• Title/Summary/Keyword: Expected Attack

Search Result 217, Processing Time 0.024 seconds

Hacking and Countermeasure on Smart TV (스마트 TV 해킹 위협 및 대응방안 분석)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.313-317
    • /
    • 2014
  • Smart-phone, PC or tablet platforms, such as smart terminals spread to the masses trying to capitalize. Smart TV also is increasing. In Korea, market size of TV is growing fast with growth of risk of hacking. In this paper, several kinds of Smart TV hacking cases are presented with the possibility of attacks against the vulnerability analysis and countermeasures. Most of the Linux operating system is open. Thus, it is vulnerable for latest hacking techniques. Most are based on the Linux OS to enhance security mount Sand-Box. However, bypass procedure using the technique, or APT attacks can avoid San-Box technique. New hacking techniques and a variety of ways will occur in the future. Therefore, this paper will develop Smart TV, and it analysis of a security threat and establishes better prepared in the future because new hacking attacks are expected to prepare more.

A Study on WB(Water-Bubble) Based Highly Secure Flexible Network Section (WB(Water-Bubble) 기반의 강한 보안성을 갖는 탄력적 네트워크 구간에 관한 연구)

  • Seo, Woo-Seok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.5
    • /
    • pp.737-746
    • /
    • 2017
  • In 2017, amid changes in the security market such as integrated security (IS) and convergence security (CS), a variety of security paradigms in terms of operation and management have been suggested. Rather than changing existing network infrastructure and bringing about fluid, multi-dimensional changes, these solutions and technologies focus entire security capacity on a primary protection, leading to network infrastructure suffering from unexpected inherent violations and problems in a continued manner. Therefore, it is time to propose and develop a flexible network section that can protect from attacks of similar pattern and concentrated traffic attacks by applying a new concept of WB (Water-Bubble) to network infrastructure and analyzing on the basis of experiment and installation. Methodology of the WB-based highly secure flexible network section proposed in this study is expected to provide materials for studies on how to achieve network section security taking into account three major limitations and security standards: fluidity, unpredictability, and non-area scalability by contact point ratio, by changing a network area predicted to be the final target of attack into resonant network section (area) with flexible area changes.

Preparation and characterization of PVDF/alkali-treated-PVDF blend membranes

  • Liu, Q.F.;Li, F.Z.;Guo, Y.Q.;Dong, Y.L.;Liu, J.Y.;Shao, H.B.;Fu, Z.M.
    • Membrane and Water Treatment
    • /
    • v.7 no.5
    • /
    • pp.417-431
    • /
    • 2016
  • Poly(vinylidene fluoride) (PVDF) powder was treated with aqueous sodium hydroxide to obtain partially defluorinated fluoropolymers with expected properties such as improving hydrophilicity and fouling resistance. Raman spectrum and FT-IR results confirmed the existence of conjugated carbon double bonds after alkaline treatment. As the concentration increased, the degree of defluorination increased. The morphology and structure of membranes were examined. The permeation performance was investigated. The results showed that membrane's hydrophilicity increased with increase of the percentage of alkaline treated PVDF powder. Moreover, in terms of the water contact angle, it decreased from $92^{\circ}$ to a minimum of $68^{\circ}$; while water up take increased from 128 to 138%. Fluxof pure water and the cleaning efficiency increased with the increase of alkaline treated PVDF powder. The fouling potential also decreased with the increase of the percentage of alkaline treated PVDF powder. The reason that makes blending PVDF show different characteristics because of partial defluorination, which led the formation of conjugated C = C bonds and the inclusion of oxygen functionalities. The polyene structure followed by hydroxide attack to yield hydroxyl and carbonyl groups. Therefore, the hydrophilicity of blending membrane was improved. The SEM and porosity measurements showed that no obvious variations of the pore dimensions and structures for blend membranes were observed. Mechanical tests suggest that the high content of the alkaline treated PVDF result in membranes with less tolerance of tensile stress and higher brittleness. TGA results exhibited that the blend of alkaline treated PVDF did not change membrane thermal stability.

Investigation of Steam Generator Tube Stress Corrosion Cracking Induced by Lead (납에 의한 증기발생기 전열관 응력부식균열 평가)

  • Kim, Dong-Jin;Hwang, Seong Sik;Kim, Joung Soo;Kim, Hong Pyo
    • Transactions of the Korean Society of Pressure Vessels and Piping
    • /
    • v.5 no.2
    • /
    • pp.1-6
    • /
    • 2009
  • Nuclear power plants (NPP) using Alloy 600 (Ni 75wt%, Cr 15wt%, Fe 10wt%) as a heat exchanger tube of the steam generator (SG) have experienced various corrosion problems by ageing such as pitting, intergranular attack (IGA) and stress corrosion cracking (SCC). In spite of much effort to reduce the material degradations, SCC is still one of important problems to overcome. Especially lead is known to be one of the most deleterious species in the secondary system that cause SCC of the alloy. Even Alloy 690 (Ni 60wt%, Cr 30wt%, Fe 10wt%) as an alternative of Alloy 600 because of outstanding superiority to SCC is also susceptible to leaded environment. An oxide on SG tubing materials such as Alloy 600 and Alloy 690 is formed and modified expanding to complex sludge throughout hideout return (HOR) of various impurities including Pb. Oxide formation and breakdown is requisite for SCC initiation and propagation. Therefore it is expected that an oxide property such as a passivity of an oxide formed on steam generator tubing materials is deeply related to PbSCC and an inhibitor to hinder oxide modification by lead efficiently can be found. In the present work, the SCC susceptibility obtained by using a slow strain rate test (SSRT) in aqueous solutions with and without lead was discussed in view of the oxide property. The oxides formed on Alloy 600 and Alloy 690 in aqueous solutions with and without lead were examined by using a transmission electron microscopy (TEM), an energy dispersive x-ray spectroscopy (EDXS), an x-ray photoelectron spectroscopy (XPS) and an electrochemical impedance spectroscopy (EIS).

  • PDF

Development of a Methodology for Detecting Intentional Aggressive Driving Events Using Multi-agent Driving Simulations (Multi-agent 주행 시뮬레이션을 이용한 운전자 주행패턴을 반영한 공격운전 검지기법 개발)

  • KIM, Yunjong;OH, Cheol;CHOE, Byongho;CHOI, Saerona;KIM, Kiyong
    • Journal of Korean Society of Transportation
    • /
    • v.36 no.1
    • /
    • pp.51-65
    • /
    • 2018
  • Intentional aggressive driving (IAD) is defined as a hazardous driving event that the aggressive driver intentionally threatens neighbor drivers with abrupt longitudinal and lateral maneuvering. This study developed a methodology for detecting IAD events based on the analysis of interactions between aggressive driver and normal driver. Three major aggressive events including rear-close following, side-close driving, and sudden deceleration were analyzed to develop the algorithm. Then, driving simulation experiments were conducted using a multi-agent driving simulator to obtain data to be used for the development of the detection algorithm. In order to detect the driver's intention to attack, a relative evaluation index (Erratic Driving Index, EDI) reflecting the driving pattern was derived. The derived IAD event detection algorithm utilizes both the existing absolute detection method and the relative detection method. It is expected that the proposed methodology can be effectively used for detecting IAD events in support of in-vehicle data recorder technology in practice.

Design of Smart Service based on Reverse-proxy for the Internet of Things (리버스 프록시 기반 IoT 서비스 도메인 설계)

  • Park, Jiye;Kang, Namhi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.1-6
    • /
    • 2014
  • The IoT (Internet of Things) is considered as a core technology to realize interconnected world. At this, companies composing ICT industry and standard organizations make efforts to accelerate it. IETF CoRE(Constrained RESTful Environment) working group standardized CoAP (Constrained Application Protocol) for the constrained device. CoAP has RESTful architecture and CoAP option is provided to use forward-proxy. The forward-proxy is used to translate protocol and perform requests on behalf of the client. However, communication between Internet based client and LLN(Low-power and Lossy Network) based CoAP server architecture has limitations to deploy real IoT service. In this architecture, problems like response delay, URI assignment and DoS attack can be occurred. To solve these problems, we propose the reverse-proxy based system. We consider both of static IoT and mobility IoT environments. Finally, our proposed system is expected to provide efficient IoT service.

Implementation of JDAM virtual training function using machine learning

  • You, Eun-Kyung;Bae, Chan-Gyu;Kim, Hyeock-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.11
    • /
    • pp.9-16
    • /
    • 2020
  • The TA-50 aircraft is conducting simulated training on various situations, including air-to-air and air-to-ground fire training, in preparation for air warfare. It is also used for pilot training before actual deployment. However, the TA-50 does not have the ability to operate smart weapon forces, limiting training. Therefore, the purpose of this study is to implement the TA-50 aircraft to enable virtual training of one of the smart weapons, the Point Direct Attack Munition (JDAM). First, JDAM functions implemented in FA-50 aircraft, a model similar to TA-50 aircraft, were analyzed. In addition, since functions implemented in FA-50 aircraft cannot be directly utilized by source code, algorithms were extracted using machine learning techniques(TensorFlow). The implementation of this function is expected to enable realistic training without actually having to be armed. Finally, based on the results of this study, we would like to propose ways to supplement the limitations of the research so that it can be implemented in the same way as it is.

The 3D Numerical Analysis on the Turbulent at 40° Crosswind, for the Predictions of Flight Stability at Take-off and Landing (이·착륙 비행 안정성 예측을 위한 측풍 40° 방향에 대한 3차원 수치해석)

  • Sheen, Dong-Jin;Kim, Do-Hyun;Park, Soo-Bok
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.2
    • /
    • pp.179-189
    • /
    • 2012
  • The aim of this paper is to research the change in the turbulent flow and the AOA(Angle Of Attack) occurred by $40^{\circ}$ crosswind to the direction of runway through the three-dimensional numerical analysis and to predict the take-off and landing flight stability. As a result, the maximum amplitude of AOA variation on runway reached $2^{\circ}$ within 3 second because of the wake formed by the constructions in the vicinity of the airport, and the overall effects appeared as an irregular aperiodic forms. Additionally, it was observed that the layout and shape of the buildings effected on the strength of turbulence directly, and the rapid flow generated between the buildings changed into stronger wake and eventually expected that the flow raises serious take-off and landing flight instability.

Development of Malicious Traffic Detection and Prevention System by Embedded Module on Wireless LAN Access Point (무선 LAN Access Point에서 임베디드 형태의 유해 트래픽 침입탐지/차단 시스템 개발)

  • Lee, Hyung-Woo;Choi, Chang-Won
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.12
    • /
    • pp.29-39
    • /
    • 2006
  • With the increasing popularity of the wireless network, the vulnerability issue on IEEE 802.1x Wireless Local Area Network (WLAN) are more serious than we expected. Security issues range from mis-configured wireless Access Point(AP) such as session hijacking to Denial of Service(DoS) attack. We propose a new system based on intrusion detection or prevention mechanism to protect the wireless network against these attacks. The proposed system has a security solution on AP that includes an intrusion detection and protection system(IDS/IPS) as an embedded module. In this paper, we suggest integrated wireless IDS/IPS module on AP with wireless traffic monitoring, analysis and packet filtering module against malicious wireless attacks. We also present that the system provides both enhanced security and performance such as on the university wireless campus network.

  • PDF

A Propeller Design Method with New Blade Sections (새로운 단면을 이용한 고효율 프로펠러 설계법)

  • J.T.,Lee;C.S.,Lee;M.C.,Kim;J.Y.,Ahn;H.C.,Kim
    • Bulletin of the Society of Naval Architects of Korea
    • /
    • v.26 no.3
    • /
    • pp.29-40
    • /
    • 1989
  • A new blade section of propeller is developed to obtain higher propeller efficiency and better cavitation performance. Eleven foil sections are carefully designed and manufactured to compare the lift-drag characteristics and cavitation performances. It is expected that the developed section behaves better in the vicinity of the ship's wake, where the angle of attack variation is large, because of its wider width in lift-drag and cavitation-free bucket diagrams. A propeller design method using the selected foil section is presented. Three chordwise loading shapes are selected to investigate the influence of the lift-drag ratios on the propeller efficiencies and cavitation performances. Three propellers are designed, which correspond to the selected chordwise loading shapes. Two more propellers which use existing foil sections are designed to compare the section performance.

  • PDF