• Title/Summary/Keyword: attack model

Search Result 996, Processing Time 0.034 seconds

ANALYSIS OF UNSTEADY OSCILLATING FLOW AROUND TWO DIMENSIONAL AIRFOIL AT HIGH ANGLE OF ATTACK (고받음각 2차원 에어포일 주위의 비정상 유동의 진동 특성에 관한 연구)

  • Yoo, J.K.;Kim, J.S.
    • Journal of computational fluids engineering
    • /
    • v.18 no.1
    • /
    • pp.1-6
    • /
    • 2013
  • Missile and fighter aircraft have been challenged by low restoring nose-down pitching moment at high angle of attach. The consequence of weak nose-down pitching moment can be resulting in a deep stall condition. Especially, the pressure oscillation has a huge effect on noise generation, structure damage, aerodynamic performance and safety, because the flow has strong unsteadiness at high angle of attack. In this paper, the unsteady aerodynamics coefficients were analyzed at high angle of attack up to 50 degrees around two dimensional NACA0012 airfoil. The two dimensional unsteady compressible Navier-Stokes equation with a LES turbulent model was calculated by OHOC (Optimized High-Order Compact) scheme. The flow conditions are Mach number of 0.3 and Reynolds number of $10^5$. The lift, drag, pressure, entropy distribution, etc. are analyzed according to the angle of attack. The results of average lift coefficients are compared with other results according to the angle of attack. From a certain high angle of attack, the strong vortex formed by the leading edge are flowing downstream as like Karman vortex around a circular cylinder. The primary and secondary oscillating frequencies are analyzed by the effects of these unsteady aerodynamic characteristics.

Study on the White Noise effect Against Adversarial Attack for Deep Learning Model for Image Recognition (영상 인식을 위한 딥러닝 모델의 적대적 공격에 대한 백색 잡음 효과에 관한 연구)

  • Lee, Youngseok;Kim, Jongweon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.1
    • /
    • pp.27-35
    • /
    • 2022
  • In this paper we propose white noise adding method to prevent missclassification of deep learning system by adversarial attacks. The proposed method is that adding white noise to input image that is benign or adversarial example. The experimental results are showing that the proposed method is robustness to 3 adversarial attacks such as FGSM attack, BIN attack and CW attack. The recognition accuracies of Resnet model with 18, 34, 50 and 101 layers are enhanced when white noise is added to test data set while it does not affect to classification of benign test dataset. The proposed model is applicable to defense to adversarial attacks and replace to time- consuming and high expensive defense method against adversarial attacks such as adversarial training method and deep learning replacing method.

A study of optimal firecar location models under enemy attack at airforce base (적 공격시 공군기지에서의 최적 소방차 배치모형 연구)

  • 이상진;김시연
    • Journal of the military operations research society of Korea
    • /
    • v.22 no.1
    • /
    • pp.30-42
    • /
    • 1996
  • This study deals with an optimal firecar location and allocation models under uncertain enemy attack at the airforce base. It allocates just one firecar on the runaway and the other firecars on the headquarter of firecar company in usual situation. It is possible for several facilities at the airforce base to be attacked simultaneously by missiles enemy air attacker, other things under uncertain enemy attack. We formulate two stochastic LP location-allocation models to deal with uncertainty. One model is to locate all firecars on one site like present situation. We generate a new firecar location with a weighted average method. We call this model "centralized allocation model". The other model is to distribute firecars on several possible sites. We call this model "distributed allcoation model". Finally, we compare two models with computer experimentations on 8 airforce bases.on 8 airforce bases.

  • PDF

A COMPUTATIONAL STUDY ON THE CHARACTERISTICS OF ASYMMETRIC VORTEX OF TANGENT-OGIVE-CYLINDER FLIGHT VEHICLE AT HIGH ANGLES OF ATTACK (Tangent-Ogive-Cylinder 비행체의 고앙각에서의 비대칭 와류 특성 연구)

  • Lim, S.;Kim, S.D.;Song, D.J.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2007.04a
    • /
    • pp.3-7
    • /
    • 2007
  • The characteristics of asymmetric vortex and side force of tangent-ogive-cylinder flight vehicle at high angles of attack have been performed by using upwind Navier-Stokes method with the ${\kappa}-{\omega}$ turbulence model. And Asymmetric transition positions are considered for generation of asymmetric vortex.

  • PDF

Sleep Deprivation Attack Detection Based on Clustering in Wireless Sensor Network (무선 센서 네트워크에서 클러스터링 기반 Sleep Deprivation Attack 탐지 모델)

  • Kim, Suk-young;Moon, Jong-sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.1
    • /
    • pp.83-97
    • /
    • 2021
  • Wireless sensors that make up the Wireless Sensor Network generally have extremely limited power and resources. The wireless sensor enters the sleep state at a certain interval to conserve power. The Sleep deflation attack is a deadly attack that consumes power by preventing wireless sensors from entering the sleep state, but there is no clear countermeasure. Thus, in this paper, using clustering-based binary search tree structure, the Sleep deprivation attack detection model is proposed. The model proposed in this paper utilizes one of the characteristics of both attack sensor nodes and normal sensor nodes which were classified using machine learning. The characteristics used for detection were determined using Long Short-Term Memory, Decision Tree, Support Vector Machine, and K-Nearest Neighbor. Thresholds for judging attack sensor nodes were then learned by applying the SVM. The determined features were used in the proposed algorithm to calculate the values for attack detection, and the threshold for determining the calculated values was derived by applying SVM.Through experiments, the detection model proposed showed a detection rate of 94% when 35% of the total sensor nodes were attack sensor nodes and improvement of up to 26% in power retention.

Bitwise Collision Attack Based on Second-Order Distance

  • Wang, Danhui;Wang, An
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.3
    • /
    • pp.1802-1819
    • /
    • 2017
  • Correlation-enhanced collision attack has been proposed by Moradi et al. for several years. However, in practical operations, this method costs lots of time on trace acquisition, storage and averaging due to its bytewise collision detection. In this paper, we propose a bitwise collision attack based on second-order distance model. In this method, only 9 average traces are enough to finish a collision attack. Furthermore, two candidate models are given in this study to distinguish collisions, and the corresponding practical experiments are also performed. The experimental results indicate that the operation time of our attack is only 8% of that of correlation-enhanced collision attack, when the two success rates are both above 0.9.

Escape Behavior of Medaka (Oryzias latipes) in Response to Aerial Predators of Different Sizes and with Different Attack Speeds

  • Lee, Sang-Hee
    • Proceedings of the National Institute of Ecology of the Republic of Korea
    • /
    • v.3 no.1
    • /
    • pp.47-53
    • /
    • 2022
  • The escape behavior of prey fish to predator attack is directly linked to the survival of the fish. In this study, I explored the escape behavior of Medaka fish to bird attacks. To simulate the attack, I designed a model triangular-shaped bird to slide along a fishing line connected between rods at both ends of the tank. The triangular shape was set to 10×15 (S=1), 15×20 (S=2), and 20×25 cm (S=3) with base×height. The slope (θ) of the fishing line, which determines the attack speed of the model bird, was set to values of 15° (θ=1), 30° (θ=2), and 45° (θ=3). The escape behavior was characterized using five variables: escape speed (ν), escape acceleration (α), responsiveness (γ), branch length similarity entropy (ε), and alignment (ϕ). The experimental results showed when (S, θ)=(fixed, varied), the change in values of the five variables were not significant. Thus, the fish respond more sensitively to S than to θ In contrast, when (S, θ)=(varied, fixed), ν, α, and γ showed increasing trends but ε and ϕ did not change much. This indicates the nature of fish escape behavior irrespective of the threat is inherent in ε and ϕ. I found that fish escape behavior can be divided into two types for the five physical quantities. In particular, the analysis showed that the type was mainly determined by the size of the model bird.

FuzzyGuard: A DDoS attack prevention extension in software-defined wireless sensor networks

  • Huang, Meigen;Yu, Bin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3671-3689
    • /
    • 2019
  • Software defined networking brings unique security risks such as control plane saturation attack while enhancing the performance of wireless sensor networks. The attack is a new type of distributed denial of service (DDoS) attack, which is easy to launch. However, it is difficult to detect and hard to defend. In response to this, the attack threat model is discussed firstly, and then a DDoS attack prevention extension, called FuzzyGuard, is proposed. In FuzzyGuard, a control network with both the protection of data flow and the convergence of attack flow is constructed in the data plane by using the idea of independent routing control flow. Then, the attack detection is implemented by fuzzy inference method to output the current security state of the network. Different probabilistic suppression modes are adopted subsequently to deal with the attack flow to cost-effectively reduce the impact of the attack on the network. The prototype is implemented on SDN-WISE and the simulation experiment is carried out. The evaluation results show that FuzzyGuard could effectively protect the normal forwarding of data flow in the attacked state and has a good defensive effect on the control plane saturation attack with lower resource requirements.

A Study on the Stress and Strain Analysis of Human Muscle Skeletal Model in Kendo Three Typical Attack Motions (세 가지 주요 검도 공격 동작에서의 근-골격계 응력과 번형률 해석에 관한 연구)

  • Lee, Jung-Hyun;Lee, Young-Shin
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.25 no.9
    • /
    • pp.126-134
    • /
    • 2008
  • Kendo is one of the popular sports in modem life. Head, wrist and thrust attack are the fast skill to get a score on a match. Human muscle skeletal model was developed for biomechanical study. The human model was consists with 19 bone-skeleton and 122 muscles. Muscle number of upper limb, trunk and lower limb part are 28, 60, 34 respectively. Bone was modeled with 3D beam element and muscle was modeled with spar element. For upper limb muscle modelling, rectus abdominis, trapezius, deltoideus, biceps brachii, triceps brachii muscle and other main muscles were considered. Lower limb muscle was modeled with gastrocenemius, gluteus maximus, gluteus medius and related muscles. The biomechanical stress and strain analysis of human muscle was conducted by proposed human bone-muscle finite element analysis model under head, wrist and thrust attack for kendo training.

Viscous Flow Analysis of a Submarine with Variation of Angle of Attack and Yaw Angle (유동 방향 변화에 따른 잠수함 주위의 3차원 점성유동 해석과 공기역학적 계수의 변화)

  • Jang Jin-Ho;Park Warn-Gyu
    • Proceedings of the KSME Conference
    • /
    • 2002.08a
    • /
    • pp.189-192
    • /
    • 2002
  • In this paper, the submarine model, called DARPA SUBOFF model, has been numerically analyzed to investigate the aerodynamic forces variation in terms of angle of attacks and yaw angles. The SUBOFF model is consisted of the three parts : axisymmetric body, fairwater, and four symmetric stern appendages. Three dimensional unsteady incompressible Wavier-Stokes equation was used on curvilinear multi-block grid system. To validate the present code, the SUBOFF tare hull and an ellipsoid at angle of attacks of $10^{\circ}\;and\;30^{\circ}$ were simulated and a good agreement with experiments was obtained. After the code validation, the flows over SUBOFF model were simulated at three different angle of attacks and yaw angles. The variation of aerodynamic forces in terms of angle of attack and yaw angle were calculated. Also, to understand the flow features around a submarine with variation of yaw and attack angle, the pressure contours and streamlines were plotted.

  • PDF