• Title/Summary/Keyword: Counter attack

Search Result 95, Processing Time 0.024 seconds

Heat/Mass Transfer and Friction Characteristic in a Square Duct with Various Discrete Ribs -In-Lined Gap Arrangement Ribs- (덕트내 요철의 단락위치 변화에 따른 열/물질전달 및 압력강하 특성 - 정렬 단락배열 요철 -)

  • Lee, Sei-Young;Choi, Chung;Rhee, Dong-Ho;Cho, Hyung-Hee
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.25 no.11
    • /
    • pp.1640-1649
    • /
    • 2001
  • The present study investigates the effects of various rib arrangements on heat/mass transfer in the cooling passage of gas turbine blades. A complex flow structure occurs in the cooling passage with rib turbulators which promote heat transfer on the wall. It is important to increase not only the heat transfer rates but also the uniformity of heat transfer in the cooling passage. A numerical computation is performed using a commercial code to calculate the flow structures and experiments are conducted to measure heat/mass transfer coefficients using a naphthalene sublimation technique. A square channel (50 mm $\times$ 50 mm) with rectangular ribs (4 mm $\times$ 5 mm) is used fur the stationary duct test. The experiments focus on the effects of rib arrangements and gap positions in the discrete ribs on the heat/mass transfer on the duct wall. The rib angle of attack is 60°and the rib-to-rib pitch is 32 mm, that is 8 times of the rib height. With the inclined rib angle of attack (60°), the parallel rib arrangements make a pair of counter rotating secondary flows in the cross section, but the cross rib arrangements make a single large secondary flow including a small secondary vortex. These secondary flow patterns affect significantly the heat/mass transfer on the ribbed wall. The heat/mass transfer in the parallel arrangements is 1.5 ∼2 times higher than that in the cross arrangements. However, the shifted rib arrangements change little the heat/mass transfer from the inline rib arrangements. The gap position in the discrete rib affects significantly the heat/mass transfer because a strong flow acceleration occurs locally through the gap.

Cyber Threats Prediction model based on Artificial Neural Networks using Quantification of Open Source Intelligence (OSINT) (공개출처정보의 정량화를 이용한 인공신경망 기반 사이버위협 예측 모델)

  • Lee, Jongkwan;Moon, Minam;Shin, Kyuyong;Kang, Sungrok
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.115-123
    • /
    • 2020
  • Cyber Attack have evolved more and more in recent years. One of the best countermeasure to counter this advanced and sophisticated cyber threat is to predict cyber attacks in advance. It requires a lot of information and effort to predict cyber threats. If we use Open Source Intelligence(OSINT), the core of recent information acquisition, we can predict cyber threats more accurately. In order to predict cyber threats using OSINT, it is necessary to establish a Database(DB) for cyber attacks from OSINT and to select factors that can evaluate cyber threats from the established DB. We are based on previous researches that built a cyber attack DB using data mining and analyzed the importance of core factors among accumulated DG factors by AHP technique. In this research, we present a method for quantifying cyber threats and propose a cyber threats prediction model based on artificial neural networks.

New Higher-Order Differential Computation Analysis on Masked White-Box AES (마스킹 화이트 박스 AES에 대한 새로운 고차 차분 계산 분석 기법)

  • Lee, Yechan;Jin, Sunghyun;Kim, Hanbit;Kim, HeeSeok;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.1-15
    • /
    • 2020
  • As differential computation analysis attack(DCA) which is context of side-channel analysis on white-box cryptography is proposed, masking white-box cryptography based on table encoding has been proposed by Lee et al. to counter DCA. Existing higher-order DCA for the masked white box cryptography did not consider the masking implementation structure based on table encoding, so it is impossible to apply this attack on the countermeasure suggested by Lee et al. In this paper, we propose a new higher-order DCA method that can be applied to the implementation of masking based on table encoding, and prove its effectiveness by finding secret key information of masking white-box cryptography suggested by Lee et al. in practice.

Secure Routing Mechanism to Defend Multiple Attacks in Sensor Networks (무선 센서 네트워크에서 다중 공격 방어를 위한 보안 라우팅 기법)

  • Moon, Soo-Young;Cho, Tae-Ho
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.1
    • /
    • pp.45-56
    • /
    • 2010
  • Sensor Networks are composed of many sensor nodes, which are capable of sensing, computing, and communicating with each other, and one or more sink node(s). Sensor networks collect information of various objects' identification and surrounding environment. Due to the limited resources of sensor nodes, use of wireless channel, and the lack of infrastructure, sensor networks are vulnerable to security threats. Most research of sensor networks have focused on how to detect and counter one type of attack. However, in real sensor networks, it is impractical to predict the attack to occur. Additionally, it is possible for multiple attacks to occur in sensor networks. In this paper, we propose the Secure Routing Mechanism to Defend Multiple Attacks in Sensor Networks. The proposed mechanism improves and combines existing security mechanisms, and achieves higher detection rates for single and multiple attacks.

Analysis of Security Vulnerability on Firewall Logging Mechanism against DDoS Attack (DDoS 공격에 대한 방화벽 로그 기록 취약점 분석)

  • Choun, Jun-Ho;Jang, Kun-Won;Jun, Moon-Seog;Shin, Dong-Gyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.6
    • /
    • pp.143-148
    • /
    • 2007
  • In the context of mass traffic, firewall system cannot record normal log files against DDoS attack. The loss of log record causes that a firewall system does not know whether a packet is normally filtered or not, and firewall log, which is an essential data for the counter measure of violation accident, cannot be verified as trusted. As a network speed increases, these problems happen more frequently and largely. Accordingly, the method to use simply additional hardware devices is not recommended for the popularization of firewall. This paper is devoted to verify the loss of iptable log that is the mother's womb of most domestic firewall systems and show that the log handling methods for conventional firewall systems are needed to improve.

Weight Recovery Attacks for DNN-Based MNIST Classifier Using Side Channel Analysis and Implementation of Countermeasures (부채널 분석을 이용한 DNN 기반 MNIST 분류기 가중치 복구 공격 및 대응책 구현)

  • Youngju Lee;Seungyeol Lee;Jeacheol Ha
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.919-928
    • /
    • 2023
  • Deep learning technology is used in various fields such as self-driving cars, image creation, and virtual voice implementation, and deep learning accelerators have been developed for high-speed operation in hardware devices. However, several side channel attacks that recover secret information inside the accelerator using side-channel information generated when the deep learning accelerator operates have been recently researched. In this paper, we implemented a DNN(Deep Neural Network)-based MNIST digit classifier on a microprocessor and attempted a correlation power analysis attack to confirm that the weights of deep learning accelerator could be sufficiently recovered. In addition, to counter these power analysis attacks, we proposed a Node-CUT shuffling method that applies the principle of misalignment at the time of power measurement. It was confirmed through experiments that the proposed countermeasure can effectively defend against side-channel attacks, and that the additional calculation amount is reduced by more than 1/3 compared to using the Fisher-Yates shuffling method.

Study on Police-led National Response against CBRN Terror by Strengthening the Standing Cooperation System of the Interagencies (다부처 상설 협력체계 구축을 통한 경찰주도 국가 화생방 테러대응 발전방안)

  • Cha, Jang-Hyeon;Kang, Taeho;Kim, Daesoo;Lee, Hochan
    • Korean Security Journal
    • /
    • no.59
    • /
    • pp.217-242
    • /
    • 2019
  • Nowadays, Terrorism has become bloodier. Unlike the past, the recent terrorism has been indiscriminate in the purpose of mass- killing. Given this aspect, the threat of a CBRN attack is the biggest one to modern society. Notably, the possibility of terrorist attacks in Korea by international terrorist groups such as ISIL is higher than ever in consideration of its allusion; crusades and the devil's allied forces. To overcome these circumstances, various measures have been taken for counter terrorism at the state level including anti-terrorist legislation. Under the anti-terrorist act, police have to lead relevant inter agencies when it comes to the CBRN terror. At first glance, current countermeasures would work well. However, in order to respond quickly, the standing cooperations system of related departments need to be set up. In this sense, this article proposed a coagulatory body that could not only consider institutional-oriented organizational restructuring and response but also integrate and operate functions of various specialized institutions. It also stressed that the council should move toward a consultative body of information gathering, distribution and working- level consultation. With this cooperation system, counter-terrorism agencies can respond rapidly, stop wasting their effort and assets by about 30%. Also, they could design the atypical aspect of terrorism into standardized.

Correlation Between Knowledge and Educational Needs Related to Recurrent in Coronary Artery bypass graft patients (관상동맥 우회술환자의 수술 후 재발 관련 지식과 교육요구도와의 상관관계)

  • 김희승;박민정
    • Journal of Korean Academy of Nursing
    • /
    • v.30 no.3
    • /
    • pp.549-559
    • /
    • 2000
  • The purpose of this study was to investigate the correlation between the knowledge and educational needs related to recurrent in coronary artery bypass graft patients as a basis to provide an individual nursing education for the population. The subjects consisted of 110 patients who had coronary artery bypass graft(CABG) at Asan Medical Center in Seoul and Sechong hospital in Buchon. Data was obtained from a knowledge questionnaire and a learning needs questionnaire between November 1998 and February 1999. Data were analyzed using SAS program for Wilcoxon rank sum test and Spearman correlation coefficient. The results were as follows : 1. With regard to the 18 items to measure knowledge, the mean (median) of items 'don't know' was 4.9(4) items. The mean (median) of items answered wrong was 3.2(3) items. The number of items answered 'don't know' tend to show higher in those who had less education, blue color jobs and myocardiac infarction history than in their counter parts. There were higher frequency of items answered 'don't know' in those who had no hypertension 2. With regard to the level of knowledge by questionnaire about CABG, The most "I dont know" (59.1%) highly response was 'He has to be treated with anticoagulant drug to prevent revasculized vessel from obstructing.' The seond highest response (56.4%) was 'If you were hypotensive, the coronary attack would collapse. 'During the hospitalized day, the patient has complete bedrest.' The highest error probability was cholesterol has not to intake.', 'After surgery, the sexual life is need controlled for 1 year. 3. The mean of educational needs was 3.38. With regard to the level of learning needs by sentence about CABG, 'Food that benefit heart disease', 'Recurrence possibility of heart disease', 'Management method of operation site', 'Risk symptom that visit hospital or report immediately' were higher than other sentenses. With regard to the level of learning needs by factor 'food(5 items)', 'disease(9 items)' and 'exercise(3 items)' showed the highest than other factors. The educational needs by patients characteristics tend to show higher in males, under the age of 49, middle or high school degree, previous experience of admission with coronary artery disease, history of myocardial infarction, expierience of PTCA, history of cerebro-vascular accident, previous expierience of smoking than in their counter parts. 4. The number of items answered 'don't know', wrong and correct weren't correlated with the level educational needs. As the results, the number of items answered 'don't know' tend to show higher in those who had less educated, blue color jobs and myocardiac infarction history than in their counter parts. There were higher frequency of items answered 'don't know' in those who had no hypertension .There were higher frequency of items answered 'don't know' on anti-thrombolitic theraphy, hypotension and pain relief. Also there were higher frequency of items answered wrong on bed rest period, cholesterol intake, and sexual life. Educational needs were higher in young age group, had previous experience of procesure and history of other disease. And when we educate CABG patients, education for diet, recurrence possibility of disease, management methods of operation site and risk symptom should be emphasized.

  • PDF

A Comparative Study on Each Nation's Counter terrorism Organization and Function (각국의 테러대응 조직과 기능의 비교 연구)

  • Kwon, Jeong-Hoon;Kim, Tae-Hwan
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.45-69
    • /
    • 2009
  • This study is to present effective and rational strategies by comparing and analyzing plans of some nations such as the United States, Britain, Germany and Japan against terrorism. Nations mentioned above have made alliance to prevent the possible terrorism after 9.11 attack and performed various tasks efficiently. The result of this study is summarized as follows. First, it is required that there should be an integrated system which works properly. Each nation has not distinguished natural disaster from man-made one based on the damage and the abilities of authorities to deal with. On the other hand, South Korea tells two disasters according to causes and runs distributed systems in which each government division performs its duties to manage each disaster. Accordingly, in economic terms, it is much more effective to provide integrated counter terrorism, not distributed one. Second, information sharing must be stimulated. To take actions quickly when an accident occurs, the government needs to have united and integrative systems, which make it prepare for various types of terrorism well. In addition, it is necessary for a government-related organization to tie up with other channels for collecting, analyzing and sharing information. For this, integrative systems for terrorism should be taken into consideration.

  • PDF

Damage Analysis of CCD Image Sensor Irradiated by Continuous Wave Laser (연속발진 레이저에 의한 CCD 영상센서의 손상 분석)

  • Yoon, Sunghee;Jhang, Kyung-Young;Shin, Wan-Soon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.19 no.6
    • /
    • pp.690-697
    • /
    • 2016
  • EOIS(electro-optical imaging system) is the main target of the laser weapon. Specially, the image sensor will be vulnerable because EOIS focuses the incident laser beam onto the image sensor. Accordingly, the laser-induced damage of the image sensor needs to be identified for the counter-measure against the laser attack. In this study, the laser-induced damage of the CCD image sensor irradiated by the CW(continuous wave) NIR(near infrared) laser was experimentally investigated and mechanisms of those damage occurrences were analyzed. In the experiment, the near infrared CW fiber laser was used as a laser source. As the fluence, which is the product of the irradiance and the irradiation time, increased, the permanent damages such as discoloration and breakdown appeared sequentially. The discoloration occurred when the color filter was damaged and then the breakdown occurred when the photodiode and substrate were damaged. From the experimental results, LIDTs(laser-induced damage thresholds) of damages were roughly determined.