• Title/Summary/Keyword: Attack Flow

Search Result 613, Processing Time 0.024 seconds

FuzzyGuard: A DDoS attack prevention extension in software-defined wireless sensor networks

  • Huang, Meigen;Yu, Bin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3671-3689
    • /
    • 2019
  • Software defined networking brings unique security risks such as control plane saturation attack while enhancing the performance of wireless sensor networks. The attack is a new type of distributed denial of service (DDoS) attack, which is easy to launch. However, it is difficult to detect and hard to defend. In response to this, the attack threat model is discussed firstly, and then a DDoS attack prevention extension, called FuzzyGuard, is proposed. In FuzzyGuard, a control network with both the protection of data flow and the convergence of attack flow is constructed in the data plane by using the idea of independent routing control flow. Then, the attack detection is implemented by fuzzy inference method to output the current security state of the network. Different probabilistic suppression modes are adopted subsequently to deal with the attack flow to cost-effectively reduce the impact of the attack on the network. The prototype is implemented on SDN-WISE and the simulation experiment is carried out. The evaluation results show that FuzzyGuard could effectively protect the normal forwarding of data flow in the attacked state and has a good defensive effect on the control plane saturation attack with lower resource requirements.

Utilizing OpenFlow and sFlow to Detect and Mitigate SYN Flooding Attack

  • Nugraha, Muhammad;Paramita, Isyana;Musa, Ardiansyah;Choi, Deokjai;Cho, Buseung
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.8
    • /
    • pp.988-994
    • /
    • 2014
  • Software Defined Network (SDN) is a new technology in computer network area which enables user to centralize control plane. The security issue is important in computer network to protect system from attackers. SYN flooding attack is one of Distributed Denial of Service attack methods which are popular to degrade availability of targeted service on Internet. There are many methods to protect system from attackers, i.e. firewall and IDS. Even though firewall is designed to protect network system, but it cannot mitigate DDoS attack well because it is not designed to do so. To improve performance of DDOS mitigation we utilize another mechanism by using SDN technology such as OpenFlow and sFlow. The methodology of sFlow to detect attacker is by capturing and sum cumulative traffic from each agent to send to sFlow collector to analyze. When sFlow collector detect some traffics as attacker, OpenFlow controller will modify the rule in OpenFlow table to mitigate attacks by blocking attack traffic. Hence, by combining sum cumulative traffic use sFlow and blocking traffic use OpenFlow we can detect and mitigate SYN flooding attack quickly and cheaply.

앞전에서의 팽창파를 이용한 양항비의 개선에 대한 연구

  • Yun, Yeong-Jun
    • Proceeding of EDISON Challenge
    • /
    • 2016.11a
    • /
    • pp.19-22
    • /
    • 2016
  • Leading edge thrust is generally caused by passing air flow from lower to upper surface and it is required to have sufficient angle of attack for notable leading edge thrust. To produce leading edge thrust at low angle of attack, utilizing expansion wave accompanying low pressure is able to be a solution. Fore structure changes the direction of flow, and this flow passes the projected edge. As a result, from a perspective of the edge, it is able to have high angle of attack, and artificial expansion wave is generated. This concept shows 9.48% increase of L/D in inviscid flow, at Mach number 1.3 and angle of attack $1^{\circ}$ in maximum, and this model shows the 3.98% of increasement at angle of attack $2^{\circ}$. Although advantage of the artificial expansion wave decreased as angle of attack increase, it shows the possibility of aerodynamical improvement with artificial expansion wave.

  • PDF

A Numerical Study on the Flowfield around a NACA 0021 Airfoil at Angles of Attack (NACA 0021 익형 유동장의 수치해석적 연구)

  • Kim, Sang-Dug
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.24 no.4
    • /
    • pp.20-25
    • /
    • 2016
  • A primary benefit of flight at high angle-of-attack conditions is to be able to reduce the speed of flight and maneuvers, which can enhance the capability of sensing and obstacle avoidance for a small UAV. The flight at high angle-of-attack conditions, however, is easy to be beyond stall which is characterized by substantial flow separation over an airfoil. Current numerical analysis was conducted on the capabilities of three representative turbulence models to predict the aerodynamic characteristics of a typical airfoil at angle-of-attack conditions. The investigation shows that these turbulence models provide good comparison with experimental data for attached flow at moderate angle-of-attack conditions. Calculation by current turbulence models are, however, not appropriate at high angle-of-attack conditions with flow separation.

Defending HTTP Web Servers against DDoS Attacks through Busy Period-based Attack Flow Detection

  • Nam, Seung Yeob;Djuraev, Sirojiddin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.7
    • /
    • pp.2512-2531
    • /
    • 2014
  • We propose a new Distributed Denial of Service (DDoS) defense mechanism that protects http web servers from application-level DDoS attacks based on the two methodologies: whitelist-based admission control and busy period-based attack flow detection. The attack flow detection mechanism detects attach flows based on the symptom or stress at the server, since it is getting more difficult to identify bad flows only based on the incoming traffic patterns. The stress is measured by the time interval during which a given client makes the server busy, referred to as a client-induced server busy period (CSBP). We also need to protect the servers from a sudden surge of attack flows even before the malicious flows are identified by the attack flow detection mechanism. Thus, we use whitelist-based admission control mechanism additionally to control the load on the servers. We evaluate the performance of the proposed scheme via simulation and experiment. The simulation results show that our defense system can mitigate DDoS attacks effectively even under a large number of attack flows, on the order of thousands, and the experiment results show that our defense system deployed on a linux machine is sufficiently lightweight to handle packets arriving at a rate close to the link rate.

Numerical Analysis of Flow Characteristics around 3D Supersonic Inlet at Various Angle of Attack (받음각이 있는 3차원 초음속 흡입구 주위의 유동진동 해석)

  • Kim, J.;Hong, W.;Kim, C.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2011.05a
    • /
    • pp.218-224
    • /
    • 2011
  • A supersonic inlet at angle of attack has anti-symmetric pressure distribution, and it can make flow instability and structural problem. In this study, numerical analysis of three-dimensional inviscid flow was conducted under various throttle ratio and angle of attack conditions. Throttle ratio was defined as the ratio of the exit area to the smallest cross section area at inlet, and the ratio is controlled from 0 to 2.42. At various angle of attack, the characteristics of steady and unsteady flow around supersonic inlet is observed under different throttling ratios. From these results, pressure recovery curves and pressure history curves were plotted by post processing. Using pressure history data, FFT analysis is also carried out. Through these processes, it shows the tendency of pressure distribution anti-symmetricity and changing dominant frequency as increasing angle of attack.

  • PDF

Characteristics of the Air Flow around Square Prism (정사각 기둥주위의 공기흐름 특성에 관한 연구)

  • Lee, Kang-Ju;Kim, Seong-Cheon
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.4 no.1
    • /
    • pp.42-52
    • /
    • 1987
  • Experimental investigation on the characteristics of the air flow around a square prism located in a uniform flow with various angles of attack was carried out. Experimental results were obtained for the angle of attack from 0 .deg. to 45 .deg. and for Reynolds No. from $2.6{\times}^4$to $12.8^4$. Seperation and reattachment was occurred on the forward face (face AB). Reattachment phenomenon was not developed in the range of attack angle lower 13 .deg. . But, for the range, 13 .deg. .approx. 35 .deg. , the reattachment developed and its position was moved forward the angle of attack increases. Pressure distributions on the reattachment face has a maxium at the reattachment point and a minimum at the separation point. Pressurea on two back faces are nearly symmetric in spite of the changes of the angle of attack and are influenced by the turbulence in rearward flow field.

  • PDF

Study on the Angle-of-Attack Characteristics of the Rudder in Rotating Propeller Flow (프로펠러 회전류에서 작동하는 방향타의 받음각 특성 연구)

  • Jung, Jae Hwan;Baek, Dong Geun;Yoon, Hyun Sik;Kim, Ki-Sup;Paik, Bu-Geun
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.50 no.6
    • /
    • pp.421-428
    • /
    • 2013
  • This study aims at numerically investigating the angle of attack characteristics of the rudder behind a rotating propeller. The rotating propeller of 5 blades and the full spade rudder are placed in the numerical water tunnel with a uniform flow condition to consider propeller-rudder interaction. The turbulence closure model is employed to simulate the three-dimensional unsteady incompressible viscous turbulent flow around the propeller and the rudder. The present numerical method are well verified by comparing with the experimental results. In order to identify the dependence of the angle of attack of the rudder on the rudder angle, a wide range of rudder angles is considered. The present study carried out the quantitative and qualitative analysis of the angle of attack in terms of the pressure distribution, streamlines and the evaluation of the flow incidence, resulting in that the angle of attack increases as we move from the root and the tip to the center of the rudder, regardless of the rudder angle. The distribution of the angle-of-attack along the span is strongly affected by rotating propeller flow and rudder angle. Consequently, the distribution of the angle-of-attack of the oncoming flow against the rudder leading edge plays a role in determination of rudder performance.

A Numerical Study on Unsteady Flowfield around a NACA 0021 Airfoil at High Angles of Attack (고영각 NACA 0021 익형 주위의 비정상 유동장에 대한 수치해석적 연구)

  • Kim, Sang Dug
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.28 no.2
    • /
    • pp.12-17
    • /
    • 2020
  • Even though the benefit of flight at high angle-of-attack is to be able to reduce the speed of flight and maneuvers in complex flight environment, the flight at high angle-of-attack, however, is easy to be in stall which is characterized by sever unsteady flow separation over an airfoil. Current unsteady numerical analysis using DES was conducted to predict the aerodynamic characteristics of a NACA 0021 airfoil at high angle-of-attack conditions. And this provides the comparison with the steady numerical one with the typical turbulence models. The unsteady calculation by DES is appropriate in terms of predicting the aerodynamic performance of NACA 0021 airfoil at high angle-of-attack conditions.

Flow Analysis of Reverse Flow in a Channel with High Angle of Attack (받음각이 큰 평판 채널 내의 역류 유동 해석)

  • Choi, Seung;Sohn, Chang-Hyun
    • Journal of the Korean Society of Visualization
    • /
    • v.5 no.1
    • /
    • pp.37-42
    • /
    • 2007
  • Reverse flow occurs in a channel when there is an obstruction at the entry. However it has been shown recently that reverse flow can be realized without an obstruction, by staggering the sides of the channel and placing it at an angle of attack to the oncoming flow. In this study the latter flow is computationally investigated. Studies have been carried out for different widths (gap between the two walls forming the channel), and at an angle of attack of 30. The results have captured all the essential features of this complex phenomenon and show the time dependent pumping mechanism which leads to the occurrence of reverse flow.