• Title/Summary/Keyword: Attack Model

Search Result 1,005, Processing Time 0.029 seconds

Investigating the effects of span arrangements on DDBD-designed RC buildings under the skew seismic attack

  • Alimohammadi, Dariush;Abadi, Esmaeel Izadi Zaman
    • Structural Engineering and Mechanics
    • /
    • v.77 no.1
    • /
    • pp.115-135
    • /
    • 2021
  • This paper focuses on examining the effects of span arrangements on displacement responses of plan-symmetric RC frame buildings designed using the direct displacement-based design (DDBD) method by employing non-linear analyses and the skew seismic attack. In order to show the desired performance of DDBD design approach, the force-based design approach is also used to examine the seismic performance of the selected structures. To realize this objective, 8-story buildings with different plans are selected. In addition, the dynamic behavior of the structures is evaluated by selecting 3, 7, and 12-story buildings. In order to perform non-linear analyses, OpenSees software is used for modeling buildings. Results of an experimental model are used to validate the analytical model implemented in OpenSees. The results of non-linear static and non-linear dynamic analyses indicate that changing span arrangements does not affect estimating the responses of structures designed using the DDBD approach, and the results are more or less the same. Next, in order to apply the earthquake in non-principle directions, DDBD structures, designed for one-way performance, are designed again for two-way performance. Time history analyses are performed under a set of artificial acceleration pairs, applied to structures at different angles. It is found that the mean maximum responses of earthquakes at all angles have very good agreement with the design-acceptable limits, while the response of buildings along the height direction has a relatively acceptable and uniform distribution. Meanwhile, changes in the span arrangements did not have a significant effect on displacement responses.

A Numerical Performance Study on Rudder with Wavy Configuration at High Angles of Attack (Wavy 형상 적용에 따른 대 각도에서의 러더 성능에 대한 수치해석 연구)

  • Tae, Hyun June;Shin, Young Jin;Kim, Beom Jun;Kim, Moon-Chan
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.54 no.1
    • /
    • pp.18-25
    • /
    • 2017
  • This study deals with numerically comparing performance according to rudder shape called 'Twisted rudder and Wavy twisted rudder'. In comparison with conventional rudder, rudder with wavy shape has showed a better performance at high angles of attack($30^{\circ}{\sim}40^{\circ}$) due to delaying stall. But most of study concerned with wavy shape had been performed in uniform flow condition. In order to identify the characteristics behind a rotating propeller, the present study numerically carries out an analysis of resistance and self-propulsion for KCS with twisted rudder and wavy twisted rudder. The turbulence closure model, Realizable $k-{\epsilon}$, is employed to simulate three-dimensional unsteady incompressible viscous turbulent and separation flow around the rudder. The simulation of self-propulsion analysis is performed in two step, because of finding optimization case of wavy shape. The first step presents there are little difference between twisted rudder and case of H_0.65 wavy twisted rudder in delivered power. So two kind of rudders are employed from first step to compare lift-to-drag ratio and torque at high angles of attack. Consequently, the wavy twisted rudder is presented as a possible way of delaying stall, allowing a rudder to have a better performance containing superior lift-to-drag ratio and torque than twisted rudder at high angles of attack. Also, as we indicate the flow visualization, check the quantity of separation flow around the rudder.

Evaluation on Sulfate Attack for Concrete Structures of Nuclear Power Plants (원자력발전소 콘크리트 구조물의 황산염 침식 평가)

  • Lee, Jong-Suk;Moon, Han-Young
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.8 no.3
    • /
    • pp.169-176
    • /
    • 2004
  • The Mechanistic model, considering expansion stress, coefficient of diffusion etc. to time, is applied to predict the deterioration of concrete structures of the nuclear power plant(NPP) due to sulfate attack. Mix design for the test was three kinds of specified compressive strength 385, 280 and $210kgf/cm^2$ which are used to construct NPPs and cement was type I and V. The immersion test was performed with 10% $Na_2SO_4$ solution to cement type and strength for a year. The coefficient of diffusion on each concrete mix is calculated based on the results of immersion test, and it is used for predicting the sulfate attack of the concrete structures of NPP. The coefficient of diffusion of the target concrete ranged $0.5763{\sim}3.9002{\times}10^{-12}m^2/sec.$, and the sulfate attack rate of concrete structures of the NPP was predicted as 0.1~7.1 mm/year.

Cyber Kill Chain-Based Taxonomy of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques, and Procedures

  • Bahrami, Pooneh Nikkhah;Dehghantanha, Ali;Dargahi, Tooska;Parizi, Reza M.;Choo, Kim-Kwang Raymond;Javadi, Hamid H.S.
    • Journal of Information Processing Systems
    • /
    • v.15 no.4
    • /
    • pp.865-889
    • /
    • 2019
  • The need for cyber resilience is increasingly important in our technology-dependent society where computing devices and data have been, and will continue to be, the target of cyber-attackers, particularly advanced persistent threat (APT) and nation-state/sponsored actors. APT and nation-state/sponsored actors tend to be more sophisticated, having access to significantly more resources and time to facilitate their attacks, which in most cases are not financially driven (unlike typical cyber-criminals). For example, such threat actors often utilize a broad range of attack vectors, cyber and/or physical, and constantly evolve their attack tactics. Thus, having up-to-date and detailed information of APT's tactics, techniques, and procedures (TTPs) facilitates the design of effective defense strategies as the focus of this paper. Specifically, we posit the importance of taxonomies in categorizing cyber-attacks. Note, however, that existing information about APT attack campaigns is fragmented across practitioner, government (including intelligence/classified), and academic publications, and existing taxonomies generally have a narrow scope (e.g., to a limited number of APT campaigns). Therefore, in this paper, we leverage the Cyber Kill Chain (CKC) model to "decompose" any complex attack and identify the relevant characteristics of such attacks. We then comprehensively analyze more than 40 APT campaigns disclosed before 2018 to build our taxonomy. Such taxonomy can facilitate incident response and cyber threat hunting by aiding in understanding of the potential attacks to organizations as well as which attacks may surface. In addition, the taxonomy can allow national security and intelligence agencies and businesses to share their analysis of ongoing, sensitive APT campaigns without the need to disclose detailed information about the campaigns. It can also notify future security policies and mitigation strategy formulation.

A Message Authentication and Key Distribution Mechanism Secure Against CAN bus Attack (CAN 버스 공격에 안전한 메시지 인증 및 키 분배 메커니즘)

  • Cho, A-Ram;Jo, Hyo Jin;Woo, Samuel;Son, Young Dong;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1057-1068
    • /
    • 2012
  • According to advance on vehicle technology, many kinds of ECU(Electronic Control Unit) are equipped inside the vehicle. In-vehicle communication among ECUs is performed through CAN(Controller Area Networks). CAN have high reliability. However, it has many vulnerabilities because there is not any security mechanism for CAN. Recently, many papers proposed attacks of in-vehicle communication by using these vulnerabilities. In this paper, we propose an wireless attack model using a mobile radio communication network. We propose a secure authentication mechanism for in-vehicle network communication that assure confidentiality and integrity of data packets and also protect in-vehicle communication from the replay attack.

Periodic-and-on-Event Message-Aware Automotive Intrusion Detection System (Periodic-and-on-Event 메시지 분석이 가능한 차량용 침입탐지 기술)

  • Lee, Seyoung;Choi, Wonsuk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.373-385
    • /
    • 2021
  • To provide convenience and safety of drivers, the recent vehicles are being equipped with a number of electronic control units (ECUs). Multiple ECUs construct a network inside a vehicle to share information related to the vehicle's status; in addition, the CAN protocol is normally applied. As the modern vehicles provide highly convenient and safe services, it provides many types of attack surfaces; as a result, it makes them vulnerable to cyber attacks. The automotive IDS (Intrusion Detection System) is one of the promising techniques for securing vehicles. However, the existing methods for automotive IDS are able to analyze only periodic messages. If someone attacks on non-periodic messages, the existing methods are not able to properly detect the intrusion. In this paper, we present a method to detect intrusions including an attack using non-periodic messages. Moreover, we evaluate our method on the real vehicles, where we show that our method has 0% of FPR and 0% of FNR under our attack model.

Improvement of Attack Traffic Classification Performance of Intrusion Detection Model Using the Characteristics of Softmax Function (소프트맥스 함수 특성을 활용한 침입탐지 모델의 공격 트래픽 분류성능 향상 방안)

  • Kim, Young-won;Lee, Soo-jin
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.81-90
    • /
    • 2020
  • In the real world, new types of attacks or variants are constantly emerging, but attack traffic classification models developed through artificial neural networks and supervised learning do not properly detect new types of attacks that have not been trained. Most of the previous studies overlooked this problem and focused only on improving the structure of their artificial neural networks. As a result, a number of new attacks were frequently classified as normal traffic, and attack traffic classification performance was severly degraded. On the other hand, the softmax function, which outputs the probability that each class is correctly classified in the multi-class classification as a result, also has a significant impact on the classification performance because it fails to calculate the softmax score properly for a new type of attack traffic that has not been trained. In this paper, based on this characteristic of softmax function, we propose an efficient method to improve the classification performance against new types of attacks by classifying traffic with a probability below a certain level as attacks, and demonstrate the efficiency of our approach through experiments.

Physical protection system vulnerability assessment of a small nuclear research reactor due to TNT-shaped charge impact on its reinforced concrete wall

  • Moo, Jee Hoon;Chirayath, Sunil S.;Cho, Sung Gook
    • Nuclear Engineering and Technology
    • /
    • v.54 no.6
    • /
    • pp.2135-2146
    • /
    • 2022
  • A nuclear energy facility is one of the most critical facilities to be safely protected during and after operation because the physical destruction of its barriers by an external attack could release radioactivity into the environment and can cause harmful effects. The barrier walls of nuclear energy facilities should be sufficiently robust to protect essential facilities from external attack or sabotage. Physical protection system (PPS) vulnerability assessment of a typical small nuclear research reactor was carried out by simulating an external attack with a tri-nitro toluene (TNT) shaped charge and results are presented. The reinforced concrete (RC) barrier wall of the research reactor located at a distance of 50 m from a TNT-shaped charge was the target of external attack. For the purpose of the impact assessment of the RC barrier wall, a finite element method (FEM) is utilized to simulate the destruction condition. The study results showed that a hole-size of diameter 342 mm at the front side and 364 mm at the back side was created on the RC barrier wall as a result of a 143.35 kg TNT-shaped charge. This aperture would be large enough to let at least one person can pass through at a time. For the purpose of the PPS vulnerability assessment, an Estimate of Adversary Sequence Interruption (EASI) model was used, which enabled the determination of most vulnerable path to the target with a probability of interruption equal to 0.43. The study showed that the RC barrier wall is vulnerable to a TNT-shaped charge impact, which could in turn reduce the effectiveness of the PPS.

A Study on Graph-Based Heterogeneous Threat Intelligence Analysis Technology (그래프 기반 이기종 위협정보 분석기술 연구)

  • Ye-eun Lee;Tae-jin Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.3
    • /
    • pp.417-430
    • /
    • 2024
  • As modern technology advances and the proliferation of the internet continues, cyber threats are also on the rise. To effectively counter these threats, the importance of utilizing Cyber Threat Intelligence (CTI) is becoming increasingly prominent. CTI provides information on new threats based on data from past cyber incidents, but the complexity of data and changing attack patterns present significant analytical challenges. To address these issues, this study aims to utilize graph data that can comprehensively represent multidimensional relationships. Specifically, the study constructs a heterogeneous graph based on malware data, and uses the metapath2vec node embedding technique to more effectively identify cyber attack groups. By analyzing the impact of incorporating topology information into traditional malware data, this research suggests new practical applications in the field of cyber security and contributes to overcoming the limitations of CTI analysis.

Development of Mixing Model for High Durability Creek Concrete Having 300kgf/$\textrm{cm}^2$ Compressive Strength (압축강도 300kgf/$\textrm{cm}^2$ 내외의 하수암거용 고내구성 콘크리트 배합모텔 개발)

  • 이창수;윤인석;이규동;고석봉
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2001.11a
    • /
    • pp.271-274
    • /
    • 2001
  • Recently, we are facing with the trend of demanding high durability concrete for creek structures. When creek structures are deteriorated, it is very difficult to repair them. The objective of this paper is to develop a mixing model for high durability creek concrete having 300kg/$\textrm{cm}^2$ compressive strength. According to the result of durability experiment, high durability concrete for creek structures has high resistance of air permeability, absorption, chloride diffusion, and chemical attack.

  • PDF