• Title/Summary/Keyword: 싱크홀

Search Result 80, Processing Time 0.037 seconds

A New Bot Disinfection Method Based on DNS Sinkhole (DNS 싱크홀에 기반한 새로운 악성봇 치료 기법)

  • Kim, Young-Baek;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.107-114
    • /
    • 2008
  • The Bot is a kind of worm/virus that can be used to launch the distributed denial-of-service(DDoS) attacks or send massive amount of spam e-mails, etc. A lot of organizations make an effort to counter the Botnet's attacks. In Korea, we use DNS sinkhole system to protect from the Botnet's attack, while in Japan "so called" CCC(Cyber Clean Center) has been developed to protect from the Botnet's attacks. But in case of DNS sinkhole system, there is a problem since it cannot cure the Bot infected PCs themselves and in case of CCC there is a problem since only 30% of users with the Botnet-infected PCs can cooperate to cure themself. In this paper we propose a new method that prevent the Botnet's attacks and cure the Bot-infected PCs at the same time.

Fuzzy-based Routing Path Determination Method to Consume Balanced Energy Resources in INSENS of Sensor Networks (센서 네트워크의 INSENS에서 균형적인 에너지 자원 소모를 위한 퍼지 기반의 라우팅 경로 설정 기법)

  • Song, Kyu-Hyun;Cho, Tae-Ho
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.07a
    • /
    • pp.202-203
    • /
    • 2015
  • 무선 센서 네트워크는 제약된 하드웨어와 개방된 환경으로 인해 싱크 홀 공격에 취약한데 이를 위해서 INSENS가 제안되었다. 이러한 INSENS는 베이스 스테이션과 센서 노드들 사이에 거리를 기반으로 경로를 설정하므로 이벤트가 자주 발생할 경우 특정 경로에 노드들은 트래픽이 증가하여 에너지 불균형을 가진다. 이러한 문제점을 해결하기 위해 본 논문에서는 네트워크 상황을 고려하여 균형적으로 에너지를 소모하게 하는 퍼지 시스템 기반의 효율적인 경로 설정 방법을 제안한다. 퍼지 시스템은 배터리 잔량, 홉 수, 경로설정 횟수의 입력을 통해 네트워크의 효율적인 경로를 설정한다. 그러므로 제안 기법은 효율적인 경로 선택으로 트래픽을 분산시켜 전체 센서 네트워크의 수명을 연장한다.

  • PDF

GIS Based Sinkhole Susceptibility Analysisin Karst Terrain: A Case Study of Samcheok-si (GIS를 활용한 카르스트 지역의 싱크홀 민감성 분석: 삼척시를 중심으로)

  • Ahn, Sejin;Sung, Hyo Hyun
    • Journal of The Geomorphological Association of Korea
    • /
    • v.24 no.4
    • /
    • pp.75-89
    • /
    • 2017
  • Sinkholes are key karst landforms that primarily evolve through the dissolution of limestone, and it posing a significant threat to roads, buildings, and other man-made structures. This study aims to analyze the area susceptible to sinkhole development using GIS and to identify potential danger area from sinkholes. Eight sinkhole related factors (slope angle, distance to caves, distance to faults, bedrock lithology, soil depth, drainage class, distance to mines, and distance to traffic routes) were constructed as spatial databases with sinkhole inventory. Based on the spatial database, sinkhole susceptibility maps were produced using nearest neighbor distance and frequency ratio models. The maps were verified with prediction rate curve and area under curve. The result indicates that the nearest neighbor distance and frequency ratio models predicted 95.3% and 94.4% of possible sinkhole locations respectively. Furthermore, to identify potential sinkhole danger area, the susceptibility map was compared with population distribution and land use map. It has been found that very highly susceptible areas are along Osipcheon and southeast southwest part of Hajang-myeon and south part of Gagok-myeon of Samcheok-si. Among those areas, it has been identified that potential sinkhole danger areas are Gyo-dong, Seongnae-dong, Jeongna-dong, Namyang-dong and Dogye-eup. These results can be useful in the aspects of land use planning and hazard prevention and management.

Harmful Traffic Control Using Sink Hole Routing (싱크홀 라우팅을 이용한 유해 트래픽 제어)

  • Chang, Moon-Soo;Lee, Jeong-Il;Oh, Chang-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.4
    • /
    • pp.69-76
    • /
    • 2009
  • The construction of Internet IP-based Network is composed of router and switch models in a variety of companies. The construction by various models causes the complexity of the management and control as different types of CLI is used by different company to filter out abnormal traffics like worm, virus, and DDoS. To improve this situation, IETF is working on enacting XML based configuration standards from NETCONF working group, but currently few commands processing at the level of operation layer on NETCONF are only standardized and it's hard for unified control operation process between different make of system as different company has different XML command to filter out abnormal traffics. This thesis proposes ways to prevent abnormal attacks and increase efficiency of network by re-routing the abnormal traffics coming thru unified control for different make of systems into Sinkhole router and designing a control system to efficiently prevent various attacks after checking the possibility of including abnormal traffics from unified control operation.

Application of Fuzzy Reasoning Method for Prediction of Subsidence Occurrences in Abandoned Mine Area (폐광산 지역에서의 지반침하예측을 위한 퍼지추론기법 적용 연구)

  • Choi, Sung-O.;Kim, Jae-Dong;Choi, Gwang-Su
    • Tunnel and Underground Space
    • /
    • v.19 no.5
    • /
    • pp.463-472
    • /
    • 2009
  • Many old domestic mines were excavated with the room and pillar method or the sublevel caving method and they involve the great possibility of surface subsidence, especially in the shallow depth mines. In most of these cases, the mine roadways and openings are very irregular in shape and the information about the local geology is uncertain. Consequently it is not simple to standardize the estimation method for the possibility of subsidence, especially the sinkhole subsidence. In this study, the fuzzy reasoning method has been applied for development of estimating the possibility of subsidence occurrence in abandoned mine area. This method has the advantage in producing the reliable estimation results with a simple performance procedure even when the precise information on the local geology and mining conditions is rare. For the verification of applicability of this method, the developed method has been applied to Kumho mine in Bonghwa, Kyungbook province and the Choong-ju mine in Iryu, Choongbook province where the surface subsidence occurred already.

A Congestion Control Scheme Considering Traffic in Large-Scale Wireless Sensor Networks (대규모 무선 센서 네트워크에서 트래픽을 고려한 혼잡제어)

  • Kwak, Moon-Sang;Hong, Young Sik
    • Journal of KIISE
    • /
    • v.42 no.1
    • /
    • pp.114-121
    • /
    • 2015
  • Large-scale wireless sensor networks are constructed by using a large number of sensor nodes that are non-uniformly deployed over a wide area. As a result, the data collected by the sensor nodes are similar to that from one another since a high density of the sensor nodes may cause an overlap. As a result of the characteristics of the traffic, data is collected from a plurality of sensor nodes by a sink node, and when the sensor nodes transmit their collected data to the sink node, the sensor nodes around the sink node have a higher amount of traffic than the sensor nodes far away from the sink node. Thus, the former sensor encounter bottlenecks due to traffic congestion and have an energy hole problem more often than the latter ones, increasing energy consumption. This paper proposes a congestion control scheme that considers traffic flows in order to control traffic congestion of the sensor nodes that are non-uniformly deployed over a large-scale wireless sensor network.

Influence Ground Sinking with Variation of Ground Water Level (지하수위 변화에 따른 지반함몰 영향연구)

  • Kim, Suk-Ja;Jung, Kwan-Sue
    • Journal of the Society of Disaster Information
    • /
    • v.14 no.4
    • /
    • pp.399-408
    • /
    • 2018
  • Purpose: Recently, the ground subsidence has caused social problem, because it occurred life and economic damage. Method: Ground subsidence is different from a sink hole. Ground subsidence occurred cavities from loss of by groundwater flow, surface layer is collapsed due to relaxation and expansion. Results: According to the survey, the caused of ground subsidence are classified as ground cavities, surrounding ground relaxation and pipe joint failure. Conclution: Cavities of ground is mainly caused by cavities formed by rainfall induced infiltration of the heavy rainfall, loss of soil due to rise and fall of ground water level and repeated sewage runoff.

Implementation of the Living Alone Elderly People Protection System using Ubiquitous Sensor Networks (유비쿼터스 센서 네트워크를 이용한 독거노인 지킴이 시스템 구현)

  • Park, Hong-Jin
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.2
    • /
    • pp.41-48
    • /
    • 2010
  • Numerous researches are being made on applications based on ubiquitous sensor networks and super light, low power sensors. With the development of society, the aged population is expanding and living alone elders are one of important social issues in today's society. This paper implements the living alone elderly people protection system using ubiquitous sensor networks. By collecting and monitoring information on living alone elders using sensor nodes and sink nodes in web environment, we can perform more integrated management. The implemented living alone elderly people protection system can monitor living alone elders' situation and take actions promptly in emergency.