• Title/Summary/Keyword: Attack Model

Search Result 1,005, Processing Time 0.032 seconds

Experimental Study for the Aerodynamic Characteristics of Slanted-Base Ogive Cylinder (기저면이 경사진 Ogive실린더의 공력특성에 관한 실험적 연구)

  • 맹주성;양시영;오세진
    • Transactions of the Korean Society of Mechanical Engineers
    • /
    • v.18 no.10
    • /
    • pp.2664-2674
    • /
    • 1994
  • Drag, lift, and pitching moment measurements have been made on a range of slanted-base ogive cylinders, using the KANOMAX wind tunnel and balance system. Test Reynolds numbers(based on model maximum diameter) varied from $0.54{\times}10^{5}{\;}to{\;}1.56{\times}10^{5}$. Crossflow velocity maesurement was conducted by 5-hole pitot tube at $Re_{D}=1.46{\times}10^{5}$. For two base angle $({\theta}=30$ and 45 deg.), aerodynamic forces and moment were measured with increasing angle of attack(0~30 deg.). Two types of wake flow were observed, a quasisymetric turbulent closure or a longitudinal vortex flow. Aerodynamic characteristics differ dramatically between the two wake types. It was found that the drag, lift and pitching moment coefficients increased with increasing angle of attack.

Implementation of Intrusion Detection System Using Packet Capture (패킷캡쳐를 이용한 침입탐지 시스템의 구현)

  • 김영진;한승조
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.6
    • /
    • pp.833-842
    • /
    • 2002
  • Computer security is considered important due to the side effect generated from the expansion of computer network and rapid increase of use of computers. A attack of intruders using a vulnerability of operating system, protocol and application programs. And so, The attack methods is to be high technology and professional. Thus It must be necessity that we necessary a solution to structure, management for framework of information technology. This paper develope intrusion detecting system for separating intruders form critical system and design IDS model and implementation of it.

Missile Autopilot Design for Agile Turn Using Time Delay Control with Nonlinear Observer

  • Lee, Chang-Hun;Kim, Tae-Hun;Tahk, Min-Jea
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.12 no.3
    • /
    • pp.266-273
    • /
    • 2011
  • This paper deals with missile autopilot design for agile turn phase in air-to-air engagement scenarios. To attain a fast response, angle-of-attack (AOA) is adopted for an autopilot command structure. Since a high operational AOA is generally required during the agile turn phase, dealing with the aerodynamic uncertainties can be a challenge for autopilot design. As a remedy, a new controller design method based on robust nonlinear control methodology such as time delay control is proposed in this paper. Nonlinear observer is also proposed to estimate the AOA in the presence of the model uncertainties. The performance of the proposed controller with variation of the aerodynamic coefficients is investigated through numerical simulations.

Robust Audio Watermarking Method Under Capturing Attacks (캡쳐링 공격에 강인한 오디오 워터마킹 방법)

  • Lee, Seung-Jae;Lee, Sang-Kwang;Seo, Jin-S.
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.375-376
    • /
    • 2006
  • In this paper, we propose a wavelet-based audio watermarking algorithm to be robust against capturing attack. Commercial capturing tools enable us to obtain audio contents without noticeable degradation in audio quality, and it is possible to be a source of illegal distribution. By adjusting mean values of the lowest subband in audio, the proposed method can survive after capturing attack including sampling rate conversion, random cropping and compression. By applying a simple human auditory model, the inaudibility of the watermark is achieved, and detection probability is improved based on the difference information. This is confirmed by experimental results.

  • PDF

Effect of the Gurney Flap on NACA 0015 Airfoil (NACA 0015 익형에 대한 Gurney 플랩의 영향)

  • Yoo, Neung-Soo;Lee, Jang-Ho
    • Journal of Industrial Technology
    • /
    • v.20 no.B
    • /
    • pp.71-76
    • /
    • 2000
  • A numerical investigation was performed to determine the effect of the Gurney flap on NACA 0015 airfoil. A Navier-Stokes code. FLUENT, was used to calculate the flow field about the airfoil. The fully-turbulent results were obtained using the standard ${\kappa}-{\varepsilon}$ two-equation turbulence model. The numerical solutions showed the Gurney flap increased both lift and drag. These results suggested that the Gurney flap served to increase the effective camber of the airfoil. Gurney flap provided a significant increase in lift-to-drag ratio relatively at low angle of attack and for high lift coefficient. It turned out that 0.75% chord size of flap was best. The numerical results exhibited detailed flow structures at the trailing edge and provided a possible explanation for the increased aerodynamic performance.

  • PDF

Aerodynamic Performance of Gurney Flap (Gurney 플?의 공기역학적 성능)

  • Yoo, Neung-Soo;Jung, Sung-Woong
    • Journal of Industrial Technology
    • /
    • v.18
    • /
    • pp.335-341
    • /
    • 1998
  • A numerical investigation was performed to determine the effect of a Gurney flap on a NACA 23012 airfoil. A Navier-Stokes code, RAMPANT, was used to calculate the flow field about airfoil. The fully turbulent results were obtained using the standard $k-{\varepsilon}$ two-equation turbulence model. To provide a check case for our computational method, computations were performed for NACA 4412 airfoil which compared with Wedcock's experimental data. Gurney flap sizes of 0.5, 1.0, 1.5, and 2% of the airfoil chord were studied. The numerical solutions showed the Gurney flap increased both lift and drag. These results suggested that the Gurney flap served to increased the effective camber of the airfoil. But Gurney flap provided a significant increase in lift-to-drag ratio relatively at low angle of attack and for high lift coefficient. Also, it turned out that 0.5% chord size of flap was best one among them.

  • PDF

Multiple input describing function analysis of non-classical aileron buzz

  • Zafar, Muhammad I.;Fusi, Francesca;Quaranta, Giuseppe
    • Advances in aircraft and spacecraft science
    • /
    • v.4 no.2
    • /
    • pp.203-218
    • /
    • 2017
  • This paper focuses on the computational study of nonlinear effects of unsteady aerodynamics for non-classical aileron buzz. It aims at a comprehensive investigation of the aileron buzz phenomenon under varying flow parameters using the describing function technique with multiple inputs. The limit cycle oscillatory behavior of an asymmetrical airfoil is studied initially using a CFD-based numerical model and direct time marching. Sharp increases in limit cycle amplitude for varying Mach numbers and angles of attack are investigated. An aerodynamic describing function is developed in order to estimate the variation of limit cycle amplitude and frequency with Mach number and angle of attack directly, without time marching. The describing function results are compared to the amplitudes and frequencies predicted by the CFD calculations for validation purposes. Furthermore, a limited sensitivity analysis is presented to demonstrate the potential of the approach for aeroelastic design.

An APT Malicious Traffic Detection Method with Considering of Trust Model (신뢰모형을 고려한 APT 악성 트래픽 탐지 기법)

  • Yun, Kyung-mi;Cho, Gi-hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.937-939
    • /
    • 2014
  • Recently, an intelligent APT(Advanced Persistent Threat) attack which aims to a special target is getting to be greatly increased. It is very hard to protect with existing intrusion detection methods because of the difficulties to protect the initial intrusion of malicious code. In this paper, we analyze out-bound traffics to prevent call-back step after malicious code intrusion, and propose an APT malicious traffic detection method with considering of trust. The proposed method is expected to provide a basement to improve the detection rate in comparing with that of existing detection methods.

  • PDF

Adaptively Secure Anonymous Identity-based Broadcast Encryption for Data Access Control in Cloud Storage Service

  • Chen, Liqing;Li, Jiguo;Zhang, Yichen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1523-1545
    • /
    • 2019
  • Cloud computing is now a widespread and economical option when data owners need to outsource or share their data. Designing secure and efficient data access control mechanism is one of the most challenging issues in cloud storage service. Anonymous broadcast encryption is a promising solution for its advantages in the respects of computation cost and communication overload. We bring forward an efficient anonymous identity-based broadcast encryption construction combined its application to the data access control mechanism in cloud storage service. The lengths for public parameters, user private key and ciphertext in the proposed scheme are all constant. Compared with the existing schemes, in terms of encrypting and decrypting computation cost, the construction of our scheme is more efficient. Furthermore, the proposed scheme is proved to achieve adaptive security against chosen-ciphertext attack adversaries in the standard model. Therefore, the proposed scheme is feasible for the system of data access control in cloud storage service.

Authenticated IGMP for Controlling Access to Multicast Distribution Tree (멀티캐스트 분배트리 접근제어를 위한 Authenticated IGMP)

  • Park, Chang-Seop;Kang, Hyun-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.3-17
    • /
    • 2007
  • Receiver access control scheme is proposed to protect multicast distribution tree from DoS(Denial-of Service) attack induced by unauthorized use of IGMP(Internet group management protocol), by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP(Content Provider), NSP(Network Service Provider), and group members.