• Title/Summary/Keyword: 시간차단기법

Search Result 87, Processing Time 0.025 seconds

A Network Processor-based In-Line Mode Intrusion Detection System for High-Speed Networks (고속 망에 적합한 네트워크 프로세서 기반 인-라인 모드 침입탐지 시스템)

  • 강구홍;김익균;장종수
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.4
    • /
    • pp.363-374
    • /
    • 2004
  • In this paper, we propose an in-line mode NIDS using network processors(NPs) that achieve performance comparable to ASIC and flexibility comparable to general-purpose processors. Even if many networking applications using NPs have been proposed, we cannot find any NP applications to NIDS in the literature. The proposed NIDS supports packet payload inspection detecting attacks, as well as packet filtering and traffic metering. In particular, we separate the filtering and metering functions from the complicated and time-consuming operations of the deep packet inspection function using two-level searching scheme, thus we can improve the performance, stability, and scalability of In-line mode system. We also implement a proto-type based on a PC platform and the Agere PayloadPlus (APP) 2.5G NP solution, and present a payload inspection algorithm to apply APP NP.

Lightweight Validation Mechanism for IoT Sensing Data Based on Obfuscation and Variance Analysis (난독화와 변화량 분석을 통한 IoT 센싱 데이터의 경량 유효성 검증 기법)

  • Yun, Junhyeok;Kim, Mihui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.9
    • /
    • pp.217-224
    • /
    • 2019
  • Recently, sensor networks are built and used on many kinds of fields such as home, traffic, medical treatment and power grid. Sensing data manipulation on these fields could be a serious threat on property and safety. Thus, a proper way to block sensing data manipulation is necessary. In this paper, we propose IoT(Internet of Things) sensing data validation mechanism based on data obfuscation and variance analysis to remove manipulated sensing data effectively. IoT sensor device modulates sensing data with obfuscation function and sends it to a user. The user demodulates received data to use it. Fake data which are not modulated with proper obfuscation function show different variance aspect with valid data. Our proposed mechanism thus can detect fake data by analyzing data variance. Finally, we measured data validation time for performance analysis. As a result, block rate for false data was improved by up to 1.45 times compared with the existing technique and false alarm rate was 0.1~2.0%. In addition, the validation time on the low-power, low-performance IoT sensor device was measured. Compared to the RSA encryption method, which increased to 2.5969 seconds according to the increase of the data amount, the proposed method showed high validation efficiency as 0.0003 seconds.

Analysis of anti-forensic trends and research on countermeasuresucation (안티 포렌식 동향 분석 및 대응 방안 연구)

  • Han Hyundong;Cho Young Jun;Cho Jae Yeon;Kim Se On;Han Wan Seop;Choi Yong Jun;Lee Jeong Hun;Kim Min Su
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.97-107
    • /
    • 2023
  • With the popularization of digital devices in the era of the 4th industrial revolution and the increase in cyber crimes targeting them, the importance of securing digital data evidence is emerging. However, the difficulty in securing digital data evidence is due to the use of anti-forensic techniques that increase analysis time or make it impossible, such as manipulation, deletion, and obfuscation of digital data. Such anti-forensic is defined as a series of actions to damage and block evidence in terms of digital forensics, and is classified into data destruction, data encryption, data concealment, and data tampering as anti-forensic techniques. Therefore, in this study, anti-forensic techniques are categorized into data concealment and deletion (obfuscation and encryption), investigate and analyze recent research trends, and suggest future anti-forensic research directions.

Study of Imaging of Submarine Bubble Plume with Reverse Time Migration (역시간 구조보정을 활용한 해저 기포플룸 영상화 연구)

  • Dawoon Lee;Wookeen Chung;Won-Ki Kim;Ho Seuk Bae
    • Geophysics and Geophysical Exploration
    • /
    • v.26 no.1
    • /
    • pp.8-17
    • /
    • 2023
  • Various sources, such as wind, waves, ships, and gas leaks from the seafloor, forms bubbles in the ocean. Underwater bubbles cause signal scattering, considerably affecting acoustic measurements. This characteristic of bubbles is used to block underwater noise by attenuating the intensity of the propagated signal. Recently, researchers have been studying the large-scale release of methane gas as bubble plumes from the seabed. Understanding the physical properties and distribution of bubble plumes is crucial for studying the relation between leaked methane gas and climate change. Therefore, a water tank experiment was conducted to estimate the distribution of bubble plumes using seismic imaging techniques and acoustic signals obtained from artificially generated bubbles using a bubble generator. Reverse time migration was applied to image the bubble plumes while the acquired acoustic envelope signal was used to effectively estimate bubble distribution. Imaging results were compared with optical camera images to verify the estimated bubble distribution. The water tank experiment confirmed that the proposed system could successfully image the distribution of bubble plumes using reverse time migration and the envelope signal. The experiment showed that the scattering signal of artificial bubble plumes can be used for seismic imaging.

Network Classification of P2P Traffic with Various Classification Methods (다양한 분류기법을 이용한 네트워크상의 P2P 데이터 분류실험)

  • Han, Seokwan;Hwang, Jinsoo
    • The Korean Journal of Applied Statistics
    • /
    • v.28 no.1
    • /
    • pp.1-8
    • /
    • 2015
  • Security has become an issue due to the rapid increases in internet traffic data network. Especially P2P traffic data poses a great challenge to network systems administrators. Preemptive measures are necessary for network quality of service(QoS) and efficient resource management like blocking suspicious traffic data. Deep packet inspection(DPI) is the most exact way to detect an intrusion but it may pose a private security problem that requires time. We used several machine learning methods to compare the performance in classifying network traffic data accurately over time. The Random Forest method shows an excellent performance in both accuracy and time.

Development of Urban Flood Forecasting Model using Statistical Method (통계학적 기법을 이용한 도시홍수 예.경보모형의 개발)

  • Lee, Beum-Hee;Lim, Jong-Il
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2007.05a
    • /
    • pp.805-809
    • /
    • 2007
  • 최근 도시의 발달은 하상공간에 대한 이용도를 높이는 방향으로 개발이 진행되어가는 추세이며, 하상도로 및 하상주차장의 이용은 이제 도시 내에서 이용 가능한 마지막 여유 공간으로 인식될 정도로 그 의존도가 높아져가고 있다. 그러나 하상공간의 활용도가 높아져갈수록 도시홍수의 발생으로 인한 대피문제가 발생하게 되고 돌발홍수로 인하여 하상도로의 차단 혹은 하상 주차장에 주차된 차량의 소거가 늦어지는 경우 고스란히 피해를 보게 되는 등 그 부작용도 계속 증가되고 있다. 도시홍수의 특성을 살펴보면 국지성 돌발 강우에 의한 유량의 급격한 증가와 짧은 유하시간, 작은 유역면적 등에 의하여 주요 예보지점까지의 도달시간이 매우 짧아 수문학적 홍수예측 모형을 이용하여 홍수예측 업무를 수행하는데 선행시간을 충분히 확보할 수 없다는 단점을 지니고 있다. 이에 따라 본 연구에서는 기존의 하천시스템에 대한 설계 등을 목적으로 하여 모형의 적용을 통한 시뮬레이션 기법을 적용하고 이를 통하여 홍수 예경보를 발령하기에는 선행시간의 확보(대피시간의 확보)라는 측면에서 상당한 어려움을 지닐 수 있으므로 시시각각으로 측정되는 실시간 수위측정 자료 및 실시간 강우자료를 이용하여 모형의 수행과정을 생략하고 하천의 수위변동을 직접 예측하고 대피할 수 있는 시나리오 기반의 수문모형을 개발하였다. SPSS를 사용한 통계학적 모형을 대전광역시 3대 하천에 대하여 적용한 결과 예측자료가 실측자료를 고수위 및 저수위 부근에서 정확히 모의하지 못하는 경향이 나타났으나 경계 및 위험수위를 설정하고 이를 넘어가는 시점에 대한 예측을 하는 홍수경보 시점 예측에는 효율적인 적용성을 나타내었다.씬 간편하면서도 정확도가 높아서, 환경방사성 스트론튬의 정량분석에 적절히 사용될 수 있다.e form of Jones matrix, which allows a new interpretation in the conversion efficiency of the thin-film optical waveguides.있다는 장점이 있었다. 따라서 소아에서 복막투석도관 수술 시 복강경적 방법을 이용하는 것이 효율적인 복막 투석을 위해 유용하다고 생각된다.상부 방광천자에 비해 민감도 59.5%(25/42), 특이도 86.6%(13/15)였고 위양성률 13.3%(2/15), 위음성률 40.5%(17/42) 로 정확도가 낮았다. 결론 : 소변을 가리지 못하는 영유아에서 요로 감염을 진단하기 위해서는 도뇨관 채뇨에 비해 초음파 감시하 치골상부 방광천자가 정확하고 안전한 채뇨법으로 권장되어야 한다고 생각한다.應裝置) 및 운용(運用)에 별다른 어려움이 없고, 내열성(耐熱性)이 강(强)하므로 쉬운 조건하(條件下)에서 경제적(經濟的)으로 공업적(工業的) 이용(利用)에 유리(有利)하다고 판단(判斷)되어진다.reatinine은 함량이 적었다. 관능검사결과(官能檢査結果) 자가소화(自家消化)시킨 크릴간장은 효소(酵素)처리한 것이나 재래식 콩간장에 비하여 품질 면에서 손색이 없고 저장성(貯藏性)이 좋은 크릴간장을 제조(製造)할 수 있다는 결론을 얻었다.이 있음을 확인할 수 있었다.에 착안하여 침전시 슬러지층과 상등액의 온도차를 측정하여 대사열량의 발생량을 측정하고 슬러지의 활성을 측정할 수 있는 방법을 개발하였다.enin과 Rhaponticin의 작용(作用)에 의(依)한 것이며,

  • PDF

Surgical Treatment of the Descending Thoracic Aorta ; An analysis of 22 cases (하행 흉부 대동맥류의 외과적 치료; 22예의 분석)

  • 이홍섭;이선훈;윤영철;구본일;김창호
    • Journal of Chest Surgery
    • /
    • v.32 no.6
    • /
    • pp.532-535
    • /
    • 1999
  • Background: The purpose of this study was to evaluate and analyze the surgical techniques and postoperative complications in patients undergoing operations for descending thoracic aortic aneurysms. Material and Method: The data of 22 major operations between March 1987 and August 1997 were retrospectively reviewed. Result: There were 18 men and 4 women with a mean age of 49 years (range 33 years to 82 years). The cause of the aneurysm was aortic dissection in 13 patients, atherosclerosis in 3, mycotic in 3, trauma in 2 and uncertain in 1. The operative techniques were resection and graft replacement in 16, axillofemoral bypass graft in 2, femorofemoral bypass graft in 2, exclusion, aneurysmorrhaphy in 1 and transfemoral stent insertion in 1. During the operation, 16 cases were performed under total aortic clamp. Among the 16 patients, femorofemoral bypass was used in 14 cases and previously made shunt in 2 cases. The mean total aortic clamp time was 91 minutes and the mean extracorporeal circulation time was 116 minutes. One death occurred in an excluded patient on the 52 postoperative day due to a rupture of the aneurysm. Postoperative complications were paraplegia in 1 case, acute renal failure in 1 case and acute respiratory failure in 1 case. Conclusion: Although surgical treatment of the descending thoracic aneurysm has many postoperative complications, good surgical results can be achieved with a proper patient selection and fine surgical techniques.

  • PDF

Preventing Botnet Damage Technique and It's Effect using Bot DNS Sinkhole (DNS 싱크홀 적용을 통한 악성봇 피해방지 기법 및 효과)

  • Kim, Young-Baek;Lee, Dong-Ryun;Choi, Joong-Sup;Youm, Heung-Youl
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.1
    • /
    • pp.47-55
    • /
    • 2009
  • Bot is a kind of worm/virus that is remotely controlled by a herder. Bot can be used to launch distributed denial-of-service(DDoS) attacks or send spam e-mails etc. Launching cyber attacks using malicious Bots is motivated by increased monetary gain which is not the objective of worm/virus. However, it is very difficult for infected user to detect this infection of Botnet which becomes more serious problems. This is why botnet is a dangerous, malicious program. The Bot DNS Sinkhole is a domestic bot mitigation scheme which will be proved in this paper as one of an efficient ways to prevent malicious activities caused by bots and command/control servers. In this paper, we analysis botnet activities over more than one-year period, including Bot's lifetime, Bot command/control server's characterizing. And we analysis more efficient ways to prevent botnet activities. We have showed that DNS sinkhole scheme is one of the most effective Bot mitigation schemes.

A Study on the Effect of Mid Layer on Supersonic 2D Double Shear Layer (초음속 2차원 2단 혼합층에서 중간층의 역할)

  • Kim, Dongmin;Baek, Seungwook
    • Journal of the Korean Society of Propulsion Engineers
    • /
    • v.19 no.1
    • /
    • pp.9-17
    • /
    • 2015
  • The basic flow configuration is composed of a plane, double shear layer where relatively thin mid gas layer is sandwiched between air and fuel stream. The present study describes numerical investigations concerning the combustion enhancement according to a variation of mid layer thickness. In this case, the effect of heat release in turbulent mixing layers is important. For the numerical solution, a fully conservative unsteady $2^{nd}$ order time accurate sub-iteration method and $2^{nd}$ order TVD scheme are used with the finite volume method including k-${\omega}$ SST model. The results consists of three categories; single shear layer consists of fuel and air, inert gas sandwiched between fuel and air, cold fuel gas sandwiched between fuel and air. The numerical calculations has been carried out in case of 1, 2, 4 mm of mid layer thickness. The height of total gas stream is 4 cm. The combustion region is broadened in case of inert gas layer of 2, 4 mm thickness and cold fuel layer of 4 mm thickness compared with single shear layer.

Performance Comparison of CDMA and TDMA protocols in radio access system for Integrated Voice/Data Services (음성 및 데이터서비스를 위한 무선접속시스템에서 CDMA와 TDMA방식의 성능비교)

  • 고종하;양영님;이정규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.6A
    • /
    • pp.820-831
    • /
    • 1999
  • In this paper, we have compared the performance of a D-TDMA protocol with that of a CDMA protocol, in radio access system for integrated voice/data services.The D-TDMA protocol is based on a generic dynamic channel assignment approach to be followed a combination of “circuit mode” reservation for voice calls, along with dynamic first-come-first served assignment of remaining capacity for data messages. In the CDMA protocol, we have used the voice activity detection to reduce the interface power of other mobiles in internal and external cells, and analyzed the interference power ratio. Also we have computed BER(Bit Error Rate) by using this interference power ratio and evaluated voice blocking probability(voice packet loss probability) and data transmission delay, according to average data length and average data arrival rate.We have found the CDMA protocol achieves comparatively higher performance for short data length, regardless of data arrival rate. Otherwise, the data transmission delay of D-TDMA protocol is shorter than that of the CDMA protocol for long data message.

  • PDF