• Title/Summary/Keyword: Indirect attack

Search Result 28, Processing Time 0.024 seconds

Study of Indirect Attack Method of Aerial Fire Firefighting by Helicopter on Forest Fire (헬기에 의한 산불공중간접진화 방법에 관한 연구)

  • Bae, Taek-Hoon;Choi, Youn-Chul
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.24 no.3
    • /
    • pp.55-61
    • /
    • 2016
  • Among the method of aerial fire firefighting, the indirect attack is efficiency way to protect main facilities and it is the aerial fire line construction. According to this study is suggested the fire line construction strategy of indirect attack by helicopter suitable Korea forest fire on theory consideration of indirect attack and experience in practical scene. This study defined that main key points of the fire line construction are accuracy, large quantity, and quickness. Main protection facilities are devided as caution area, warning area, danger area and concern area. Also, it suggested stage-by-stsge from 1 step to 3 step for the aerial fire firefighting correspondence strategy and the fire line construction model. I regard that this study's indirect attack method of the aerial fire firefighting of the fire line construction may be understand about indirect attack tactics and application of indirect attack which is assistance to raise of capability of the aerial fire firefighting with effectiveness and efficiency.

Intelligent Internal Stealthy Attack and its Countermeasure for Multicast Routing Protocol in MANET

  • Arthur, Menaka Pushpa;Kannan, Kathiravan
    • ETRI Journal
    • /
    • v.37 no.6
    • /
    • pp.1108-1119
    • /
    • 2015
  • Multicast communication of mobile ad hoc networks is vulnerable to internal attacks due to its routing structure and high scalability of its participants. Though existing intrusion detection systems (IDSs) act smartly to defend against attack strategies, adversaries also accordingly update their attacking plans intelligently so as to intervene in successful defending schemes. In our work, we present a novel indirect internal stealthy attack on a tree-based multicast routing protocol. Such an indirect stealthy attack intelligently makes neighbor nodes drop their routing-layer unicast control packets instead of processing or forwarding them. The adversary targets the collision avoidance mechanism of the Medium Access Control (MAC) protocol to indirectly affect the routing layer process. Simulation results show the success of this attacking strategy over the existing "stealthy attack in wireless ad hoc networks: detection and countermeasure (SADEC)" detection system. We design a cross-layer automata-based stealthy attack on multicast routing protocols (SAMRP) attacker detection system to identify and isolate the proposed attacker. NS-2 simulation and analytical results show the efficient performance, against an indirect internal stealthy attack, of SAMRP over the existing SADEC and BLM attacker detection systems.

Analysis of the factors of the failure of the North Korean Army's Great Bypass Maneuver to Honam during the Korea War from an indirect approach strategy: Focusing on the Naval and Marine Corps' Tongyeong Amphibious Operation to Stop the "Dislocation" (간접접근전략으로 본 6·25전쟁기 북한군의 호남 방면 대우회기동 실패 요인 분석 -'교란'을 저지한 해군·해병대의 통영상륙작전을 중심으로-)

  • Choi, Ho-jae
    • Maritime Security
    • /
    • v.6 no.1
    • /
    • pp.109-135
    • /
    • 2023
  • The North Korean military's maneuver toward Honam was the fastest maneuver the North Korean army had demonstrated during the Korean War, and it was a threatening attack that forced the Korean and Allied forces to fully adjust the defenses of the Nakdong River. However, when this study analyzed the North Korean military's maneuver toward Honam in terms of indirect approach strategy, there were a number of factors that inevitably led to its failure. In terms of implementing the indirect approach strategy, the North Korean military cited a number of failure factors, including the dispersion of combat forces, the inflexibility of changing the line of operation, the maneuvering of ground forces, and the lack of psychological distaction. However, the North Koreans were preparing for a final "surprise attack," in which the 7th Division, which was following the North Korean 6th Division, took another diversion and attempted to attack in the direction of Tongyeong. With this, the North Koreans intended to break through the Nakdong River defenses and head for Pusan. However, the North Korean attack was ultimately thwarted by the Korean Navy and Marine Corps' Tongyeong Amphibious Operation. With a swift maneuver using the sea as a maneuvering space, the Navy and Marine Corps occupied key points first, creating an advantageous situation and fending off an attack by the North Korean 7th Division. The Navy and Marine Corps' Tongyeong Amphibious Operation finally thwarted the North Korean military's maneuver toward Honam, thus maintaining the Nakdong River defenses.

  • PDF

Indirect Branch Target Address Verification for Defense against Return-Oriented Programming Attacks (Return-Oriented Programming 공격 방어를 위한 간접 분기 목적 주소 검증 기법)

  • Park, Soohyun;Kim, Sunil
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.5
    • /
    • pp.217-222
    • /
    • 2013
  • Return-Oriented Programming(ROP) is an advanced code-reuse attack like a return-to-libc attack. ROP attacks combine gadgets in program code area and make functions like a Turing-complete language. Some of previous defense methods against ROP attacks show high performance overhead because of dynamic execution flow analysis and can defend against only certain types of ROP attacks. In this paper, we propose Indirect Branch Target Address Verification (IBTAV). IBTAV detects ROP attacks by checking if target addresses of indirect branches are valid. IBTAV can defends against almost all ROP attacks because it verifies a target address of every indirect branch instruction. Since IBTAV does not require dynamic execution flow analysis, the performance overhead of IBTAV is relatively low. Our evaluation of IBTAV on SPEC CPU 2006 shows less than 15% performance overhead.

Study of Aerial Fire Line Construction and Suppression Method on Forest Fire (산불 공중진화 방화선 구축형태 및 진화방법에 관한 연구)

  • Bae, Taek-Hoon;Lee, Si-Young
    • Fire Science and Engineering
    • /
    • v.24 no.5
    • /
    • pp.26-31
    • /
    • 2010
  • In this study, attack process and aerial control line construction type which were considered forest fire type and a case of operations were suggested using the experience of aerial fire attack of all type of forest fires. As the spread rate of forest fire is effected by terrain, slope, wind speed, forest species and etc., we needed to analyze spreading direction, behavior type and intensity before heli-team constructed a aerial control line. Especially, It is important to consider safety of attack team as a their views were obstructed. In this study, we suggested a 13 methods from type A to type M about attack and construction of aerial indirect control line.

Evaluation of performance characteristics in the success of team attack during women's volleyball competition (여자배구 경기에서 팀 공격 성공을 위한 선수들의 수행 특성 평가)

  • Lee, Ki-Chung;Bae, Sung-Jae
    • Korean Journal of Applied Biomechanics
    • /
    • v.15 no.1
    • /
    • pp.1-18
    • /
    • 2005
  • The purpose of this study was to evaluate performance characteristics. in the success of team attack during volleyball competition. For this, real game was analyzed using S-VHS video camera for three dimensional cinematography. The contents of this research were receive to set time, set to spike time, setter moving distance, ball position during set and attacker's relative ball position during jump and spike, and open area at spike. Among the various kinematical factors considered in this study, the ball height relative spiker and open area were found to be related to offensive performance. This finding implies that although their direct impact were not significant the other factors could have indirect impact on offensive performance by increasing open area. Thus, receiver, setter, assistant attacker, and main attacker should practice for successful performance in each stage. Lastly, it is necessary to develop kinematic variables to evaluate performance characteristics of players. Further study may consider the best defense position against the attack of the opponent player.

Dynamics of Heterogeneous Warfare

  • Park, Kyung-Soo
    • Journal of the Korean Statistical Society
    • /
    • v.6 no.1
    • /
    • pp.65-76
    • /
    • 1977
  • The relative importance of single-shot kill probabilities, rates of fire, weapon allocation strategies, and the size of initial force in warfare between two force with heterogeneous multiple weapon systems are considered by examining their effect on a natural measure of effectiveness, the expected number of survivors. Attrition equations are derived via stochastic formulation to represent the mean course of battle having an underlying probability distribution. It is assumed that each side uses indirect area fires. Level of intelligence activities are reflected in the availability of spontaneous information on the current enemy status. Depending on the availability of the information on the current enemy status, each participatory unit may follow 1) a prescribed attack pattern (fraction of the available units assigned to various enemy targets) or 2) an adaptive attack pattern depending on the enemy status at that time. Conditions for possible stalemate are discussed.

  • PDF

A Study on the Application of Cathodic Protection for the Repair of Marine Concrete Structure (해양콘크리트 구조물의 보수를 위한 전기방식의 응용에 대한 고찰)

  • 문한영;김성수;김홍삼
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 1997.04a
    • /
    • pp.229-234
    • /
    • 1997
  • Recently many concrete structures have been deteriorated due to the corrosion of reinforcing steel caused by chloride attack. The chloride attack causes very rapid and serious deterioration. Therefore, It is necessary for highly reliable method to stop the corrosion. Especially, on damaged concrete, it is difficult to stop the progress of steel corrosion that has already occured in concrete. The indirect method of corrosion protection such as eliminating corrosion factors by coating would be hard to be expected for complete stop of corrosion. In this paper, we applied the cathodic protection to chloride attacked marine concrete structures and verified the effect in addition to application of cathodic protection.

  • PDF

Intraventricular Hemorrhage Long after Successful Encephaloduroarterio Synangiosis in Moyamoya Patient

  • Chung, Moon-Young;Park, Young-Seok;Kim, Dong-Seok;Choi, Joong-Uhn
    • Journal of Korean Neurosurgical Society
    • /
    • v.46 no.3
    • /
    • pp.257-260
    • /
    • 2009
  • Intraventricular hemorrhage long after successful encephaloduroarterio synangiosis (EDAS) is very rare. The effect of revascularization surgery for preventing hemorrhagic event of moyamoya disease remains controversial. We report a 17-year-old female with intracerebral hemorrhage and intraventricular hemorrahge 10 years after successful EDAS. Even though cerebral vessels angiography showed good collateral circulations without specific weak points, a cerebral hemorrhage could occur in patient with ischemic type of moyamoya disease long after successful indirect bypass operations. Good collateralization of cerebral angiography or magnetic resonance perfusion image after indirect bypass surgery would ensure against ischemic symptoms, not a hemorrhage. And, thus a life-time follow-up strategy might be necessary even if a good collateral circulation has been established.

A Meta-data Generation Technique for Efficient and Secure Code Reuse Attack Detection with a Consideration on Two Types of Instruction Set (안전하고 효율적인 Code Reuse Attack 탐지를 위한 ARM 프로세서의 두 가지 명령어 세트를 고려한 Meta-data 생성 기술)

  • Heo, Ingeo;Han, Sangjun;Lee, Jinyong;Paek, Yunheung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.443-446
    • /
    • 2014
  • Code reuse attack (CRA)는 기존의 코드 내에서 필요한 코드 조각들 (gadgets)을 모아 indirect branch 명령어들로 잇는 방식으로 공격자가 원하는 악성 프로그램을 구성할 수 있는 강력한 공격 방법이다. 공격자는 자신의 코드를 대상 시스템에 심는 대신 기존의 코드를 이용하기 때문에, 대부분의 범용 운영체제 (OS)가 강제하는 W^X protection 을 무력화할 수 있다. 이러한 CRA 에 대응하기 위하여 다수의 연구들에서 branch 의 trace 를 분석하여 CRA 고유의 특성을 찾아내는 Signature 기반 탐지 기술을 제안하였다. 본 논문에서는 ARM 프로세서 상에서의 CRA 를 대응하기 위한 Signature 기반 탐지 기술을 효율적으로 도울 수 있는 binary 분석 및 meta-data 생성 기술을 제안한다. 특히, 본 논문은 우리의 이전 논문에서 고려 되지 못했던 ARM 의 두 가지 명령어 세트의 특성을 고려하여, 공격자가 어느 명령어 세트를 이용하여 CRA 를 시도하더라도 막아낼 수 있도록 meta-data 를 두 가지 mode 에 대해서 생성하였다. 실험 결과, meta-data 는 본래 바이너리 코드 대비 20.8% 정도의 크기 증가를 일으키는 것으로 나타났다.