• Title/Summary/Keyword: Attack Modeling

Search Result 152, Processing Time 0.026 seconds

Analysis of the Interaction Between Side Jet and Supersonic Free Stream Using K-factor (상호 작용 계수를 이용한 측추력 제트와 초음속 자유류 상호 작용에 관한 연구)

  • Kim, Min-Gyu;Lee, Kwang-Seop
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.15 no.1
    • /
    • pp.101-110
    • /
    • 2012
  • The side jet effects between jet flow and free-stream on a missile body were investigated by experimentally and numerically for modeling aerodynamic coefficients in pitch plane. K-factors for normal force and pitching moment were introduced to estimate the side jet effects. The main parameters of the jet interaction phenomena were angle of attack, jet pressure ratio, Mach number and jet bank angle. The K-factors for normal force coefficient and pitching moment coefficients in pitch plane were analysed.

Quasi Steady Stall Modelling of Aircraft Using Least-Square Method

  • Verma, Hari Om;Peyada, N.K.
    • International Journal of Aerospace System Engineering
    • /
    • v.7 no.1
    • /
    • pp.21-27
    • /
    • 2020
  • Quasi steady stall is a phenomenon to characterize the aerodynamic behavior of aircraft at high angle of attack region. Generally, it is exercised from a steady state level flight to stall and its recovery to the initial flight in a calm weather. For a theoretical study, such maneuver is demonstrated in the form of aerodynamic model which consists of aircraft's stability and control derivatives. The current research paper is focused on the appropriate selection of aerodynamic model for the maneuver and estimation of the unknown model coefficients using least-square method. The statistical accuracy of the estimated parameters is presented in terms of standard deviations. Finally, the validation has been presented by comparing the measured data to the simulated data from different models.

Modeling and simulation of CNP-applied network security models with application of fuzzy rule-based system (퍼지를 적용한 계약망 프로토콜 기반의 네트워크 보안 모델의 설계 및 시뮬레이션)

  • Lee Jin-ah;Cho Tae-ho
    • Journal of the Korea Society for Simulation
    • /
    • v.14 no.1
    • /
    • pp.9-18
    • /
    • 2005
  • Attempts to attack hosts in the network have become diverse, due to crackers developments of new creative attacking methods. Under these circumstances the role of intrusion detection system as a security system component gets considerably importance. Therefore, in this paper, we have suggested multiple intrusion detection system based on the contract net protocol which provides the communication among multiple agents. In this architecture, fuzzy rule based system has been applied for agent selection among agents competing for being activated. The simulation models are designed and implemented based on DEVS formalism which is theoretically well grounded means of expressing discrete event simulation models.

  • PDF

Attacker and Linux based Host Modeling For Cyber Attack Simulation (가상공격 시뮬레이션을 위한 공격자 및 리눅스 기반 호스트 모델링)

  • 정정례;이장세;박종서;지승도
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2002.11a
    • /
    • pp.29-37
    • /
    • 2002
  • 본 논문은 가상 공격 시뮬레이션을 위한 공격자 및 리눅스 기반 호스트에 대한 모델링 방법의 제안을 주목적으로 한다. 최근, Amoroso는 보안 메커니즘 중심의 침입 모델을 제안하였으나, 시뮬레이션 접근이 분명치 않은 단점이 있다. 또한, Cohen은 원인-결과 모델을 이용하여 사이버 공격과 방어를 표현한 바 있으나, 개념적 단계의 추상화 모델링으로 인해 실제 적용이 어려운 실정이다. 이를 해결하고자 하는 시도로 항공대 지능시스템 연구실에서 SES/MB 프레임워크를 이용한 네트워크 보안 모델링 및 시뮬레이션 방법을 제안한 바 있으나, 공격에 따른 호스트의 복잡한 변화를 표현하기에는 부족하다. 이러한 문제점들을 해결하고자, 본 논문에서는 시스템의 구조를 표현하는 기존 SES에 합성용 규칙기반 전문가 시스템 방법론을 통합한 Rule-Based SES를 적용하여 공격자를 모델링하고, DEVS를 기반으로 하는 네트워크 구성원을 모델링한다. 제안된 모델링 방법의 타당성을 검증하기 위해 본 논문에서는 샘플 네트워크에 대한 사례연구를 수행한다.

  • PDF

Performance and flow field assessment of settling tanks using experimental and CFD modeling

  • Nouri, Alireza Zamani;Heydari, Mohammad Mehdi
    • Membrane and Water Treatment
    • /
    • v.8 no.5
    • /
    • pp.423-435
    • /
    • 2017
  • Settling Basins are one of the most important and popular methods for removal of suspended sediments irrigation and drainage networks or power canals taking off from an alluvial river and wastewater treatment plant. Improving the performance and so increasing sediment removal efficiency of settling basins by an alternative method is necessary. In the present work, the effect of baffle and its angle of attack with the flow (${\theta}$) on the sediment removal efficiency is investigated by conducting a series of experiments on a straight canal with 8 m length, 0.3 m width and 0.5 m height and 3 m length of basin equipped with an adjustable glass baffle. A numerical analysis has been carried out using ANSYS Fluent 3D software (a general purpose computational fluid dynamics simulation tool) for three Froude numbers from the experiments. The numerical and experimental results were found to match reasonably well.

A Proposal of Analysis Modeling on the Transfer and Adhesion of Incoming Salt to RC Structure (비래염분 전송 및 RC조 구조물 부착과정에 관한 분석 모델링 제안)

  • Cho, Gyu-Hwan;Kim, Woo-Jae;Ahn, Jae-Cheol;Park, Dong-Cheon
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2012.05a
    • /
    • pp.91-92
    • /
    • 2012
  • RC structure which is located at shoreline has more serious damages compared with inland structure, because it is directly exposed to chlorine ion which is called incoming salt. In the transmission of incoming salt, differences in transmitted volume of incoming salts could occur according to the influences of local shoreline topography which includes surrounding weather conditions, types of building placements, obstacles of wind tunnel etc. And therefore, for the application of boundary conditions for durable offshore structure design against the salt attack, comparative analysis through wind tunnel test and fluid value simulation are executed in order to investigate the moving and adhesion process of incoming salt to offshore structure.

  • PDF

Performance Evaluation of Wavelet-based ECG Compression Algorithms over CDMA Networks (CDMA 네트워크에서의 ECG 압축 알고리즘의 성능 평가)

  • 김병수;유선국
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.53 no.9
    • /
    • pp.663-669
    • /
    • 2004
  • The mobile tole-cardiology system is the new research area that support an ubiquitous health care based on mobile telecommunication networks. Although there are many researches presenting the modeling concepts of a GSM-based mobile telemedical system, practical application needs to be considered both compression performance and error corruption in the mobile environment. This paper evaluates three wavelet ECG compression algorithms over CDMA networks. The three selected methods are Rajoub using EPE thresholding, Embedded Zerotree Wavelet(EZW) and Wavelet transform Higher Order Statistics Coding(WHOSC) with linear prediction. All methodologies protected more significant information using Forward Error Correction coding and measured not only compression performance in noise-free but also error robustness and delay profile in CDMA environment. In addition, from the field test we analyzed the PRD for movement speed and the features of CDMA 1X. The test results show that Rajoub has low robustness over high error attack and EZW contributes to more efficient exploitation in variable bandwidth and high error. WHOSC has high robustness in overall BER but loses performance about particular abnormal ECG.

Simulation-based Network Vulnerability Analysis Using the SIMVA (SIMVA를 이용한 시뮬레이션 기반의 네트워크 취약성 분석)

  • You Yong-Jun;Lee Jang-Se;Chi Sung-Do
    • Journal of the Korea Society for Simulation
    • /
    • v.13 no.3
    • /
    • pp.21-29
    • /
    • 2004
  • The major objective of this paper is to analyze network vulnerabilities using the SIMVA (SIMualtion-based Vulnerability Analyzer). SIMVA is capable of monitor network status and analyze vulnerabilities automatically. To do this, we have employed the advanced modeling and simulation concepts such as SES/MB (System Entity Structure / Model Base) framework, DEVS (Discrete Event System Specification) formalism, and experimental frame for developing network security models and simulation-based analysis of vulnerability. SIMVA can analyze static vulnerability as well as dynamic vulnerability consistently and quantitatively. In this paper, we verified and tested the capability of application of SIMVA by slammer worm attack scenario.

  • PDF

A study of Modeling and Simulation for Analyzing wireless Attack with drone (드론을 이용한 무선네트워크 공격 시나리오와 대응방안)

  • Kim, Seonkwang;Moon, Eunjung;Kim, Cho-Yeong;An, Hayoung;Kim, s;Han, Cheol-Gyu
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.186-188
    • /
    • 2017
  • 우리는 모든 것이 연결되는 4차 산업혁명 시대에 살고 있다. 그와 마찬가지로 보안 위협들도 새롭게 연결된 형태로 나타나고 있다. 본 논문에서는 드론과 정보통신기술이 융합된 형태의 공격 방법을 제시하고 그에 대한 대응방안을 제시한다.

High Performance control of Linear Hybrid Stepping Motor with Force Ripple Compensator (추력 리플을 보상하는 선형 하이브리드 스테핑 전동기의 고성능 제어)

  • Hwang, Tai-Sik;Seok, Jul-Ki
    • Proceedings of the KIPE Conference
    • /
    • 2005.07a
    • /
    • pp.240-242
    • /
    • 2005
  • The linear hybrid stepping motors (LHSM) has been widely used due to its simple structure and low cost control. Despite of its attractive features, the conventional LHSM has the multiples of 4th times harmonic reluctance force from excitation current and cogging force from space harmonic of permeance. This paper propose a new LHSM, which the mechanical and electrical phase difference are 45$^{\circ}$. The proposed motor shows a unique ability to deliver low detent force and we propose a closed-loop control scheme to attack the ripple force for high performance applications. An analytical and experimental comparison between conventional and proposed LHSM is evaluated to confirm the effectiveness of the proposed modeling and control scheme.

  • PDF