• Title/Summary/Keyword: Attack Model

Search Result 1,005, Processing Time 0.034 seconds

A Study on the Quantitative Threat-Level Assessment Measure Using Fuzzy Inference (퍼지추론을 이용한 정량적 사이버 위협 수준 평가방안 연구)

  • Lee, Kwang-ho;Kim, Jong-Hwa;Kim, Jee-won;Yun, Seok Jun;Kim, Wanju;Jung, Chan-gi
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.19-24
    • /
    • 2018
  • In this study, for evaluating the cyber threat, we presented a quantitative assessment measures of the threat-level with multiple factors. The model presented in the study is a compound model with the 4 factors; the attack method, the actor, the strength according to the type of the threat, and the proximity to the target. And the threat-level can be quantitatively evaluated with the Fuzzy Inference. The model will take the information in natural language and present the threat-level with quantified data. Therefore an organization can accurately evaluate the cyber threat-level and take it into account for judging threat.

  • PDF

Quasi-steady three-degrees-of-freedom aerodynamic model of inclined/yawed prisms: Formulation and instability for galloping and static divergence

  • Cristoforo Demartino;Zhen Sun;Giulia Matteoni;Christos T. Georgakis
    • Wind and Structures
    • /
    • v.37 no.1
    • /
    • pp.57-78
    • /
    • 2023
  • In this study, a generalized three-degree-of-freedom (3-DoF) analytical model is formulated to predict linear aerodynamic instabilities of a prism under quasi-steady (QS) conditions. The prism is assumed to possess a generic cross-section exposed to turbulent wind flow. The 3-DoFs encompass two orthogonal horizontal directions and rotation about the prism body axis. Inertial coupling is considered to account for the non-coincidence of the mass center and the rotation center. The aerodynamic force coefficients-drag, lift, and moment-depend on the Reynolds number based on relative flow velocity, angle of attack, and the angle between the wind and the cable. Aerodynamic forces are linearized with respect to the static equilibrium configuration and mean wind velocity. Routh-Hurwitz and Liénard and Chipart criteria are used in the eigenvalue problem, yielding an analytical solution for instabilities in galloping and static divergence types. Additionally, the minimum structural damping and stiffness required to prevent these instabilities are numerically determined. The proposed 3-DoF instability model is subsequently applied to a conductor with ice accretion and a full-scale dry inclined cable. In comparison to existing models, the developed model demonstrates superior prediction accuracy for unstable regions compared with results in wind tunnel tests.

THREE-STAGED RISK EVALUATION MODEL FOR BIDDING ON INTERNATIONAL CONSTRUCTION PROJECTS

  • Wooyong Jung;Seung Heon Han
    • International conference on construction engineering and project management
    • /
    • 2011.02a
    • /
    • pp.534-541
    • /
    • 2011
  • Risk evaluation approaches for bidding on international construction projects are typically partitioned into three stages: country selection, project classification, and bid-cost evaluation. However, previous studies are frequently under attack in that they have several crucial limitations: 1) a dearth of studies about country selection risk tailored for the overseas construction market at a corporate level; 2) no consideration of uncertainties for input variable per se; 3) less probabilistic approaches in estimating a range of cost variance; and 4) less inclusion of covariance impacts. This study thus suggests a three-staged risk evaluation model to resolve these inherent problems. In the first stage, a country portfolio model that maximizes the expected construction market growth rate and profit rate while decreasing market uncertainty is formulated using multi-objective genetic analysis. Following this, probabilistic approaches for screening bad projects are suggested through applying various data mining methods such as discriminant logistic regression, neural network, C5.0, and support vector machine. For the last stage, the cost overrun prediction model is simulated for determining a reasonable bid cost, while considering non-parametric distribution, effects of systematic risks, and the firm's specific capability accrued in a given country. Through the three consecutive models, this study verifies that international construction risk can be allocated, reduced, and projected to some degree, thereby contributing to sustaining stable profits and revenues in both the short-term and the long-term perspective.

  • PDF

A Simulator Development of Surface Warship Torpedo Defense System considering Bubble-Generating Wake Decoy (기포발생식 항적기만기를 고려한 수상함 어뢰방어체계 시뮬레이터 개발)

  • Wooshik Kim;Myoungin Shin;Jisung Park;Ho Seuk Bae
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.27 no.3
    • /
    • pp.416-427
    • /
    • 2024
  • The wake-homing underwater guided weapon that detects and tracks wake generated during voyage of a surface ship is impossible to avoid with the present acoustic deception torpedo defense system. Therefore, research on bubble-generating wake decoy is necessary to deceive wake-homing underwater guided weapon. Experiments in various environments are required to verify the effective operation method and performance of the wake decoy, but performance verification through underwater experiment is limited. In this paper, we develop a simulator for an torpedo defense system of surface ship, which is applied bubble-generating wake decoy, against acoustic, wake, and hybrid homing underwater guided weapon attack. The simulator includes surface ship model, acoustic decoy(static, mobile) model, bubble-generating wake decoy model, search and motion model of underwater guided weapon and so on. By integrating various models, MATLAB GUI simulator was developed. Through the simulation results for various environmental variables by this simulator, it is judged that effective operation method and performance verification of the bubble-generating wake decoy can be performed.

High-Capacity Robust Image Steganography via Adversarial Network

  • Chen, Beijing;Wang, Jiaxin;Chen, Yingyue;Jin, Zilong;Shim, Hiuk Jae;Shi, Yun-Qing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.366-381
    • /
    • 2020
  • Steganography has been successfully employed in various applications, e.g., copyright control of materials, smart identity cards, video error correction during transmission, etc. Deep learning-based steganography models can hide information adaptively through network learning, and they draw much more attention. However, the capacity, security, and robustness of the existing deep learning-based steganography models are still not fully satisfactory. In this paper, three models for different cases, i.e., a basic model, a secure model, a secure and robust model, have been proposed for different cases. In the basic model, the functions of high-capacity secret information hiding and extraction have been realized through an encoding network and a decoding network respectively. The high-capacity steganography is implemented by hiding a secret image into a carrier image having the same resolution with the help of concat operations, InceptionBlock and convolutional layers. Moreover, the secret image is hidden into the channel B of carrier image only to resolve the problem of color distortion. In the secure model, to enhance the security of the basic model, a steganalysis network has been added into the basic model to form an adversarial network. In the secure and robust model, an attack network has been inserted into the secure model to improve its robustness further. The experimental results have demonstrated that the proposed secure model and the secure and robust model have an overall better performance than some existing high-capacity deep learning-based steganography models. The secure model performs best in invisibility and security. The secure and robust model is the most robust against some attacks.

A study of the destructive styles from Contemporary Paintings - Focused on distinguishing enmity-destruction and self-destruction - (현대회화에서 드러난 해체의 형식론에 관한 연구 -타의적 해체와 자의적 해체의 성격규정을 중심으로-)

  • Park Ki-Woong
    • Journal of Science of Art and Design
    • /
    • v.7
    • /
    • pp.5-63
    • /
    • 2005
  • Generally, the meanings of destruction are related in the meaning of demolition, breakdown, into fragments ... and so on, and the similar meanings are twist, crush, demolish, split, cut, into pieces , break up ... etc. Further, it has related in the cruelty and destructive heart which are linked with orgy, Sadism, Necrophilia and so on. The meanings are also expressed by the initial , which are deprivation, deface, defame, deform, degrade, delegitimize, denounce , deride, destroy, devalue, as well as debase, debunk, declaim, declassify, decry, delete, denigrate, deprecate, despise or detract ...and so on. Dario Gamboni has discussed the meaning in his book as two categories Iconoclasm and Vandalism. And the similar meanings could be found in the words which has the initial of , like abase, abate, abhor, abjure, abolish, abridge, abuse ...and so on. Even though the distinct meanings of Iconoclasm and Vandalism, it is not easy to distinguish clearly between the differences when the results are accomplished in contemporary paintings because of the similarity of the results. In korean vocabulary there are no similar words to distinguish between the meanings of destruction and deconstruction, and the deconstruction is not recorded in the general dictionaries. However the meaning of is diminishing, separation, contrast and so on. So the unification of the word as do-construction is not construct, minus construction, reverse construction. And Vincent Ditch explained that there are the meaning of destroy the text. From Jacques Derrida, the deconstruction strategy is to criticise the world of traditional metaphysics and logocentrism, and not to reconstruire the philosophical meaning of texts but $d\'{e}construire$ them. And Saussure emphasized that the signifers could have more meaning that there can be more signified in traditional texts in the art. as a result, deconstruction is explained that there are many signified meanings in a signifer. In this thesis , from using the meanings of destruction and deconstruction, to distinguish the expressive skills in contemporary art works are arising. Therefore, special methods which are linked in the destruction styles are selected. As a result, the two different purposes of destruction is arising, one is enmity destruction and the other is self destruction another word, auto destruction or destruction to create The enmity destruction can be distinguished by the two category Iconoclasm and Vandalism. They come from the moment of different historical aspect is arising and want to attack the Icon or masterpiece this concept is from the study of John Philips and especially iconoclasm is linked with religious and artistic heart, but Vandalism is come from the political attack. Sometime, this distinguish is not clearly arising, because the two aspects are co-related in the attack. As a result, firstly, the Iconoclastic controversy had arisen in the methods of Dadaism which has developed by Man Ray, Francis Picabia and Marcel Duchamp. They want to attack the pre-established master-pieces and painting spaces, and they had 'non-artistic attitude' not to be art. Since 1980, the German artist Anselm Kiefer adapted the methods and made them his special skills so he had tried to paint tough brush strokes and draw with hugh pallette image line and fire and water images , they can be the image attack as the Iconoclasm. secondly, the model of vandalism is to be done by hammer, drill, canon and so on. the method is to attack the content of painting. Further, the object of destruction is bound by cords and iron lings to demolish or to declare the authority of pre-statues; it symbolize the pre-authority is gone already. Self-destruction based paintings are clearly different in the purpose of approaching the art work. First of all, they can be auto-destruction, creative destruction and metamorphosis destruction, which is linked with the skill the material aspect and basic stature, and sign destruction or signifier destruction, which is link with the inner meaning destruction that is considered as the Semiotical destruction in post-modern paintings. Since 1960, the auto destruction is based on the method of firing, melting, grinding and similar skills, which is linked with Neo-Dada and reverse-assemblage. Metamorphosis destruction is strongly linked with the basic inner heart price and quality, so it can be resulted in the changedness of expectation and recognition. Tony Cragg has developed the skills to metamorphose the wood as stone or iron as cloth and stone as sponge and rubber and so on. The researcher has developed the same style in the series of since 2003. The other self-destructive methods are found in the skill of sign destruction. In the methods the meaning of the art is not fixed as one or two, but is developed multi-meaning and differ from original starting situation, so Jacques Derrida called the difference meaning in deconstruction. It is the destruction of textes. These methods are accomplished by David Salle, Francesco Clemente, and recently Tracy Emin, who has developed the attacking heart in the spectators' emotion. Sometime in the method of self-destruction, it is based on horror and shock, the method is explored by Demian Hirst and Jakes and Dinos Chapman. Their destructive styles stimulate ambivalent heart and destroy original sign of girl and animals.

  • PDF

Modeling and coupling characteristics for an airframe-propulsion-integrated hypersonic vehicle

  • Lv, Chengkun;Chang, Juntao;Dong, Yilei;Ma, Jicheng;Xu, Cheng
    • Advances in aircraft and spacecraft science
    • /
    • v.7 no.6
    • /
    • pp.553-570
    • /
    • 2020
  • To address the problems caused by the strong coupling of an airbreathing hypersonic vehicle's airframe and propulsion to the integrated control system design, an integrated airframe-propulsion model is established, and the coupling characteristics between the aircraft and engine are analyzed. First, the airframe-propulsion integration model is established based on the typical nonlinear longitudinal dynamical model of an air-breathing hypersonic vehicle and the one-dimensional dual-mode scramjet model. Thrust, moment, angle of attack, altitude, and velocity are used as transfer variables between the aircraft model and the engine model. The one-dimensional scramjet model can accurately reflect the working state of the engine and provide data to support the coupling analysis. Second, owing to the static instability of the aircraft model, the linear quadratic regulator (LQR) controller of the aircraft is designed to ensure attitude stability and height tracking. Finally, the coupling relationship between the aircraft and the engine is revealed through simulation examples. The interaction between vehicle attitude and engine working condition is analyzed, and the influence of vehicle attitude on engine safety is considered. When the engine is in a critical working state, the attitude change of the aircraft will not affect the engine safety without considering coupling, whereas when coupling is considered, the attitude change of the aircraft may cause the engine unstart, which demonstrates the significance of considering coupling characteristics.

Penetration Model in Soil Considering J-hook Trajectory (토양 내 J-hook 궤적을 고려한 침투해석 모델 개발)

  • Sung, Seung-Hun;Ji, Hun
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.35 no.1
    • /
    • pp.1-8
    • /
    • 2022
  • This study proposes a penetration model in soil considering the wake separation and reattachment based on the integrated force law (IFL). Rigid body dynamics, the IFL, and semi-empirical resistance function about soil are utilized to formulate the motion of the hard projectile. The model can predict the trajectory in soil considering the spherical cavity expansion phenomenon under various oblique angles and angles of attack (AOA). The Mohr-Coulomb yield model is utilized as the resistance function of the soil. To confirm the feasibility of the proposed model, a comparative study is conducted with experimental results described in the open literature. From the comparative study, the penetration depth estimated from the proposed model had about 13.4% error compared to that of the experimental results. In general, the finite element method is widely used to predict the trajectory in soil for a projectile. However, it takes considerable time to construct the computational model for the projectile and perform the numerical simulation. The proposed model only needs to the dimension of the projectile and can predict the trajectory of the projectile in a few seconds.

Decision Making Model for Selecting Financial Company Server Privilege Account Operations (금융회사 서버 Privilege 계정 운영방식 결정 모델)

  • Lee, Suk-Won;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1607-1620
    • /
    • 2015
  • The server privilege account must be operated through law and regulation. However, due to regulation non-compliance and inadequate operation on financial company server privilege, an incident that every server data being deleted by hacker occur which is later being named as 'NH Bank Cyber Attack'. In this paper, the current operation status on financial company privilege accounts is being analysed to elicit problems and improvement. From the analysis, important evaluation factors will be also selected and applied generating the decision making model for financial company server privilege account operation. The evaluation factor deducted from privilege account status analysis will be used to present and verify the decision making model and formula through AHP(Analytic Hierarchy process).

Measurement and Numerical Model for Wave Interation on Impermeable Steep Slopes (불투수성 급경사면 위의 파랑상호작용에 관한 수치모델 및 실험)

  • Kim, In-Chul;Ahn, Ik-Seong
    • Journal of Ocean Engineering and Technology
    • /
    • v.22 no.5
    • /
    • pp.44-51
    • /
    • 2008
  • The planning and design of coastal structures against wave attack is required to accurately predict wave transformation, wave run-up, and fluid. particlevelocities an a slope. On tire other hand, in tire swash and surf zones of a natural beach, where coastal erosion and accretion occur at tire land-sea boundary, hydrodynamic analysis is essential. In this study, a RBREAK2 numerical model was created based on the nonlinear shallow water equation and laboratory measurements were carried out in terms of tire free surface elevations and velocities for tire cases of regular and irregular waves on 1 : 10 and 1 : 5 impermeable slopes. The data were used to evaluate tire applicability and limitations of tire RBREAK2 numerical model. The numerical mode1 could predict tire cross-shore variation of the wave profile reasonably well, but showed more accurate results for slopes that were steeper than 1 : 10. Except near tire wave crest, tire computed depth averaged velocities could represent tire measured profile below tire trough level fairly well.