• Title/Summary/Keyword: Attack Response

Search Result 415, Processing Time 0.027 seconds

DESIGN OF HIGH LIFT FLAP WITH OPTIMIZATION TECHNIQUE (최적화 기법을 이용한 고양력 플랩 설계)

  • Kim, C.W.;Lee, Y.G.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2008.03a
    • /
    • pp.227-228
    • /
    • 2008
  • In the present paper, fowler flap was optimized to maximize the lift with response surface method. Leading edge shape and the gap between main airfoil and flap, were optimized and the aerodynamic characteristics was improved considerably. The optimized flap has more rounded leading edge and bigger gap. Before angle of attack, $10^{\circ}$, lift and drag are improved and the optimized flap shows similar aerodynamic characteristics to the original flap. The flow condition for optimization was angle of attack, $10^{\circ}$, Mach number, 0.2, flap deflection, $40^{\circ}$.

  • PDF

DESIGN OF HIGH LIFT FLAP WITH OPTIMIZATION TECHNIQUE (최적화 기법을 이용한 고양력 플랩 설계)

  • Kim, C.W.;Lee, Y.G.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2008.10a
    • /
    • pp.227-228
    • /
    • 2008
  • In the present paper, fowler flap was optimized to maximize the lift with response surface method. Leading edge shape and the gap between main airfoil and flap, were optimized and the aerodynamic characteristics was improved considerably. The optimized flap has more rounded leading edge and bigger gap. Before angle of attack, $10^{\circ}$, lift and drag are improved and the optimized flap shows similar aerodynamic characteristics to the original flap. The flow condition for optimization was angle of attack, $10^{\circ}$, Mach number, 0.2, flap deflection, $40^{\circ}$.

  • PDF

A Study on Command and Control Through Cyber Protection Function Analysis (사이버 방호기능 분석을 통한 지휘통제에 관한 연구)

  • Choi, Seho;Oh, Haengrok;Yun, Joobeom
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.24 no.5
    • /
    • pp.537-544
    • /
    • 2021
  • Cyber threats can bypass existing cyber-protection systems and are rapidly developing by exploiting new technologies such as artificial intelligence. In order to respond to such cyber threats, it is important to improve the ability to detect unknown cyber threats by correlating heterogeneous cyber protection systems. In this paper, to enhance cyber-attack response capabilities, we proposed command and control that enables rapid decision-making and response before the attack objectives are achieved, using Lockheed Martin's cyber kill chain and MITRE ATT&CK to analyze the purpose and intention of the attacker.

DDoS Attack Response Framework using Mobile Code (DDoS 공격 대응 프레임워크 설계 및 구현)

  • Lee, Young-seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.3 no.3
    • /
    • pp.31-38
    • /
    • 2010
  • It has become more difficult to correspond an cyber attack quickly as patterns of attack become various and complex. However, current security mechanisms just have passive defense functionalities. In this paper, we propose new network security architecture to respond various cyber attacks rapidly and to chase and isolate the attackers through cooperation between security zones. The proposed architecture makes it possible to deal effectively with cyber attacks such as IP spoofing or DDoS(Distributed Denial of Service), by using active packet technology including a mobile code on active network. Also, it is designed to have more active correspondent than that of existing mechanisms. We implemented these mechanisms in Linux routers and experimented on a testbed to verify realization possibility of attacker response framework using mobile code. The experimentation results are analyzed.

  • PDF

One-Pass Identification Processing Password (한 단계로 신원확인을 위한 패스워드)

  • Kim Yong-Hun;Cho Beom-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.3
    • /
    • pp.627-632
    • /
    • 2005
  • Almost all network systems provide an authentication mechanism based on user ID and password. In such system, it is easy to obtain the user password using a sniffer program with illegal eavesdropping. The one-time password and challenge-response method are useful authentication schemes that protect the user passwords against eavesdropping. In client/ server environments, the one-time password scheme using time is especially useful because it solves the synchronization problem. It is the stability that is based on Square Root problem, and we would like to suggest OPI(One Pass Identification), enhancing the stability for all of the well-known attacks by now including Free-playing attack, off-line Literal attack, Server and so on. OPI does not need to create the special key to read the password. OPI is very excellent in identifying the approved person within a very short time.

Response Methodology against Spoofed IP Attack using Active Networks Mechanism (액티브 네트워크를 이용한 위조 IP 공격 대응 메커니즘)

  • Park, Sang-Hyun;Ko, Haeng-Seok;Kwon, Oh-Seok
    • Journal of Internet Computing and Services
    • /
    • v.9 no.2
    • /
    • pp.69-81
    • /
    • 2008
  • It has become more difficult to correspond a cyber attack quickly as patterns of attack become various and complex. However, current security mechanism just have passive defense functionalities. In this paper, we propose new network security mechanism to respond various cyber attacks rapidly and to chase and isolate the attackers through cooperation between security zones. The proposed mechanism makes it possible to deal effectively with cyber attacks such as IP spoofing, by using active packet technology including a mobile code on active network. Also, it is designed to hove more active correspondent than that of existing mechanisms. We implemented these mechanisms in Linux routers and experimented on a testbed to verify realization possibility of attacker response framework using mobile code. The experimentation results are analyzed.

  • PDF

Reinforcement Learning-Based APT Attack Response Technique Utilizing the Availability Status of Assets (방어 자산의 가용성 상태를 활용한 강화학습 기반 APT 공격 대응 기법)

  • Hyoung Rok Kim;Changhee Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.1021-1031
    • /
    • 2023
  • State-sponsored cyber attacks are highly impactful because they are carried out to achieve pre-planned goals. As a defender, it is difficult to respond to them because of the large scale of the attack and the possibility that unknown vulnerabilities may be exploited. In addition, overreacting can reduce the availability of users and cause business disruption. Therefore, there is a need for a response policy that can effectively defend against attacks while ensuring user availability. To solve this problem, this paper proposes a method to collect the number of processes and sessions of defense assets in real time and use them for learning. Using this method to learn reinforcement learning-based policies on a cyber attack simulator, the attack duration based on 100 time-steps was reduced by 27.9 time-steps and 3.1 time-steps for two attacker models, respectively, and the number of "restore" actions that impede user availability during the defense process was also reduced, resulting in an overall better policy.

Wake effects of an upstream bridge on aerodynamic characteristics of a downstream bridge

  • Chen, Zhenhua;Lin, Zhenyun;Tang, Haojun;Li, Yongle;Wang, Bin
    • Wind and Structures
    • /
    • v.29 no.6
    • /
    • pp.417-430
    • /
    • 2019
  • To study the wake influence of an upstream bridge on the wind-resistance performance of a downstream bridge, two adjacent long-span cable-stayed bridges are taken as examples. Based on wind tunnel tests, the static aerodynamic coefficients and the dynamic response of the downstream bridge are measured in the wake of the upstream one. Considering different horizontal and vertical distances, the flutter derivatives of the downstream bridge at different angles of attack are extracted by Computational Fluid Dynamics (CFD) simulations and discussed, and the change in critical flutter state is further studied. The results show that a train passing through the downstream bridge could significantly increase the lift coefficient of the bridge which has the same direction with the gravity of the train, leading to possible vertical deformation and vibration. In the wake of the upstream bridge, the change in lift coefficient of the downstream bridge is reduced, but the dynamic response seems to be strong. The effect of aerodynamic interference on flutter stability is related to the horizontal and vertical distances between the two adjacent bridges as well as the attack angle of incoming flow. At large angles of attack, the aerodynamic condition around the downstream girder which may drive the bridge to torsional flutter instability is weakened by the wake of the upstream bridge, and the critical flutter wind speed increases at this situation.

Operation Plan for the Management of an Information Security System to Block the Attack Routes of Advanced Persistent Threats (지능형지속위협 공격경로차단 위한 정보보호시스템 운영관리 방안)

  • Ryu, Chang-Su
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.759-761
    • /
    • 2016
  • Recent changes in the information security environment have led to persistent attacks on intelligent assets such as cyber security breaches, leakage of confidential information, and global security threats. Since existing information security systems are not adequate for Advanced Persistent Threat; APT attacks, bypassing attacks, and attacks on encryption packets, therefore, continuous monitoring is required to detect and protect against such attacks. Accordingly, this paper suggests an operation plan for managing an information security system to block the attack routes of advanced persistent threats. This is achieved with identifying the valuable assets for prevention control by establishing information control policies through analyzing the vulnerability and risks to remove potential hazard, as well as constructing detection control through controlling access to servers and conducting surveillance on encrypted communication, and enabling intelligent violation of response by having corrective control through packet tagging, platform security, system backups, and recovery.

  • PDF

A Study on Traceback System for Pharming Attack Response (파밍 공격 대응을 위한 역추적 시스템 연구)

  • Choi, Sang-Wook;Chae, Cheol-Joo;Kim, Young-Ho;Lee, Jae-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.277-280
    • /
    • 2008
  • Security policy that use defense system such as Intrusion Detection System or Firewall is limited to passive response that only manage important data and resources. This paper analyzes security problem and maximum of passive response, provides a responsive way to Pharming attack which is one kind of hacking. This paper also includes ICMP-based traceback system that uses ICMP traceback Message about invasion that is decided through hacking. With this paper we can intercept damage of personal information leakage and property loss that is done through Pharming attacks.

  • PDF