• Title/Summary/Keyword: Attack Model

Search Result 990, Processing Time 0.022 seconds

Combat Effectiveness Based Analysis Methodology for Optimal Requirement of Attack Helicopter Using Simulation (시뮬레이션을 이용한 전투효과기반 공격헬기 소요 분석방안)

  • Jung, Chi-Young;Lee, Jae-Yeong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.6
    • /
    • pp.1099-1105
    • /
    • 2010
  • The purpose of this paper is to propose a methodology that can estimate optimal requirement of attack helicopter Korea army will be operating in future. For estimating optimal requirement, attack helicopter's operation concept, performance, battlefield environment and enemy threat are considered. We use a wargame model, AAsim(Army Aviation simulation), as a analytic simulation model which is used to analyze DOTMLPF and operation in army aviation field. In this paper, we conduct battle experiment for anti armored corps operation which reflects attack helicopter's combat effectiveness very well. As a result of simulation, the destructive rate for enemy armored corps per each attack helicopter can be calculated. In this paper, we propose optimal requirement of attack helicopter using that destructive rate for enemy armored corps.

A Probe Prevention Model for Detection of Denial of Service Attack on TCP Protocol (TCP 프로토콜을 사용하는 서비스거부공격 탐지를 위한 침입시도 방지 모델)

  • Lee, Se-Yul;Kim, Yong-Soo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.13 no.4
    • /
    • pp.491-498
    • /
    • 2003
  • The advanced computer network technology enables connectivity of computers through an open network environment. There has been growing numbers of security threat to the networks. Therefore, it requires intrusion detection and prevention technologies. In this paper, we propose a network based intrusion detection model using FCM(Fuzzy Cognitive Maps) that can detect intrusion by the DoS attack detection method adopting the packet analyses. A DoS attack appears in the form of the Probe and Syn Flooding attack which is a typical example. The SPuF(Syn flooding Preventer using Fussy cognitive maps) model captures and analyzes the packet informations to detect Syn flooding attack. Using the result of analysis of decision module, which utilized FCM, the decision module measures the degree of danger of the DoS and trains the response module to deal with attacks. For the performance comparison, the "KDD′99 Competition Data Set" made by MIT Lincoln Labs was used. The result of simulating the "KDD′99 Competition Data Set" in the SPuF model shows that the probe detection rates were over 97 percentages.

Study on the Development of the Maneuvering Mathematical Model Considering the Large Angle Motion of Submarine

  • Jae Hyuk Choi;Sungwook Lee;Jinhyeong Ahn
    • Journal of Ocean Engineering and Technology
    • /
    • v.37 no.3
    • /
    • pp.81-88
    • /
    • 2023
  • Maneuverability is a crucial factor for the safety and success of submarine missions. This paper introduces a mathematical model that considers the large drift and angle of attack motions of submarines. Various computational fluid dynamics (CFD) simulations were performed to adapt Karasuno's fishery vessel maneuvering mathematical model to submarines. The study also presents the procedure for obtaining the physics-based hydrodynamic coefficients proposed by Karasuno through CFD calculations. Based on these coefficients, the reconstructed forces and moments were compared with those obtained from CFD and to the hydrodynamic derivatives expressed by a Taylor expansion. The study also discusses the mathematical maneuvering model that accounts for the large drift angles and angles of attack of submarines. The comparison results showed that the proposed maneuvering mathematical model based on modified Karasno's model could cover a large range of motions, including horizontal motion and vertical motions. In particular, the results show that the physics-based mathematical maneuvering model can represent the forces and moments acting on the submarine hull during large drift and angle of attack motions. The proposed mathematical model based on the Karasuno model could obtain more accurate results than the Taylor third-order approximation-based mathematical model in estimating the hydrodynamic forces acting on submarines during large drift and angle of attack motions.

Membership Inference Attack against Text-to-Image Model Based on Generating Adversarial Prompt Using Textual Inversion (Textual Inversion을 활용한 Adversarial Prompt 생성 기반 Text-to-Image 모델에 대한 멤버십 추론 공격)

  • Yoonju Oh;Sohee Park;Daeseon Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.1111-1123
    • /
    • 2023
  • In recent years, as generative models have developed, research that threatens them has also been actively conducted. We propose a new membership inference attack against text-to-image model. Existing membership inference attacks on Text-to-Image models produced a single image as captions of query images. On the other hand, this paper uses personalized embedding in query images through Textual Inversion. And we propose a membership inference attack that effectively generates multiple images as a method of generating Adversarial Prompt. In addition, the membership inference attack is tested for the first time on the Stable Diffusion model, which is attracting attention among the Text-to-Image models, and achieve an accuracy of up to 1.00.

Two-Phase Security Protection for the Internet of Things Object

  • Suryani, Vera;Sulistyo, Selo;Widyawan, Widyawan
    • Journal of Information Processing Systems
    • /
    • v.14 no.6
    • /
    • pp.1431-1437
    • /
    • 2018
  • Securing objects in the Internet of Things (IoT) is essential. Authentication model is one candidate to secure an object, but it is only limited to handle a specific type of attack such as Sybil attack. The authentication model cannot handle other types of attack such as trust-based attacks. This paper proposed two-phase security protection for objects in IoT. The proposed method combined authentication and statistical models. The results showed that the proposed method could handle other attacks in addition to Sybil attacks, such as bad-mouthing attack, good-mouthing attack, and ballot stuffing attack.

A Study on Network based Intelligent Intrusion Prevention model by using Fuzzy Cognitive Maps on Denial of Service Attack (서비스 거부 공격에서의 퍼지인식도를 이용한 네트워크기반의 지능적 침입 방지 모델에 관한 연구)

  • Lee, Se-Yul;Kim, Yong-Soo;Sim, Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.13 no.2
    • /
    • pp.148-153
    • /
    • 2003
  • A DoS(Denial of Service) attack appears in the form of the intrusion attempt and Syn Flooding attack is a typical example. The Syn Flooding attack takes advantage of the weak point of 3-way handshake between the end-points of TCP which is the connection-oriented transmission service and has the reliability This paper proposes a NIIP(Network based Intelligent Intrusion Prevention) model. This model captures and analyzes the packet informations for the detection of Syn Flooding attack. Using the result of analysis of decision module, the decision module, which utilizes FCM(Fuzzy Cognitive Maps), measures the degree of danger of the DoS and trains the response module to deal with attacks. This model is a network based intelligent intrusion prevention model that reduces or prevents the danger of Syn Flooding attack.

Robustness Analysis of a Novel Model-Based Recommendation Algorithms in Privacy Environment

  • Ihsan Gunes
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.5
    • /
    • pp.1341-1368
    • /
    • 2024
  • The concept of privacy-preserving collaborative filtering (PPCF) has been gaining significant attention. Due to the fact that model-based recommendation methods with privacy are more efficient online, privacy-preserving memory-based scheme should be avoided in favor of model-based recommendation methods with privacy. Several studies in the current literature have examined ant colony clustering algorithms that are based on non-privacy collaborative filtering schemes. Nevertheless, the literature does not contain any studies that consider privacy in the context of ant colony clustering-based CF schema. This study employed the ant colony clustering model-based PPCF scheme. Attacks like shilling or profile injection could potentially be successful against privacy-preserving model-based collaborative filtering techniques. Afterwards, the scheme's robustness was assessed by conducting a shilling attack using six different attack models. We utilize masked data-based profile injection attacks against a privacy-preserving ant colony clustering-based prediction algorithm. Subsequently, we conduct extensive experiments utilizing authentic data to assess its robustness against profile injection attacks. In addition, we evaluate the resilience of the ant colony clustering model-based PPCF against shilling attacks by comparing it to established PPCF memory and model-based prediction techniques. The empirical findings indicate that push attack models exerted a substantial influence on the predictions, whereas nuke attack models demonstrated limited efficacy.

A Study on the Tank-Attack Helicopter Duel

  • 최석철
    • Journal of the military operations research society of Korea
    • /
    • v.23 no.1
    • /
    • pp.25-46
    • /
    • 1997
  • In this paper, we consider a tow-person zero-sum game in which an attack helicopter with a missile wishes to destroy a tank. The tank has much small-caliber ammunition for protection itself from the attack helicopter. And the attack helicopter possesses a missile for attacking the tank. We develop models for the behavior of the attack helicopter, in terms of missile launch time, and of the tank, in terms of ammunition firing rate, in several situations. In particular, we examine the Weiss-Gillman model.

  • PDF

Network Attack and Defense Game Theory Based on Bayes-Nash Equilibrium

  • Liu, Liang;Huang, Cheng;Fang, Yong;Wang, Zhenxue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.10
    • /
    • pp.5260-5275
    • /
    • 2019
  • In the process of constructing the traditional offensive and defensive game theory model, these are some shortages for considering the dynamic change of security risk problem. By analysing the critical indicators of the incomplete information game theory model, incomplete information attack and defense game theory model and the mathematical engineering method for solving Bayes-Nash equilibrium, the risk-averse income function for information assets is summarized as the problem of maximising the return of the equilibrium point. To obtain the functional relationship between the optimal strategy combination of the offense and defense and the information asset security probability and risk probability. At the same time, the offensive and defensive examples are used to visually analyse and demonstrate the incomplete information game and the Harsanyi conversion method. First, the incomplete information game and the Harsanyi conversion problem is discussed through the attack and defense examples and using the game tree. Then the strategy expression of incomplete information static game and the engineering mathematics method of Bayes-Nash equilibrium are given. After that, it focuses on the offensive and defensive game problem of unsafe information network based on risk aversion. The problem of attack and defense is obtained by the issue of maximizing utility, and then the Bayes-Nash equilibrium of offense and defense game is carried out around the security risk of assets. Finally, the application model in network security penetration and defense is analyzed by designing a simulation example of attack and defense penetration. The analysis results show that the constructed income function model is feasible and practical.

Unsteady Aerodynamic characteristics at High Angle of Attack around Two Dimensional NACA0012 Airfoil (고 받음각 2차원 NACA0012 에어포일 주위의 비정상 공기역학적 특성)

  • Yoo, Jae-Kyeong;Kim, Jae-Soo
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2011.05a
    • /
    • pp.414-419
    • /
    • 2011
  • Missile am fighter aircraft have been challenged by low restoring nose-down pitching moment at high angle of attach. The consequence of weak nose-down pitching moment can be resulting in a deep stall condition. Especially, the pressure oscillation has a huge effect on noise generation, structure damage, aerodynamic performance and safety, because the flow has strong unsteadiness at high angle of attack. In this paper, the unsteady aerodynamics coefficients were analyzed at high angle of attack up to 60 degrees around two dimensional NACA0012 airfoil. The two dimensional unsteady compressible Navier-Stokes equation with a LES turbulent model was calculated by OHOC (Optimized High-Order Compact) scheme. The flow conditions are Mach number of 0.3 and Reynolds number of $10^5$. The lift, drag, pressure distribution, etc. are analyzed according to the angle of attack. The results at a low angle of attack are compared with other results before a stall condition. From a certain high angle of attack, the strong vortex formed by the leading edge are flowing downstream as like Karman vortex around a circular cylinder. Unsteady velocity field, periodic vortex shedding, the unsteady pressure distribution on the airfoil surface, and the acoustic fields are analyzed. The effects of these unsteady characteristics in the aerodynamic coefficients are analyzed.

  • PDF