• 제목/요약/키워드: Attack

검색결과 6,391건 처리시간 0.033초

받음각이 있는 3차원 초음속 흡입구 주위의 유동진동 해석 (Numerical Analysis of Flow Characteristics around 3D Supersonic Inlet at Various Angle of Attack)

  • 김정민;홍우람;김종임
    • 한국전산유체공학회:학술대회논문집
    • /
    • 한국전산유체공학회 2011년 춘계학술대회논문집
    • /
    • pp.218-224
    • /
    • 2011
  • A supersonic inlet at angle of attack has anti-symmetric pressure distribution, and it can make flow instability and structural problem. In this study, numerical analysis of three-dimensional inviscid flow was conducted under various throttle ratio and angle of attack conditions. Throttle ratio was defined as the ratio of the exit area to the smallest cross section area at inlet, and the ratio is controlled from 0 to 2.42. At various angle of attack, the characteristics of steady and unsteady flow around supersonic inlet is observed under different throttling ratios. From these results, pressure recovery curves and pressure history curves were plotted by post processing. Using pressure history data, FFT analysis is also carried out. Through these processes, it shows the tendency of pressure distribution anti-symmetricity and changing dominant frequency as increasing angle of attack.

  • PDF

지연된 등록 취소를 이용한 SIP 등록 취소 공격 방어 (Protecting Deregistration Attack in SIP Using Delayed Deregistration)

  • 권경희
    • 한국콘텐츠학회논문지
    • /
    • 제15권12호
    • /
    • pp.18-23
    • /
    • 2015
  • SIP 등록 취소 공격은 공격자가 정상적 SIP UA의 REGISTER 메시지를 간단히 위장함으로써 야기되지만, 그 영향력은 매우 크다. 본 논문에서는 등록 서버가 등록 취소 REGISTER 메시지를 수신하는 즉시 위치 서버로부터 바인딩을 제거함으로써 등록을 취소하는 대신에, 일정 기간을 지연한 후에 취소하게 함으로서 등록 취소 공격을 식별하고 방어하게 해주는 새로운 방법을 제안한다. 따라서 본 논문에서 제안한 이 기법은 추가적인 암호화나 인증 과정들의 오버헤드 없이 SIP 등록 취소 공격에 대응하는 안전한 SIP 환경을 구축할 수 있게 한다.

MANET에서 규칙을 기반으로 한 계층형 침입 탐지에 관한 연구 (The Study of Hierarchical Intrusion Detection Based on Rules for MANET)

  • 정혜원
    • 디지털산업정보학회논문지
    • /
    • 제6권4호
    • /
    • pp.153-160
    • /
    • 2010
  • MANET composed mobile nodes without central concentration control like base station communicate through multi-hop route among nodes. Accordingly, it is hard to maintain stability of network because topology of network change at any time owing to movement of mobile nodes. MANET has security problems because of node mobility and needs intrusion detection system that can detect attack of malicious nodes. Therefore, system is protected from malicious attack of intruder in this environment and it has to correspond to attack immediately. In this paper, we propose intrusion detection system based on rules in order to more accurate intrusion detection. Cluster head perform role of monitor node to raise monitor efficiency of packet. In order to evaluate performance of proposed method, we used jamming attack, selective forwarding attack, repetition attack.

Stateful Virtual Proxy for SIP Message Flooding Attack Detection

  • Yun, Ha-Na;Hong, Sung-Chan;Lee, Hyung-Woo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제3권3호
    • /
    • pp.251-265
    • /
    • 2009
  • VoIP service is the transmission of voice data using SIP protocol on an IP-based network. The SIP protocol has many advantages, such as providing IP-based voice communication and multimedia service with low communication cost. Therefore, the SIP protocol disseminated quickly. However, SIP protocol exposes new forms of vulnerabilities to malicious attacks, such as message flooding attack. It also incurs threats from many existing vulnerabilities as occurs for IP-based protocol. In this paper, we propose a new virtual proxy to cooperate with the existing Proxy Server to provide state monitoring and detect SIP message flooding attack with IP/MAC authentication. Based on a proposed virtual proxy, the proposed system enhances SIP attack detection performance with minimal latency of SIP packet transmission.

SIP 등록취소 공격에 대한 단순한 방어 기법 (Simple Protection Method against Deregistration Attack in SIP)

  • 권경희
    • 반도체디스플레이기술학회지
    • /
    • 제15권4호
    • /
    • pp.92-96
    • /
    • 2016
  • Although deregistration attack is caused by simple spoofing the REGISTER message of a legitimate SIP UA, its impact is serious. The root cause of this attack is based on the fact that RFC 3261 allows the UA to remove the binding from the Location Server. In this paper, we propose a simple protection method to allow Registrar or Location Server just to ignore deregistration messages. We also show that this method works well by analyzing the process of registration and deregistration. Without any additional overhead such as an encryption or authentication, this method is able to establish a secure SIP environment efficiently protecting against the deregistration attack.

분산처리 공격에 대한 방어방법 연구 (Distributed Attack Analysis and Countermeasure)

  • 신미예
    • 중소기업융합학회논문지
    • /
    • 제5권1호
    • /
    • pp.19-23
    • /
    • 2015
  • 분산 서비스 거부 공격은 공격자가 한 지점에서 서비스 공격을 수행하는 형태를 넘어서 광범위한 네트워크를 이용하여서 다수의 공격 지점에서 한 곳을 집중적이게 공격을 하는 형태의 서비스 거부 공격이다. 특정 서버나 클라이언트에게 많은 접속 시도를 만들어서 정상적인 서비스를 사용하지 못하게 하는 방법 등등의 공격이 있다. DDoS 공격의 대응 방법에는 관리적 측면과 기술적 측면의 대응 이 두 가지를 제안 하였다.

  • PDF

SP F-함수를 갖는 4-브랜치 GFN-2 구조에 대한 기지키 공격 (Known-Key Attacks on 4-Branch GFN-2 Structures with SP F-Functions)

  • 홍득조
    • 정보보호학회논문지
    • /
    • 제30권5호
    • /
    • pp.795-803
    • /
    • 2020
  • 본 논문에서는 SP 구조의 F-함수를 가진 4-브랜치 GFN-2 구조에 대한 기지키 구별 공격(Known-Key Distinguishing Attack) 및 부분 충돌 공격(Partial-Collision Attack)을 연구한다. 첫 번째로, 이 구조에 대해 기지키 구별 공격이 15 라운드까지 가능함이 밝혀진다. 두 번째로, 마지막 라운드에 셔플 연산이 있는 경우, 부분 충돌 공격이 14 라운드까지 가능함이 밝혀진다. 마지막으로, 마지막 라운드에 셔플 연산이 없는 경우, 부분 충돌 공격이 15 라운드까지 가능함이 밝혀진다.

트래픽 제어 기법을 이용한 라우터에서의 서비스 거부 공격 방어 기법 (Methods of Defense DoS Attack by Traffic Metering and Controlling Technique in a Router)

  • 이호균;김정녀
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2003년도 추계학술발표논문집 (하)
    • /
    • pp.1985-1988
    • /
    • 2003
  • As the Distributed Denial of Service attack technique is getting smarter, defense method have been developed by various means. Existing defense method baseds on detection technique is not effective to DDoS attack. Because it depend on rule set that is used to detect attack and DDoS attack pattern has become very similar to real traffic pattern. So the rule set is not efficient method to find DDoS attack. To solve this problem, DDoS defense mechanism based on QoS technique has been suggested. In this paper, we summarize existing DDoS defense mechanism and focus on method based on QoS, and introduce a new DDoS defense framework.

  • PDF

앞전에서의 팽창파를 이용한 양항비의 개선에 대한 연구

  • 윤영준
    • EDISON SW 활용 경진대회 논문집
    • /
    • 제6회(2016년)
    • /
    • pp.19-22
    • /
    • 2016
  • Leading edge thrust is generally caused by passing air flow from lower to upper surface and it is required to have sufficient angle of attack for notable leading edge thrust. To produce leading edge thrust at low angle of attack, utilizing expansion wave accompanying low pressure is able to be a solution. Fore structure changes the direction of flow, and this flow passes the projected edge. As a result, from a perspective of the edge, it is able to have high angle of attack, and artificial expansion wave is generated. This concept shows 9.48% increase of L/D in inviscid flow, at Mach number 1.3 and angle of attack $1^{\circ}$ in maximum, and this model shows the 3.98% of increasement at angle of attack $2^{\circ}$. Although advantage of the artificial expansion wave decreased as angle of attack increase, it shows the possibility of aerodynamical improvement with artificial expansion wave.

  • PDF

Security Analysis of Partially Hidden Password Systems Resistant to Shoulder Surfing Attacks

  • Seong, Jin-Taek
    • 한국정보전자통신기술학회논문지
    • /
    • 제13권1호
    • /
    • pp.17-26
    • /
    • 2020
  • As more users use mobile devices, shoulder surfing attacks have emerged as an important issue in security. According to research report, in fact, the result showed that about 30% of smartphone users are hit by shoulder surfing attacks. To this end, in this paper, we consider a shoulder surfing attack and propose a partially hidden password system to resistant to its attack. In order to help readers understand, we describe the proposed password system in more detail using one simple example. The core idea behind the proposed system is to place the user's password randomly in the specified grid instead of entering a password directly. As a result, even if an attacker makes a shoulder surfing attack to observe the password, the user can hide the preset password and defend against the attack. We also show how the security of the password system proposed in this paper is improved. In addition, even if there are consecutive shoulder surfing attacks, the security of the proposed password system is robust.