• Title/Summary/Keyword: Worm Simulation

Search Result 51, Processing Time 0.023 seconds

Optimal Internet Worm Treatment Strategy Based on the Two-Factor Model

  • Yan, Xiefei;Zou, Yun
    • ETRI Journal
    • /
    • v.30 no.1
    • /
    • pp.81-88
    • /
    • 2008
  • The security threat posed by worms has steadily increased in recent years. This paper discusses the application of the optimal and sub-optimal Internet worm control via Pontryagin's maximum principle. To this end, a control variable representing the optimal treatment strategy for infectious hosts is introduced into the two-factor worm model. The numerical optimal control laws are implemented by the multiple shooting method and the sub-optimal solution is computed using genetic algorithms. Simulation results demonstrate the effectiveness of the proposed optimal and sub-optimal strategies. It also provides a theoretical interpretation of the practical experience that the maximum implementation of treatment in the early stage is critically important in controlling outbreaks of Internet worms. Furthermore, our results show that the proposed sub-optimal control can lead to performance close to the optimal control, but with much simpler strategies for long periods of time in practical use.

  • PDF

Double Enveloping Worm Thread Tooth Machining Study using Full Face Contact Cutting Tool (전체면 접촉 절삭공구를 이용한 장구형 웜나사 치형가공 연구)

  • Kang, S.J.;Kim, Y.H.
    • Transactions of Materials Processing
    • /
    • v.29 no.3
    • /
    • pp.144-150
    • /
    • 2020
  • In this paper, we propose the generation of a double enveloping worm thread profile with a non-developable ruled surface. Thread surface machining cuts all the way from the tip to the tooth root at one time, like full-face contact machining, rather than cutting several times like point machining. This cutting can reduce the cutting duration and achieve the smooth surface that does not require a grinding process for the threaded surface. The mathematical model of the cutting process was developed from theoretical equations, and the tooth surface was generated using two parameters and modeled in the CATIA using the generated Excel data. Additionally, the machining process of the worm was simulated in a numerical control simulation system. To verify the validity of the proposed method, the deviation between the modeling and the workpiece was measured using a 3D measuring machine.

Image segmentation using adaptive MIN-MAX genetic clustering and fuzzy worm searching (자율 적응 최소-최대 유전 군집호와 퍼지 벌레 검색을 이용한 영상 영역화)

  • 하성욱;서석배;강대성
    • Proceedings of the IEEK Conference
    • /
    • 1998.06a
    • /
    • pp.781-784
    • /
    • 1998
  • An image segmentation approach based on the fuzzy worm searching and MIN-MAx clusterng algorithm is proposed in this paper. This algorithm deals with fuzzy worm value and min-max node at a gross scene level, which investigates the edge information including fuzzy worm action. But current segmentation methods based edge extraction methods generally need the mask information for the algebraic model, and take long run times at mask operation, wheras the proposed algorithm has single operation ccording to active searching of fuzzy worms. In addition, we also genetic min-max clustering using genetic algorithm to complete clustering and fuzyz searching on grey-histogram of image for the optimum solution, which can automatically determine the size of rnages and has both strong robust and speedy calculation. The simulation results showed that the proposed algorithm adaptively divided the quantized images in histogram region and performed single searching methods, significantly alleviating the increase of the computational load and the memory requirements.

  • PDF

Simulation-based Worm Damage Assessment on ATCIS (시뮬레이션 기반 육군전술지휘정보체계에 대한 웜 피해평가)

  • Kim, Gi-Hwan;Kim, Wan-Joo;Lee, Soo-Jin
    • Journal of the military operations research society of Korea
    • /
    • v.33 no.2
    • /
    • pp.115-127
    • /
    • 2007
  • The army developed the ATCIS(Army Tactical Command Information System) for the battlefield information system with share the command control information through the realtime. The using the public key and the encryption equipment in the ATCIS is enough to the confidentiality, integrity. but, it is vulnerable about the availability with the zero day attack. In this paper, we implement the worm propagation simulation on the ATCIS infrastructure through the modelling on the ATCIS operation environment. We propose the countermeasures based on the results from the simulation.

Modeling and Network Simulator Implementation for analyzing Slammer Worm Propagation Process (슬래머 웜 전파과정 분석을 위한 네트워크 모델링 및 시뮬레이터 구현)

  • Lim, Jae-Myung;Yoon, Chong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.5B
    • /
    • pp.277-285
    • /
    • 2007
  • In this paper, we present a simulation model of Slammer worm propagation process which caused serious disruptions on Internet in the you of 2003 and analyze the process of Slammer by using NS-2. Recently introduced NS-2 modeling called "Detailed Network-Abstract Network Model" had enabled packet level analysis. However, it had deficiency of accommodating only small sized network. By extending the NS-2 DN-AN model to AN-AN model (Abstract Network-Abstract Network model), it is effectively simulated that the whole process from the initial infection to the total network congestion on hourly basis not only for the Korean network but also for the rest of the world networks. Furthermore, the progress of the propagation from Korean network to the other country was also simulated through the AN-AN model. 8,848 hosts in Korean network were infected in 290 second and 66,152 overseas hosts were infected in 308 second. Moreover, the scanning traffics of the worm at the Korean international gateway saturated the total bandwidth in 154 seconds for the inbound traffic and in 135 seconds for the outbound one.

A Study on the Gating System and Simulation for Gravity Casting of ZnDC1 Worm Gear (아연 합금 웜기어의 중력 주조 공정을 위한 주조 방안 설계 및 해석에 관한 연구)

  • Lee, Un-Gil;Kim, Jae-Hyun;Jin, Chul-Kyu;Chun, Hyeon-Uk
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.24 no.5
    • /
    • pp.589-596
    • /
    • 2021
  • In this study, the optimum gating system was designed, and the two zinc alloy worm gears were manufactured in single process by applying a symmetrical gating system with 2 runners. The SRG ratio is set to 1 : 0.9 : 0.6, and the cross-sectional shapes such as sprue, runner and gate are designed. In order to determine whether the design of the gating system is appropriate, casting analysis was carried out. It takes 4.380 s to charge the casting 100%, 0.55 to 0.6 m/s at the gates and solidification begins after the casting is fully charged. The amount of air entrapment is 2% in the left gear and 6% in the right gear. Hot spots occurred in the center hole of the gear, and pores were found to occur around the upper part of the hole. Therefore, the design of the casting method is suitable for worm gears. CT analysis showed that all parts of worm gear were distributed with fine pores and some coarse pores were distributed around the central hole of worm gear. The yield strength and tensile strength were 220 MPa, 285 MPa, and the elongation rate was 8%. Vickers hardness is 82 HV.

Worm Virus Modeling and Simu1ation Methodology Using Artificial Life (인공생명 기반의 웜바이러스 모델링 및 시뮬레이선 방법론)

  • You, Yong-Jun;Chae, Soo-Hoan;Chi, Sung-Do;Oh, Ji-Yeon
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.4
    • /
    • pp.1-10
    • /
    • 2006
  • Computer virus modeling and simulation research has conducted with focus on the network vulnerability analysis. But computer virus shows the biological virus characters such as proliferation, reproduction and evolution. Therefore it is necessary to research the computer virus modeling and simulation using the Artificial life technique. The approach of computer modeling and simulation using Artificial life provides the analysis method about the effects on the network by computer virus and the behavior mechanism of computer virus. Hence this paper proposes the methodology of computer virus modeling and simulation using Artificial life, which is effected to contribute the research on the computer virus vaccine.

  • PDF

A Study of Worm Propagation Modeling extended AAWP, LAAWP Modeling (AAWP와 LAAWP를 확장한 웜 전파 모델링 기법 연구)

  • Jun, Young-Tae;Seo, Jung-Taek;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.73-86
    • /
    • 2007
  • Numerous types of models have been developed in recent years in response to the cyber threat posed by worms in order to analyze their propagation and predict their spread. Some of the most important ones involve mathematical modeling techniques such as Epidemic, AAWP (Analytical Active Worm Propagation Modeling) and LAAWP (Local AAWP). However, most models have several inherent limitations. For instance, they target worms that employ random scanning in the entire nv4 network and fail to consider the effects of countermeasures, making it difficult to analyze the extent of damage done by them and the effects of countermeasures in a specific network. This paper extends the equations and parameters of AAWP and LAAWP and suggests ALAAWP (Advanced LAAWP), a new worm simulation technique that rectifies the drawbacks of existing models.

A Piezoelectric Lens Actuator for Mobile Information Devices (모바일 기기용 렌즈 구동 압전형 액츄에이터 개발)

  • Lee, Hun-Tae;Lee, Seung-Yop;Park, Young-Phil
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2005.11a
    • /
    • pp.744-749
    • /
    • 2005
  • In this paper, a lens actuator for mobile devices is proposed using stack type piezoelectric materials. In general, the deformation of PZT actuators is not enough for lens motion when the allowed voltage is applied. The small stroke problem can be solved by accumulating a lot of small displacements in high frequency. In this paper, a new inch-worm type model for focusing actuator is suggested based on the interaction of inertial and frictional forces. Theoretical analysis and simulation using ANSYS are performed to verify the feasibility of the inch-worm PZT actuator model. Various types of clamps are considered to determine the effect of frictional force on the motion, and appropriate clamp-actuator models are proposed. The proposed models are experimentally verified and the experimental results show high correspondence with theoretical and simulated values. The inch-worm type focusing actuator enable a large stroke with 7.79 mm/sec with 10kHz and 10V.

  • PDF

Harmful Traffic Detection by Protocol and Port Analysis (프로토콜과 포트 분석을 통한 유해 트래픽 탐지)

  • Shin Hyun-Jun;Choi Il-Jun;Oh Chang-Suk;Koo Hyang-Ohk
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.5
    • /
    • pp.172-181
    • /
    • 2005
  • The latest attack type against network traffic appeared by worm and bot that are advanced in DDoS. It is difficult to detect them because they are diversified, intelligent, concealed and automated. The exisiting traffic analysis method using SNMP has a vulnerable problem; it considers normal P2P and other application program to be harmful traffic. It also has limitation that does not analyze advanced programs such as worm and bot to harmful traffic. Therefore, we analyzed harmful traffic out Protocol and Port analysis. We also classified traffic by protocol, well-known port, P2P port, existing attack port, and specification port, apply singularity weight to detect, and analyze attack availability. As a result of simulation, it is proved that it can effectively detect P2P application, worm, bot, and DDoS attack.

  • PDF