• Title/Summary/Keyword: C2 공격

Search Result 172, Processing Time 0.024 seconds

Analysis of Performance of Spoofing Detection Algorithm in GPS L1 Signal (GPS L1 기만신호 검출 알고리즘 성능 분석)

  • Kim, Taehee;Kim, Jaehoon;Lee, Sanguk
    • Journal of Satellite, Information and Communications
    • /
    • v.8 no.2
    • /
    • pp.29-35
    • /
    • 2013
  • In this paper, we investigate the type and detection methode of spoofing attack, and then analyze the performance of spoofing detection algorithm in GPS L1 signal through the simulation. Generally spoofer is different from the jammer, because the receiver can be operated and not. In case of spoofing the GPS receiver is hard to recognize the spoofing attack and can be operated normally without stopping because the spoofing signal is the mimic GPS signal. To evaluate the performance of spoofing detection algorithm, both the software based spoofing and GPS signal generator and the software based GPS receiver are implemented. In paper, we can check that spoofing signal can affect to the DLL and PLL tracking loop because code delay and doppler frequency of spoofing. The spoofing detection algorithm has been implemented using the pseudorange, signal strength and navigation solution of GPS receiver and proposed algorithm can effectively detect the spoofing signal.

The Effect of the Gurney Flap on NACA 00XX Airfoil (NACA 00XX 익형에 대한 Gurney 플랩의 영향)

  • Yoo, Neung-Soo
    • Journal of Industrial Technology
    • /
    • v.22 no.A
    • /
    • pp.59-65
    • /
    • 2002
  • The objective of this study is to provide the quantitative and qualitative computational data about the aerodynamic performance of Gurney flap on NACA 00XX airfoils and to show the optimum Gurney flap height for each airfoil. The test was performed on 7 different airfoils from NACA 0006 to NACA0024, which have a 3% chord(=c) thickness interval. For every NACA 00XX airfoil, Gurney flap heights were changed by 0.5% or 0.25% chord interval from 0 to 2.0%c to study their effects. The aerodynamic characteristics of clean and Gurney flap airfoil were compared, and the influences of Gurney flap on each airfoil were compared. As a CFD (Computational Fluid Dynamics) solver, FLUENT, based on Navier-Stokes code, was used to calculate the flow field around the airfoil. The fully-turbulent results were obtained using the standard $k-{\varepsilon}$ two-equation turbulence model. The test results showed that Gurney flap increased the lift coefficient much more than the drag coefficient over a certain range of the lift coefficient, so the lift-to-drag ratio, which is the important index of airfoil performance, was increased. Based on the test results, the relationship between the airfoil thickness and the optimum Gurney flap heights was suggested.

  • PDF

Implementation of Authentication Algorithm for CDMA Digital Mobile Communication System (CDMA 디지털 이동통신 시스템의 인증 알고리즘 구현)

  • Kim, Bum-Sik;Shin, In-Chul
    • Journal of IKEEE
    • /
    • v.3 no.2 s.5
    • /
    • pp.204-214
    • /
    • 1999
  • The user authentication service can be used to prevent telecommunications piracy and to demand reliable payment from subscriber. Over the last few years several of the cryptographic systems being used by the IS-41 North American Mobile telephones have been broken. These algorithms included ORYX, CMEA and CAVE. The process of replacing these algorithms is already underway. In this paper we designed a hash function and applied it to the authentication algorithm of IS-95A authentication system. We also analyzed the randomness properties of designed algorithm using statistical analysis and simulated the validity of this algorithm using C programming language.

  • PDF

Effects of Corona Electrode Shape and Discharge Gap Spacing on Ozone Concentration (방전공격과 방전극 형상이 오존발생농도에 미치는 영향)

  • Park, Seung-Lok;Lee, Jae-Chan;Jung, Sung-Jin;Moon, Jae-Duk
    • The Transactions of the Korean Institute of Electrical Engineers C
    • /
    • v.50 no.4
    • /
    • pp.169-175
    • /
    • 2001
  • Ozone has been widely applied to many industrial fields because of its strong oxidation power, Therefore, the studies have been carried out for the methods on an effective and high concentration ozone generation. The silent or surface discharge type ozone generators have been mainly used for high concentration ozone generation in many fields of applications. But these two types of ozone generators have shortcomings to be improved. In this study, the ozone generator which improved the shortcomings of above ozone generators was proposed and fabricated for the high concentration ozone generation. And the proposed ozone generator could generate the surface and barrier discharge simultaneously. For this purpose, a mesh type discharge electrode was proposed and studied as a function of the widths output maximum ozone concentration of 2.96[vol%] was obtained at 5.6[kV], 830[mA], for 0.3[mm] width and 0.8[mm] vacancy of the mesh electrode and gap spacing of 0.65[mm] respectively.

  • PDF

Biology of Torymus geranii (Walker), a Parasitoid of Chestnut Gall Wasp Dryocosmus kuriphilus Yasumatsu (Hymenoptera, Cynipidae) (밤나무혹벌(Dryocosmus kuriphilus)의 기생천적 남색긴꼬리좀벌(Torymus geranii)에 관한 생물학)

  • Kim, Chul-Su;Park, Il-Kwon;Kim, Jong-Kuk;Shin, Sang-Chul;Chung, Yeong-Jin;Choi, Kwang-Sik
    • Korean journal of applied entomology
    • /
    • v.44 no.3 s.140
    • /
    • pp.219-223
    • /
    • 2005
  • Torymus geranii was found to be a ectoparasitoid attacking the larvae of Dryocosmus kuriphilus. T. geranii has longevity of a $42.8{\pm}9.8$ days at $20^{\circ}C$ and $26.5{\pm}11.0$ day at $25^{\circ}C$ under conditions supplied with 100% honeydew. Oviposition numbers at 20 and $25^{\circ}C$ were $22.3{\pm}12.5$ and $42.2{\pm}18.4$, respectively. The eggs were oval in shape, measuring $0.56{\pm}0.33$ mm in length. The larvae, $2.94{\pm}0.18mm$ in length, was white and length of male and female pupae were $2.01{\pm}0.18mm$ and $2.73{\pm}0.09mm$, respectively. T. geranii had two generations with overwintering generation emerged on late May to early June at Chunchon, central part of Korea, however showed three generations with overwintering generation emerged on middle May to early June, the first one on late June to early July, and the second one on late July to earlyl August.

Construction of an Audio Steganography Botnet Based on Telegram Messenger (텔레그램 메신저 기반의 오디오 스테가노그래피 봇넷 구축)

  • Jeon, Jin;Cho, Youngho
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.127-134
    • /
    • 2022
  • Steganography is a hidden technique in which secret messages are hidden in various multimedia files, and it is widely exploited for cyber crime and attacks because it is very difficult for third parties other than senders and receivers to identify the presence of hidden information in communication messages. Botnet typically consists of botmasters, bots, and C&C (Command & Control) servers, and is a botmasters-controlled network with various structures such as centralized, distributed (P2P), and hybrid. Recently, in order to enhance the concealment of botnets, research on Stego Botnet, which uses SNS platforms instead of C&C servers and performs C&C communication by applying steganography techniques, has been actively conducted, but image or video media-oriented stego botnet techniques have been studied. On the other hand, audio files such as various sound sources and recording files are also actively shared on SNS, so research on stego botnet based on audio steganography is needed. Therefore, in this study, we present the results of comparative analysis on hidden capacity by file type and tool through experiments, using a stego botnet that performs C&C hidden communication using audio files as a cover medium in Telegram Messenger.

RELATIONSHIP OF MOTHERS' SELF-PERCEPTION WITH PERCEPTION OF CHILDREN'S PROBLEMS - FOCUSING ON VALIDITY SCALES OF MMPI & KPI-C - (어머니의 자기 지각 성향과 자녀 문제에 대한 지각 성향간의 관계 - MMPI와 KPI-C의 타당도 척도를 중심으로 -)

  • Kim, Keun-Hyang;Jung, Yoo-Sook;Hong, Sung-Do;Kim, E-Yong;Kim, Ji-Hae
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.9 no.2
    • /
    • pp.174-179
    • /
    • 1998
  • Objective:Present study investigated the relationship between mothers' self-perception and perception of children's problems. Method:Subjects were 63 children, mothers, who visited child & adolescent psychiatric clinic. Their mothers completed Minnesota Mulpiphasic Personality Inventory(MMPI) & Korean Personality Inventory for Children(KPI-C). Correlation between validity scales of mothers' MMPI and validity scales of KPI-C was analysed, and then we divided subjects into two group(High & Low Group) according to the MMPI validity scales, and compared KPI-C's validity scales by student t-test. Result:There were significant positive correlation(r=.30) between K scale of MMPI and L scale of KPI-C, significant negative correlation(r=-.32) F scale of MMPI and L scale of KPI-C. The Means of T scores did show significant difference according to MMPI F, K scales in KPI-C L scale, to MMPI L scale in KPI-C F scale. Conclusion:These results indicated that defensive mothers tend to perceive her child's problems more defensively. However mothers who exaggerate their problem more severely, do not exaggerate their children's problem. Therefore, these result suggested that we should be careful not to underestimate children's problem whose mother elevated in K scale of MMPI.

  • PDF

Analysis on Decryption Failure Probability of TiGER (TiGER의 복호화 실패율 분석)

  • Seungwoo Lee;Jonghyun Kim;Jong Hwan Park
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.157-166
    • /
    • 2024
  • Probability of decryption failure of a public key cryptography based on LWE(learning with errors) is determined by its architecture and parameter settings. Since large decryption failure probability leads to attacks[1] on scheme as well as degradation of performance, TiGER[2], a Ring-LWE(R)-based KEM proposed for the first round of KpqC, tried to reduce the decryption failure probability by using error correction code Xef and D2 encoding method. However, D'Anvers et al. has shown that the commonly assumed independence of each bit error is not established since in the case of an encryption scheme based on Ring-LWE(R) using an error correction code, there is error dependency which is not negligible[3]. In this paper, since TiGER does not consider the error dependency, we calcualte the decryption failure probability of TiGER by considering the error dependency. In addition, we found that the bit error probability is incorrectly calculated in TiGER, so we present the correct calculation.

Biological Studies on Torymus sinensis Kamijo (Hymenoptera, Torymidae), a Parasitoid of Chestnut Gall Wasp Dryocosmus Kuriphilus Yasumatsu(Hymenoptera, Cynipidae) (밤나무혹벌의 기생천적 Torymus sinensis에 관한 생태학적 연구)

  • 김종국
    • Korean journal of applied entomology
    • /
    • v.38 no.2
    • /
    • pp.85-91
    • /
    • 1999
  • Torymus sinensis was found to be a solitary ectoparasitoid attacking the larvae ofDryocosmus kuriphilus. The sex ratio of Torymus sinensis was close to 1 : 1 in foreign chestnut varieties.Under constant temperatures of 15"C, 20$^{\circ}$C, and 25"C, the preoviposition period and longevity of theadult was longer at lower temperatures when fed on honey. Most of the Torymus sinensis female havemature eggs in their ovaries just after emergence. The number of mature eggs reached to average 22.5individuals per female in four days, which was the highest value, after the emergence and then decreasedgradually. Eggs were laid on the larvae of the host or attached on inner surface of the gall chamber. Theeggs were oval in shape, measuring 0.49 mm length and 0.13 mm width and the color of the justoviposited egg was milky white. The larvae appeared in one day after being deposited at 20$^{\circ}$C. Thepupae, 2.25 mm length for female and 1.89 mm length for male, was milky white in color just afterpupation but became black later. In Kangwon Province, development period of chestnut galls formated byDryocosmus kuriphilus were mid April to late May and its primary parasitoid, Torymus sinensis adult,emerged from withered previous year galls in early April to early May. This species has one generation ina year, and hibernated with the matured larvae. hibernated with the matured larvae.

  • PDF

Mechanism of the Hydrolysis of Phenyl N-(p-chlorobenzoyl)Chloroformimidate Derivatives in Acid Media (산성용액 중에서 Phenyl N-(p-chlorobenzoyl)chloroformimidate 유도체의 가수분해 반응 메카니즘)

  • Nack-Do Sung;Young-Gu Cheun;Ki-Sung Kwon;Tae-Rin Kim
    • Journal of the Korean Chemical Society
    • /
    • v.31 no.4
    • /
    • pp.352-358
    • /
    • 1987
  • Rate constants for the hydrolysis of para-substituted phenyl N-(p-chlorobenzoyl)chloroformimidate (I) derivatives in 1 : 4 dioxane-water at $25^{\circ}C$ have been determined. Rate data, substituent effect $(\rho\>{\rho}^+)$, product analysis and MO calculation indicate that the uncatalyzed reaction proceeds through an $S_N1$ mechanism involving the formation of azocarbonium ion (II) below pH 3.0, and the base-catalyzed reaction proceeds through an $S_N2$ mechanism via transition state (III) above pH 4.0. The relative stability of four peri planar conformational isomers were (E-ap) > (Z-ap) > (E-sp) > (Z-ap), respectively, and the most stable stereo structures shows that the Y-substituted phenyl group $(C_6H_4-Y)$ occupy vertical $(90^{\circ})$ position on the plane of the benzimidochloroformyl group in (E-ap) conformer. The nucleophilic substitution of water molecule occurs by sigma attack to the activatived azomethine carbon atom of (I) derivatives.

  • PDF