• Title/Summary/Keyword: Attack Model

Search Result 1,005, Processing Time 0.029 seconds

Analysis and Countermeasure of Malicious Code (악성코드 분석 및 대응 방안)

  • Hong, Sunghuyck
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.2
    • /
    • pp.13-18
    • /
    • 2014
  • Due to the development of information systems and the Internet, the Internet and smart phones can access networking in any where and any time. This causes the program to exploit various vulnerabilities and malicious code created to go out information, the disclosure of such crime increasing day by day. The proposed countermeasure model will be able to contribute to block all kinds of malicious code activities.

  • PDF

Simulation-based Network Vulnerability Analysis Using the SIMVA (SIMVA를 이용한 시뮬레이션 기반의 네트워크 취약성 분석)

  • You Yong-Jun;Lee Jang-Se;Chi Sung-Do
    • Journal of the Korea Society for Simulation
    • /
    • v.13 no.3
    • /
    • pp.21-29
    • /
    • 2004
  • The major objective of this paper is to analyze network vulnerabilities using the SIMVA (SIMualtion-based Vulnerability Analyzer). SIMVA is capable of monitor network status and analyze vulnerabilities automatically. To do this, we have employed the advanced modeling and simulation concepts such as SES/MB (System Entity Structure / Model Base) framework, DEVS (Discrete Event System Specification) formalism, and experimental frame for developing network security models and simulation-based analysis of vulnerability. SIMVA can analyze static vulnerability as well as dynamic vulnerability consistently and quantitatively. In this paper, we verified and tested the capability of application of SIMVA by slammer worm attack scenario.

  • PDF

Study on Attack Source Traceback Model of IPv6 (IPv6의 공격 근원지 역추적 모델 연구)

  • 이철수;임인빈;최재호
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.301-303
    • /
    • 2004
  • 인터넷의 급성장으로 해킹이나 Dos 공격, 웜, 바이러스 등의 사이버 범죄가 크게 증가하고 지능화되어 최근 역추적에 대한 관심이 날로 증가하고 있다. 보안 도구로 침입탐지시스템(IDS) 이나 침입방지시스템 (IPS) 등이 있으나 해킹이나 DoS 공격을 방어하는데 현실적으로 한계가 있다. 따라서 능동적인 해킹 방어를 위한 기본적인 기술로 해커의 실제 위치를 추적하는 역추적 시스템 기술이 필요하다. 특히 IPv4에서의 역추적 시스템에 대한 연구는 활발하게 이루어지고 있지만 IPv6에 대한 연구는 아직 미흡하다. 본 논문에서는 IPv4의 주소 고갈로 인해 앞으로 이를 대신할 IPv6에 대한 공격 근원지 역추적 시스템 개발이 시급하다고 보고. 해킹을 시도하는 해커의 실제 위치를 실시간으로 추적할 수 있도록 IPv6 헤더 패킷의 트래픽 클래스(Traffic Class)와 플로우 라벨(Flow Label)을 이용하여 IPv6에서의 실시간 네트워크 침입자 역추적 시스템 모델을 제안하고자 한다.

  • PDF

A Study on the Prediction of Durability of Concrete Structures Subjected to Chloride Attack by Chloride Diffusion Model (염소이온의 확산모델에 의한 염해를 받는 콘크리트 구조물의 내구성 예측연구)

  • 오병환;장승엽;차수원;이명규
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 1997.04a
    • /
    • pp.254-260
    • /
    • 1997
  • Chloride-induced corrosion of reinforcement is one of the main factors which cause the deterioration of concrete structures. Durability and service lives of the concrete sturctures should be predicted in order to minimize the risk of corrosion of reinforcement. The objective of this study is to suggest the basis of analytical methods of predicting the corrosion threhold time of concrete structures. Based on the chemistry and physics of chloride ion transport and corrosion process, chloride intrusion with various exposure conditions, variability of diffusivity and transport of pore water in concrete are taken into consideration in applying finite element formulation to the predicion of corrosion threhold time. The effects of main factors on the prediction of chloride intrusion and corrosion threhold time are examined. In addition, after chloride diffusivities of several mixture proportions with different parameters are measured by chloride diffusion test, the exemplary anayses of corrosion threhold time of those mixture proportions are carried out.

  • PDF

Probability-Based Prediction of Time to Corrosion Initiation of RC Structure Exposed to Salt Attack Environment Considering Uncertainties (불확실성을 고려한 RC구조물의 부식개시시기에 대한 확률 기반 예측)

  • Kim, Jin-Su;Do, Jeong-Yun;Hun, Seung;Soh, Seung-Young;Soh, Yang-Seob
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2005.05b
    • /
    • pp.249-252
    • /
    • 2005
  • Chloride ingress is a common cause of deterioration of reinforced concrete structures. Modeling the chloride ingress is an important basis for designing reinforced concrete structures and for assessing the reliability of an existing structure. The modelling is also needed for predicting the deterioration of a reinforced structure. This paper presents an approach for the probabilistic modeling of the chloride-induced corrosion of reinforcement steel in concrete structures that takes into account the uncertainties in the physical models. The parameters of the models are modeled as random variables and the distribution of the corrosion time and probability of corrosion are determined by using Monte Carlo simulation. The predictions of the proposed model is very effective to do the decision-making about initiation time and deterioration degree.

  • PDF

Numerical Study of Passive Control with Slotted Blading in Highly Loaded Compressor Cascade at Low Mach Number

  • Ramzi, Mdouki;Bois, Gerard;Abderrahmane, Gahmousse
    • International Journal of Fluid Machinery and Systems
    • /
    • v.4 no.1
    • /
    • pp.97-103
    • /
    • 2011
  • With the aim to increase blade loadings and stable operating range in highly loaded compressors, this article has been conducted to explore, through a numerical parametric study, the potential of passive control using slotted bladings in cascade configurations. The objective of this numerical investigation is to analyze the influence of location, width and slope of the slots and therefore identify the optimal configuration. The approach is based on two dimensional cascade geometry, low speed regime, steady state and turbulent RANS model. The results show the efficiency of this passive technique to delay separation and enhance aerodynamic performances of the compressor cascade. A maximum of 28.3% reduction in loss coefficient have been reached, the flow turning is increased with approximately $5^0$ and high loading over a wide range of angle of attack have been obtained for the optimized control parameter.

Implementation of Intrusion Detection System Using Network Packet Capture (네트워크 패킷 감사를 이용한 침입탐지시스템의 구현)

  • 김영진
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.391-395
    • /
    • 2002
  • Computer security is considered important due to the side effect generated from the expansion of computer network and rapid increase of use of computers. A attach of intruders using a vulnerability of operating system, protocol and application programs. And so, The attack methods is to be high technology and professional. Thus It must be necessity that we necessary a solution to structure, management for framework of information technology. This paper develope intrusion detecting system for separating intruders form critical system and design IDS model and implementation of it.

  • PDF

A Study on the Adaptive Roll Control Scheme for the Top Attack Smart Projectile (상부공격 지능탄의 회전각 적응제어 기법 연구)

  • 홍종태;정수경;최상경
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.3 no.2
    • /
    • pp.61-70
    • /
    • 2000
  • An Adaptive Positive Position Feedback method is presented for controlling the roll of the supersonic smart projectile. The proposed strategy combines the attractive attributes of Positive Position Feedback(PPF) of Goh and Caughey, and Lyapunov stability theorem. The parameters of Adaptive-PFF controller are adjusted in an adaptive mauler in order to follow the performance of an optimal reference model. In this way, optimal damping and zero steady-state errors can be achieved even in the presence of uncertain or changing plant parameters. The performance obtained with the Adaptive-PPF algorithm is compared with conventional PPF control algorithm. The results obtained emphasize the potential of Adaptive-PPF algorithm as an efficient means for controlling plants such as supersonic flight systems with uncertainties in real time.

  • PDF

A Vibration Control of the Strcture using Immune Response Algorithm (면역반응 알고리즘을 이용한 구조물의 진동제어)

  • 이영진;이권순
    • Journal of Korean Port Research
    • /
    • v.13 no.2
    • /
    • pp.389-398
    • /
    • 1999
  • In the biological immunity, the immune system of organisms regulates the antibody and T-cells to protect the attack from the foreign materials which are virus, germ cell, and other antigens, and supports their stable state. It has similar characteristics that has the adaptation and robustness to overcome disturbances and to control the plant of engineering application. In this paper, we build a model of the T-cell regulated immune response mechanism. We have also designed an immune response controller(IRC) focusing on the T-cell regulated immune response of the biological immune system that include both a help part to control the response and a suppress part to adjust system stabilization effect. We show some computer simulation to control the vibration of building structure system with strong wind forces excitation also demonstrate the efficiency of the proposed controller for applying a practical system even with existing nonlinear terms.

  • PDF

Network Security Modeling and Cyber Attack Simulation Using the SES/MB Framework (SES/MB 프레임워크를 이용한 네트워크 보안 모델링 및 사이버 공격 시뮬레이션)

  • 정기찬;이장세;김환국;정정례;박종서;지승도
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2000.11a
    • /
    • pp.118-124
    • /
    • 2000
  • 본 논문은 계층 구조적이고 모듈화 된 모델링 및 시뮬레이션 프레임워크를 이용한 네트워크 보안 모델링과 사이버 공격에 대한 시뮬레이션 기법의 연구를 주목적으로 한다. 단순한 네트워크 모델에서의 원인-결과 모델을 대상으로 시뮬레이션 하는 기존의 접근방법과는 달리, 복잡한 네트워크 보안 모델과 모델 기반의 사이버 공격에 대한 시뮬레이션 기법은 아직까지 시도된 바가 없는 실정이다. 따라서, 본 논문에서는 첫째, System Entity Structure/Model Base(SES/MB)을 통하여 계층 구조적, 모듈화, 객체지향적 설계를 하였고 둘째, 해킹 행위의 상세분석을 위해 취약성을 고려한 명령어 수준의 네트워크 보안 모델링 및 시뮬레이션 방법론을 제안하였다. 마지막으로, 사이버 공격 시나리오를 이용한 사례연구를 통하여 타당성을 검증하였다.

  • PDF