• Title/Summary/Keyword: Attack Model

Search Result 1,005, Processing Time 0.027 seconds

Iterative Channel Estimation Algorithm for Anti-jamming in MIMO Communication Systems (MIMO 통신 시스템에서 항재밍을 위한 반복적인 채널 추정 알고리즘)

  • Jung, Jun Hee;Hwang, Yu Min;Cha, Kyung Hyun;Lee, Jae Seang;Shin, Yoan;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.11 no.3
    • /
    • pp.32-36
    • /
    • 2016
  • In wireless communication systems, jamming attack is a critical threat. Especially, reactive jamming can jam when the sender and receiver are communicating, which can maximize the attack efficiency of jamming. In this paper, we use the property of multi-input multi-output (MIMO) technology to achieve jamming resilient orthogonal frequency-division multiplexing (OFDM) communications. In particular, we use MIMO interference cancellation to remove the jamming signals strategically. We first investigate the reactive jamming attack model and their impacts on the MIMO-OFDM systems. We then present an iterative channel estimation algorithm that exploits MIMO interference cancellation. Our simulations show various anti-jamming methods and demonstrate the efficiency of our proposed algorithm under the reactive jamming attack.

A Dynamic Defense Using Client Puzzle for Identity-Forgery Attack on the South-Bound of Software Defined Networks

  • Wu, Zehui;Wei, Qiang;Ren, Kailei;Wang, Qingxian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.846-864
    • /
    • 2017
  • Software Defined Network (SDN) realizes management and control over the underlying forwarding device, along with acquisition and analysis of network topology and flow characters through south bridge protocol. Data path Identification (DPID) is the unique identity for managing the underlying device, so forged DPID can be used to attack the link of underlying forwarding devices, as well as carry out DoS over the upper-level controller. This paper proposes a dynamic defense method based on Client-Puzzle model, in which the controller achieves dynamic management over requests from forwarding devices through generating questions with multi-level difficulty. This method can rapidly reduce network load, and at the same time separate attack flow from legal flow, enabling the controller to provide continuous service for legal visit. We conduct experiments on open-source SDN controllers like Fluid and Ryu, the result of which verifies feasibility of this defense method. The experimental result also shows that when cost of controller and forwarding device increases by about 2%-5%, the cost of attacker's CPU increases by near 90%, which greatly raises the attack difficulty for attackers.

Numerical Analysis of the Unsteady Subsonic Flow around a Plunging Airfoil

  • Lee, Kyungwhan;Kim, Jaesoo
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.14 no.3
    • /
    • pp.201-209
    • /
    • 2013
  • Much numerical and experimental research has been done for the flow around an oscillating airfoil. The main research topics are vortex shedding, dynamic stall phenomenon, MAV's lift and thrust generation. Until now, researches mainly have been concentrated on analyzing the wake flow for the variation of frequency and amplitude at a low angle of attack. In this study, wake structures and acoustic wave propagation characteristics were studied for a plunging airfoil at high angle of attack. The governing equations are the Navier-Stokes equation with LES turbulence model. OHOC (Optimized High-Order Compact) scheme and 4th order Runge-Kutta method were used. The Mach number is 0.3, the Reynolds number is, and the angle of attack is from $20^{\circ}$ to $50^{\circ}$. The plunging frequency and the amplitude are from 0.05 to 0.15, and from 0.1 to 0.2, respectively. Due to the high resolution numerical method, wake vortex shedding and pressure wave propagation process, as well as the propagation characteristics of acoustic waves can be simulated. The results of frequency analysis show that the flow has the mixed characteristics of the forced plunging frequency and the vortex shedding frequency at high angle of attack.

An improved Multi-server Authentication Scheme for Distributed Mobile Cloud Computing Services

  • Irshad, Azeem;Sher, Muhammad;Ahmad, Hafiz Farooq;Alzahrani, Bander A.;Chaudhry, Shehzad Ashraf;Kumar, Rahul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5529-5552
    • /
    • 2016
  • Mobile cloud computing (MCC) has revolutionized the way in which the services can be obtained from the cloud service providers. Manifold increase in the number of mobile devices and subscribers in MCC has further enhanced the need of an efficient and robust authentication solution. Earlier, the subscribers could get cloud-computing services from the cloud service providers only after having consulted the trusted third party. Recently, Tsai and Lo has proposed a multi-server authenticated key agreement solution for MCC based on bilinear pairing, to eliminate the trusted third party for mutual authentication. The scheme has been novel as far as the minimization of trusted party involvement in authenticating the user and service provider, is concerned. However, the Tsai and Lo scheme has been found vulnerable to server spoofing attack (misrepresentation attack), de-synchronization attack and denial-of-service attack, which renders the scheme unsuitable for practical deployment in different wireless mobile access networks. Therefore, we have proposed an improved model based on bilinear pairing, countering the identified threats posed to Tsai and Lo scheme. Besides, the proposed work also demonstrates performance evaluation and formal security analysis.

Securing a Cyber Physical System in Nuclear Power Plants Using Least Square Approximation and Computational Geometric Approach

  • Gawand, Hemangi Laxman;Bhattacharjee, A.K.;Roy, Kallol
    • Nuclear Engineering and Technology
    • /
    • v.49 no.3
    • /
    • pp.484-494
    • /
    • 2017
  • In industrial plants such as nuclear power plants, system operations are performed by embedded controllers orchestrated by Supervisory Control and Data Acquisition (SCADA) software. A targeted attack (also termed a control aware attack) on the controller/SCADA software can lead a control system to operate in an unsafe mode or sometimes to complete shutdown of the plant. Such malware attacks can result in tremendous cost to the organization for recovery, cleanup, and maintenance activity. SCADA systems in operational mode generate huge log files. These files are useful in analysis of the plant behavior and diagnostics during an ongoing attack. However, they are bulky and difficult for manual inspection. Data mining techniques such as least squares approximation and computational methods can be used in the analysis of logs and to take proactive actions when required. This paper explores methodologies and algorithms so as to develop an effective monitoring scheme against control aware cyber attacks. It also explains soft computation techniques such as the computational geometric method and least squares approximation that can be effective in monitor design. This paper provides insights into diagnostic monitoring of its effectiveness by attack simulations on a four-tank model and using computation techniques to diagnose it. Cyber security of instrumentation and control systems used in nuclear power plants is of paramount importance and hence could be a possible target of such applications.

Probabilistic safety assessment-based importance analysis of cyber-attacks on nuclear power plants

  • Park, Jong Woo;Lee, Seung Jun
    • Nuclear Engineering and Technology
    • /
    • v.51 no.1
    • /
    • pp.138-145
    • /
    • 2019
  • With the application of digital technology to safety-critical infrastructures, cyber-attacks have emerged as one of the new dangerous threats. In safety-critical infrastructures such as a nuclear power plant (NPP), a cyber-attack could have serious consequences by initiating dangerous events or rendering important safety systems unavailable. Since a cyber-attack is conducted intentionally, numerous possible cases should be considered for developing a cyber security system, such as the attack paths, methods, and potential target systems. Therefore, prior to developing a risk-informed cyber security strategy, the importance of cyber-attacks and significant critical digital assets (CDAs) should be analyzed. In this work, an importance analysis method for cyber-attacks on an NPP was proposed using the probabilistic safety assessment (PSA) method. To develop an importance analysis framework for cyber-attacks, possible cyber-attacks were identified with failure modes, and a PSA model for cyber-attacks was developed. For case studies, the quantitative evaluations of cyber-attack scenarios were performed using the proposed method. By using quantitative importance of cyber-attacks and identifying significant CDAs that must be defended against cyber-attacks, it is possible to develop an efficient and reliable defense strategy against cyber-attacks on NPPs.

A Numerical Study on the Characteristics of the Supercavitation and Hydrodynamic Forces Generated in a Supercavitating Underwater Vehicle with Angle of Attack (받음각을 갖는 초공동 수중 운동체에서 발생하는 초월공동과 유체력 특성에 대한 수치적 연구)

  • Jeon, Yunho;Park, Jeonghoon;Jeon, Kwansoo
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.58 no.4
    • /
    • pp.214-224
    • /
    • 2021
  • Recently, as the technology of the supercavitating underwater vehicle is improved, the necessity of research for maneuvering characteristics of the supercavitating underwater vehicle has emerged. In this study, as a preliminary step to analyzing the maneuverability of a supercavitating underwater vehicle, the characteristics of cavity shapes and hydrodynamic forces generated in a supercavitating underwater vehicle with an angle of attack were evaluated numerically. First, the geometry was designed by modifying the shape of the existing supercavitating underwater vehicle. The continuity and the Navier-stokes equations are numerically solved, and turbulent eddy viscosity is solved by the k-ω SST model. The results present the characteristics of cavity shape and the hydrodynamic forces of the designed geometry with an angle of attack.

Numerical investigations on the effect of mean incident wind on flutter onset of bridge deck sections

  • Keerthana, M.;Harikrishna, P.
    • Structural Engineering and Mechanics
    • /
    • v.82 no.4
    • /
    • pp.517-542
    • /
    • 2022
  • The effect of mean angle of wind attack on the flutter critical wind speed of two generic bridge deck cross-sections, viz, one closed box type streamlined section (deck-1) and closed box trapezoidal bluff type section with extended flanges/overhangs (deck-2) type of section have been studied using Computational Fluid Dynamics (CFD) based forced vibration simulation method. Owing to the importance of the effect of the amplitude of forcing oscillation on the flutter onset, its effect on the flutter derivatives and flutter onset have been studied, especially at non-zero mean angles of wind attack. The flutter derivatives obtained have been used to evaluate flutter critical wind speeds and flutter index of the deck sections at non-zero mean angles of wind attack studied and the same have been validated with those based on experimental results reported in literature. The value of amplitude of forcing oscillation in torsional degree of freedom for CFD based simulations is suggested to be in the range of 0.5° to 2°, especially for bluff bridge deck sections. Early onset of flutter from numerical simulations, thereby conservative estimate of occurrence of instability has been observed from numerical simulations in case of bluff bridge deck section. The study aids in gaining confidence and the extent of applicability of CFD during early stages of bridge design, especially towards carrying out studies on mean incident wind effects.

Using Machine Learning Techniques for Accurate Attack Detection in Intrusion Detection Systems using Cyber Threat Intelligence Feeds

  • Ehtsham Irshad;Abdul Basit Siddiqui
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.179-191
    • /
    • 2024
  • With the advancement of modern technology, cyber-attacks are always rising. Specialized defense systems are needed to protect organizations against these threats. Malicious behavior in the network is discovered using security tools like intrusion detection systems (IDS), firewall, antimalware systems, security information and event management (SIEM). It aids in defending businesses from attacks. Delivering advance threat feeds for precise attack detection in intrusion detection systems is the role of cyber-threat intelligence (CTI) in the study is being presented. In this proposed work CTI feeds are utilized in the detection of assaults accurately in intrusion detection system. The ultimate objective is to identify the attacker behind the attack. Several data sets had been analyzed for attack detection. With the proposed study the ability to identify network attacks has improved by using machine learning algorithms. The proposed model provides 98% accuracy, 97% precision, and 96% recall respectively.

Design of Uni-directional Optical Communication Structure Satisfying Defense-In-Depth Characteristics against Cyber Attack (사이버공격에 대비한 심층방호 특성을 만족하는 단방향 광통신 구조 설계)

  • Jeong, Kwang Il;Lee, Joon Ku;Park, Geun Ok
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.561-568
    • /
    • 2013
  • Instrumentation and control system in nuclear power plant performs protecting, controling and monitoring safety operation of Nuclear Power Plant. As cyber attack to the control equipment of instrumentation and control system can cause reactor shutdown and radiation release, it is required to design the instrumentation and control system considering cyber security in accordance with regulatory guides and industrial standards. In this paper, we proposed a design method of uni-directional communication structure which is required in the design of defense-in-depth model according to regulatory guides and industrial standards and we implemented a communication board with the proposed method. This communication board was tested in various test environments and test items and we concluded it can provide uni-directional communication structure required to design of defense-in-depth model against cyber attack by analyzing the results. The proposed method and implemented communication board were applied in the design of SMART (system-integrated modular advanced reactor) I&C (instrumentation and control) systems.