• Title/Summary/Keyword: disk attack

Search Result 24, Processing Time 0.016 seconds

Study on the Aerodynamic Characteristics of an Wing Depending on the Propeller Mounting Position (프로펠러 장착 위치에 따른 날개의 공력 특성 변화 연구)

  • Inseo, Choi;Cheolheui, Han
    • Journal of Aerospace System Engineering
    • /
    • v.16 no.6
    • /
    • pp.54-63
    • /
    • 2022
  • Recently, electric propulsion aircraft with various propeller mounting positions have been under construction. The position of the propeller relative to the wing can significantly affect the aerodynamic performance of the aircraft. Placing the propeller in front of the wing produces a complex swirl flow behind or around the propeller. The up/downwash induced by the swirl flow can alter the wing's local effective angle of attack, causing a change in the aerodynamic load distribution across the wing's spanwise direction. This study investigated the influence of the distance between a propeller and a wing on the aerodynamic loads on the wing. The swirl flow generated by the propeller was modelled using an actuator disk theory, and the wing's aerodynamics were analysed with the VSPAERO tool. Results of the study were compared to wind tunnel test data and established that both axial and spanwise distance between the propeller and the wing positively affect the wing's lift-to-drag ratio. Specifically, it was observed that the lift-to-drag ratio increases when the propeller is positioned higher than the wing.

A Study for Hybrid Honeypot Systems (하이브리드 허니팟 시스템에 대한 연구)

  • Lee, Moon-Goo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.11
    • /
    • pp.127-133
    • /
    • 2014
  • In order to protect information asset from various malicious code, Honeypot system is implemented. Honeypot system is designed to elicit attacks so that internal system is not attacked or it is designed to collect malicious code information. However, existing honeypot system is designed for the purpose of collecting information, so it is designed to induce inflows of attackers positively by establishing disguised server or disguised client server and by providing disguised contents. In case of establishing disguised server, it should reinstall hardware in a cycle of one year because of frequent disk input and output. In case of establishing disguised client server, it has operating problem such as procuring professional labor force because it has a limit to automize the analysis of acquired information. To solve and supplement operating problem and previous problem of honeypot's hardware, this thesis suggested hybrid honeypot. Suggested hybrid honeypot has honeywall, analyzed server and combined console and it processes by categorizing attacking types into two types. It is designed that disguise (inducement) and false response (emulation) are connected to common switch area to operate high level interaction server, which is type 1 and low level interaction server, which is type 2. This hybrid honeypot operates low level honeypot and high level honeypot. Analysis server converts hacking types into hash value and separates it into correlation analysis algorithm and sends it to honeywall. Integrated monitoring console implements continuous monitoring, so it is expected that not only analyzing information about recent hacking method and attacking tool but also it provides effects of anticipative security response.

Predation Efficiency and Preference of the Hydrophilid Water Beetle Hydrochara affinis (Coleoptera: Hydrophilidae) Larvae on Two Mosquitos Culex pipiens molestus and Ochlerotatus togoi under Laboratory Conditions (잔물땡땡이(Hydrochara affinis: Hydrophilidae, Coleoptera) 유충의 모기 2종(Culex pipiens molestus 및 Ochlerotatus togoi)에 대한 실내조건에서의 섭식효율 및 선호도)

  • Baek, Hak Myeong;Kim, Dong Gun;Baek, Min Jeong;Lee, Cha Young;Kang, Hyo Jeong;Kim, Myeong Chul;Yoo, Jae Seung;Bae, Yeon Jae
    • Korean Journal of Environmental Biology
    • /
    • v.32 no.2
    • /
    • pp.112-117
    • /
    • 2014
  • Predation efficiency and preference of the hydrophilid water beetle, Hydrochara affinis (Coleoptera: Hydrophilidae), larvae on two mosquito species, Culex pipiens molestus and Ochlerotatus togoi, were tested under laboratory conditions. Experiments were conducted in a transparent cylindrical plastic container (diameter, 100 mm; height, 40 mm; water level, 15 mm) for 24 hours (16 h, light; 8 h, dark) at $25^{\circ}C$. The predation efficiency of H. affinis on mosquito larvae was investigated under various prey conditions (1, 2, 4, 8, 16, 32, 64, and 128 larvae) with five replicates. Further, in order to investigate the prey preference on two mosquito species, each 32 larvae of C. pipiens molestus and O. togoi were provided simultaneously for the first instar larva of H. affinis with 5 replicates. As a result, the predation curves of H. affinis on two mosquito species were logarithmic; and the number of consumed prey increased as the number of predator instars were increased. As predicted from the predation curves, the estimated maximum number of C. pipiens molestus and O. togoi consumed by a third instar larva of H. affinis per a day was 926 and 304 larvae, respectively. As predicted from the Holling's disk equation, the differences in consumed prey number between predator instars and prey species were caused by handling time rather than attack rate. Handling time decreased rapidly as the predator larvae grew, and that of O. togoi was twice longer than that of C. pipiens molestus.

Secure Certificates Duplication Method Among Multiple Devices Based on BLE and TCP (BLE 및 TCP 기반 다중 디바이스 간 안전한 인증서 복사 방법)

  • Jo, Sung-Hwan;Han, Gi-Tae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.2
    • /
    • pp.49-58
    • /
    • 2018
  • A certificate is a means to certify users by conducting the identification of the users, the prevention of forgery and alteration, and non-repudiation. Most people use an accredited certificate when they perform a task using online banking, and it is often used for the purpose of proving one's identity in issuing various certificates and making electronic payments in addition to online banking. At this time, the issued certificate exists in a file form on the disk, and it is possible to use the certificate issued in an existing device in a new device only if one copies it from the existing device. However, most certificate duplication methods are a method of duplication, entering an 8-16 digit verification code. This is inconvenient because one should enter the verification code and has a weakness that it is vulnerable to security issues. To solve this weakness, this study proposes a method for enhancing security certificate duplication in a multi-channel using TCP and BLE. The proposed method: 1) shares data can be mutually authenticated, using BLE Advertising data; and 2) encrypts the certificate with a symmetric key algorithm and delivers it after the certification of the device through an ECC-based electronic signature algorithm. As a result of the implementation of the proposed method in a mobile environment, it could defend against sniffing attacks, the area of security vulnerabilities in the existing methods and it was proven that it could increase security strength about $10^{41}$ times in an attempt of decoding through the method of substitution of brute force attack existing method.