• 제목/요약/키워드: Attack Role

검색결과 188건 처리시간 0.019초

Role Based Petri Net : 공격 시나리오의 효율적 설계를 위한 역할 기반 표현 모델 (Role Based Petri-Net : Role Based Expression Model for an Efficient Design of Attack Scenarios)

  • 박준식;조재익;문종섭
    • 정보보호학회논문지
    • /
    • 제20권1호
    • /
    • pp.123-128
    • /
    • 2010
  • 공격 시나리오의 그래프 표현은 서버의 취약성 분석 및 공격의 방어를 위한 설계에 필수적인 방법이다. 이를 위해 다양한 요구사항 분석 모델이 이용되고 있으나, 복잡한 시나리오간의 결합을 표현할 수 있는 모델은 제한적이다. 본 논문에서 제안하는 역할 기반 페트리 넷(Role Based Petri Net)은 동시성과 시각적인 장점을 가진 페트리 넷을 역할 기반으로 구성하여 효과적 표현 모델을 제공하고 알려지지 않은 공격에 대한 시나리오를 효율적으로 표현할 수 있다.

긴급제언: 해킹대응과 기술사의 역할 (Professional Engineer's Role to Respond to Haeker Attacks)

  • 권영관
    • 기술사
    • /
    • 제44권5호
    • /
    • pp.26-30
    • /
    • 2011
  • The hacking attacks as a DDoS attack on a telecommunications network has depleted the network resources. When hacking attack occurs a user can not access to the network and can not use the telecommunication services. Professional Engineers with expertise and experience in the field of Information and communication could play an important role to respond to the hacking attacks. Professional Engineers will build the information and communication network system for the hacking countermeasures.

  • PDF

황산염 침식과 성능저하 모드 (Sulfate Attack and Its Deterioration Modes)

  • 이승태;문한영;김성수;이창수;김종필
    • 한국콘크리트학회:학술대회논문집
    • /
    • 한국콘크리트학회 2006년도 춘계 학술발표회 논문집(II)
    • /
    • pp.209-212
    • /
    • 2006
  • Until now, sulfate attack is not completely understood. The purpose of this study is to provide a fundamental data to understand deterioration mechanism by sulfate attack. Chemical processes for products formed by sulfate attack were explained in this study. ASTM C1012 test and microstructural observations such as XRD and BSE analysis were carried out to manifest behavior and role of the products formed during sulfate attack. Regarding the dominant causes of sulfate attack, the main deterioration modes could be divided into 3 types; (1) expansive type, (2) onion-peeling type, and (3) acidic type.

  • PDF

MANET에서 규칙을 기반으로 한 계층형 침입 탐지에 관한 연구 (The Study of Hierarchical Intrusion Detection Based on Rules for MANET)

  • 정혜원
    • 디지털산업정보학회논문지
    • /
    • 제6권4호
    • /
    • pp.153-160
    • /
    • 2010
  • MANET composed mobile nodes without central concentration control like base station communicate through multi-hop route among nodes. Accordingly, it is hard to maintain stability of network because topology of network change at any time owing to movement of mobile nodes. MANET has security problems because of node mobility and needs intrusion detection system that can detect attack of malicious nodes. Therefore, system is protected from malicious attack of intruder in this environment and it has to correspond to attack immediately. In this paper, we propose intrusion detection system based on rules in order to more accurate intrusion detection. Cluster head perform role of monitor node to raise monitor efficiency of packet. In order to evaluate performance of proposed method, we used jamming attack, selective forwarding attack, repetition attack.

MMORPG 히트판정 모델에 관한 연구 - 트라비아 온라인을 중심으로 - (Study on Hit Judgement Model of MMORPG - in case of Travia Online -)

  • 손형률
    • 한국콘텐츠학회논문지
    • /
    • 제5권6호
    • /
    • pp.172-177
    • /
    • 2005
  • 히트 판정은 전투방식의 MMORPG 게임시스템의 설계에 필수적이며 다양한 형태의 게임시스템의 근간을 이룬다. 히트 판정의 모델은 최소, 최대, 치명 공격력의 공격력 구간과 실패, 일반, 치명 공격확률 구간으로 나누어지며 이를 난수 함수로 구간을 결정하고 손상값을 계산한다. 이 논문에서는 일반적인 MMORPG에서 사용할 수 있는 히트 판정 모델을 제시하고 이를 상용 MMORPG 트라비아 온라인에 적용하여 얻은 효과에 대해 자세히 설명한다.

  • PDF

Behavior based Routing Misbehavior Detection in Wireless Sensor Networks

  • Terence, Sebastian;Purushothaman, Geethanjali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권11호
    • /
    • pp.5354-5369
    • /
    • 2019
  • Sensor networks are deployed in unheeded environment to monitor the situation. In view of the unheeded environment and by the nature of their communication channel sensor nodes are vulnerable to various attacks most commonly malicious packet dropping attacks namely blackhole, grayhole attack and sinkhole attack. In each of these attacks, the attackers capture the sensor nodes to inject fake details, to deceive other sensor nodes and to interrupt the network traffic by packet dropping. In all such attacks, the compromised node advertises itself with fake routing facts to draw its neighbor traffic and to plunge the data packets. False routing advertisement play vital role in deceiving genuine node in network. In this paper, behavior based routing misbehavior detection (BRMD) is designed in wireless sensor networks to detect false advertiser node in the network. Herein the sensor nodes are monitored by its neighbor. The node which attracts more neighbor traffic by fake routing advertisement and involves the malicious activities such as packet dropping, selective packet dropping and tampering data are detected by its various behaviors and isolated from the network. To estimate the effectiveness of the proposed technique, Network Simulator 2.34 is used. In addition packet delivery ratio, throughput and end-to-end delay of BRMD are compared with other existing routing protocols and as a consequence it is shown that BRMD performs better. The outcome also demonstrates that BRMD yields lesser false positive (less than 6%) and false negative (less than 4%) encountered in various attack detection.

Full-scale study of conical vortices and roof corner pressures

  • Wu, F.;Sarkar, P.P.;Mehta, K.C.
    • Wind and Structures
    • /
    • 제4권2호
    • /
    • pp.131-146
    • /
    • 2001
  • A full-scale synchronized data acquisition system was set up on the roof of the experimental building at the Texas Tech University Wind Engineering Research Field Laboratory to simultaneously collect approaching wind data, conical vortex images, and roof corner suction pressure data. One-second conditional sampling technique has been applied in the data analysis, which makes it possible to separately evaluate the influencing effects of the horizontal wind angle of attack, ${\theta}$, and the vertical wind angle of attack, ${\varphi}$. Results show a clear cause-and-effect relationship between the incident wind, conical vortices, and the induced roof-corner high-suction pressures. The horizontal wind angle of attack, ${\theta}$, is shown to be the most significant factor in influencing the overall vortex structure and the suction pressures beneath. It is further revealed that the vertical wind angle of attack, ${\varphi}$, plays a critical role in generating the instantaneous peak suction pressures near the roof corner.

Sulfate Attack and the Role of Cement Compositions

  • Lee, Seung-Tae;Lee, Seung-Heun
    • 한국세라믹학회지
    • /
    • 제44권9호
    • /
    • pp.465-470
    • /
    • 2007
  • This paper presents an experimental study of the sulfate resistance of mortars and pastes exposed to sodium sulfate solutions up to one year. In order to check deterioration modes due to sulfate attack, the sodium sulfate solution was varied at three concentration steps (3,380, 10,140 and 33,800 ppm of $SO_4^{2-}$ ions), and maintained at ambient temperature. The tests include a visual examination, expansion and compressive strength loss measurements as well as x-ray diffraction tests. The experimental data indicated that the use of cement with a low $C_3A$ content and low silicate ratio has a beneficial effect on the sulfate attack of mortars. In contrast, the mortars with a high $C_3A$ content and high silicate ratio became severely degraded due to the formation of ettringite, gypsum and/or thaumasite in the cement matrix.

얇은 벽 보를 이용한 초기 받음각이 있는 테이퍼형 복합재료 항공기 날개의 구조 모델링 (Structural Modelling of Tapered Composite Aircraft Wings with Initial Angle of Attack using Thin-Walled Beam)

  • 김근택;송오섭
    • 항공우주시스템공학회지
    • /
    • 제3권2호
    • /
    • pp.1-11
    • /
    • 2009
  • A structural modelling for study on dynamic characteristics of tapered composite aircraft wings in the form of thin-walled beam is presented. The proposed structural model includes effects of transverse shear flexibility exhibited by the advanced composite materials and warping restraint characterizing elastic anisotropy and induced structural couplings. The complex effects of these factors could have a role in more efficient analysis on those structural models.

  • PDF

프로펠러 회전류에서 작동하는 방향타의 받음각 특성 연구 (Study on the Angle-of-Attack Characteristics of the Rudder in Rotating Propeller Flow)

  • 정재환;백동근;윤현식;김기섭;백부근
    • 대한조선학회논문집
    • /
    • 제50권6호
    • /
    • pp.421-428
    • /
    • 2013
  • This study aims at numerically investigating the angle of attack characteristics of the rudder behind a rotating propeller. The rotating propeller of 5 blades and the full spade rudder are placed in the numerical water tunnel with a uniform flow condition to consider propeller-rudder interaction. The turbulence closure model is employed to simulate the three-dimensional unsteady incompressible viscous turbulent flow around the propeller and the rudder. The present numerical method are well verified by comparing with the experimental results. In order to identify the dependence of the angle of attack of the rudder on the rudder angle, a wide range of rudder angles is considered. The present study carried out the quantitative and qualitative analysis of the angle of attack in terms of the pressure distribution, streamlines and the evaluation of the flow incidence, resulting in that the angle of attack increases as we move from the root and the tip to the center of the rudder, regardless of the rudder angle. The distribution of the angle-of-attack along the span is strongly affected by rotating propeller flow and rudder angle. Consequently, the distribution of the angle-of-attack of the oncoming flow against the rudder leading edge plays a role in determination of rudder performance.