• Title/Summary/Keyword: Attack Model

Search Result 1,005, Processing Time 0.028 seconds

Storm Surge Vulnerability Assessment due to Typhoon Attack on Coastal area in Korea (태풍 내습으로 인한 연안역 해일 취약성 평가)

  • Kang, Tae-Soon;Oh, Hyeong-Min;Lee, Hae-Mi;Eum, Ho-Sik
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.21 no.5
    • /
    • pp.608-616
    • /
    • 2015
  • In this study, we have estimated the storm surge heights using numerical modeling on coastal area, and then evaluated the vulnerability index by applying the vulnerability assessment techniques. Surge modelling for 27 typhoons affected from 2000 to 2014 were simulated by applying the ADCIRC model. The results of validation and verification was in significant agreement as compared with observations for the top 6 ranking typhoons affected. As results, the storm surge heights in Jinhae Bay, Sacheon Bay, Gwangyang Bay, Cheonsu Bay and Gyeonggi Bay were higher than other inner coastal areas, then storm surge vulnerability assessment was performed using a standardization, normalization and gradation of storm surge heights. According to results of storm surge vulnerability assessment, index of Jinhae Bay, Sacheon Bay, Gwangyang Bay etc. are estimated to be vulnerable(4~5) because of the characteristics of storm surge such as inner bay are vulnerable compared with exposed to the open sea areas. However, index in the inner bay of western Jeonnam are not vulnerable(1~3) relatively. It may not appear the typhoons affected significantly for the past 15 years. So, the long-term vulnerability assessment with the sensitivity of geomorphology are necessary to reduce the uncertainty.

A Propeller Design Method with a New Blade Section : Applied to Container Ships (새로운 날개단면을 이용한 프로펠러 설계법 - 콘테이너선에 응용 -)

  • J.T. Lee;M.C. Kim;J.W. Ahn;S.H. Van;H.C. Kim
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.28 no.2
    • /
    • pp.40-51
    • /
    • 1991
  • A Propeller design method using the newly developed blade section(KH18), which behaves better cavitation characteristics, is presented. Experimental results for two-dimensional foil sections show that the lift-drag curve and the cavitation-free bucket diagram of the new blade section are wider comparing to those of the existion NACA sections. This characteristic of the new section is particularly important for marine propeller applications since angle of attack variation of the propeller blade operating behind a non-uniform ship's wake is relatively large. A lifting surface theory is used for the design of a propeller with the developed section for a 2700 TEU container ship. Since the most suitable chordwise loading shape is not known a priori, chordwise loading shape is chosen as a design parameter. Five propellers with different chordwise loading shapes and different foil sections are designed and tested in the towing tank and cavitation tunnel at KRISO. It is observed by a series of extensive model tsets that the propeller(KP197) having the chordwise loading shape, which has less leading edge loading at the inner radii and more leading edge loading at the outer radii of 0.7 radius, has higher propulsive efficiency and better cavitation characteristics. The KP197 propeller shows 1% higher efficiency, 30% cavitation volume reduction and 9% reduction of fluctuating pressure level comparing to the propeller with an NACA section. More appreciable efficiency gain for the new blade section propeller would be expected by reduction of expanded blade area considering the better cavitation characteristics of the new blade section.

  • PDF

Economic Injury Level of Thrips tabaci (Thysanoptera: Thripidae) on Welsh onions (Allium fistulosum L. var) in the Early Transplanting Stage (파에서 정식초기 파총채벌레의 경제적피해수준 설정)

  • Kang, Taek-Jun;Cho, Myoung-Rae;Kim, Hyeong-Hwan;Jeon, Heung-Yong;Kim, Dong-Soon
    • Korean journal of applied entomology
    • /
    • v.50 no.4
    • /
    • pp.289-293
    • /
    • 2011
  • This study was conducted to develop economic injury level (EIL) of onion thrips, Thrips tabaci, on welsh onion (Allium fistulosum L. var) in the early transplanting stage. The changes of welsh onion biomass, yield loss, and T. tabaci density were investigated according to the inoculation periods of T. tabaci. In the early transplanting stage of welsh onion, the yield loss (%) increased with increasing inoculation periods: 17.0, 53.3, 38.4, and 80.8% yield loss in 5, 10, 15, and 20 d inoculation periods, respectively. The relationship between Cumulative Insect Days (CID) of T. tabaci and yield loss (%) of welsh onion was well described by a nonlinear logistic equation. Using the estimated equation, EIL of T. tabaci on welsh onion was estimated to 30 CID per plant based on the yield loss 12% (an empirical gain threshold 5% + marketable rate 93% of welsh onion). ET was calculated to 24 CID, which corresponds to 80% of EIL. Until a more defined EIL-model is developed, the present results should be useful for T. tabaci management in early growth stage of welsh onion. The effect of T. tabaci attack on the yield of welsh onion in late growing season (120 days after transplanting) was also examined. The yield of welsh onion increased at a low population density of T. tabaci and decreased at higher densities, showing a typical over-compensatory response.

A step-by-step service encryption model based on routing pattern in case of IP spoofing attacks on clustering environment (클러스터링 환경에 대한 IP 스푸핑 공격 발생시 라우팅 패턴에 기반한 단계별 서비스 암호화 모델)

  • Baek, Yong-Jin;Jeong, Won-Chang;Hong, Suk-Won;Park, Jae-Hung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.6
    • /
    • pp.580-586
    • /
    • 2017
  • The establishment of big data service environment requires both cloud-based network technology and clustering technology to improve the efficiency of information access. These cloud-based networks and clustering environments can provide variety of valuable information in real-time, which can be an intensive target of attackers attempting illegal access. In particular, attackers attempting IP spoofing can analyze information of mutual trust hosts constituting clustering, and attempt to attack directly to system existing in the cluster. Therefore, it is necessary to detect and respond to illegal attacks quickly, and it is demanded that the security policy is stronger than the security system that is constructed and operated in the existing single system. In this paper, we investigate routing pattern changes and use them as detection information to enable active correspondence and efficient information service in illegal attacks at this network environment. In addition, through the step-by -step encryption based on the routing information generated during the detection process, it is possible to manage the stable service information without frequent disconnection of the information service for resetting.

A Study on security characteristics and vulnerabilities of BAS(Building Automation System) (BAS의 보안 특성 및 취약점에 관한 연구)

  • Choi, Yeon-Suk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.669-676
    • /
    • 2017
  • Recently, due to the importance of information security, security vulnerability analysis and various information protection technologies and security systems are being introduced as a countermeasure against cyber-attacks in new as well as existing buildings, and information security studies on high-rise buildings are also being conducted. However, security system introduction and research are generally performed from the viewpoint of general IT systems and security policies, so there is little consideration of the infrastructure of the building. In particular, the BAS or building infrastructure, is a closed system, unlike typical IT systems, but has unique structural features that accommodate open functions. Insufficient understanding of these system structures and functions when establishing a building security policy makes the information security policies for the BAS vulnerable and increases the likelihood that all of the components of the building will be exposed to malicious cyber-attacks via the BAS. In this paper, we propose an architecture reference model that integrates three different levels of BAS structure (from?) different vendors. The architectures derived from this study and the security characteristics and vulnerabilities at each level will contribute to the establishment of security policies that reflect the characteristics of the BAS and the improvement of the safety management of buildings.

A Study on the Detection Model of Illegal Access to Large-scale Service Networks using Netflow (Netflow를 활용한 대규모 서비스망 불법 접속 추적 모델 연구)

  • Lee, Taek-Hyun;Park, WonHyung;Kook, Kwang-Ho
    • Convergence Security Journal
    • /
    • v.21 no.2
    • /
    • pp.11-18
    • /
    • 2021
  • To protect tangible and intangible assets, most of the companies are conducting information protection monitoring by using various security equipment in the IT service network. As the security equipment that needs to be protected increases in the process of upgrading and expanding the service network, it is difficult to monitor the possible exposure to the attack for the entire service network. As a countermeasure to this, various studies have been conducted to detect external attacks and illegal communication of equipment, but studies on effective monitoring of the open service ports and construction of illegal communication monitoring system for large-scale service networks are insufficient. In this study, we propose a framework that can monitor information leakage and illegal communication attempts in a wide range of service networks without large-scale investment by analyzing 'Netflow statistical information' of backbone network equipment, which is the gateway to the entire data flow of the IT service network. By using machine learning algorithms to the Netfllow data, we could obtain the high classification accuracy of 94% in identifying whether the Telnet service port of operating equipment is open or not, and we could track the illegal communication of the damaged equipment by using the illegal communication history of the damaged equipment.

Analysis of a Gas Mask Using CFD Simulation (CFD모사기법을 이용한 가스 여과기 성능 해석)

  • Jeon, Rakyoung;Kwon, Kihyun;Yoon, Soonmin;Park, Myungkyu;Lee, Changha;Oh, Min
    • Korean Chemical Engineering Research
    • /
    • v.57 no.4
    • /
    • pp.475-483
    • /
    • 2019
  • Special chemical warfare agents are lethal gases that attack the human respiratory system. One of such gases are blood agents that react with the irons present in the electron transfer system of the human body. This reaction stops internal respiration and eventually causes death. The molecular sizes of these agents are smaller than the pores of an activated carbon, making chemical adsorption the only alternative method for removing them. In this study, we carried out a Computational Fluid Dynamics simulation by passing a blood agent: cyanogen chloride gas through an SG-1 gas mask canister developed by SG Safety Corporation. The adsorption bed consisted of a Silver-Zinc-Molybdenum-Triethylenediamine activated carbon impregnated with copper, silver, zinc and molybdenum ions. The kinetic analysis of the chemical adsorption was performed in accordance with the test procedure for the gas mask canister and was validated by the kinetic data obtained from experimental results. We predicted the dynamic behaviors of the main variables such as the pressure drop inside the canister and the amount of gas adsorbed by chemisorption. By using a granular packed bed instead of the Ergun equation that is used to model porous materials in Computational Fluid Dynamics, applicable results of the activated carbon were obtained. Dynamic simulations and flow analyses of the chemical adsorption with varying gas flow rates were also executed.

The Study of Statistical Optimization of MTBE Removal by Photolysis(UV/H2O2) (광분해반응을 통한 MTBE 제거에 대한 통계적 최적화 연구)

  • Chun, Sukyoung;Chang, Soonwoong
    • Journal of the Korean GEO-environmental Society
    • /
    • v.12 no.9
    • /
    • pp.55-61
    • /
    • 2011
  • This study investigate the use of ultraviolet(UV) light with hydrogen peroxide($H_2O_2$) for Methyl Tert Butyl Ether(MTBE) degradation in photolysis reactor. The process in general demands the generation of OH radicals in solution at the presence of UV light. These radicals can then attack the MTBE molecule and it is finally destroyed or converted into a simple harmless compound. The MTBE removal by photolysis were mathematically described as the independent variables such as irradiation intensity, initial concentration of MTBE and $H_2O_2$/MTBE ratio, and these were modeled by the use of response surface methodology(RSM). These experiments were carried out as a Box-Behnken Design(BBD) consisting of 15 experiments. Regression analysis term of Analysis of Variance(ANOVA) shows significantly p-value(p<0.05) and high coefficients for determination values($R^2$=94.60%) that allow satisfactory prediction of second-order regression model. And Canonical analysis yields the stationery point for response, with the estimate ridge of maximum responses and optimal conditions for Y(MTBE removal efficiency, %) are $x_1$=25.75 W of irradiation intensity, $x_2$=7.69 mg/L of MTBE concentration and $x_3$=11.04 of $H_2O_2$/MTBE molecular ratio, respectively. This study clearly shows that RSM is available tool for optimizing the operating conditions to maximize MTBE removal.

Estimation of Maneuverability of Underwater Vehicles with Ahead Propeller by the Vertical Planar Motion Mechanism Test (VPMM 시험을 통한 선수부에 프로펠러를 갖는 수중운동체의 조종성능 추정)

  • Shin, Myung-Sub;Kim, Dong-Hwi;Kim, Yagin;Hwang, Jong-Hyon;Baek, Hyung-Min;Kim, Sung-Jae;Park, Sang-Jun;Choi, Young-Myung;Park, Hongrae;Kim, Eun-Soo
    • Journal of Navigation and Port Research
    • /
    • v.46 no.3
    • /
    • pp.168-178
    • /
    • 2022
  • In this study, the resistance test, the vertical static angle of the attack test and VPMM test will be conducted to estimate the maneuverability of underwater vehicles with ahead propeller. The vertical static test will be conducted within the range of -40deg to 40deg, to investigate the cross-flow drag at high incidence angles. The tests will be conducted by dividing the propeller rotation into a case in which the propeller rotates at a specific rpm, and a case in which the propeller rotates naturally, according to the towing speed. Hydrodynamic coefficients of vertical direction will be estimated by the captive model tests. Additionally, the vertical dynamic stability index based on estimated hydrodynamic coefficients will be calculated and the impact of the propeller revolution state on the index will be investigated. The results are expected to be used as reference test data for underwater vehicles with ahead propeller.

Cyber Threats Analysis of AI Voice Recognition-based Services with Automatic Speaker Verification (화자식별 기반의 AI 음성인식 서비스에 대한 사이버 위협 분석)

  • Hong, Chunho;Cho, Youngho
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.33-40
    • /
    • 2021
  • Automatic Speech Recognition(ASR) is a technology that analyzes human speech sound into speech signals and then automatically converts them into character strings that can be understandable by human. Speech recognition technology has evolved from the basic level of recognizing a single word to the advanced level of recognizing sentences consisting of multiple words. In real-time voice conversation, the high recognition rate improves the convenience of natural information delivery and expands the scope of voice-based applications. On the other hand, with the active application of speech recognition technology, concerns about related cyber attacks and threats are also increasing. According to the existing studies, researches on the technology development itself, such as the design of the Automatic Speaker Verification(ASV) technique and improvement of accuracy, are being actively conducted. However, there are not many analysis studies of attacks and threats in depth and variety. In this study, we propose a cyber attack model that bypasses voice authentication by simply manipulating voice frequency and voice speed for AI voice recognition service equipped with automated identification technology and analyze cyber threats by conducting extensive experiments on the automated identification system of commercial smartphones. Through this, we intend to inform the seriousness of the related cyber threats and raise interests in research on effective countermeasures.