• Title/Summary/Keyword: Attack tool

Search Result 139, Processing Time 0.021 seconds

Performance and flow field assessment of settling tanks using experimental and CFD modeling

  • Nouri, Alireza Zamani;Heydari, Mohammad Mehdi
    • Membrane and Water Treatment
    • /
    • v.8 no.5
    • /
    • pp.423-435
    • /
    • 2017
  • Settling Basins are one of the most important and popular methods for removal of suspended sediments irrigation and drainage networks or power canals taking off from an alluvial river and wastewater treatment plant. Improving the performance and so increasing sediment removal efficiency of settling basins by an alternative method is necessary. In the present work, the effect of baffle and its angle of attack with the flow (${\theta}$) on the sediment removal efficiency is investigated by conducting a series of experiments on a straight canal with 8 m length, 0.3 m width and 0.5 m height and 3 m length of basin equipped with an adjustable glass baffle. A numerical analysis has been carried out using ANSYS Fluent 3D software (a general purpose computational fluid dynamics simulation tool) for three Froude numbers from the experiments. The numerical and experimental results were found to match reasonably well.

A Survey of Research on Human-Vehicle Interaction in Defense Area (국방 분야의 인간-차량 인터랙션 연구)

  • Yang, Ji Hyun;Lee, Sang Hun
    • Korean Journal of Computational Design and Engineering
    • /
    • v.18 no.3
    • /
    • pp.155-166
    • /
    • 2013
  • We present recent human-vehicle interaction (HVI) research conducted in the area of defense and military application. Research topics discussed in this paper include: training simulation for overland navigation tasks; expertise effects in overland navigation performance and scan patterns; pilot's perception and confidence on an overland navigation task; effects of UAV (Unmanned Aerial Vehicle) supervisory control on F-18 formation flight performance in a simulator environment; autonomy balancing in a manned-unmanned teaming (MUT) swarm attack, enabling visual detection of IED (Improvised Explosive Device) indicators through Perceptual Learning Assessment and Training; usability test on DaViTo (Data Visualization Tool); and modeling peripheral vision for moving target search and detection. Diverse and leading HVI study in the defense domain suggests future research direction in other HVI emerging areas such as automotive industry and aviation domain.

Armed Vehicle BAttle Group Simulation : BAGSim (기갑 전투그룹 교전 시뮬레이션 모델)

  • 최상영
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.1
    • /
    • pp.73-83
    • /
    • 2003
  • This paper presents armed vehicle BAttle Group Simulation model(called BAGSim) which is an object-oriented simulation system for representing battle group engagement consisting of tanks and helicopters. BAGSim is designed in the evolutionary software life cycle approach with the Unified Software Development Process, and implemented with C++ language. BAGSim consists of a preprocessor for engagement scenario definition and simulation data set up, a main processor for triggering engagement event and advancing simulation clock, and a post processor to record simulation histories. Application scenario covers several type of engagement among command tanks, fight tanks, scout helicopters, attack helicopters, anti-tank guided missiles, and decoys. Thus, BAGSim can be effectively used as an analytic tool to examine some operational concepts and tactics, further experimentally fine tune tank design options.

  • PDF

A Study for Detection of the Kernel Backdoor Attack and Design of the restoration system (커널 백도어 공격 탐지 및 복구시스템 설계에 관한 연구)

  • Jeon, Wan-Keun;Oh, Im-Geol
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.3
    • /
    • pp.104-115
    • /
    • 2007
  • As soon as an intrusion is detected by kernel backdoor, the proposed method can be preserve secure and trustworthy evidence even in a damaged system. As an experimental tool, we implement a backup and analysis system, which can be response quickly, to minimize the damages. In this paper, we propose a method, which can restore the deleted log file and analyze the image of a hard disk, to be able to expose the location of a intruder.

  • PDF

Phishing Email Detection Using Machine Learning Techniques

  • Alammar, Meaad;Badawi, Maria Altaib
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.277-283
    • /
    • 2022
  • Email phishing has become very prevalent especially now that most of our dealings have become technical. The victim receives a message that looks as if it was sent from a known party and the attack is carried out through a fake cookie that includes a phishing program or through links connected to fake websites, in both cases the goal is to install malicious software on the user's device or direct him to a fake website. Today it is difficult to deploy robust cybersecurity solutions without relying heavily on machine learning algorithms. This research seeks to detect phishing emails using high-accuracy machine learning techniques. using the WEKA tool with data preprocessing we create a proposed methodology to detect emails phishing. outperformed random forest algorithm on Naïve Bayes algorithms by accuracy of 99.03 %.

Enhancing Inoculation in the Spiral of Silence to Promote Resistance to Attacks: Examining Public Opinion on Taiwan-PRC Relations

  • Lin, Wayne Wei Kuo
    • Asian Journal for Public Opinion Research
    • /
    • v.10 no.3
    • /
    • pp.149-177
    • /
    • 2022
  • This study analyzes how inoculation affects the spiral of silence. Inoculation could be a beneficial tool in a democracy as it elevates citizens' resistance to attitude change "forced" by "the winning opinion" in the spiral of silence on a certain controversial issue. The study examines essential variables combined with the theories of inoculation and spiral of silence, such as resistance to counter-attitudinal attack, fear of isolation, and issue-involvement. A two-wave field experiment was employed to assess the formation of public opinion on Taiwan's political future with the People's Republic of China. Results support that inoculation enhanced people's resistance to attitude change and decreased their fear of isolation. Individuals who are more issue-involved were also shown to be more affected by inoculation, which allowed them to resist attitude change. The decreased fear of isolation, coupled with more issue involvement, might elevate people's willingness to speak out in public. More political discussions regarding an important public issue might be expected in a democracy.

A Study on the Aerodynamic Characteristics of a Joined-wing Aircraft with Variation of Wing Configurations

  • Kidong Kim;Jisung Jang
    • International Journal of Aerospace System Engineering
    • /
    • v.10 no.1
    • /
    • pp.1-13
    • /
    • 2023
  • The present study was attempted to investigate flow interference effects and the aerodynamic characteristics of the front and rear wings of a joined-wing aircraft by changing the configuration variables. The study was performed using a computational fluid dynamics(CFD) tool to demonstrate forward flight and analyze aerodynamic characteristics. A total of 9 configurations were analyzed with variations on the position, height, dihedral angle, incidence angle, twist angle, sweepback angle, and wing area ratio of the front and rear wings while the fuselage was fixed. The quantities of aerodynamic coefficients were confirmed in accordance with joined-wing configurations. The closer the front and rear wings were located, the greater the flow interference effects tended. Interestingly, the rear wing did not any configuration change, the lift coefficient of the rear wing was decreased when adjusted to increase the incidence angle of the front wing. The phenomenon was appeared due to an effective angle of attack alteration of the rear wing resulting from the flow interference by the front wing configurations.

An Implementation of Mining Prototype System for Network Attack Analysis (네트워크 공격 분석을 위한 마이닝 프로토타입 시스템 구현)

  • Kim, Eun-Hee;Shin, Moon-Sun;Ryu, Keun-Ho
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.455-462
    • /
    • 2004
  • Network attacks are various types with development of internet and are a new types. The existing intrusion detection systems need a lot of efforts and costs in order to detect and respond to unknown or modified attacks because of detection based on signatures of known attacks. In this paper, we present a design and implementation for mining prototype system to predict unknown or modified attacks through network protocol attributes analysis. In order to analyze attributes of network protocols, we use the association rule and the frequent episode. The collected network protocols are storing schema of TCP, UDP, ICMP and integrated type. We are generating rules that can predict the types of network attacks. Our mining prototype in the intrusion detection system aspect is useful for response against new attacks as extra tool.

A Study on the Indication for Thoracotomy and Operation Results of Spontaneous Pneumothorax (자연기흉의 개흉술 적응과 수술성적에 관한 연구)

  • Lee, Jae-Won;Kim, Geun-Ho
    • Journal of Chest Surgery
    • /
    • v.20 no.1
    • /
    • pp.39-47
    • /
    • 1987
  • The records of 268 patients, who were diagnosed as spontaneous pneumothorax during the period 1975 to 1984, treated at the department of thoracic and cardiovascular surgery, Hanyang University Hospital, were reviewed retrospectively to evaluate the effect of surgical intervention on each indications. Of these,.61 patients [22.8%] were taken operation to treat the pneumothorax after closed thoracostomy. We have classified the 61 patients to evaluate the therapeutic effect on each indications. And the therapeutic effect is based on the chest tube indwelling days. The results were as follows: 1. The chest tube indwelling days of the group who were taken closed thoracostomy only was average 14.13*9.17 days [range 5-66 days], and that of the group who were finally taken the thoracotomy after closed thoracostomy was 21.85*12.30 days [range 5-55 days]. 2. The indications of thoractomy were thoracoscopic findings, recurrence and continuous air leakage. 3. The chest tube indwelling day of the group who was taken thoracotomy by thoracoscopic findings was average 11.67*6.51 day, that was relatively short compared to those of the other groups. 4. The continuous air leakage group after closed thoracostomy was subdivided into three subgroups, continuous air leakage in 1st attack, thoracoscopic findings in 1st attack, and recurrence. 5. Of these, the chest tube indwelling day of the subgroup, who was taken operation by thoracoscopic findings, was 21.33e8.26, that was relatively short compared with those of the other subgroups. We use the thoracoscope as excellent diagnostic tool to detect the operation indication in the spontaneous pneumothorax patients. And we gain the benefits to shorten the chest tube indwelling days and admission days, and also to protect the recurrence.

  • PDF

White-Box AES Implementation Revisited

  • Baek, Chung Hun;Cheon, Jung Hee;Hong, Hyunsook
    • Journal of Communications and Networks
    • /
    • v.18 no.3
    • /
    • pp.273-287
    • /
    • 2016
  • White-box cryptography presented by Chow et al. is an obfuscation technique for protecting secret keys in software implementations even if an adversary has full access to the implementation of the encryption algorithm and full control over its execution platforms. Despite its practical importance, progress has not been substantial. In fact, it is repeated that as a proposal for a white-box implementation is reported, an attack of lower complexity is soon announced. This is mainly because most cryptanalytic methods target specific implementations, and there is no general attack tool for white-box cryptography. In this paper, we present an analytic toolbox on white-box implementations of the Chow et al.'s style using lookup tables. According to our toolbox, for a substitution-linear transformation cipher on n bits with S-boxes on m bits, the complexity for recovering the $$O\((3n/max(m_Q,m))2^{3max(m_Q,m)}+2min\{(n/m)L^{m+3}2^{2m},\;(n/m)L^32^{3m}+n{\log}L{\cdot}2^{L/2}\}\)$$, where $m_Q$ is the input size of nonlinear encodings,$m_A$ is the minimized block size of linear encodings, and $L=lcm(m_A,m_Q)$. As a result, a white-box implementation in the Chow et al.'s framework has complexity at most $O\(min\{(2^{2m}/m)n^{m+4},\;n{\log}n{\cdot}2^{n/2}\}\)$ which is much less than $2^n$. To overcome this, we introduce an idea that obfuscates two advanced encryption standard (AES)-128 ciphers at once with input/output encoding on 256 bits. To reduce storage, we use a sparse unsplit input encoding. As a result, our white-box AES implementation has up to 110-bit security against our toolbox, close to that of the original cipher. More generally, we may consider a white-box implementation of the t parallel encryption of AES to increase security.