• Title/Summary/Keyword: 변종

Search Result 1,346, Processing Time 0.026 seconds

Flora of Natural Mashes in Wondae-ri (Inje-gun, Kangwon-do) (강원도 인제군 원대리 자연습지의 식물상)

  • Park, Wan-Geun;Yoo, Seok-In;Park, Kwang-Seo
    • Journal of Forest and Environmental Science
    • /
    • v.16 no.1
    • /
    • pp.50-68
    • /
    • 2000
  • This study was to estabilish the composition and vegetation of vascular plants on natural mashes in Wondae-ri(710m: $37^{\circ}$ 58' 30" N, $128^{\circ}$ 12' 15" E), This work was conducted from April to October, 1999. Vascular plants were composed of 71 families, 175 genera, 228 species, 1 subspecies, 33 varieties and 3 formae, totaling 265 taxa. Among the investigated vascular plants, 19 families, 24 genera, 31 species, 5 varieties, 1 formae, totaling 37 taxa (13.9%) were hydrophytes and hygrophytes. The forest vegetation was classified into 1 community and 2 subcommunities ; A. Phragmites japonica community A-1. Salix gracilistyla-Impatiens noli-tangere subcommunity A-2. Spiraea prunifolia var. simpliciflora-Artemisia capillaris subcommunity.

  • PDF

A High-Interaction Client Honeypot on Android Platform (안드로이드 플랫폼에서의 High-Interaction 클라이언트 허니팟 적용방안 연구)

  • Jung, Hyun-Mi;Son, Seung-Wan;Kim, Kwang-Seok;Lee, Gang-Soo
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.381-386
    • /
    • 2013
  • As the new variation malicious codes of android platform are drastically increasing, the preparation plan and response is needed. We proposed a high-interaction client honeypot that applied to the android platform. We designed flow for the system. Application plan and the function was analyze. Each detail module was optimized in the Android platform. The system is equipped with the advantage of the high-interaction client honeypot of PC environment. Because the management and storage server was separated it is more flexible and expanded.

A Development of Malware Detection Tool based on Signature Patterns (시그너처 패턴기반의 악성코드 탐색도구의 개발)

  • Woo Chong-Woo;Ha Kyoung-Hui
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.6 s.38
    • /
    • pp.127-136
    • /
    • 2005
  • Recently, the damages occurring from the malware are increasing rapidly, regardless of continuous development of commercial vaccines . Generally, the vaccine detects well-known malware effectively, but it becomes helpless without any information against the unknown ones. Also, the malware generates its variations fast enough, so that the vaccine always gets behind in its updates. In this paper, we are describing a design and development of malware detection tool, which can detect such malware effectively. We first analyze the general functionality of the malware, and then extracts specific signatures. Such that, we can actively cope with a malware, which may come in previous type, a new type, and any of its mutations also.

  • PDF

A Taxonomic Study of Orders Arcellinida and Gromiida (Protozoa ; Sarcomastigophora ; Rhizopoda) from Ch'ongju Area, Korea (한국 청주지역의 유곡변형충목 및 유곡사상근족충목에 대한 분류학적 연구 (원생동물아계 : 내질편모충문: 근족충상강))

  • 정완호;최진복
    • Animal Systematics, Evolution and Diversity
    • /
    • v.5 no.2
    • /
    • pp.183-204
    • /
    • 1989
  • The Arcellinida and Gromiida (Protozoa ; Sacromastigophora ; Rhizopoda) inhabiting the freshwater in Chngju area were systematically investigated. Collections of samples were made from September, 1988, to August, 1989 at 10 sites located in Chngju area, Korea. As a result, 19 species and one variety in five families were identified, of which 12 species and one variety were newly recorded from Korea ; Arcella gibbosa Penard, A.polypora Penard, Centropyxis ecornis (Ehrenberg), Lesquereusia modesta Rhumbler . Nebela tuberculata (Wallich), Difflugia acuminata var. inflata Penard, D. crassa Cash and Hopkinson, d.curvicaulis Penard, D. elegans Penard, D.lithophila Penard, Pontigulasia compressa (Carter), P.vas(Leidy), Euglypha scutigera Penard. The identified species were redescribed with photographs.

  • PDF

Study on Cryptographic Analysis of Erebus Ransomware (Erebus 랜섬웨어에 대한 암호학적 분석 연구)

  • Kim, Soram;Kim, Jihun;Park, Myungseo;Kim, Daeun;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.339-346
    • /
    • 2018
  • Ransomware is a malicious program that requires money by encrypting data. The damage to ransomware is increasing worldwide, and targeted attacks for corporations, public institutions and hospitals are increasing. As a ransomware is serviced and distributed, its various usually emerge. Therefore, the accurate analysis of ransomware can be a decryption solution not only for that ransomware but also for its variants. In this paper, we analyze a cryptographic elements and encryption process for Erebus found in June, 2017, and investigate its cryptographic vulnerability and memory analysis.

Flash Malware Detection Method by Using Flash Tag Frequency (플래시 TAG Frequency를 이용한 악성 플래시 탐지 기술)

  • Jung, Wookhyun;Kim, Sangwon;Choi, Sangyong;Noh, Bongnam
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.259-263
    • /
    • 2015
  • The vulnerabilities related to Flash player which is widely used in internet browsers and office programs are gradually increased. To detect Flash malwares, previous work focuses on predefined features of ActionScript. However above work cannot detect new/mutated Flash malwares, since predefined features could not cover the new patterns of new/mutated Flash mawares. To solve this problem, we propose a Flash malware detection method that uses machine learning to learn Flash Tag patterns and classify Flash by using machine learning.

  • PDF

An Intrusion Detection System using Time Delay Neural Networks (시간지연 신경망을 이용한 침입탐지 시스템)

  • 강흥식;강병두;정성윤;김상균
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.5
    • /
    • pp.778-787
    • /
    • 2003
  • Intrusion detection systems based on rules are not efficient for mutated attacks, because they need additional rules for the variations. In this paper, we propose an intrusion detection system using the time delay neural network. Packets on the network can be considered as gray images of which pixels represent bytes of them. Using this continuous packet images, we construct a neural network classifier that discriminates between normal and abnormal packet flows. The system deals well with various mutated attacks, as well as well known attacks.

  • PDF

A Systematic Study on the Cimicifuga foefida L Complex and Related Species (Ranunculaceae) (Cimicifuga foetida L. Complex 및 근연종(미나리아재비과)에 대한 분류학적 연구)

  • 박종욱
    • Journal of Plant Biology
    • /
    • v.37 no.1
    • /
    • pp.111-124
    • /
    • 1994
  • The delimitation and systematic relationships of the C. foetida complex and related species were evaluated by numerical methods, including principal components analysis and cluster analysis of major morphological characters. Results of these analyses strongly support recognition of three varieties in C. foetida; these include C. foetida var. foetida, C. foetida var. micrantha, and C. foetida var. velutita. The results also indicated that C. brachycarpa, C. frigida, C. heracleifolia, and C. yunnanensis are distinct species, and C. heracleifolia comprises C. heracleifolia var. heracleifolia and C heracleifolia var. bifida. Cimicifuga mairei and C. foetida var. foliolosa, however, appeared to be morphologically indistinguishable from C. foetida var. velutina. In addition, C. foetida var. longibracteata and C. foetida var. bifula are conspecific with C. frigida.rigida.

  • PDF