• Title/Summary/Keyword: Attack Visualization

Search Result 89, Processing Time 0.025 seconds

A Flowfield Calculation around Two Circular Cylinders in Various Arrangements by a Discrete Vortex Method (이산와법에 의한 다양한 배열에서 2원주 주위의 유동장 계산)

  • 노기덕;박지태;강호근
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.27 no.3
    • /
    • pp.365-372
    • /
    • 2003
  • The Flow patterns around two cylinders in various arrangements were studied by a discrete vortex method. The flow for the surface of each cylinder was represented by arranging bound vortices at adequate intervals. The viscous diffusion of fluid was represented by the random walk method. The vortex distributions. streaklines. timelines and velocity vectors around two cylinders were calculated for centre-to-centre pitch ratios of P/D=1.5 and 2.5, attack ang1es of $a=0^{circ}, 30^{circ}, 60^{circ} and 90^{\circ}$. and Reynolds number of Re= 1200. The results of simulation correspond to the photographs by flow visualization and the flow intereference between two cylinders in various arrangements were clearly visualized by a numerical simulation.

PCAV: Parallel Coordinates Attack Visualizer (PCAV: 평행좌표계를 이용한 네트워크 공격의 시각화)

  • Choi, Hyun-Sang;Lee, Hee-Jo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.130-132
    • /
    • 2005
  • 인터넷상의 수많은 트래픽 정보 중에서 악성 트래픽 정보를 빠르게 감지하는 것은 그 정보의 방대함 때문에 쉽지 않다. 공격시각회(Attack Visualization) 기법은 이런 수많은 정보 중에서 악성 트래픽 정보를 좀 더 쉽게 인지하게 함으로써 새로운 공격에 대해서 빠른 대응과 피해 최소화를 하는데 활용할 수 있다. 본 연구에서는 평행좌표계(Parallel Coordinates)를 이용해 공격시각화를 하여, 분산 서비스 거부 공격, 웜, 스캐닝 공격 등 인터넷상에 알려진 혹은 알려지지 않은 새로운 공격들에 대해 빠른 대응을 하기위한 기술 연구를 하였으며, 각 공격들의 특정 시각화 패턴을 감지하고 이를 알려주는 이상탐지(anomaly detection) 시각화 시스템 PCAV를 구현하였다. PCAV 시스템을 통해 네트워크 관리자는 실시간으로 트래픽 정보와 공격들의 시각화 정보를 원격에서도 모니터링하고 이를 통해 즉시 대응하는 것이 가능하다. 또한, 이전에 발생한 공격들의 시각화 정보를 확인하고 이를 분석하는 것과, 알려지지 않은 공격이 발생했을지라도 그 공격의 시각적 패턴이 나타났을 때 즉각 공격 서명(Signature)으로 활용 하는 것이 가능하다.

  • PDF

Reverse Flow Characteristics in a channel with fixed angle of attack following variable width and stagger (받음각이 큰 평판 채널 내의 역류 유동 가시화)

  • Choi, Seung;Sohn, Chang-Hyun;Gowda, B.H.L.
    • 한국가시화정보학회:학술대회논문집
    • /
    • 2006.12a
    • /
    • pp.11-16
    • /
    • 2006
  • Reverse flow occurs in a channel when there is an obstruction at the entry, However it has been shown recently that reverse flow can be realized without an obstruction, by staggering the sides of the channel and placing it at an angle of attack to the oncoming flow. In this study the latter flow is computationally investigated. And the mechanism is investigated using PIV (Particle Image Velocimetry) method. The results have captured all the essential features of this complex phenomenon and show the time dependent pumping mechanism which leads to the occurrence of reverse flow.

  • PDF

A log visualization method for network security monitoring (네트워크 보안 관제를 위한 로그 시각화 방법)

  • Joe, Woo-Jin;Shin, Hyo-Jeong;Kim, Hyong-Shik
    • Smart Media Journal
    • /
    • v.7 no.4
    • /
    • pp.70-78
    • /
    • 2018
  • Current trends in information system have led many companies to adopt security solutions. However, even with a large budget, they cannot function properly without proper security monitoring that manages them. Security monitoring necessitates a quick response in the event of a problem, and it is needed to design appropriate visualization dashboards for monitoring purposes so that necessary information can be delivered quickly. This paper shows how to visualize a security log using the open source program Elastic Stack and demonstrates that the proposed method is suitable for network security monitoring by implementing it as a appropriate dashboard for monitoring purposes. We confirmed that the dashboard was effectively exploited for the analysis of abnormal traffic growth and attack paths.

Detecting SQL Injection Logs Leveraging ELK Stack (ELK Stack을 활용한 SQL Injection 로그 탐지)

  • Min, Song-ha;Yu, Hyun-jae;Lim, Moon-ju;Kim, Jong-min
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.337-340
    • /
    • 2022
  • SQL Injection attacks are one of the older attack techniques and are the dominant type of hacking attempts against web services. There have been many attempts to hack SQL injection attacks by exposing data or obtaining privileges. In this paper, we implement a log analysis system that can respond to SQL injection attacks in real time using the open source ELK Stack. did. By providing a visualization of SQL injection attack log data through the implemented system, it is expected that users will be able to easily grasp the degree of attack risk and quickly prepare for attacks.

  • PDF

The characteristics of the flow field around canvas kite using the PIV (PIV를 이용한 범포 주위의 유동장 특성)

  • Bae, Bong-Seong;An, Heui-Chun;Bae, Jae-Hyun;Park, Chang-Doo;Kim, In-Ok
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.42 no.2
    • /
    • pp.86-96
    • /
    • 2006
  • This research aims at establishing the fundamental characteristics of the kite through the analysis of the flow field around various types of kites. The approach of this study were adopted for the analysis; visualization by PIV(particle image velocimetry). Also, the lift and drag tests of kites had been performed in our previous finding(Bae et al., 2004a; Bae et al., 2004b). For this situation, models of canvas kite were deployed in the circulating water channel for the PIV test using the same conditions as in the lift and drag tests. The results obtained from the above approach are summarized as follows: Given the rectangular and triangular kites when attack angle is $20^{\circ}$, vortex by the boundary layer separation was seen in the leading edge and the flow towards the trailing edge was more turbulent. But, the inverted triangular type kite was seen to be stable without any boundary layer separation or turbulence. The increase of the attack angle resulted in the eddy in order of the rectangular, triangular and inverted triangular type. The magnitude of the eddy followed the same order. The effect of edge-eddy was biggest in the triangular type followed by the rectangular and then the inverted triangular type. The kite as the buoyancy device or the opening device will be very useful when the appropriate applications and the stability are met.

Investigation of crossflow features of a slender delta wing

  • Tasci, Mehmet O.;Karasu, Ilyas;Sahin, Besir;Akilli, Huseyin
    • Wind and Structures
    • /
    • v.31 no.3
    • /
    • pp.229-240
    • /
    • 2020
  • In the present work, the main features of primary vortices and the vorticity concentrations downstream of vortex bursting in crossflow plane of a delta wing with a sweep angle of Λ=70° were investigated under the variation of the sideslip angles, β. For the pre-review of flow structures, dye visualization was conducted. In connection with a qualitative observation, a quantitative flow analysis was performed by employing Particle Image Velocimetry (PIV). The sideslip angles, β were varied with four different angles, such as 0°, 4°, 12°, and 20° while angles of attack, α were altered between 25° and 35°. This study mainly focused on the instantaneous flow features sequentially located at different crossflow planes such as x/C=0.6, 0.8 and 1.0. As a summary, time-averaged and instantaneous non-uniformity of turbulent flow structures are altered considerably resulting in non-homogeneous delta wing surface loading as a function of the sideslip angle. The vortex bursting location on the windward side of the delta wing advances towards the leading-edge point of the delta wing. The trajectory of the primary vortex on the leeward side slides towards sideways along the span of the delta wing. Besides, the uniformity of the lift coefficient, CL over the delta wing plane was severely affected due to unbalanced distribution of buffet loading over the same plane caused by the variation of the sideslip angle, β. Consequently, dissimilarities of the leading-edge vortices result in deterioration of the mean value of the lift coefficient, CL.

Real-Time Visualization of Web Usage Patterns and Anomalous Sessions (실시간 웹 사용 현황과 이상 행위에 대한 시각화)

  • 이병희;조상현;차성덕
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.4
    • /
    • pp.97-110
    • /
    • 2004
  • As modem web services become enormously complex, web attacks has become frequent and serious. Existing security solutions such as firewalls or signature-based intrusion detection systems are generally inadequate in securing web services, and analysis of raw web log data is simply impractical for most organizations. Visual display of "interpreted" web logs, with emphasis on anomalous web requests, is essential for an organization to efficiently track web usage patterns and detect possible web attacks. In this paper, we discuss various issues related to effective real-time visualization of web usage patterns and anomalies. We implemented a software tool named SAD (session anomaly detection) Viewer to satisfy such need and conducted an empirical study in which anomalous web traffics such as Misuse attacks, DoS attacks, Code-Red worms and Whisker scans were injected. Our study confirms that SAD Viewer is useful in assisting web security engineers to monitor web usage patterns in general and anomalous web sessions in particular.articular.

A Numerical Performance Study on Rudder with Wavy Configuration at High Angles of Attack (Wavy 형상 적용에 따른 대 각도에서의 러더 성능에 대한 수치해석 연구)

  • Tae, Hyun June;Shin, Young Jin;Kim, Beom Jun;Kim, Moon-Chan
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.54 no.1
    • /
    • pp.18-25
    • /
    • 2017
  • This study deals with numerically comparing performance according to rudder shape called 'Twisted rudder and Wavy twisted rudder'. In comparison with conventional rudder, rudder with wavy shape has showed a better performance at high angles of attack($30^{\circ}{\sim}40^{\circ}$) due to delaying stall. But most of study concerned with wavy shape had been performed in uniform flow condition. In order to identify the characteristics behind a rotating propeller, the present study numerically carries out an analysis of resistance and self-propulsion for KCS with twisted rudder and wavy twisted rudder. The turbulence closure model, Realizable $k-{\epsilon}$, is employed to simulate three-dimensional unsteady incompressible viscous turbulent and separation flow around the rudder. The simulation of self-propulsion analysis is performed in two step, because of finding optimization case of wavy shape. The first step presents there are little difference between twisted rudder and case of H_0.65 wavy twisted rudder in delivered power. So two kind of rudders are employed from first step to compare lift-to-drag ratio and torque at high angles of attack. Consequently, the wavy twisted rudder is presented as a possible way of delaying stall, allowing a rudder to have a better performance containing superior lift-to-drag ratio and torque than twisted rudder at high angles of attack. Also, as we indicate the flow visualization, check the quantity of separation flow around the rudder.

Fluttering Characteristics of Free-falling Plates (자유낙하하는 판의 fluttering 특성 연구)

  • Hong, Seulki;Chae, Seokbong;Kim, Jooha
    • Journal of the Korean Society of Visualization
    • /
    • v.15 no.2
    • /
    • pp.33-40
    • /
    • 2017
  • Abstract In the present study, the characteristics of kinematics and dynamics in the fluttering motion of free-falling plates are investigated at Reynolds number of $10^5$. We record quasi-two-dimensional trajectories of free-falling plates with and without superhydrophobic coating using high-speed camera, and compute the drag and lift forces by trajectory analysis. Translational and angular velocities are modeled as harmonic functions with specific phase differences. In particular, periodic mass elevations near turning points are explained using the suggested models. At each turning point, a sudden drop in lift and a rapid increase in drag occur simultaneously due to fast increase in angle of attack. However, the lift is increased over the buoyancy-corrected weight of plate during gliding flight, resulting in periodic mass elevations near turning points. Superhydrophobicity is shown to increase lift but to reduce drag on a fluttering plate, resulting in the decrease of mean descent speed.