• Title/Summary/Keyword: Attack Modeling

Search Result 153, Processing Time 0.028 seconds

Spectral Modeling of Haegeum Using Cepstral Analysis (캡스트럼 분석을 이용한 해금의 스펙트럼 모델링)

  • Hong, Yeon-Woo;Kang, Myeong-Su;Cho, Sang-Jin;Kim, Jong-Myon;Lee, Jung-Chul;Chong, Ui-Pil
    • The Journal of the Acoustical Society of Korea
    • /
    • v.29 no.4
    • /
    • pp.243-250
    • /
    • 2010
  • This paper proposes a spectral modeling of Korean traditional instrument, Haegeum, using cepstral analysis to naturally describe Haegeum sounds varying with time. To get a precise result of cepstral analysis, we set the frame size to 3 periods of input signal and more cepstral coefficients are used to extract formants. The performance is enhanced by flexibly controlling the cutoff frequency of bandpass filter depending on the resonances in the synthesis process of sinusoidal components and the deleting peaks remained in the residual signal. To detect the change of pitch, we divide the input frames into silence, attack, and sustain region and determine which region the current frame is involved in. Then, the proposed method readjusts the frame size according to the fundamental frequency in the case of the current frame is in attack region and corrects the extraction errors of the fundamental frequency for the frames in sustain region. With these processes, the synthesized sounds are much more similar to the originals. The evaluation result through the listening test by a Haegeum player says that the synthesized sounds are almost similar to originals (96~100 % similar to the original sounds).

Feedback flow control using the POD method on the backward facing step wall model

  • Cho, Sung-In;Lee, In;Lee, Seung-Jun;Lee, Choong Yun;Park, Soo Hyung
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.13 no.4
    • /
    • pp.428-434
    • /
    • 2012
  • Missiles suffer from flight instability problems at high angles of attack, since vortex flow over a fuselage cause lateral force to the body. To overcome this problem at a high angle of attack, the development of a real time vortex controller is needed. In this paper, Proper Orthogonal Decomposition (POD) and feedback controllers are developed for real time vortex control. The POD method is one of the most well known techniques for modeling low order models that represent the original full-order model. An adaptive control algorithm is used for real time control.

A STUDY OF AERODYNAMIC MODELING FOR UNFOLDING WING MOTION ANALYSIS (전개하는 날개의 공력 모델링 연구)

  • Jung, S.Y.;Yoon, S.J.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2008.03a
    • /
    • pp.245-250
    • /
    • 2008
  • For simulation of a wing unfolding motion for the various aerodynamic conditions, equation governing unfolding motion and moments applying to the unfolding wing were modelled. Aerodynamic roll moment consists of the static roll moment and the damping moment, which were obtained through wind tunnel tests and numerical analyses respectively. Panel method was used to compute the roll damping coefficient with twisted wing, whose deflection angle was equivalent to angle of attack due to the deployment motion. Roll damping coefficient is a function of angle of attack, sideslip angle, and deployment angle but not of angular velocity of deployment. Simulation with aerodynamic damping model gave more similar deployment time compared to wing deployment test results.

  • PDF

A STUDY OF AERODYNAMIC MODELING FOR UNFOLDING WING MOTION ANALYSIS (전개하는 날개의 공력 모델링 연구)

  • Jung, S.Y.;Yoon, S.J.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2008.10a
    • /
    • pp.245-250
    • /
    • 2008
  • For simulation of a wing unfolding motion for the various aerodynamic conditions, equation governing unfolding motion and moments applying to the unfolding wing were modelled. Aerodynamic roll moment consists of the static roll moment and the damping moment, which were obtained through wind tunnel tests and numerical analyses respectively. Panel method was used to compute the roll damping coefficient with twisted wing, whose deflection angle was equivalent to angle of attack due to the deployment motion. Roll damping coefficient is a function of angle of attack, sideslip angle, and deployment angle but not of angular velocity of deployment. Simulation with aerodynamic damping model gave more similar deployment time compared to wing deployment test results.

  • PDF

A study on the reduction in angle of attack by the constructions in the vicinity of airport runway with crosswind (활주로 주변 건물을 지나는 측풍에 의한 이.착륙 항공기의 받음각 감소에 관한 연구)

  • Hong, Gyo-Young;Sheen, Dong-Jin;Park, Soo-Bok
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.17 no.2
    • /
    • pp.1-7
    • /
    • 2009
  • This paper illustrates how simulation modeling can be of substantial help in designing constructions in the vicinity of airport runway and presents results about the influence of aircraft wake vortices through computer simulation. The cross-wind energy dissipation rate is estimated from the Y-directional velocity spectrum for a sample in a real meteorological observation data. The eddy region about cross wind in the vicinity of airport runway is highly dependent on the height and shape of the buildings and the AOA of aircraft is greatly influenced by Y-directional velocity occurred by dint of separation region in runway.

  • PDF

Data Mining Approaches for DDoS Attack Detection (분산 서비스거부 공격 탐지를 위한 데이터 마이닝 기법)

  • Kim, Mi-Hui;Na, Hyun-Jung;Chae, Ki-Joon;Bang, Hyo-Chan;Na, Jung-Chan
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.279-290
    • /
    • 2005
  • Recently, as the serious damage caused by DDoS attacks increases, the rapid detection and the proper response mechanisms are urgent. However, existing security mechanisms do not effectively defend against these attacks, or the defense capability of some mechanisms is only limited to specific DDoS attacks. In this paper, we propose a detection architecture against DDoS attack using data mining technology that can classify the latest types of DDoS attack, and can detect the modification of existing attacks as well as the novel attacks. This architecture consists of a Misuse Detection Module modeling to classify the existing attacks, and an Anomaly Detection Module modeling to detect the novel attacks. And it utilizes the off-line generated models in order to detect the DDoS attack using the real-time traffic. We gathered the NetFlow data generated at an access router of our network in order to model the real network traffic and test it. The NetFlow provides the useful flow-based statistical information without tremendous preprocessing. Also, we mounted the well-known DDoS attack tools to gather the attack traffic. And then, our experimental results show that our approach can provide the outstanding performance against existing attacks, and provide the possibility of detection against the novel attack.

Shoulder Surfing Attack Modeling and Security Analysis on Commercial Keypad Schemes (어깨너머공격 모델링 및 보안 키패드 취약점 분석)

  • Kim, Sung-Hwan;Park, Min-Su;Kim, Seung-Joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1159-1174
    • /
    • 2014
  • As the use of smartphones and tablet PCs has exploded in recent years, there are many occasions where such devices are used for treating sensitive data such as financial transactions. Naturally, many types of attacks have evolved that target these devices. An attacker can capture a password by direct observation without using any skills in cracking. This is referred to as shoulder surfing and is one of the most effective methods. There has been only a crude definition of shoulder surfing. For example, the Common Evaluation Methodology(CEM) attack potential of Common Criteria (CC), an international standard, does not quantitatively express the strength of an authentication method against shoulder surfing. In this paper, we introduce a shoulder surfing risk calculation method supplements CC. Risk is calculated first by checking vulnerability conditions one by one and the method of the CC attack potential is applied for quantitative expression. We present a case study for security-enhanced QWERTY keyboard and numeric keypad input methods, and the commercially used mobile banking applications are analyzed for shoulder surfing risks.

IARAM: Internet Attack Representation And Mapping Mechanism for a Simulator (IARAM: 시뮬레이터를 위한 인터넷 공격 표현 및 맵핑 기법)

  • Lee, Cheol-Won;Kim, Jung-Sik;Kim, Dong-Kyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.89-102
    • /
    • 2008
  • Internet becomes more and more popular, and most companies and institutes use web services for e-business and many other purposes. With the explosion of Internet, the attack of internet worm has grown. Simulation is one of the most widely used method to study internet worms. But, it is quite challenging to simulate very large-scale worm attacks because of various reasons. By this reason, we often use the modeling network simulation technique. But, it also has problem that it difficult to apply each worm attacks to simulation. In this paper, we propose worm attack representation and mapping methods for apply worm attack to simulation. The proposed method assist to achieve the simulation efficiency. And we can express each worm attacks more detail. Consequently, the simulation of worm attacks has the time-efficiency and the minuteness.

3-Step Security Vulnerability Risk Scoring considering CVE Trends (CVE 동향을 반영한 3-Step 보안 취약점 위험도 스코어링)

  • Jihye, Lim;Jaewoo, Lee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.27 no.1
    • /
    • pp.87-96
    • /
    • 2023
  • As the number of security vulnerabilities increases yearly, security threats continue to occur, and the vulnerability risk is also important. We devise a security threat score calculation reflecting trends to determine the risk of security vulnerabilities. The three stages considered key elements such as attack type, supplier, vulnerability trend, and current attack methods and techniques. First, it reflects the results of checking the relevance of the attack type, supplier, and CVE. Secondly, it considers the characteristics of the topic group and CVE identified through the LDA algorithm by the Jaccard similarity technique. Third, the latest version of the MITER ATT&CK framework attack method, technology trend, and relevance between CVE are considered. We used the data within overseas sites provide reliable security information to review the usability of the proposed final formula CTRS. The scoring formula makes it possible to fast patch and respond to related information by identifying vulnerabilities with high relevance and risk only with some particular phrase.

Virtual Reality Game Modeling for a Haptic Jacket

  • Bae, Hee-Jung;Jang, Byung-Tae
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.882-885
    • /
    • 2003
  • In this paper, we describe a haptic jacket and wheel as a haptic interface to enhance VR game realism. Building upon the VR game system using this devices, our haptic interface technique allows the user to intuitive interact on game contents, and then to sense the game event properties such as walking, attacking, driving and fire in a natural way. In addition, we extended the initial haptic model to support haptic decoration and dynamic interactions due to the added game event in a real time display. An application example presented here is a VR Dino-Attack game. This game supports interactions among dynamic and our intuitive haptic interface. Modeling physic interactions involves precise collision detection, real-time force computation, and high control-loop bandwidth.

  • PDF