong unsteadiness at high angle of attack. In this paper, the unsteady aerodynamics coefficients were analyzed for the oscillating airfoil at high angle of attack around two dimensional NACA0012 airfoil. The two dimensional unsteady compressible Navier-Stokes equation with a LES turbulent model was calculated by OHOC (Optimized High-Order Compact) scheme. The flow conditions are Mach number of 0.2 and Reynolds number of $1.2{\times}10^4$. The lift, drag, pressure distribution, etc. are analyzed according to the pitching oscillation. Unsteady velocity field, periodic vortex shedding, the unsteady pressure distribution, and the acoustic fields are analyzed. The effects of these unsteady characteristics in the aerodynamic coefficients are analyzed.

  • PDF

Study Response Model against ARP Redirect attack on Local Area Network (Local Area Network상의 ARP Redirect attack 대응 모델에 관한 연구)

  • Lee, Sun-Joong;Kim, Jung-Moon;Yeh, Hong-Jin
    • Annual Conference of KIPS
    • /
    • 2003.05c
    • /
    • pp.2237-2240
    • /
    • 2003
  • 하나의 물리 망 위에 있는 두 시스템은 상대방의 물리 주소를 알고 있어야만 통신을 할 수 있고. 물리 주소는 통신비용 절감을 위해 ARP를 사용하는 HOST의 ARP cache에 Internet-to-Ethernet Mapping형태로 저장한다. 이러한 ARP cache 구조는 Modification의 많은 취약성을 가진다. 그 중 취약성을 이용한 공격 중 하나인 ARP Redirect Attack은 물리 망 위의 Target Host 패킷이 공격자의 시스템을 통해 게이트웨이까지 가도록 한다. 본 논문은 게이트웨이 및 일반 HOST 시스템으로 구성된 Local Area Network 기반 구조를 내부 공격자 시스템으로부터 다른 내부 시스템의 사용자 정보를 안전하게 게이트웨이까지 보내기 위한 대응 모델을 제안하고자 한다.

  • PDF