• Title/Summary/Keyword: Countermeasure

Search Result 1,892, Processing Time 0.026 seconds

Simulation of 2-color Concentric Annular Ring Reticle Seeker and Counter-countermeasure using LMS Algorithm (2-color 동심원 레티클 탐색기의 시뮬레이션 및 LMS 방법을 이용한 반대응능력)

  • 홍현기
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.12A
    • /
    • pp.1990-1999
    • /
    • 2001
  • This paper presents a dynamic simulation loop that gives tracking results of 2-color concentric annular ring (CAR) reticle seeker. Our simulation tool includes the target/flare model and a proportional navigation guidance (PNG) loop. The CAR reticle system performances and the flare effects are analyzed in various scenarios. When a flare is present in the field of view (FOV), the simulation results show that the reticle seeker cannot keep a precise target tracking. In this paper, we propose 2-color counter-countermeasure (CCM) using the least mean square (LMS) method to cope with a presence of IR flare. The proposed method makes a simultaneous process in two infrared (IR) wavelength bands: MWIR add SWIR. The simulation results have shown that our adaptive IRCCM algorithm can achieve an effective cancellation of the flare signal with a relatively high intensity.

  • PDF

The Analysis of Rainwater Storage Facility Project for the Urban Disaster Prevention in Busan and its Countermeasures (도시방재를 위한 부산지역 우수저류시설 설치사업의 분석과 대책)

  • Hwang, Jae-Yun
    • Tunnel and Underground Space
    • /
    • v.25 no.1
    • /
    • pp.37-45
    • /
    • 2015
  • Recently, many cities have always been affected by large natural disasters such as floods and landslides. As climate change causes more frequent localized heavy rains exceeding the conveyance capacity of sewer, flood damage is expected to increase. For the sake of reducing the urban flood damage by changed rainfall, there has been many trials on installation of runoff-reducing facilities. Therefore, it was required to study about reasonable analysis and countermeasure of rainwater storage facility project for extending it. This study was to review the status of rainwater storage facility project for the urban disaster prevention in Busan, to find out problems, and to propose the countermeasure of rainwater storage facility project for the urban disaster prevention.

Analysis in Technological Responses to Side-channel Attack (부채널 공격에 대한 대응기술 분석)

  • d, Young-Jin;Jo, JungBok;Lee, HoonJae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.219-222
    • /
    • 2013
  • The Side Channel attack methods proposed by P.Kocher are mainly used for cryptanalysis different cipher algorithms even though they are claimed to be strongly secured. Those kinds of attacks depend on environment implementation especially on the hardware implementation of the algorithm to the crypto module. side-channel attacks are a type of attack introduced by P.Kocher and is applicable according to each environment or method that is designed. This kind of attack can analyze and also extract important information by reading the binary code data via measurement of changes in electricity(voltage) consumption, running time, error output and sounds. Thus, in this paper, we discuss recent SPA and DPA attacks as well as recent countermeasure techniques.

  • PDF

Vibration Reducing Method for High Pressure Feedwater Heater Drain Piping System (고압급수가열기 배수계통 배관계 고진동 해소방안 연구)

  • Lee, Wook-Ryun;Lee, Jun-Shin;Kim, Sang-Bok;Hong, Soon-Bup;Shin, Yong-Woo
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2006.05a
    • /
    • pp.1290-1295
    • /
    • 2006
  • The 120 meters high pressure feedwater heater drain piping in nuclear power plant had been suffered by excessive vibration from the beginning of power generation. As time goes by, the piping vibration was beyond the allowable limit and an appropriate countermeasure was required to prevent the fatigue failure of the pipeline from the abnormal vibration. In this study, the vibrational characteristics of high pressure feedwater heater drain piping and the countermeasure for abnormal vibration were investigated. Among the several vibration reduction methods, the piping layout changed by making the smooth pipeline was applied to the high Pressure feedwater heater drain piping in nuclear Power plant. Applying the countermeasure, the vibration level was found to reduce over 54 percents and was satisfied under the allowable velocity at the full-power operation condition.

  • PDF

A Study of Countermeasures for Advanced Persistent Threats attacks by malicious code (악성코드의 유입경로 및 지능형 지속 공격에 대한 대응 방안)

  • Gu, MiSug;Li, YongZhen
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.4
    • /
    • pp.37-42
    • /
    • 2015
  • Due to the advance of ICT, a variety of attacks have been developing and active. Recently, APT attacks using malicious codes have frequently occurred. Advanced Persistent Threat means that a hacker makes different security threats to attack a certain network of a company or an organization. Exploiting malicious codes or weaknesses, the hacker occupies an insider's PC of the company or the organization and accesses a server or a database through the PC to collect secrets or to destroy them. The paper suggested a countermeasure to cope with APT attacks through an APT attack process. It sought a countermeasure to delay the time to attack taken by the hacker and suggested the countermeasure able to detect and remove APT attacks.

  • PDF

Countermeasure on the Suppression of Micro Surge and Noise for a Induction Motor Driven by Commercial Inverter (상용인버터 구동 유도전동기의 마이크로 서지 및 노이즈 억제에 관한 대책)

  • Kim, Duk-Hyun;Choi, Jeong-Won
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.22 no.10
    • /
    • pp.111-117
    • /
    • 2008
  • Generally, speed control for Induction motor widely used in industrial field is accomplished by commercial inverter. Induction motor driven by commercial inverter causes the micro surge voltage because of high speed switching of inverter. Micro surge brings about not only the breakdown of motor but also noise in PLC control system. And they court the enormous interference in activity for production. In this paper, we suggest the suppressible countermeasure for the breakdown of motor after the consideration of productive mechanism about micro surge. Experiment is performed by inverter with LCR filler in its output terminal. As a result, we confirmed that micro surge voltage is reduced. And the suppressible countermeasure for the noise of PLC control system is suggested by theoretical consideration.

Actual Conditions of Cyberbullying and the Countermeasure (사이버 괴롭힘의 실태와 대응방안)

  • Lim, Woon-sik;Choi, Hyun-sick
    • Journal of the Society of Disaster Information
    • /
    • v.6 no.1
    • /
    • pp.122-137
    • /
    • 2010
  • The purpose of this study is to find the exact state of cyberbullying and the countermeasure for it. cyberbullying is characterized by having the wideness, the anonymity and the intellectualization unlike the harassment of off-line. The result of this study, the cyberbullying is increased through the e-mail, cellular phone, and website around the teenagers. In particular, the cyberbullying has appeared mainly among the same age friends, it is proved that injurers inflict the harassment mainly at their own place and the ratio of the harassment by one self is higher than many. In addition, it is quite probable that the injurer-student who inflicts the harassment in off-line also can do it in on-line and to attack the cyberbullying is easy to find by the student who is indulged himself in internet use. Therefore, it is presented that the countermeasure in educational side and systematic side on this study. First on the educational side, there are presented the practice of the preventive education against the cyberbullying, expansion of the preventive schools for the cyber ethics and cyber crime and strengthening of the guideline for students in cyberspace. Second on the systematic side, there are presented the appointment of various committee, to strengthen the protection of damaged students, preparation of laws for cyberbullying, expansion of information office for internet addiction, improvement of the system for the school custodian and to extend the operating for cyber clearness school.

Cyber attack taxonomy for digital environment in nuclear power plants

  • Kim, Seungmin;Heo, Gyunyoung;Zio, Enrico;Shin, Jinsoo;Song, Jae-gu
    • Nuclear Engineering and Technology
    • /
    • v.52 no.5
    • /
    • pp.995-1001
    • /
    • 2020
  • With the development of digital instrumentation and control (I&C) devices, cyber security at nuclear power plants (NPPs) has become a hot issue. The Stuxnet, which destroyed Iran's uranium enrichment facility in 2010, suggests that NPPs could even lead to an accident involving the release of radioactive materials cyber-attacks. However, cyber security research on industrial control systems (ICSs) and supervisory control and data acquisition (SCADA) systems is relatively inadequate compared to information technology (IT) and further it is difficult to study cyber-attack taxonomy for NPPs considering the characteristics of ICSs. The advanced research of cyber-attack taxonomy does not reflect the architectural and inherent characteristics of NPPs and lacks a systematic countermeasure strategy. Therefore, it is necessary to more systematically check the consistency of operators and regulators related to cyber security, as in regulatory guide 5.71 (RG.5.71) and regulatory standard 015 (RS.015). For this reason, this paper attempts to suggest a template for cyber-attack taxonomy based on the characteristics of NPPs and exemplifies a specific cyber-attack case in the template. In addition, this paper proposes a systematic countermeasure strategy by matching the countermeasure with critical digital assets (CDAs). The cyber-attack cases investigated using the proposed cyber-attack taxonomy can be used as data for evaluation and validation of cyber security conformance for digital devices to be applied, and as effective prevention and mitigation for cyber-attacks of NPPs.

A Study on the Test and Evaluation Methodology for the Precise Encountering Scenario between Ammunitions (탄약 간 정밀교전을 위한 시험평가기법 연구)

  • Ha, Jongsoo;Park, Youngsik;Lee, Hanjin;Kim, Yongjae;Kwak, Yoon;Park, Minkyu
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.6
    • /
    • pp.776-783
    • /
    • 2018
  • This paper proposes an improved test and evaluation methodology to be conducted for a in-flight threat-countermeasure encounter scenario. Although the conventional test method adopted in the precedent researches allows high precision and safety, such full-scale method is practically not appropriate to apply to small-scale test rounds for evaluating the subparts of the ammunition. To address this problem, this study suggests a readily-applicable, small-scale test and evaluation method of the subpart of the ammunition in firing test. In the threat-countermeasure encounter scenario, the results of several tests demonstrate that the proposed technique does not deteriorate the precision when the engagement point should be adjusted.

A Random M-ary Method-Based Countermeasure against Power Analysis Attacks on ECC (타원곡선 암호시스템에서 랜덤 m-ary 방법을 사용한 전력분석 공격의 대응방법)

  • 안만기;하재철;이훈재;문상재
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.3
    • /
    • pp.35-43
    • /
    • 2003
  • The randomization of scalar multiplication in ECC is one of the fundamental concepts in defense methods against side-channel attacks. This paper proposes a countermeasure against simple and differential power analysis attacks through randomizing the transformed m-ary method based on a random m-ary receding algorithm. The proposed method requires an additional computational load compared to the standard m-ary method, yet the power consumption is independent of the secret key. Accordingly, since computational tracks using random window width can resist against SPA and DPA, the proposed countermeasure can improve the security for smart cards.