• Title/Summary/Keyword: 침입성

Search Result 1,050, Processing Time 0.028 seconds

Key Pre-distribution using the Quorum System in Wireless Sensor Networks (센서 네트워크에서의 쿼럼 시스템을 이용한 키 사전 분배)

  • Kang Ji-Myung;Lee Sung-Ryeoll;Cho Seong-Ho;Kim Chong-Kwon;Ahn Joung-Chul
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.3
    • /
    • pp.193-200
    • /
    • 2006
  • The security feature is essential in wireless sensor network such as intrusion detection or obstacle observation. Sensor nodes must have shared secret between nodes to support security such as privacy. Many methods which provide key pre-distribution need too many keys or support poor security. To solve this problem, probabilistic key pre-distribution is proposed. This method needs a few keys and use probabilistic method to share keys. However, this method does not guarantee key sharing between nodes, and neighbor nodes nay not communicate each other. It leads to waste of network resource such as inefficient routing, extra routing protocol. In this paper, we propose new key distribution method using quorum system which needs a few keys and guarantee key sharing between nodes. We also propose extension of the method which needs fewer keys and guarantee key sharing when node deployment knowledge is well known.

Histopathology of Red Pepper Plant Infected with Colletotrichum dematium f. sp. capsicum (탄저병균 Colletotrichum dematium f. sp. capsicum에 감염된 고추의 병태조직학적 관찰)

  • Lee Sang Bum;Chung Bong Koo;Shim Jae Sup
    • Korean Journal Plant Pathology
    • /
    • v.2 no.3
    • /
    • pp.185-192
    • /
    • 1986
  • Upon germination, a conidium was septated in accordance with number of germ tubes. The percentages of ppressorial formation were not different between the resistant cultivars (Kumchang NO. 2 and Hongilpum) and the susceptible cultivars (Haneulcho and Saegochu). Appressorial form was various such as round, elliptic or star-shapped. The maximum number of appressoria was shown at 12 hours after inoculation. By 24 hours fter inoculation, hypersensitive tiny brown lesions were observed on the leaves and fruits of the resistant cultivars. Epidermal cells under cuticle layer of the resistant Kumchang NO. 2 fruit showed severe plasmolysis, while on the susceptible cultivars, the lession was largely extended to following incubation. Subcuticular infection hyphae were profusely colonized in the disintegrated tissues. Acervuli and setae on the stromatic structure ere formed at 96 hours. The infected seed coat was not only severely collapsed, but also infection hyphae were observed on the disintegrated seed coat, resulting severe plasmolysis of nucellus and embryo.

  • PDF

Smart Card Based User Authentication Scheme Secure Against Password Guessing Attack

  • Joo, Young-Do
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.4 no.3
    • /
    • pp.182-188
    • /
    • 2011
  • Recently Yoon et al. proposed the remote user authentication scheme using smart cards. But their scheme has not satisfied security requirements which should be considered in the user authentication scheme using the password based smart card. In this paper, we prove that Yoon et al.'s scheme is vulnerable to a password guessing attack in case that the attacker steals the user's smart card and extracts the information from the smart card. Accordingly, this paper proposes the improved user authentication scheme based on the hash functin and random nonce that can withstand various possible attacks including a password guessing attack. The result of comparative analysis demonstrates that the proposed scheme is more secure and efficient than Yoon et al.'s scheme, with a trivial trade-off to require just a few more exclusive-OR operations.

Ensemble Model using Multiple Profiles for Analytical Classification of Threat Intelligence (보안 인텔리전트 유형 분류를 위한 다중 프로파일링 앙상블 모델)

  • Kim, Young Soo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.3
    • /
    • pp.231-237
    • /
    • 2017
  • Threat intelligences collected from cyber incident sharing system and security events collected from Security Information & Event Management system are analyzed and coped with expanding malicious code rapidly with the advent of big data. Analytical classification of the threat intelligence in cyber incidents requires various features of cyber observable. Therefore it is necessary to improve classification accuracy of the similarity by using multi-profile which is classified as the same features of cyber observables. We propose a multi-profile ensemble model performed similarity analysis on cyber incident of threat intelligence based on both attack types and cyber observables that can enhance the accuracy of the classification. We see a potential improvement of the cyber incident analysis system, which enhance the accuracy of the classification. Implementation of our suggested technique in a computer network offers the ability to classify and detect similar cyber incident of those not detected by other mechanisms.

A Study on the Distribution and Change of Montane Meadows in the East Face of Mt. Baekdu (백두산 동사면 산지초지 분포와 변화에 관한 연구)

  • Kim, Nam-Sin
    • Journal of the Korean association of regional geographers
    • /
    • v.18 no.4
    • /
    • pp.364-373
    • /
    • 2012
  • This study is to analyze distribution and change of montane meadows on the lava plateau in the east face of Mt. Baekdu. Process for aims carried out field survey, and analyzed landsat images of 1993, 1999, 2004, and year 2010. After research findings, the area of forests has increased by 33% from $636km^2$ to $848km^2$, montane meadow has decreased by 58% from $303km^2$ to $127km^2$ during 18 years. Montane meadows could be classified as 2 categories of wet meadow and dry meadow by the geomorphic environments and vegetation types. Wet meadow has decreased by 30%, dry meadow has decreased by 70% in the same period. Decreasing areas are replacing meadows with forests in invasion by trees and shrubs. According to the analysis with weather data for 16 years from 1993 to 2008, temperature has increased by $1.6^{\circ}C$, on the other hand, precipitation has decreased by 5.3mm. These kinds of climate change trends continue in the future, it could be change montane meadows into tree types.

  • PDF

Implementation of Analyzer of the Alert Data using Data Mining (데이타마이닝 기법을 이용한 경보데이타 분석기 구현)

  • 신문선;김은희;문호성;류근호;김기영
    • Journal of KIISE:Databases
    • /
    • v.31 no.1
    • /
    • pp.1-12
    • /
    • 2004
  • As network systems are developed rapidly and network architectures are more complex than before, it needs to use PBNM(Policy-Based Network Management) in network system. Generally, architecture of the PBNM consists of two hierarchical layers: management layer and enforcement layer. A security policy server in the management layer should be able to generate new policy, delete, update the existing policy and decide the policy when security policy is requested. And the security policy server should be able to analyze and manage the alert messages received from Policy enforcement system in the enforcement layer for the available information. In this paper, we propose an alert analyzer using data mining. First, in the framework of the policy-based network security management, we design and implement an alert analyzes that analyzes alert data stored in DBMS. The alert analyzer is a helpful system to manage the fault users or hosts. Second, we implement a data mining system for analyzing alert data. The implemented mining system can support alert analyzer and the high level analyzer efficiently for the security policy management. Finally, the proposed system is evaluated with performance parameter, and is able to find out new alert sequences and similar alert patterns.

A Scheme of Resource Reallocation and Server Replication against DoS Attacks (서비스 거부 공격에 대비한 자원 재할당 및 서버 중복 방안)

  • Min, Byoung-Joon;Kim, Sung-Ki;Na, Yong-Hi;Lee, Ho-Jae;Choi, Joong-Sup;Kim, Hong-Geun
    • The KIPS Transactions:PartA
    • /
    • v.10A no.1
    • /
    • pp.7-14
    • /
    • 2003
  • In order to cope with DoS (Denial of Service) attacks disturbing delivery of intended services by exhausting resources of computing nodes, we need a solution to recognize important resources for the essential services which have to be maintained under any circumstances and to adapt the system to the urgent situation and reconfigure itself properly. In this paper, we present a two-phase scheme to handle the problem. In the first phase, by means of dynamic resource reallocation within a computing node, we try to make the selected essential services survive even after the occurrence of an attack. For the second phase when it becomes impossible to continue the service in spite of the actions taken in the first phase, we apply server replication in order to continue the transparent provision of the essential services with the end users by utilizing redundant computing nodes previously arranged. Experimental result obtained on a testbed reveals the validity of the proposed scheme. A comparison with other proposed schemes has been conducted by analyzing the performance and the cost.

Determination of the Soil-water Characteristic Curve Using the Flow Pump Technique (피스톤 펌프 기법을 이용한 흙-수분 특성곡선 측정방법)

  • 황창수;김태형
    • Journal of the Korean Geotechnical Society
    • /
    • v.19 no.5
    • /
    • pp.155-162
    • /
    • 2003
  • The soil-water characteristic curve (SWCC) represents the essential constitutive relationship for solving various problems in unsaturated soil mechanics. A reliable and convenient experimental method is needed for the determination of the SWCC in engineering applications. This study introduces and proves that the suction-saturation experimental measurement based on the flow pump technique is a convenient and accurate method for obtaining the SWCC. The flow pump technique provides complete control over the test conditions and is capable of detecting all the important elements of the SWCC. In particular, it is capable of defining continuous drying and wetting curves, the moment of air occlusion, and the hysteretic behavior of unsaturated soils. Not only the optimal testing procedure but also the analysis technique for the flow pump technique has been established in this study. Especially, the method of the suction drop measurement was developed to measure the SWCC. This method is a convenient and time saving method without losing accuracy.

Cluster-based Continuous Object Prediction Algorithm for Energy Efficiency in Wireless Sensor Networks (무선 센서 네트워크에서 에너지 효율성을 위한 클러스터 기반의 연속 객체 예측 기법)

  • Lee, Wan-Seop;Hong, Hyung-Seop;Kim, Sang-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8C
    • /
    • pp.489-496
    • /
    • 2011
  • Energy efficiency in wireless sensor networks is a principal issue to prolong applications to track the movement of the large-scale phenomena. It is a selective wakeup approach that is an effective way to save energy in the networks. However, most previous studies with the selective wakeup scheme are concentrated on individual objects such as intruders and tanks, and thus cannot be applied for tracking continuous objects such as wild fire and poison gas. This is because the continuous object is pretty flexible and volatile due to its sensitiveness to surrounding circumferences so that movable area cannot be estimated by the just spatiotemporal mechanism. Therefore, we propose a cluster-based algorithm for applying the efficient and more accurate technique to the continuous object tracking in enough dense sensor networks. Proposed algorithm wakes up the sensors in unit cluster where target objects may be diffused or shrunken. Moreover, our scheme is asynchronous because it does not need to calculate the next area at the same time.

A Study of Phase Sensing Device IoT Network Security Technology Framework Configuration (디바이스 센싱 단계의 IoT 네트워크 보안 기술 프레임워크 구성)

  • Noh, SiChoon;Kim, Jeom goo
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.35-41
    • /
    • 2015
  • Internet of Things has a wide range of vulnerabilities are exposed to information security threats. However, this does not deal with the basic solution, the vaccine does not secure encryption for the data transmission. The encryption and authentication message transmitted from one node to the construction of the secure wireless sensor networks is required. In order to satisfy the constraint, and security requirements of the sensor network, lightweight encryption and authentication technologies, the light key management technology for the sensor environment it is required. Mandatory sensor network security technology, privacy protection technology subchannel attack prevention, and technology. In order to establish a secure wireless sensor networks encrypt messages sent between the nodes and it is important to authenticate. Lightweight it shall apply the intrusion detection mechanism functions to securely detect the presence of the node on the network. From the sensor node is not involved will determine the authenticity of the terminal authentication technologies, there is a need for a system. Network security technology in an Internet environment objects is a technique for enhancing the security of communication channel between the devices and the sensor to be the center.