• Title/Summary/Keyword: Attack Modeling

Search Result 152, Processing Time 0.027 seconds

An Efficient Searching of Vulnerabilities Based on a DNS System Model using Ptolemy (톨레미를 이용한 DNS 시스템 모델 기반의 효율적 취약성 탐지)

  • Shin, Seung-Hun;Park, Seung-Kyu;Jung, Ki-Hyun
    • The KIPS Transactions:PartD
    • /
    • v.16D no.6
    • /
    • pp.921-926
    • /
    • 2009
  • Vulnerabilities in software can result in many social and economic problems once it has already been deployed and put to use. Thus, the vulnerabilities should be seriously taken into consideration from the beginning step of software development. A modeling and simulation method for software can be adopted as a testing tool for establishing vulnerability inspection strategies. For verification of usability of this strategy, in this paper, we modeled the behavior of a DNS system using Ptolemy and the simulation was performed. The result shows that a well-known vulnerability of DNS server could be effectively found, which confirms that the modeling and simulation can be used for vulnerability testing.

A Survey Study on Standard Security Models in Wireless Sensor Networks

  • Lee, Sang Ho
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.4
    • /
    • pp.31-36
    • /
    • 2014
  • Recent advancement in Wireless Sensor Networks (WSNs) has paved the way for WSNs to enable in various environments in monitoring temperature, motion, sound, and vibration. These applications often include the detection of sensitive information from enemy movements in hostile areas or in locations of personnel in buildings. Due to characteristics of WSNs and dealing with sensitive information, wireless sensor nodes tend to be exposed to the enemy or in a hazard area, and security is a major concern in WSNs. Because WSNs pose unique challenges, traditional security techniques used in conventional networks cannot be applied directly, many researchers have developed various security protocols to fit into WSNs. To develop countermeasures of various attacks in WSNs, descriptions and analysis of current security attacks in the network layers must be developed by using a standard notation. However, there is no research paper describing and analyzing security models in WSNs by using a standard notation such as The Unified Modeling Language (UML). Using the UML helps security developers to understand security attacks and design secure WSNs. In this research, we provide standard models for security attacks by UML Sequence Diagrams to describe and analyze possible attacks in the three network layers.

  • PDF

A Study on Analysis Technique for Chloride Penetration in Cracked Concrete under Combined Deterioration (복합열화에 노출된 균열부 콘크리트 내의 염화물 침투 해석 기법에 대한 연구)

  • Kwon, Seung-Jun;Song, Ha-Won;Byun, Keun-Joo
    • Journal of the Korea Concrete Institute
    • /
    • v.19 no.3
    • /
    • pp.359-366
    • /
    • 2007
  • Recently, analysis researches on durability are focused on chloride attack and carbonation due to increased social and engineering significance. Generally, chloride penetration and carbonation occur simultaneously except for in submerged condition and chloride behavior in carbonated concrete is evaluated to be different from that in normal concrete. Furthermore, if unavoidable crack occurs in concrete, it influences not only single attack but also coupled deterioration more severely. This is a study on analysis technique with system dynamics for chloride penetration in concrete structures exposed to coupled chloride attack and carbonation through chloride diffusion, permeation, and carbonation reaction. For the purpose, a modeling for chloride behavior considering diffusion and permeation is performed through previous models for early-aged concrete such as MCHHM (multi component hydration heat model) and MPSFM (micro pore structure formation). Then model for combined deterioration is developed considering changed characteristics such as pore distribution, saturation and dissociation of bound chloride content under carbonation. The developed model is verified through comparison with previous experimental data. Additionally, simulation for combined deterioration in cracked concrete is carried out through utilizing previously developed models for chloride penetration and carbonation in cracked concrete. From the simulated results, CCTZ (chloride-carbonation transition zone) for evaluating combined deterioration is proposed. It is numerically verified that concrete with slag has better resistance to combined deterioration than concrete with OPC in sound and cracked concrete.

Modeling and Implementation of IDS for Security System simulation using SSFNet (SSFNet 환경에서 보안시스템 시뮬레이션을 위한 IDS 모델링 및 구현)

  • Kim, Yong-Tak;Kwon, Oh-Jun;Seo, Dong-Il;Kim, Tai-Suk
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.1
    • /
    • pp.87-95
    • /
    • 2006
  • We need to check into when a security system is newly developed, we against cyber attack which is expected in real network. However it is impossible to check it under the environment of a large-scale distributive network. So it is need to simulate it under the virtual network environment. SSFNet is a event-driven simulator which can be represent a large-scale network. Unfortunately, it doesn't have the module to simulate security functions. In this paper, we added the IDS module to SSFNet. We implement the IDS module by modeling a key functions of Snort. In addition, we developed some useful functions using Java language which can manipulate easily a packet for network simulation. Finally, we performed the simulation to verify the function if our developed IDS and Packets Manipulation. The simulation shows that our expanded SSFNet can be used to further large-scale security system simulator.

  • PDF

Modeling and Simulation of Optimal Path Considering Battlefield-situation in the War-game Simulation (워게임 시뮬레이션에서 전장상황을 고려한 최적경로 모델링 및 시뮬레이션)

  • Lee, Sung-Young;Jang, Sung-Ho;Lee, Jong-Sik
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.3
    • /
    • pp.27-35
    • /
    • 2010
  • War-games using C4I systems have been used to improve the command ability of commanders and the fighting power of combat forces. During a war-game simulation, a commander makes a plan for the movement of a combat force and issues orders to the combat force according to the plan. If it is possible to minimize damages from the artillery of enemy forces and take the advantage position where is effective for attack/defense, we can hold a dominant position of the battlefield. Therefore, this papers proposes a genetic algorithm-based optimal path searching method. The proposed method creates an optimal path of a combat force by taking into consideration dangerous conditions of the battlefield in which the combat force is. This paper also shows the process of creating an optimal path by using a discrete event specification modeling and simulation method.

Modeling and Analysis of Counterfire Warfare for Tactical Operation and Acquisition (전술적 운용과 무기체계 획득을 위한 대화력전 모델링과 분석)

  • Lim, Jong-Won;Lee, Tae-Eog;Kim, Dae-Kyu
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.16 no.2
    • /
    • pp.175-184
    • /
    • 2013
  • In counterfire warfare, it is important to detect and attack enemy targets faster than the enemy using sensing and shooting assets. The artillery assets of North Korea are mostly mine artillery and much more than those of South Korea. To cope with sudden fire attacks from North Korea, we need to improve capability of our artillery. In this paper, we discuss issues and problems of our counterfire warfare systems and processes to overcome numerical inferiority and defend against the mine artillery. We develop a simulation model for counterfire warfare and analyze effectiveness of our counterfire weapon systems and operations based on various counterfire warfare scenarios. Finally, we propose methods of tactical operations and acquisition strategies of counterfire weapon systems, including detaction, firing, and protection assets.

Nonlinear Adaptive Flight Control Using Neural Networks and Backstepping (신경회로망 및 Backstepping 기법을 이용한 비선형 적응 비행제어)

  • Lee, Taeyoung;Kim, Youdan
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.6 no.12
    • /
    • pp.1070-1078
    • /
    • 2000
  • A nonlinear adaptive flight control system is proposed using a backstepping controller with neural network controller. The backstepping controller is used to stabilize all state variables simultaneously without the two-timescale assumption that separates the fast dynamics, involving the angular rates of the aircraft, from the slow dynamics which includes angle of attack, sideslip angle, and bank angle. It is assumed that the aerodynamic coefficients include uncertainty, and an adaptive controller based on neural networks is used to compensate for the effect of the aerodynamic modeling error. It is shown by the Lyapunov stability theorem that the tracking errors and the weights of neural networks exponentially converge to a compact set. Finally, nonlinear six-degree-of-freedom simulation results for an F-16 aircraft model are presented to demonstrate the effectiveness of the proposed control law.

  • PDF

Enhanced Classical Tafel Diagram Model for Corrosion of Steel in Chloride Contaminated Concrete and the Experimental Non-Linear Effect of Temperature

  • Hussain, Raja Rizwan
    • International Journal of Concrete Structures and Materials
    • /
    • v.4 no.2
    • /
    • pp.71-75
    • /
    • 2010
  • The chloride ion attack on the passive iron oxide layer of reinforcement steel embedded in concrete under variable temperature environment is influenced by several parameters and some of them still need to be further investigated in more detail. Different school of thoughts exist between past researchers and the data is limited in the high temperature and high chloride concentration range which is necessary with regards to setting boundary conditions for enhancement of tafel diagram model presented in this research. The objective of this paper is to investigate the detrimental coupled effects of chloride and temperature on corrosion of reinforced concrete structures in the high range by incorporating classical Tafel diagram chloride induced corrosion model and laboratory controlled experimental non-linear effect of temperature on corrosion of rebar embedded in concrete.

Real-time Algorithms to Minimize the Threatening Probability in a Fire Scheduling Problem for Unplanned Artillery Attack Operation (비계획 사격상황에서 적 위협 최소화를 위한 실시간 사격순서 결정 연구)

  • Cha, Young-Ho;Bang, June-Young;Shim, Sangoh
    • Korean Management Science Review
    • /
    • v.34 no.1
    • /
    • pp.47-56
    • /
    • 2017
  • We focus on the Real time Fire Scheduling Problem (RFSP), the problem of determining the sequence of targets to be fired at, for the objective of minimizing threatening probability to achieve tactical goals. In this paper, we assume that there are m available weapons to fire at n targets (> m) and the weapons are already allocated to targets. One weapon or multiple weapons can fire at one target and these fire operations should start simultaneously while the finish time of them may be different. We suggest mathematical modeling for RFSP and several heuristic algorithms. Computational experiments are performed on randomly generated test problems and results show that the suggested algorithms outperform the firing method which is generally adopted in the field artillery.

Determination of Required Cover Depth of Concrete Exposed to Simultaneous Attack of Carbonation and Chloride Ion (중성화와 염소이온의 동시 복합환경에 노출된 콘크리트의 적정 피복두께의 결정)

  • 이창수;윤인석;이규동
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2003.11a
    • /
    • pp.90-93
    • /
    • 2003
  • The most common deteriorating processes of concrete structures in the world-wide are carbonation and chloride ion. In this paper, chloride profiles of carbonated concrete is predicted to considering two layer composite model, which is based on Fick's 2nd law. From the experimental result on combined deterioration of chloride and carbonation, it was examined that high chloride concentration was built up to 3-5㎜ over depth from carbonation depth. The analytical modeling of chloride diffusion, which was based on the Fick's 2nd law of diffusion, was suggested to depict the relative influence of the carbonation depth.

  • PDF