• Title/Summary/Keyword: Attack Model

Search Result 1,005, Processing Time 0.035 seconds

주기 운동하는 마이크로플랩의 효과에 대한 수치적 연구

  • Jeong, Yeon-Gyu;Hyeon, Seong-Yun;Jang, Geun-Sik;Choe, Seong-Uk
    • 유체기계공업학회:학술대회논문집
    • /
    • 2006.08a
    • /
    • pp.387-390
    • /
    • 2006
  • Numerical study has been conducted in two dimensions about a NACA0012 airfoil with an oscillating microflap on the surface. We show that this microflap is effective in controlling the unsteady stall at high angles of attack. We solve the compressible Navier-Stokes equations for the Reynolds numbers with an extensible chimera grid fitted to the oscillatory microflap. For turbulent calculation, we adopt the SST $k-{\omega}$ model. We investigate the parametric effect of angle of attacks, Reynolds number, and the location where the microflap is installed.

  • PDF

Design of Neural Network Adaptive Control Law for Aircraft System Including Uncertainty

  • Kim, You-Dan;Shin, Dong-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.125.3-125
    • /
    • 2001
  • Recently, aircraft is designed to have high maneuverable at high angle of attack. However, it is very hard to obtain the accurate dynamic model for the high performance, because aerodynamic characteristics are nonlinear and include a lot of uncertainties. Therefore, nonlinear controller without considering uncertainties may degrade the control system performance. On this paper, to overcome these defects, the neural networks based adaptive nonlinear controller is proposed making use of the backstepping technique. Neural networks are implemented to guarantee robustness to uncertainties caused by aerodynamic coefficients variation. The main feature of the proposed controller is that the adaptive controller is developed under the assumption ...

  • PDF

A DPA attack using hamming weight model on Rijndael algorithm (Rijndael 암호알고리듬에 대한 Hamming weight 모델의 DPA공격)

  • 전영환;곽동진;이훈재;문상재
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.9-14
    • /
    • 2001
  • 부-채널 공격 중에서 가장 핵심이 되는 전력분석 공격은 여러 가지 암호알고리듬이 장착된 스마트 카드 시스템에 대해 공격이 이루어졌으며, 대부분 이 전력분석 공격에 취약한 것으로 알려져 있다. 본 논문에서는 AES로 채택된 Rijndael 알고리듬에 대하여 스마트 카드 구현시 고려되는 전력분석 공격중에서 hamming weight 모델을 이용한 세가지의 DPA 공격을 제시하고 그 대응방안을 설명한다.

  • PDF

Life Expectation of Salt Attack for Fire Damaged RC Structure (화재피해를 입은 콘크리트 건축물의 염해 내구수명 산정)

  • Park, Dong-Cheon
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2017.05a
    • /
    • pp.15-16
    • /
    • 2017
  • The properties of concrete damaged by fire change according to the temperature. Diffusion coefficient of chloride ion also can change which affect the life expectation under salt circumstance. Diffusion coefficient was measured by NT BUILD 492 using the concrete specimen damaged by high temperature. FEM analysis was performed to predict the life expectancy which can help to diagnose the concrete diagnose and to design maintenance strategy.

  • PDF

The regional defense model using early detection mechanism for against DDoS attack (DDoS 공격에 대한 사전탐지 기법을 이용한 지역적인 방어 모델)

  • Park, Sung-Wook;Yeh, Hong-Jin
    • Annual Conference of KIPS
    • /
    • 2005.05a
    • /
    • pp.1225-1228
    • /
    • 2005
  • 본 논문에서는 DDoS 공격 패킷을 사전에 탐지하고 트래픽 제어를 하기위한 방안을 제안한다. 제안된 모델은 공격대상에서 멀리 떨어 진 라우터에서 낮은 임계치를 적용하여 탐지 하게 되며 지역 연합 모델을 통한 지역적인 방어 행동을 취하게 된다. 사전에 취해지는 방어 행동으로 인해 본 시스템은 좋은 성능을 발휘 할 것이다. 시스템의 각 지역연합들은 DDoS 공격의 악의 적인 트래픽의 양을 줄이는 것에 기여 할 것이다.

  • PDF

A Study on Packet payload based Attack Detection using HMM (HMM을 이용한 패킷 내용기반 공격 탐지에 관한 연구)

  • Kim, Dong-Seong;Yeom, Dong-Bok;Park, Jong-Sou
    • Annual Conference of KIPS
    • /
    • 2003.05c
    • /
    • pp.2257-2260
    • /
    • 2003
  • 기존의 네트워크 기반의 IDS 는 쉘코드를 단순 매칭 함으로써 침입여부를 판별한다 이러한 방식은 알려진 공격에 대해서만 탐지할 수 있으며, 다형 쉘코드 및 IDS 우회 방법을 사용할 경우 탐지하지 못하는 문제점을 가진다. 따라서 본 논문에서는 Hidden Markov Model을 이용하여 자동화되고 효율적인 패킷 내용 기반의 침입 탐지기법을 제안한다.

  • PDF

Detecting scheme against bypass Denial of Service Attack (우회 DoS 공격을 탐지하기 위한 모델 설계)

  • 김용석;전준철;유기영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.709-711
    • /
    • 2003
  • 현재 사용되어지는 컴퓨터 통신 프로토콜(OSI 7 layer reference model)은 구조적인 문제점을 들어내고 있다. 이런 문제점 때문에, 해커들은 수많은 패킷들을 생성시키는 Denial of Service(DoS) 공격과 Distributed Denial of Service(DDoS) 공격을 사용하여 한 호스트나 한 네트워크 자원에 치명적인 악영향을 미친다. 특정한 TCP 포트나 UDP 포트에 공격을 가하는 경우에는 룰 기반의 침입탐지 시스템(IDS)이 탐지 해낼 수 있지만 다른 임의의 포트에 공격을 가하게 되연 IDS는 이것을 탐지하지 못한다. 따라서 우리는 잉의의 포트에 DoS나 DDoS 공격들이 일어났을 때 이 공격들을 탐지할 수 있는 모델을 설계하였다.

  • PDF

A New Session Key Agreement Scheme Using Smart Cards (스마트 카드를 이용한 새로운 세션 키 생성 방법)

  • Lee, Jongkook;Jongsoo Jang
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04a
    • /
    • pp.518-520
    • /
    • 2003
  • This paper proposes a new session key agreement scheme which is based on Station-to-station protocol, or STS shortly. We extend key agreement model of STS, to take into account smart cards. Besides, we modify STS to withstand message replaying attack. Security analysis shows our scheme is still secure.

  • PDF

A Study on Applying Amphibious Warfare Using EINSTein Model Based on Complexity Theory (복잡계이론 기반하 EINSTein 모형을 이용한 상륙전 적용에 관한 연구)

  • Lee, Sang-Heon
    • Journal of the military operations research society of Korea
    • /
    • v.32 no.2
    • /
    • pp.114-130
    • /
    • 2006
  • This paper deals with complexity theory to describe amphibious warfare situation using EINSTein (Enhanced ISAAC Neural Simulation Tool) simulation model. EINSTein model is an agent-based artificial "laboratory" for exploring self-organized emergent behavior in land combat. Many studies have shown that existing Lanchester equations used in most war simulation models does not describe changes of combat. Future warfare will be information warfare with various weapon system and complex combat units. We have compared and tested combat results with Lanchester models and EINSTein model. Furthermore, the EINSTein model has been applied and analyzed to amphibious warfare model such as amphibious assault and amphibious sudden attack. The results show that the EINSTein model has a possibility to apply and analyze amphibious warfare more properly than Lanchester models.

Two Stage Deep Learning Based Stacked Ensemble Model for Web Application Security

  • Sevri, Mehmet;Karacan, Hacer
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.632-657
    • /
    • 2022
  • Detecting web attacks is a major challenge, and it is observed that the use of simple models leads to low sensitivity or high false positive problems. In this study, we aim to develop a robust two-stage deep learning based stacked ensemble web application firewall. Normal and abnormal classification is carried out in the first stage of the proposed WAF model. The classification process of the types of abnormal traffics is postponed to the second stage and carried out using an integrated stacked ensemble model. By this way, clients' requests can be served without time delay, and attack types can be detected with high sensitivity. In addition to the high accuracy of the proposed model, by using the statistical similarity and diversity analyses in the study, high generalization for the ensemble model is achieved. Within the study, a comprehensive, up-to-date, and robust multi-class web anomaly dataset named GAZI-HTTP is created in accordance with the real-world situations. The performance of the proposed WAF model is compared to state-of-the-art deep learning models and previous studies using the benchmark dataset. The proposed two-stage model achieved multi-class detection rates of 97.43% and 94.77% for GAZI-HTTP and ECML-PKDD, respectively.