• Title/Summary/Keyword: Attack behavior analysis

Search Result 93, Processing Time 0.03 seconds

Analysis of the Helicopter Fire Attack Pattern on Forest Fire Behavior (산불진화 헬기의 물 살포유형 분석에 관한 연구)

  • Lee, Si-Young;Bae, Taek-Hoon
    • Fire Science and Engineering
    • /
    • v.23 no.2
    • /
    • pp.96-100
    • /
    • 2009
  • Because of dense forests and restriction of approaching for fire fighters, forest fire is easy to be a larger fire in Korea. For this result, the air attack was about 90% of extinguishing, so the application of aircrafts, especially helicopters, will be increased gradually. In the all process of forest fire attack, the method of heli-scattering water was the chief element of success of efficient forest fire attack and safe flight. Therefore, a standardized method of heli-scattering water was required. However, as it was not already standardized, a efficiency and safety of fire fighting have been decreased. In this study, we suggest a 11 patterns of methods for scatterling water based on a actual experience of air attack.

Detection of System Abnormal State by Cyber Attack (사이버 공격에 의한 시스템 이상상태 탐지 기법)

  • Yoon, Yeo-jeong;Jung, You-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1027-1037
    • /
    • 2019
  • Conventional cyber-attack detection solutions are generally based on signature-based or malicious behavior analysis so that have had difficulty in detecting unknown method-based attacks. Since the various information occurring all the time reflects the state of the system, by modeling it in a steady state and detecting an abnormal state, an unknown attack can be detected. Since a variety of system information occurs in a string form, word embedding, ie, techniques for converting strings into vectors preserving their order and semantics, can be used for modeling and detection. Novelty Detection, which is a technique for detecting a small number of abnormal data in a plurality of normal data, can be performed in order to detect an abnormal condition. This paper proposes a method to detect system anomaly by cyber attack using embedding and novelty detection.

The Pattern Analysis for Gameplay of RPG(Role-Play Game) Genre base on Smart-phone : Toward 'Blade for Kakao' (스마트폰 기반 RPG 장르의 게임플레이 패턴 분석 : '블레이드 for Kakao'를 중심으로)

  • Han, Sang-Geun;Song, Seung-Keun
    • Cartoon and Animation Studies
    • /
    • s.38
    • /
    • pp.237-258
    • /
    • 2015
  • This research aims to analyze gamer's behavior pattern on 'Blade for Kakao' RPG genre based on smart-phone. Three subjects were recruited using the concurrent protocol method to conduct ten episodes in region 1. As a result, it derived four behavior patterns according to the combination of space type affordance and the arrangement affordance of obstacle(monster). The result of this research revealed the forward attack arranged for the fixed obstacles in the wide space, the indirect attack as avoid-type arranged for scattered obstacles in the same space, the hunting up attack once arranged for the crowded obstacles in the same space, and the pulling attack arranged for obstacles in the narrow space. Moreover, it revealed the character growth and the optimization of attack method according to the attribute affordance of the obstacle(monster). This research expect to offer the design guideline for game level design to investigate the relationship between the game play and affordance in RPG genre based on smart-phone.

Galloping characteristics of a 1000-kV UHV iced transmission line in the full range of wind attack angles

  • Lou, Wenjuan;Wu, Huihui;Wen, Zuopeng;Liang, Hongchao
    • Wind and Structures
    • /
    • v.34 no.2
    • /
    • pp.173-183
    • /
    • 2022
  • The galloping of iced conductors has long been a severe threat to the safety of overhead transmission lines. Compared with normal transmission lines, the ultra-high-voltage (UHV) transmission lines are more prone to galloping, and the damage caused is more severe. To control the galloping of UHV lines, it is necessary to conduct a comprehensive analysis of galloping characteristics. In this paper, a large-span 1000-kV UHV transmission line in China is taken as a practical example where an 8-bundled conductor with D-shaped icing is adopted. Galerkin method is employed for the time history calculation. For the wind attack angle range of 0°~180°, the galloping amplitudes in vertical, horizontal, and torsional directions are calculated. Furthermore, the vibration frequencies and galloping shapes are analyzed for the most severe conditions. The results show that the wind at 0°~10° attack angles can induce large torsional displacement, and this range of attack angles is also most likely to occur in reality. The galloping with largest amplitudes in all three directions occurs at the attack angle of 170° where the incoming flow is at the non-iced side, due to the strong aerodynamic instability. In addition, with wind speed increasing, galloping modes with higher frequencies appear and make the galloping shape more complex, indicating strong nonlinear behavior. Based on the galloping amplitudes of three directions, the full range of wind attack angles are divided into five galloping regions of different severity levels. The results obtained can promote the understanding of galloping and provide a reference for the anti-galloping design of UHV transmission lines.

Numerical Analysis on the Blade Tip Clearance Flow in the Axial Rotor (II) - Variation of Leakage Vortex with Tip Clearance and Attack Angle - (축류 회전차 익말단 틈새유동에 대한 수치해석(II) - 틈새변화 및 영각변화에 따른 누설와류의 변화 -)

  • Ro, Soo-Hyuk;Cho, Kang-Rae
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.23 no.9
    • /
    • pp.1106-1112
    • /
    • 1999
  • Substantial losses behind axial flow rotor are generated by the wake, various vortices in the hub region and the tip leakage vortex in the tip region. Particularly, the leakage vortex formed near blade tip is one of the main causes of the reduction of performance, generation of noise and aerodynamic vibration in downstream. In this study, the three-dimensional flow fields in an axial flow rotor were calculated with varying tip clearance under various flow rates, and the numerical results were compared with experimental ones. The numerical technique was based on SIMPLE algorithm using standard $k-{\varepsilon}$ model(WFM) and Launder & Sharma's Low Reynolds Number $k-{\varepsilon}$ model(LRN). Through calculations, the effects of tip clearance and attack angle on the 3-dimensional flow fileds behind a rotor and leakage flow/vortex were investigated. The presence of tip leakage vortex, loci of vortex center and its behavior behind the rotor for various tip clearances and attack angles was described well by calculation.

Using Machine Learning Techniques for Accurate Attack Detection in Intrusion Detection Systems using Cyber Threat Intelligence Feeds

  • Ehtsham Irshad;Abdul Basit Siddiqui
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.179-191
    • /
    • 2024
  • With the advancement of modern technology, cyber-attacks are always rising. Specialized defense systems are needed to protect organizations against these threats. Malicious behavior in the network is discovered using security tools like intrusion detection systems (IDS), firewall, antimalware systems, security information and event management (SIEM). It aids in defending businesses from attacks. Delivering advance threat feeds for precise attack detection in intrusion detection systems is the role of cyber-threat intelligence (CTI) in the study is being presented. In this proposed work CTI feeds are utilized in the detection of assaults accurately in intrusion detection system. The ultimate objective is to identify the attacker behind the attack. Several data sets had been analyzed for attack detection. With the proposed study the ability to identify network attacks has improved by using machine learning algorithms. The proposed model provides 98% accuracy, 97% precision, and 96% recall respectively.

Montgomery Multiplier with Very Regular Behavior

  • Yoo-Jin Baek
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.17-28
    • /
    • 2024
  • As listed as one of the most important requirements for Post-Quantum Cryptography standardization process by National Institute of Standards and Technology, the resistance to various side-channel attacks is considered very critical in deploying cryptosystems in practice. In fact, cryptosystems can easily be broken by side-channel attacks, even though they are considered to be secure in the mathematical point of view. The timing attack(TA) and the simple power analysis attack(SPA) are such side-channel attack methods which can reveal sensitive information by analyzing the timing behavior or the power consumption pattern of cryptographic operations. Thus, appropriate measures against such attacks must carefully be considered in the early stage of cryptosystem's implementation process. The Montgomery multiplier is a commonly used and classical gadget in implementing big-number-based cryptosystems including RSA and ECC. And, as recently proposed as an alternative of building blocks for implementing post quantum cryptography such as lattice-based cryptography, the big-number multiplier including the Montgomery multiplier still plays a role in modern cryptography. However, in spite of its effectiveness and wide-adoption, the multiplier is known to be vulnerable to TA and SPA. And this paper proposes a new countermeasure for the Montgomery multiplier against TA and SPA. Briefly speaking, the new measure first represents a multiplication operand without 0 digits, so the resulting multiplication operation behaves in a very regular manner. Also, the new algorithm removes the extra final reduction (which is intrinsic to the modular multiplication) to make the resulting multiplier more timing-independent. Consequently, the resulting multiplier operates in constant time so that it totally removes any TA and SPA vulnerabilities. Since the proposed method can process multi bits at a time, implementers can also trade-off the performance with the resource usage to get desirable implementation characteristics.

Multiple input describing function analysis of non-classical aileron buzz

  • Zafar, Muhammad I.;Fusi, Francesca;Quaranta, Giuseppe
    • Advances in aircraft and spacecraft science
    • /
    • v.4 no.2
    • /
    • pp.203-218
    • /
    • 2017
  • This paper focuses on the computational study of nonlinear effects of unsteady aerodynamics for non-classical aileron buzz. It aims at a comprehensive investigation of the aileron buzz phenomenon under varying flow parameters using the describing function technique with multiple inputs. The limit cycle oscillatory behavior of an asymmetrical airfoil is studied initially using a CFD-based numerical model and direct time marching. Sharp increases in limit cycle amplitude for varying Mach numbers and angles of attack are investigated. An aerodynamic describing function is developed in order to estimate the variation of limit cycle amplitude and frequency with Mach number and angle of attack directly, without time marching. The describing function results are compared to the amplitudes and frequencies predicted by the CFD calculations for validation purposes. Furthermore, a limited sensitivity analysis is presented to demonstrate the potential of the approach for aeroelastic design.

EDR platform construction using ELK Stack and Sysmon (ELK Stack과 Sysmon을 이용한 EDR 플랫폼 연구)

  • Shin, Hyun-chang;Kong, Seung-Jun;Oh, Myung-ho;Lee, Dong-hwi
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.333-336
    • /
    • 2022
  • With the development of IT technology, cybercrime is becoming sophisticated and intelligent. In particular, in the case of BackDoor, which is used in the APT attack (intelligent continuous attack), it is very important to detect malicious behavior and respond to infringement because it is often unaware that it has been damaged by an attacker. This paper aims to build an EDR platform that can monitor, analyze, and respond to malicious behavior in real time by collecting, storing, analyzing, and visualizing logs in an endpoint environment in real time using open source-based analysis solutions ELK Stack and Sysmon.

  • PDF

A Study on Analysis Technique for Chloride Penetration in Cracked Concrete under Combined Deterioration (복합열화에 노출된 균열부 콘크리트 내의 염화물 침투 해석 기법에 대한 연구)

  • Kwon, Seung-Jun;Song, Ha-Won;Byun, Keun-Joo
    • Journal of the Korea Concrete Institute
    • /
    • v.19 no.3
    • /
    • pp.359-366
    • /
    • 2007
  • Recently, analysis researches on durability are focused on chloride attack and carbonation due to increased social and engineering significance. Generally, chloride penetration and carbonation occur simultaneously except for in submerged condition and chloride behavior in carbonated concrete is evaluated to be different from that in normal concrete. Furthermore, if unavoidable crack occurs in concrete, it influences not only single attack but also coupled deterioration more severely. This is a study on analysis technique with system dynamics for chloride penetration in concrete structures exposed to coupled chloride attack and carbonation through chloride diffusion, permeation, and carbonation reaction. For the purpose, a modeling for chloride behavior considering diffusion and permeation is performed through previous models for early-aged concrete such as MCHHM (multi component hydration heat model) and MPSFM (micro pore structure formation). Then model for combined deterioration is developed considering changed characteristics such as pore distribution, saturation and dissociation of bound chloride content under carbonation. The developed model is verified through comparison with previous experimental data. Additionally, simulation for combined deterioration in cracked concrete is carried out through utilizing previously developed models for chloride penetration and carbonation in cracked concrete. From the simulated results, CCTZ (chloride-carbonation transition zone) for evaluating combined deterioration is proposed. It is numerically verified that concrete with slag has better resistance to combined deterioration than concrete with OPC in sound and cracked concrete.