• Title/Summary/Keyword: Expected Attack

Search Result 214, Processing Time 0.035 seconds

Wake Characteristics of Vane-Type Vortex Generators in a Flat Plate Laminar Boundary Layer

  • Shim, HoJoon;Jo, Young-Hee;Chang, Kyoungsik;Kwon, Ki-Jung;Park, Seung-O
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.16 no.3
    • /
    • pp.325-338
    • /
    • 2015
  • Experimental and numerical investigations were conducted to identify the wake characteristics downstream of two vane-type vortex generators over laminar flat plate boundary layer. Experimental study was carried out by using the stereoscopic particle image velocimetry. To describe the flow field around the vortex generator in detail, numerical study was performed. We considered two different planform shapes of vortex generator: triangular and rectangular shape. The height of the generator was chosen to be about the boundary layer thickness at the position of its installation. Two different lengths of the generator were chosen: two and five times the height. Wake measurements were carried out at three angles of attack for each configuration. Wake characteristics for each case such as overall vortical structure, vorticity distribution, and location of vortex center with downstream distance were obtained from the PIV data. Wake characteristics, as expected, were found to vary strongly with the geometry and angle of attack so that no general tendency could be deduced. Causes of this irregular tendency were explained by using the results of the numerical simulation.

Carbonation and Cl Penetration Resistance of Alkali Silicate Impregnant of Concrete (Silicate계 콘크리트 침투성 함침제의 탄산화 및 염해 저항성)

  • Song, Hun;Chu, Yong-Sik;Lee, Jong-Kyu
    • Journal of the Korean Ceramic Society
    • /
    • v.45 no.11
    • /
    • pp.719-724
    • /
    • 2008
  • Every concrete structure should continue to perform its intended functions such as to maintain the required strength and durability during its lifetime. Deterioration of the concrete structure, however, occurs more progressively from the outside of the concrete exposed to severe conditions. Main deteriorations in concrete structures result from carbonation, chloride ion attack and frost attack. Concrete can therefore be more durable by applying surface protection to increase its durability using impregnants, which are normally classified into two large groups in polymeric and silicate materials. Concrete impregnants are composed of silanes and alkali silicates (sodium, potassium and lithium silicate). Thus, this study is concerned with elevating the carbonation and Cl- penetration resistance of concrete structures by applying alkali silicate hydrophilic impregnants including lithium and potassium silicates. From the experimental test results, lithium and potassium silicates produced a good improvement in carbonation resistance and are expected to be used as hydrophilic impregnants of concrete structures.

Implementation of abnormal behavior detection Algorithm and Optimizing the performance of Algorithm (비정상행위 탐지 알고리즘 구현 및 성능 최적화 방안)

  • Shin, Dae-Cheol;Kim, Hong-Yoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.11
    • /
    • pp.4553-4562
    • /
    • 2010
  • With developing networks, information security is going to be important and therefore lots of intrusion detection system has been developed. Intrusion detection system has abilities to detect abnormal behavior and unknown intrusions also it can detect intrusions by using patterns studied from various penetration methods. Various algorithms are studying now such as the statistical method for detecting abnormal behavior, extracting abnormal behavior, and developing patterns that can be expected. Etc. This study using clustering of data mining and association rule analyzes detecting areas based on two models and helps design detection system which detecting abnormal behavior, unknown attack, misuse attack in a large network.

Influence of trailing edge serration in the wake characteristics of S809 airfoil

  • Mano Sekar;Amjad Ali Pasha;Nadaraja Pillai Subramania
    • Wind and Structures
    • /
    • v.37 no.1
    • /
    • pp.15-23
    • /
    • 2023
  • The wake behavior of extended flat plate and serration in the trailing edge of S809 airfoil is presented in this experimental study using wind tunnel testing. The clustering of wind turbines in wind parks has recently been a pressing issue, due to the expected increase in power output and deciding the number of wind turbines to be installed. One of the prominent factors which influence the performance of the subsequent wind turbines is the downstream wake characteristics. A series of wind tunnel investigations were performed to assess the downstream near wake characteristics of the S809 airfoil at various angles of attack corresponding to the Reynolds Number Re = 2.02 × 105. These experimental results revealed the complex nature of the downstream near wake characteristics featuring substantial asymmetry arising out of the incoherent flow separations prevailing over the suction and the pressure sides of the airfoil. Based on the experimental results, it is found that the wake width and the downstream velocity ratio decrease with an increase in the angle of attack. Nonetheless, the dissipation length and downstream velocity ratio increases proportionally in the downstream direction. Additionally, attempts were made to understand the physical nature of the near wake characteristics at 1C, 2C, 3C and 4C downstream locations.

Development of Force Measuring Device in Learning Wind Tunnel Used for Transportation Technology Class (수송 기술에 적합한 학습용 풍동의 힘 측정 장치 개발)

  • Choi, Jun-Seop;Lee, Sung-Gu
    • 대한공업교육학회지
    • /
    • v.32 no.1
    • /
    • pp.117-133
    • /
    • 2007
  • The purpose of this study was to develop the force measuring device of learning wind tunnel, teaching-learning materials in order to enhance understanding of flight principle and give interest about aviation technology in secondary school. The content of this study was consisted of the development and experiment of force measuring device for learning wind tunnel. The main results of this study were as follows: This device developed here is simple structure applying lever principle instead of the comparatively expensive load cell used in engineering college or a aviation research institute and so on. Measurement of lift and drag as well as the comparison experiment of a fluid resistance is possible with only one device developed here. The lift coefficient with angle of attack has shown the same tendency in both of theoretical and experimental values. And the stall phenomenon was found under the larger angle of attack of experimental rather than expected theoretical values. The drag coefficient with angle of attack has shown the same tendency in both of theoretical and experimental values. And drag coefficient the rate of increasement of the experimental values increased more gently than its theoretical values.

A New Low-Cost Mutual Authentication Protocol in RFID based on Hash Function (해시함수 기반의 새로운 저비용 RFID 상호인증 프로토콜)

  • Bae, Woo-Sik;Lee, Jong-Yun;Kim, Sang-Choon
    • The Journal of Korean Association of Computer Education
    • /
    • v.14 no.1
    • /
    • pp.175-185
    • /
    • 2011
  • Recently RFID systems have been introduced in place of barcode systems to industries such as logistics, distribution, and manufacturing. Due to security vulnerabilities in wireless communication between the reader and tags, however, the authentication protocols for the communication have also been researched extensively. In order to solve the vulnerability of previously proposed protocols, this paper thus proposes an authentication protocol that satisfies the security requirements in the RFID system and minimizes the quantity of computation such as random number generation, transmitting the micro-time of databases. In addition, it is expected that the proposed cross authentication protocol is safe against replay attack, spoofing attack, traffic analysis, and eavesdropping attack when it is applied to the RFID system. Also, it has advantages such as providing a high level of security at a lower manufacturing cost.

  • PDF

Security Risks Evaluation based on IPv6 Firewall Rules (IPv6의 방화벽 규칙을 기반으로한 보안위험 평가)

  • Phang, Seong-Yee;Lee, Hoon-Jae;Lim, Hyo-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.261-264
    • /
    • 2008
  • IPv6 has been proposed and deployed to cater the shortage of IPv4 addresses. It is expected to foresee mobile phones, pocket PCs, home devices and any other kind of network capable devices to be connected to the Internet with the introduction and deployment of IPv6. This scenario will bring in more challenges to the existing network infrastructure especially in the network security area. Firewalls are the simplest and the most basic form of protection to ensure network security. Nowadays, firewalls' usage has been extended from not only to protect the whole network but also appear as software firewalls to protect each network devices. IPv6 and IPv4 are not interoperable as there are separate networking stacks for each protocol. Therefore, the existing states of the art in firewalling need to be reengineered. In our context here, we pay attention only to the IPv6 firewalls configuration anomalies without considering other factors. Pre-evaluation of security risk is important in any organization especially a large scale network deployment where an add on rules to the firewall may affect the up and running network. We proposed a new probabilistic based model to evaluate the security risks based on examining the existing firewall rules. Hence, the network administrators can pre-evaluate the possible risk incurred in their current network security implementation in the IPv6 network. The outcome from our proposed pre-evaluation model will be the possibilities in percentage that the IPv6 firewall is configured wrongly or insecurely where known attacks such as DoS attack, Probation attack, Renumbering attack and etc can be launched easily. Besides that, we suggest and recommend few important rules set that should be included in configuring IPv6 firewall rules.

  • PDF

Research on Malware Classification with Network Activity for Classification and Attack Prediction of Attack Groups (공격그룹 분류 및 예측을 위한 네트워크 행위기반 악성코드 분류에 관한 연구)

  • Lim, Hyo-young;Kim, Wan-ju;Noh, Hong-jun;Lim, Jae-sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.193-204
    • /
    • 2017
  • The security of Internet systems critically depends on the capability to keep anti-virus (AV) software up-to-date and maintain high detection accuracy against new malware. However, malware variants evolve so quickly they cannot be detected by conventional signature-based detection. In this paper, we proposed a malware classification method based on sequence patterns generated from the network flow of malware samples. We evaluated our method with 766 malware samples and obtained a classification accuracy of approximately 40.4%. In this study, malicious codes were classified only by network behavior of malicious codes, excluding codes and other characteristics. Therefore, this study is expected to be further developed in the future. Also, we can predict the attack groups and additional attacks can be prevented.

A Study on the Countermeasure of Cyber Attacks Using Anonymous Network (익명네트워크를 이용한 사이버공격에 대한 대응방안 연구)

  • Lee, Jung-Hyun;Ahn, Kwan-Joon;Park, Won-Hyung;Lim, Jong-In
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.31-37
    • /
    • 2011
  • Recently on tile network to ensure the anonymity of Mixed networking has been actively researched. It uses encrypted communications between Nodes and communications path is changed often to the attacker traceback and response, including the difficult thing is the reality. National institutions and infrastructure in these circumstances, the attack on the national level, if done on a large scale can be disastrous in. However, an anonymous network technology to cover up their own internet communication, it malicious form of Internet use by people who enjoy being continually updated and new forms of technology being developed is a situation continuously. In addition, attacks in the future application of these technologies is expected to continue to emerge. However, this reality does not deserve this thesis is prepared. In this paper, anonymously using a network to respond effectively to a cyber attack on the early detection research is to proceed.

Design of a Coordinator-based Intrusion Detection System in Ubiquitous Sensor Network Environment (USN환경에서 코디네이터 기반의 침입탐지시스템 설계)

  • Kim, Hwang-Rae;Kang, Yeon-I
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.3
    • /
    • pp.984-990
    • /
    • 2010
  • Zigbee sensor network technology to build a ubiquitous environment has an important role. However, Zigbee technology, sensing environmental information within the local area to deliver the information because it was designed for the purpose of simple tasks, Attack by a variety of technologies that could potentially compromise the network is very high. To solve this problems, many defense mechanisms are presented in a lot of papers. But, to attack the existing Zigbee various response measures for the implementation of the functionality of the sensor nodes very heavy and high expensive problem. To resolve this problems, with superior computing power Zigbee network coordinator to install, based coordinator to intrusion detection systems is proposed. Coordinator-based IDS(Intrusion Detection System) of the Zigbee network is detected attack, and present a new approach to resolve, possible applications in various fields, so in real life Zigbee technology is expected to contribute to graft.