• Title/Summary/Keyword: Attack Model

Search Result 1,005, Processing Time 0.031 seconds

A Study on Survivability Management Model for Information Systems Over Internet (인터넷에서 정보시스템의 생존성 관리 모델)

  • Kim, Hwang-Rae;Park, Jin-Sub
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.6
    • /
    • pp.1185-1193
    • /
    • 2006
  • The next generation networked information system over unbounded internet is open to various network attacks and incidents, so many users suffer from damage and financial loss. In this paper we propose a survivability management model to evaluate the tradeoffs between the cost of defence mechanisms for information systems with weighted service and the resulting expected survivability after a network attack or occurrence of incidents. By varying the level of defence in the simulation, we examine how survivability changes according to the defense level. We derive a cost/survivability and weighted service/survivability curve that managers can use to decide on the appropriate level of defense for the network system of their organizations.

  • PDF

A Study about Vortex Flow Characteristics on Delta wing by Wime-Resolving PIV (시간해상도 PIV를 이용한 델타형 날개에서의 와류유동특성에 관한 연구)

  • Lee Hyun;Kim Beom-Seok;Sohn Myong-Hwan;Lee Young-Ho
    • 한국가시화정보학회:학술대회논문집
    • /
    • 2002.11a
    • /
    • pp.105-108
    • /
    • 2002
  • Highly swept leading edge extension(LEX) applied to delta wings has greatly improved the subsonic maneuverability of contemporary fighters. In this study, systematic approach by PIV experimental method within a circulating water channel was adopted to study the fundamental characteristics of induced vortex generation, development and its breakdown appearing on a delta wing model with or without LEX in terms of four angles of attack$(15^{\circ},\;20^{\circ},\;25^{\circ},\;30^{\circ})$ and six measuring sections$(30\%,\;40\%,\;50\%,\;60\%,\;70\%,\;80\%)$ of chord length. Distributions of time-averaged velocity vectors and vorticities over the delta wing model were compared along the chord length direction. High-speed CCD camera which made it possible to acquire serial images is able to get the detailed information about the flow characteristics occurred on the delta wing. Especially quantitative comparison of the maximum vorticity featuring the induced pressure distribution were also conducted to clarity the significance of the LEX existence.

  • PDF

A Robust Collaborative Filtering against Manipulated Ratings (조작된 선호도에 강건한 협업적 여과 방법)

  • Kim, Heung-Nam;Ha, In-Ay;Jo, Geun-Sik
    • Journal of Internet Computing and Services
    • /
    • v.10 no.6
    • /
    • pp.81-98
    • /
    • 2009
  • Collaborative filtering, one of the most successful technologies among recommender systems, is a system assisting users in easily finding the useful information and supporting the decision making. However, despite of its success and popularity, one notable issue is incredibility of recommendations by unreliable users called shilling attacks. To deal with this problem, in this paper, we analyze the type of shilling attacks and propose a unique method of building a model for protecting the recommender system against manipulated ratings. In addition, we present a method of applying the model to collaborative filtering which is highly robust and stable to shilling attacks.

  • PDF

Numerical investigation of the effects angles of attack on the flutter of a viscoelastic plate

  • Sherov, A.G.;Khudayarov, B.A.;Ruzmetov, K.Sh.;Aliyarov, J.
    • Advances in aircraft and spacecraft science
    • /
    • v.7 no.3
    • /
    • pp.215-228
    • /
    • 2020
  • As is shown in the paper, the Koltunov-Rzhanitsyn singular kernel of heredity (when constructing mathematical models of the dynamics problem of the hereditary theory of viscoelasticity) adequately describes real mechanical processes, best approximates experimental data for a long period of time. A mathematical model of the problem of the flutter of viscoelastic plates moving in a gas with a high supersonic velocity is given. Using the Bubnov-Galerkin method, discrete models of the problem of the flatter of viscoelastic plates flowed over by supersonic gas flow are obtained. A numerical method is developed to solve nonlinear integro-differential equations (IDE) for the problem of the hereditary theory of viscoelasticity with weakly singular kernels. A general computational algorithm and a system of application programs have been developed, which allow one to investigate the nonlinear dynamic problems of the hereditary theory of viscoelasticity with weakly singular kernels. On the basis of the proposed numerical method and algorithm, nonlinear problems of the flutter of viscoelastic plates flowed over in a gas flow at an arbitrary angle are investigated. In a wide range of changes in various parameters of the plate, the critical velocity of the flutter is determined. It is shown that the singularity parameter α affects not only the oscillations of viscoelastic systems, but the critical velocity of the flutter as well.

A New Functional Model Complex of Extradiol-cleaving Catechol Dioxygenases: Properties and Reactivity of [$Fe^{II}$(BLPA)DBCH]BPh₄

  • Lim, Ji H.;Park, Tae H.;이호진;이강봉;Jang, Ho G.
    • Bulletin of the Korean Chemical Society
    • /
    • v.20 no.12
    • /
    • pp.1428-1432
    • /
    • 1999
  • [Fe$^{II}$(BLPA)DBCH]BPh₄ (1), a new functional model for the extradiol-cleaving catechol dioxygenases, has been synthesized, where BLPA is bis(6-methyl-2-pyridylmethyl)(2-pyridylmethyl)amine and DBCH is 3,5-di-tert-butylcatecholate monoanion. ¹H NMR and EPR studies confirm that 1 has a high-spin Fe(II) (S = 2) center. The electronic spectrum of 1 exhibits one absorption band at 386 nm, showing the yellow color of the typical [Fe$^{II}$(BLPA)] complex. Upon exposure to O₂, 1 is converted to an intense blue species within a minute. This blue species exhibits two intense bands at 586 and 960 nm and EPR signals at g = 5.5 and 8.0 corresponding to the high-spin Fe(III) complex (S = 5/2, E/D = 0.11). This blue complex further reacts with O₂ to be converted to (μ-oxo)Fe$^{III}_2$ complex within a few hours. Interestingly, 1 affords intradiol cleavage (65%) and extradiol cleavage (20%) products after the oxygenation. It can be suggested that 1 undergoes two different oxygenation pathways. The one takes the substrate activation mechanism proposed for the intradiol cleavage products after the oxidation of the $Fe^II\;to\;Fe^{III}$. The other involves the direct attack of O₂ to $Fe^{II}$ center, forming the $Fe^{III}$-superoxo intermediate which can give rise to the extradiol cleavage products. 1 is the first functional Fe(II) complex for extradiol-cleaving dioxygenases giving extradiol cleavage products.

Palliates the Attack by Hacker of Android Application through UID and Antimalware Cloud Computing

  • Zamani, Abu Sarwar;Ahmad, Sultan;Uddin, Mohammed Yousuf;Ansari, Asrar Ahmad;Akhtar, Shagufta
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.182-186
    • /
    • 2021
  • The market for smart phones has been booming in the past few years. There are now over 400,000 applications on the Android market. Over 10 billion Android applications have been downloaded from the Android market. Due to the Android popularity, there are now a large number of malicious vendors targeting the platform. Many honest end users are being successfully hacked on a regular basis. In this work, a cloud based reputation security model has been proposed as a solution which greatly mitigates the malicious attacks targeting the Android market. Our security solution takes advantage of the fact that each application in the android platform is assigned a unique user id (UID). Our solution stores the reputation of Android applications in an anti-malware providers' cloud (AM Cloud). The experimental results witness that the proposed model could well identify the reputation index of a given application and hence its potential of being risky or not.

A Study of Patient's Privacy Protection in U-Healthcare (유헬스케어에서 환자의 프라이버시 보호 방안 연구)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.913-921
    • /
    • 2012
  • On the strength of the rapid development and propagation of U-healthcare service, the service technologies are full of important changes. However, U-healthcare service has security problem that patient's biometric information can be easily exposed to the third party without service users' consent. This paper proposes a distributed model according authority and access level of hospital officials in order to safely access patients' private information in u-Healthcare Environment. Proposed model can both limit the access to patients' biometric information and keep safe system from DoS attack using time stamp. Also, it can prevent patients' data spill and privacy intrusion because the main server simultaneously controls hospital officials and the access by the access range of officials from each hospital.

Prognosis of aerodynamic coefficients of butterfly plan shaped tall building by surrogate modelling

  • Sanyal, Prasenjit;Banerjee, Sayantan;Dalui, Sujit Kumar
    • Wind and Structures
    • /
    • v.34 no.4
    • /
    • pp.321-334
    • /
    • 2022
  • Irregularity in plan shape is very common for any type of building as it enhances better air ventilation for the inhabitants. Systematic opening at the middle of the facades makes the appearance of the building plan as a butterfly one. The primary focus of this study is to forecast the force, moment and torsional coefficient of a butterfly plan shaped tall building. Initially, Computational Fluid Dynamics (CFD) study is done on the building model based on Reynolds averaged Navier Stokes (RANS) k-epsilon turbulence model. Fifty random cases of irregularity and angle of attack (AOA) are selected, and the results from these cases are utilised for developing the surrogate models. Parametric equations are predicted for all these aerodynamic coefficients, and the training of these outcomes are also done for developing Artificial Neural Networks (ANN). After achieving the target acceptance criteria, the observed results are compared with the primary CFD data. Both parametric equations and ANN matched very well with the obtained data. The results are further utilised for discussing the effects of irregularity on the most critical wind condition.

A Study on the Wind Tunnel Facility Performance Improvement of ADD Ludwieg Tube (국방과학연구소 Ludwieg Tube 풍동설비 성능개량 연구)

  • Sangjun Ma
    • Journal of Aerospace System Engineering
    • /
    • v.17 no.4
    • /
    • pp.118-125
    • /
    • 2023
  • The wind tunnel test is one of the essential processes in the development of guided missile systems, and various wind tunnel facilities exist depending on the test requirements, various conditions, and their purposes. The Ludwieg tube is very useful in the development of guided missile systems, and we have necessitated the upgrade of the Ludwieg tube in ADD to acquire various test requirements, such as high angle of attack, repeatability, and stability. In this paper, upgrading the nozzle, vacuum tank, and model support is suggested to improve the Ludwieg tube performance, and we demonstrate a result of the solution through pressure measurement.

Spatio-temporal deep learning model for urban drainage network: (2) Improving model's robustness (우수관망 시공간 딥러닝 모델: (2) 모델 강건성 향상을 위한 연구)

  • Yubin An;Soon Ho Kwon;Donghwi Jung
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.228-228
    • /
    • 2023
  • 국지적 지역에 내리는 강한 강도의 강우는 많은 인명 및 재산 피해를 발생시킨다. 이러한 피해를 예방하기 위해 도시 침수 예측에 관한 연구가 오랜 기간 수행되어 왔으며, 최근에는 다양한 신경망(neural network) 모델이 활발히 이용되고 있다. 강우 지속 기간이나 강도는 일정하지 않고, 공간적 특징 또한 도시마다 다르므로 안정적인 침수 예측을 위한 신경망 모델은 강건성(robustness)을 지녀야 한다. 강건한 신경망 모델이란 적대적 공격(adversarial attack)을 방어할 수 있는 능력을 갖춘 모델을 일컫는다. 따라서 본 연구에서는, 도시 침수 예측을 위한 시공간 신경망(spatio-temporal neural network) 모델의 강건성 제고를 위한 방법론을 제안한다. 먼저 적대적 공격의 유형과 방어 방법을 분류하고, 시공간 신경망 모델의 학습 데이터 특성 및 모델 구조구성 조건 등을 활용하여 최적의 강건성 제고 방안을 도출하였다. 해당 모델은 집중호우로 인해 나타날 다양한 관망에서의 침수 피해를 각각 예측하고 피해를 예방하기 위해 활용될 수 있다.

  • PDF