• Title/Summary/Keyword: Attack potential

Search Result 259, Processing Time 0.027 seconds

Defending Multiple Terrorist Targets (대테러전략의 게임이론적 분석)

  • Lee, Sanghoon K.
    • KDI Journal of Economic Policy
    • /
    • v.35 no.3
    • /
    • pp.91-124
    • /
    • 2013
  • This paper analyzes a situation where multiple targets are exposed to a potential terrorist attack. The probability of an attack is determined endogenously in a game where a terrorist chooses the target while the targets independently determine the level of deterrence. As each target tries to divert an attack to others, the symmetric equilibrium becomes suboptimal and exhibits dispersion in the level of deterrence. The analysis shows that the first best deterrence level may be achieved when the targets can write a binding risk-sharing contract. Such a contract has limited applicability however as it suffers from a potential verification problem.

  • PDF

Prospection of Power IT networks (전력 IT 네트워크 보안 전망)

  • Kim, Hak-Man;Kang, Dong-Joo
    • Proceedings of the KIEE Conference
    • /
    • 2007.11b
    • /
    • pp.294-295
    • /
    • 2007
  • The importance of security is increased in power industry. Recently Power IT networks are attacked in cyber space and demage of attack become increased. For solving the problems, many research studies for network security enhancement are globally carried out in the world. In this paper, we introduce recent cyber attack cases, efforts for enhancing cyber safeness and put into perspective of potential security areas for power IT areas.

  • PDF

Differential Power Analysis Attack on Cryptosystem adopted NAF Algorithm as a Secret Key Recoding Method (비밀키를 NAF로 사용하는 암호시스템의 차분 전력분석 공격)

  • Ahn Mahn-Ki;Ha Jae-Cheol;Lee Hoon-Jae;Moon Sang-Jae
    • Journal of Internet Computing and Services
    • /
    • v.4 no.3
    • /
    • pp.1-8
    • /
    • 2003
  • The power analysis attack is a physical attack which can be applied to the cryptosystems such as smartcard. We try to experimental attack to a smart card which implemented Elliptic Curve Cryptosystem adopting NAF algorithm as a secret key recording method. Our differential power analysis attack is a potential threat to that implementation. The attacker measures the power traces during the multiplication with secret key bits in a target smart card and the multiplication with the guessed bits in other experimental one. The comparison of these two traces gives a secret bit, which means that attacker can find all secret key bits successively.

  • PDF

A Case Study on Chloride Corrosion for the End Zone of Concrete Deck Subjected to De-icing Salts Added Calcium Chloride (염화칼슘이 함유된 제설제로 인한 콘크리트 바닥판 단부의 염해에 관한 사례 연구)

  • Chung, Jee-Seung;Kim, Bo-Heon;Kim, Il-Sun
    • Journal of the Korean Society of Safety
    • /
    • v.29 no.6
    • /
    • pp.87-93
    • /
    • 2014
  • In this study, the reinforced concrete rahmen bridge damaged by the chloride attack was investigated. According to the investigation, the degraded concretes on cantilever kerb and end part were intensively observed. Thus, the chloride content test and half-cell method were performed to evaluate the degraded parts. As a result, the contents of chloride on degraded parts were C and D grade. On the other hand, the half-cell potential values of rebar in degraded concrete were measured with the minor corrosion. This rebar corrosion is expected to progressing. Chloride content D grade is due to expansion pressure by corrosion of rebar and freeze-thaw by permeate water, could see progresses rapidly degradation. In order to prevent chloride attack to concrete deck caused by deicing salts, corresponding to the chloride critical concentration must maintain grade b or at least grade c. Chloride condition evaluation standard apply to evaluation of marine structure chloride attack with chloride attack by deicing salts.

A Exprimental Study on the Corrosion of Reinforcing Steel in a Coastal Concrete Structure due to the Attack of Chloride Ions (염분침투에 의한 해안 콘크리트 구조물의 철근부식에 관한 실험적 연구)

  • 안상섭;김은겸;신치범;조원일;이윤한
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 1997.10a
    • /
    • pp.263-268
    • /
    • 1997
  • One of the principal causes of the deterioation of coastal concrete structures is the corrosion of reinforcing steel induced by the attack of chloride ions. An experimental study was performed to investigate the distribution of concentration of chloride ions in a coastal concrete structure and to measure the half-cell potential of embedded steel by using the copper-copper sulfate reference electrode. Quantitative analysis showed that the concentration of chloride ion in the aqueous phase near the surface of embedded steel exceeded a threshold value for corrosion, 0.05% by weight in concrete. The absolute value of half-cell potential at some members of embedded steel was measured to be higher than 350mV, indicating that the probability of corrosion is more than 90%. The prediction on corrosion based on the experimental measurements was confirmed by the observation of corrosion on the surface of steel bars in the concrete core taken out of the concrete structure.

  • PDF

Studies of the possibility of external threats of the automotive ECU through simulation test environment (자동차용 ECU의 CAN 메시지를 통한 자동차 공격 방법 연구)

  • Lee, Hye-Ryun;Kim, Kyoung-Jin;Jung, Gi-Hyun;Choi, Kyung-Hee;Park, Seung-Kyu;Kwon, Do-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.39-49
    • /
    • 2013
  • In this paper, security mechanism of internal network(CAN) of vehicle is a very incomplete state and the possibility of external threats as a way to build a test environment that you can easily buy from the market by the vehicle's ECU(Electric Control Unit) to verify and obtain a CAN message. Then, by applying it to ECU of the real car to try to attack is proposed. A recent study, Anyone can see plain-text status of the CAN message in the vehicle. so that in order to verify the information is vulnerable to attack from outside, analyze the data in a vehicle has had a successful attack, but attack to reverse engineering in the stationary state and buying a car should attempt has disadvantages that spatial, financial, and time costs occurs. Found through the car's ECU CAN message is applied to a real car for Potential threats outside of the car to perform an experiment to verify and equipped with a wireless network environment, the experimental results, proposed method through in the car to make sure the attack is possible. As a result, reduce the costs incurred in previous studies and in the information absence state of the car, potential of vehicle's ECU attack looks.

Calculating Dynamic Derivatives of Flight Vehicle with New Engineering Strategies

  • Mi, Baigang;Zhan, Hao;Chen, Baibing
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.18 no.2
    • /
    • pp.175-185
    • /
    • 2017
  • This paper presents new differential methods for computing the combined and single dynamic stability derivatives of flight vehicle. Based on rigid dynamic mesh technique, the combined dynamic stability derivative can be achieved by imposing the aircraft pitching to the same angle of attack with two different pitching angular velocities and also translating it to the same additional angle of attack with two different rates of angle of attack. As a result, the acceleration derivative is identified. Moreover, the rotating reference frame is adopted to calculate the rotary derivatives when simulating the steady pull-up with different pitching angular velocities. Two configurations, the Hyper Ballistic Shape (HBS) and Finner missile model, are considered as evaluations and results of all the cases agree well with reference or experiment data. Compared to traditional ones, the new differential methods are of high efficiency and accuracy, and potential to be extended to the simulation of combined and single stability derivatives of directional and lateral.

An Experimental Study on the Salt Resistance Properties with Concrete Materials under Marine Environment (Exposure period : 5 years) (해양환경에 폭로한 콘크리트의 내염특성에 대한 실험적 연구 (폭로기간 : 5년))

  • Kim, Yong-Chul;Suk, Jun-Yeoll;Shin, Do-Chul
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2006.05b
    • /
    • pp.169-172
    • /
    • 2006
  • The IIA structures exposed to marine environment is subject to many different types of potential attack. The physical attack due to drying and wetting would increase the internal stress of concrete. The chemical attack resulting from the diffusion of ions$(Cl^-,SO_4^{2-},Mg^+)$ from seawater through the pores in concrete. Therefore the sea water resistance of concrete must be considered when it is used for structure in the ocean. The objective of this study is to evaluate chloride diffusion and corrosion characteristics of concrete when using the various concrete materials under marine environment. After 5 years of exposure, concrete incorporating 40% blast-furnace slag as replacement for type I cement with low w/c ratio of 0.42 and using the inhibitor shows excellent performance.

  • PDF

Blast Damage Assessment to a Modern Steel Structures

  • Mestreau Eric;Baum Joseph D.;Charman Chuck;Lee Seung;Sohn Young
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2006.05a
    • /
    • pp.292-295
    • /
    • 2006
  • The terrorist attack of September $11^{th}$ 2001 has enforced a new examination of the response of modern steel structures, such as those found in large warehouses, auditoriums and airport terminals, to terrorist bomb attack. The effort described in this paper assesses the potential damage to such a newly designed structure form a medium-size car bomb. The structure is mostly composed of a lightweight complex beam structure with large windows and skylights piercing through a corrugated roof. The structural response to the terrorist attack requires the modelling of various physics phenomena including bomb detonation, blast wave propagation, reflections, and refractions and resulting blast impact on the structure. Hence, a fluid/structure coupled methodology is used to perform the assessment.

  • PDF

An Approach for Applying Network-based Moving Target Defense into Internet of Things Networks

  • Park, Tae-Keun;Park, Kyung-Min;Moon, Dae-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.9
    • /
    • pp.35-42
    • /
    • 2019
  • In this paper, we propose an approach to apply network-based moving target defense into Internet of Things (IoT) networks. The IoT is a technology that provides the high interconnectivity of things like electronic devices. However, cyber security risks are expected to increase as the interconnectivity of such devices increases. One recent study demonstrated a man-in-the-middle attack in the statically configured IoT network. In recent years, a new approach to cyber security, called the moving target defense, has emerged as a potential solution to the challenge of static systems. The approach continuously changes system's attack surface to prevent attacks. After analyzing IPv4 / IPv6-based moving target defense schemes and IoT network-related technologies, we present our approach in terms of addressing systems, address mutation techniques, communication models, network configuration, and node mobility. In addition, we summarize the direction of future research in relation to the proposed approach.