• Title/Summary/Keyword: Attack Model

Search Result 1,005, Processing Time 0.026 seconds

A study on the identification of underwater propeller singing phenomenon (수중 프로펠러 명음 현상의 규명에 관한 연구)

  • Kim, Taehyung;Lee, Hyoungsuk
    • The Journal of the Acoustical Society of Korea
    • /
    • v.37 no.2
    • /
    • pp.92-98
    • /
    • 2018
  • This paper is a study on the generation mechanism of propeller singing based on the cavitation tunnel test, underwater impact test, finite element analysis and computational flow analysis for the model propeller. A wire screen mesh, a propeller and a rudder were installed to simulate ship stern flow, and occurrence and disappearance of propeller singing phenomenon were measured by hydrophone and accelerometer. The natural frequencies of propeller blades were predicted through finite element analysis and verified by contact and non-contact impact tests. The flow velocity and effective angle of attack for each section of the propeller blades were calculated using RANS (Reynolds Averaged Navier-Stokes) equation-based computational fluid analysis. Using the high resolution analysis based on detached eddy simulation, the vortex shedding frequency calculation was performed. The numerical predicted vortex shedding frequency was confirmed to be consistent with the singing frequency and blade natural frequency measured by the model test.

Efficient Operation Model for Effective APT Defense (효율적인 APT 대응 시스템 운영 모델)

  • Han, Eun-hye;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.501-519
    • /
    • 2017
  • With the revolution of IT technology, cyber threats and crimes are also increasing. In the recent years, many large-scale APT attack executed domestically and internationally. Specially, many of the APT incidents were not recognized by internal organizations, were noticed by external entities. With fourth industrial revolution(4IR), advancement of IT technology produce large scale of sensitive data more than ever before; thus, organizations invest a mount of budget for various methods such as encrypting data, access control and even SIEM for analyzing any little sign of risks. However, enhanced intelligent APT it's getting hard to aware or detect. These APT threats are too much burden for SMB, Enterprise and Government Agencies to respond effectively and efficiently. This paper will research what's the limitation and weakness of current defense countermeasure base on Cyber Kill Chain process and will suggest effective and efficient APT defense operation model with considering of organization structure and human resources for operation.

Efficient RFID Search Protocols Providing Enhanced User Privacy (강화된 사용자 프라이버시를 보장하는 효율적인 RFID 검색 프로토콜)

  • Lim, Ji-Hwan;Oh, Hee-Kuck;Nyang, Dae-Hun;Lee, Mun-Kyu;Kim, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.347-356
    • /
    • 2009
  • In an RFID search protocol, a reader uses designated query to determine whether a specific tag is in the vicinity of the reader. This fundamental difference makes search protocol more vulnerable to replay attacks than authentication protocols. Due to this, techniques used in existing RFID authentication protocols may not be suitable for RFID search protocols. In this paper, we propose two RFID search protocols, one based on static ID and the other based on dynamic ID, which use counter to prevent replay attacks. Moreover, we propose a security model for RFID search protocols that includes forward/backward traceability, de-synchronization and forgery attack. Based on this model, we analyze security of our protocols and related works.

Numerical Study of the Aerodynamic Characteristics of an Airfoil with Thickness Uncertainty for a Wind Tunnel Testing (두께의 불확실성을 갖는 풍동시험 익형모델의 공력특성에 관한 수치해석 연구)

  • Yi, Tae-Hyeong;Kwon, Ki-Jung;Kim, Keun-Taek;Ahn, Seok-Min
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.40 no.6
    • /
    • pp.475-484
    • /
    • 2012
  • Numerical investigation is performed to understand the effects of thickness uncertainty of a supporting airfoil due to manufacturing processes on the aerodynamic characteristics of an airfoil used for measuring data in a wind tunnel testing. This is done by comparing the coefficients of lift, drag and moment of the airfoils. In this work, the airfoil model consists of three parts, one located in the center for measuring and two outer parts used for supporting. The study is carried out with a NACA64-418 airfoil and the turbulence model of Transition SST. It is found that the effect of thickness uncertainty of the airfoils used for supporting is not significant to the performance of the test airfoil at various angles of attack and Reynolds numbers.

Verifier-Based Multi-Party Password-Authenticated Key Exchange for Secure Content Transmission (그룹 사용자간 안전한 콘텐츠 전송을 위한 검증자를 이용한 패스워드 기반 다자간 키 교환 프로토콜)

  • Kwon, Jeong-Ok;Jeong, Ik-Rae;Choi, Jae-Tark;Lee, Dong-Hoon
    • Journal of Broadcast Engineering
    • /
    • v.13 no.2
    • /
    • pp.251-260
    • /
    • 2008
  • In this paper, we present two verifier-based multi-party PAKE (password-authenticated key exchange) protocols. The shared key can be used for secure content transmission. The suggested protocols are secure against server compromise attacks. Our first protocol is designed to provide forward secrecy and security against known-key attacks. The second protocol is designed to additionally provide key secrecy against the server which means that even the server can not know the session keys of the users of a group. The suggested protocols have a constant number of rounds are provably secure in the standard model. To the best of our knowledge, the proposed protocols are the first secure multi-party PAKE protocols against server compromise attacks in the literature.

A Study on Unconsciousness Authentication Technique Using Machine Learning in Online Easy Payment Service (온라인 간편 결제 환경에서 기계학습을 이용한 무자각 인증 기술 연구)

  • Ryu, Gwonsang;Seo, Changho;Choi, Daeseon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1419-1429
    • /
    • 2017
  • Recently, environment based authentication technique had proposed reinforced authentication, which generating statistical model per user after user login history classifies into account takeover or legitimate login. But reinforced authentication is likely to be attacked if user was not attacked in past. To improve this problem in this paper, we propose unconsciousness authentication technique that generates 2-Class user model, which trains user's environmental information and others' one using machine learning algorithms. To evaluate performance of proposed technique, we performed evasion attacks: non-knowledge attacker that does not know any information about user, and sophisticated attacker that only knows one information about user. Experimental results against non-knowledge attacker show that precision and recall of Class 0 were measured as 1.0 and 0.998 respectively, and experimental results against sophisticated attacker show that precision and recall of Class 0 were measured as 0.948 and 0.998 respectively.

Wind-excited stochastic vibration of long-span bridge considering wind field parameters during typhoon landfall

  • Ge, Yaojun;Zhao, Lin
    • Wind and Structures
    • /
    • v.19 no.4
    • /
    • pp.421-441
    • /
    • 2014
  • With the assistance of typhoon field data at aerial elevation level observed by meteorological satellites and wind velocity and direction records nearby the ground gathered in Guangzhou Weather Station between 1985 and 2001, some key wind field parameters under typhoon climate in Guangzhou region were calibrated based on Monte-Carlo stochastic algorithm and Meng's typhoon numerical model. By using Peak Over Threshold method (POT) and Generalized Pareto Distribution (GPD), Wind field characteristics during typhoons for various return periods in several typical engineering fields were predicted, showing that some distribution rules in relation to gradient height of atmosphere boundary layer, power-law component of wind profile, gust factor and extreme wind velocity at 1-3s time interval are obviously different from corresponding items in Chinese wind load Codes. In order to evaluate the influence of typhoon field parameters on long-span flexible bridges, 1:100 reduced-scale wind field of type B terrain was reillustrated under typhoon and normal conditions utilizing passive turbulence generators in TJ-3 wind tunnel, and wind-induced performance tests of aero-elastic model of long-span Guangzhou Xinguang arch bridge were carried out as well. Furthermore, aerodynamic admittance function about lattice cross section in mid-span arch lib under the condition of higher turbulence intensity of typhoon field was identified via using high-frequency force-measured balance. Based on identified aerodynamic admittance expressions, Wind-induced stochastic vibration of Xinguang arch bridge under typhoon and normal climates was calculated and compared, considering structural geometrical non-linearity, stochastic wind attack angle effects, etc. Thus, the aerodynamic response characteristics under typhoon and normal conditions can be illustrated and checked, which are of satisfactory response results for different oncoming wind velocities with resemblance to those wind tunnel testing data under the two types of climate modes.

Intrusion Situation Classification Model for Intelligent Intrusion Awareness (지능적인 침입 인지를 위한 침입 상황 분류 모델)

  • Hwang, Yoon-Cheol;Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.3
    • /
    • pp.134-139
    • /
    • 2019
  • As the development of modern society progresses rapidly, the technologies of society as a whole are progressing and becoming more advanced. Especially in the field of security, more sophisticated and intelligent attacks are being created. Meanwhile, damaging situations are becoming several times larger than before Therefore, it is necessary to re-classify and enhance the existing classification system. It is required to minimize the intrusion damage by actively responding to intelligent intrusions by applying this classification scheme to currently operating intrusion detection systems. In this paper, we analyze the intrusion type caused by intelligent attack We propose a new classification scheme for intrusion situations to guarantee the service safety, reliability, and availability of the target system, We use this classification model to lay the foundations for the design and implementation of a smart intrusion cognitive system capable of early detection of intrusion, the damages caused by intrusion, and more collections active response.

Analysis of Strategic Priorities for Strengthening Cybersecurity Capability of Cambodia (캄보디아의 사이버보안 역량강화를 위한 전략적 우선순위 분석)

  • Heng, Mara;Hwang, Gee-Hyun
    • Journal of Digital Convergence
    • /
    • v.17 no.10
    • /
    • pp.93-102
    • /
    • 2019
  • This paper aims to set the priorities for the cybersecurity strategy of Cambodian government. To this end, we built a AHP research model by adopting 4 factors from the ITU national interests model and selecting 7 strategies from best practices of 8 countries leading the cyber security. Using a questionnaire, 19 experts evaluated Cambodia's cybersecurity strategy priorities. The key policy factors were evaluated in the order of homeland defense, economic welfare, value promotion and favorable world order. Their strategic alternatives were identified in the order of legislation, capacity building, and cyber attack prevention for critical infrastructure. This study will contribute to setting the strategic priorities and feasible action plans to strengthen Cambodia's cybersecurity capabilities.

The Conversion method from ID-based Encryption to ID-based Dynamic Threshold Encryption (ID기반 암호시스템을 이용하여 ID기반 동적 임계 암호시스템으로 변환하는 방법)

  • Kim, Mi-Lyoung;Kim, Hyo-Seung;Son, Young-Dong;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.733-744
    • /
    • 2012
  • Dynamic threshold public-key encryption provides dynamic setting of the group of all users, receivers and the threshold value. Over recent years, there are many studies on the construction of scheme, called ID-based dynamic threshold encryption, which combines the ID-based encryption with dynamic threshold encryption. In this paper, we analyze the ID-based dynamic threshold encryption proposed by Xing and Xu in 2011, and show that their scheme has a structural problem. We propose a conversion method from ID-based encryption which uses the bilinear map to ID-based dynamic threshold encryption. Additionally, we prove this converted scheme has CPA security under the full model.