• 제목/요약/키워드: Attack time

검색결과 1,152건 처리시간 0.026초

Failure of Ammonia Synthesis Converter Due to Hydrogen Attack and Its On-Stream Assessment Using ToFD Method

  • Albiruni, Farabirazy;Lee, Joon-Hyun
    • 대한기계학회:학술대회논문집
    • /
    • 대한기계학회 2008년도 추계학술대회A
    • /
    • pp.132-137
    • /
    • 2008
  • A failure analysis of ammonia converter which suffered hydrogen attack in two years since its initial operating time was presented. It is constructed from 2.25 Cr.1 Mo steel. Analysis showed that the failure on closing seam weld joint was due to local improper post weld heat treatment (PWHT). Improper PWHT can introduce high residual stresses in thick-walled pressure vessel. High residual stress level in weld joint is very prone to hydrogen attack for any components which are operating in hydrogen gas environment. The repair procedures based on the principle to decrease the residual stress then proposed. The repair was controlled very carefully by applying several nondestructive tests in the each stage of repair. To assure the successful of the proposed repair, after one year since repair time, high temperature ultrasonic and TOFD methods were applied on-stream to this equipment in order to evaluate its post repair condition. The two methods showed good results on the repaired area.

  • PDF

중력효과 및 캐비테이터 받음각 고려 공동 형상 예측기법 연구 (The Study of Prediction Method of Cavity Shape Considering Both Gravity Effect and Angle of Attack of Cavitator)

  • 김민재;이종주;김선범
    • 한국군사과학기술학회지
    • /
    • 제21권2호
    • /
    • pp.180-187
    • /
    • 2018
  • In this study, we develop a prediction method of cavity shape taking gravity effect and angle of attack of cavitator into consideration simultaneously. Logvinovich's theoretical formulas are superimposed to predict the change of cavity centerline due to both gravity effect and angle of attack of cavitator. It is found that as the angle of attack of cavitator increases, the gravity effect is weakened due to decrease in cavity volume, and even in case of the same angle of attack, cavity shape changes in different ways depending on whether the angle of attack of cavitator is positive or negative. We conclude that cavity shapes are largely affected by the angle of attack of cavitator, and the gravity effect and angle of attack of cavitator should be considered at the same time for the prediction of cavity shape.

모바일 RFID를 위한 보안 RFID 상호인증 프로토콜 설계 (Design of RFID Mutual Authentication Protocol for Mobile RFID)

  • 이승민;김은환;전문석
    • 한국통신학회논문지
    • /
    • 제35권2B호
    • /
    • pp.183-190
    • /
    • 2010
  • 최근 연구된 Mobile를 이용한 인증 프로토콜들에는 많은 연구가 있었음에도 불구하고, RFID의 근본적으로 갖고 있는 위치추적, 재전송 공격, 스푸핑 공격 등에 취약점이 여전히 남아있다. 본 논문에서는 리더나 태그에서 난수를 생성하는 기존의 연구된 프로토콜들과는 달리 Back-End DB에서 일회성 난수를 생성하고, 이 난수를 상호인증에 사용함으로써 위치추적, 재전송 공격, 스푸핑 공격에 안전하게 프로토콜을 설계하였다.

포병부대 비계획 사격순서 결정 알고리즘 (Algorithms for Fire Sequencing Problem in Unplanned Artillery Attack Operation)

  • 최용백;김경섭
    • 산업경영시스템학회지
    • /
    • 제35권2호
    • /
    • pp.37-44
    • /
    • 2012
  • This paper focuses on scheduling problems arising in the military. In planned artillery attack operations, a large number of threatening enemy targets should be destroyed to minimize fatal loss to the friendly forces. We consider a situation in which the number of available weapons is smaller than the number of targets. Therefore it is required to develop a new sequencing algorithm for the unplanned artillery attack operation. The objective is to minimize the total loss to the friendly forces from the targets, which is expressed as a function of the fire power potential, after artillery attack operations are finished. We develop an algorithm considering the fire power potential and the time required to destroy the targets. The algorithms suggested in this paper can be used in real artillery attack operations if they are modified slightly to cope with the practical situations.

지연된 등록 취소를 이용한 SIP 등록 취소 공격 방어 (Protecting Deregistration Attack in SIP Using Delayed Deregistration)

  • 권경희
    • 한국콘텐츠학회논문지
    • /
    • 제15권12호
    • /
    • pp.18-23
    • /
    • 2015
  • SIP 등록 취소 공격은 공격자가 정상적 SIP UA의 REGISTER 메시지를 간단히 위장함으로써 야기되지만, 그 영향력은 매우 크다. 본 논문에서는 등록 서버가 등록 취소 REGISTER 메시지를 수신하는 즉시 위치 서버로부터 바인딩을 제거함으로써 등록을 취소하는 대신에, 일정 기간을 지연한 후에 취소하게 함으로서 등록 취소 공격을 식별하고 방어하게 해주는 새로운 방법을 제안한다. 따라서 본 논문에서 제안한 이 기법은 추가적인 암호화나 인증 과정들의 오버헤드 없이 SIP 등록 취소 공격에 대응하는 안전한 SIP 환경을 구축할 수 있게 한다.

MANET에서 규칙을 기반으로 한 계층형 침입 탐지에 관한 연구 (The Study of Hierarchical Intrusion Detection Based on Rules for MANET)

  • 정혜원
    • 디지털산업정보학회논문지
    • /
    • 제6권4호
    • /
    • pp.153-160
    • /
    • 2010
  • MANET composed mobile nodes without central concentration control like base station communicate through multi-hop route among nodes. Accordingly, it is hard to maintain stability of network because topology of network change at any time owing to movement of mobile nodes. MANET has security problems because of node mobility and needs intrusion detection system that can detect attack of malicious nodes. Therefore, system is protected from malicious attack of intruder in this environment and it has to correspond to attack immediately. In this paper, we propose intrusion detection system based on rules in order to more accurate intrusion detection. Cluster head perform role of monitor node to raise monitor efficiency of packet. In order to evaluate performance of proposed method, we used jamming attack, selective forwarding attack, repetition attack.

CNN 기반의 실시간 DNS DDoS 공격 탐지 시스템 (CNN Based Real-Time DNS DDoS Attack Detection System)

  • 서인혁;이기택;유진현;김승주
    • 정보처리학회논문지:컴퓨터 및 통신 시스템
    • /
    • 제6권3호
    • /
    • pp.135-142
    • /
    • 2017
  • DDoS (Distributed Denial of Service)는 대량의 좀비 PC를 이용하여 공격 대상 서버에 접근하여 자원을 고갈시켜 정상적인 사용자가 서버를 이용하지 못하게 하는 공격이다. DDoS 공격발생 사례가 꾸준히 증가하고 있고, 주요 공격대상은 IT 서비스, 금융권, 정부기관이기 때문에 DDoS를 탐지하는 것이 중요한 이슈로 떠오르고 있다. 본 논문에서는 DNS 서버를 이용하여 패킷을 증폭시키는 DNS DDoS 공격 즉, DNS Amplification 공격(이하 DNS 증폭 공격)을 Deep Learning (이하 딥 러닝)을 활용해 실시간으로 탐지하는 방법에 대해 소개한다. 기존 연구들의 한계점을 극복하기 위하여 실험망 환경의 데이터가 아닌 실 환경 데이터를 혼합하여 탐지 시스템을 학습하였다. 또한 이미지 인식에 주로 사용되는 Convolutional Neural Network (이하 CNN)을 이용하여 딥 러닝 모델을 구축하였다.

Lee와 Chen의 일회용 비밀번호 인증기법 분석 (Analysis of the Lee-Chen's One-Time Password Authentication Scheme)

  • 유일선;김보남;김흥준
    • 한국정보통신학회논문지
    • /
    • 제13권2호
    • /
    • pp.285-292
    • /
    • 2009
  • Lee와 Chen은 2005년에 Yeh-Shen-Whang 인증기법을 stolen verifier 공격에 대응할 수 있도록 개선하였다. 이 기법은 서버와 각 사용자의 공유 비밀키를 서버의 비밀키로부터 파생하여 stolen verifier 공격을 무력화 하였다. 그러나 우리는 Lee와 Chen의 개선안이 서버의 비밀키에 대한 오프라인 사전공격에 취약하다는 것을 발견하였다. 본 논문에서는 이러한 취약점을 분석하고 가능한 공격을 보인 후, 하드웨어 보안 모듈을 사용하여 이 문제에 대한 해결방안을 제시하였다. 또한, Lee와 Chen의 문제점으로 알려진 서비스 거부 공격과 과거 세션키 유출 공격에 대한 취약점을 개선하였다. 결론적으로 제안 인증기 법과 Lee와 Chen의 기법을 비교분석 하여 제안 인증기법의 보안강도가 개선되었음을 보였다.

Semi-supervised based Unknown Attack Detection in EDR Environment

  • Hwang, Chanwoong;Kim, Doyeon;Lee, Taejin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권12호
    • /
    • pp.4909-4926
    • /
    • 2020
  • Cyberattacks penetrate the server and perform various malicious acts such as stealing confidential information, destroying systems, and exposing personal information. To achieve this, attackers perform various malicious actions by infecting endpoints and accessing the internal network. However, the current countermeasures are only anti-viruses that operate in a signature or pattern manner, allowing initial unknown attacks. Endpoint Detection and Response (EDR) technology is focused on providing visibility, and strong countermeasures are lacking. If you fail to respond to the initial attack, it is difficult to respond additionally because malicious behavior like Advanced Persistent Threat (APT) attack does not occur immediately, but occurs over a long period of time. In this paper, we propose a technique that detects an unknown attack using an event log without prior knowledge, although the initial response failed with anti-virus. The proposed technology uses a combination of AutoEncoder and 1D CNN (1-Dimention Convolutional Neural Network) based on semi-supervised learning. The experiment trained a dataset collected over a month in a real-world commercial endpoint environment, and tested the data collected over the next month. As a result of the experiment, 37 unknown attacks were detected in the event log collected for one month in the actual commercial endpoint environment, and 26 of them were verified as malicious through VirusTotal (VT). In the future, it is expected that the proposed model will be applied to EDR technology to form a secure endpoint environment and reduce time and labor costs to effectively detect unknown attacks.

Elliptic Curve Signcryption Based Security Protocol for RFID

  • Singh, Anuj Kumar;Patro, B.D.K.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권1호
    • /
    • pp.344-365
    • /
    • 2020
  • Providing security has been always on priority in all areas of computing and communication, and for the systems that are low on computing power, implementing appropriate and efficient security mechanism has been a continuous challenge for the researchers. Radio Frequency Identification (RFID) system is such an environment, which requires the design and implementation of efficient security mechanism. Earlier, the security protocols for RFID based on hash functions and symmetric key cryptography have been proposed. But, due to high strength and requirement of less key size in elliptic curve cryptography, the focus of researchers has been on designing efficient security protocol for RFID based on elliptic curves. In this paper, an efficient elliptic curve signcryption based security protocol for RFID has been proposed, which provides mutual authentication, confidentiality, non-repudiation, integrity, availability, forward security, anonymity, and scalability. Moreover, the proposed protocol successfully provides resistance from replay attack, impersonation attack, location tracking attack, de-synchronization attack, denial of service attack, man-in-the-middle attack, cloning attack, and key-compromise attack. Results have revealed that the proposed protocol is efficient than the other related protocols as it takes less computational time and storage cost, especially for the tag, making it ideal to be used for RFID systems.