• Title/Summary/Keyword: 침입자

Search Result 543, Processing Time 0.032 seconds

Design of a Policy-based Security Mechanism for the Secure Grid Applications (안전한 그리드 응용을 위한 정책기반의 보안 기능 설계)

  • Cho, Young-Bok;You, Mi-Kyung;Lee, Sang-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.2
    • /
    • pp.901-908
    • /
    • 2011
  • For the available grid environmental realization, the resource supply PC must have to provide an appropriate security function of their operation environments. SKY@HOME is a kind of the grid computing environments. If this has not supervised by administrator handling smoothly, it is inherently vulnerable state to the security level of the grid environments, because the resource supply PC is not update a security function without delay. It is also have the troublesome problems which have to install of an additional security program for support the appropriate security. This paper proposes an integration security model on the policy-based that provides an update each level according to the situation of the resource supply PC for improving its problems as a security aspect of the SKY@HOME. This model analyzes the security state of the resource supply PC respectively, and then the result is available to provide an appropriate security of the resource supply PC using an integration security model. The proposed model is not need additionally to buy and install the software, because it is provided the security management server oriented service. It is also able to set up the suit security function of a characteristic of the each resource supply PC. As a result, this paper clearly show the participation of resource supply PC improved about 20%.

Change in Axial Rotation of Toric Soft Contact Lens according to Tear Volume (눈물양에 따른 토릭 소프트콘택트렌즈의 축 회전양 변화)

  • Seo, Woo Hyun;Kim, So Ra;Park, Mijung
    • Journal of Korean Ophthalmic Optics Society
    • /
    • v.20 no.4
    • /
    • pp.445-454
    • /
    • 2015
  • Purpose: The present study was aimed to investigate the effect of tear volume on a change of axial rotation according to wearing time of toric soft contact lens and gaze directions. Method: Toric soft contact lenses with double thin zone design applied on 62 eyes. Then, changes in non invasive tear film break-up time and the rotational direction/amount of lens when changing gaze direction were respectively measured after 15 minutes and 6 hours of lens wear. Results: Lens rotation to temporal direction was more found when changing gaze direction after lens wear. However, its rotation was varied according to wearing time and the subjects' tear volume. Furthermore, the frequency of lens rotation to temporal direction was higher in dry eyes compared with normal eyes at nearly all gaze directions after 15 minutes and 6 hour of lens wear. The rotational amount of lens was generally greater in dry eyes after 15 minutes of lens wear. However, its difference between normal eyes and dry eyes was not great after 6 hours of lens wear. Conclusion: The present study revealed that axial rotation of toric soft contact lens was varied according to the wearer's tear volume and lens rotational patterns at the initial, and extending periods of lens wear were different. The change in rotational pattern of toric soft contact lens from these results means the possibility of visual change after extending lens wear, and the identification of its correlation with tear volume suggests the necessity of considering factors for choosing appropriate toric soft contact lens.

A Study for Task Detection Acquiring Abnormal Permission in Linux (리눅스의 비정상 권한 획득 태스크의 탐지방법 연구)

  • Kim, Won-Il;Yoo, Sang-Hyun;Kwak, Ju-Hyun;Lee, Chang-Hoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.11
    • /
    • pp.427-432
    • /
    • 2014
  • The Purpose of local system attacks is to acquire administrator's(root) privilege shell through the execution of the malicious program or change the flow of the program. This acquiring shell through attack is still valid approach method and it is difficult to cope with improving each of vulnerability because the attacker can select various forms of attack. Linux allocate a set of credentials when login, in order to manage user permissions. Credentials were issued and managed by the kernel directly, and also the kernel ensures that any change cannot be occurred outside of kernel. But, user's credentials that acquired root privilege through system attacks occurs a phenomenon that does not remain consistent. In this paper we propose a security module to detect a security threats that may cause to users and tasks by analysis user task execution and inconsistency credentials.

An Efficient Method for Analyzing Network Security Situation Using Visualization (시각화 기반의 효율적인 네트워크 보안 상황 분석 방법)

  • Jeong, Chi-Yoon;Sohn, Seon-Gyoung;Chang, Beom-Hwan;Na, Jung-Chan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.107-117
    • /
    • 2009
  • Network administrator recognizes the abnormal phenomenon in the managed network by using the alert messages generated in the security devices including the intrusion detection system, intrusion prevention system, firewall, and etc. And then the series of task, which searches for the traffic related to the alert message and analyzes the traffic data, are required to determine where the abnormal phenomenon is the real network security threat or not. There are many alert messages to have to inspect in order to determine the network security situation. Also the much times are needed so that the network administrator can analyze the security condition using existing methods. Therefore, in this paper, we proposed an efficient method for analyzing network security situation using visualization. The proposed method monitors anomalies occurred in the entire IP address's space and displays the detail information of a security event. In addition, it represents the physical locations of the attackers or victims by linking GIS information and IP address. Therefore, it is helpful for network administrator to rapidly analyze the security status of managed network.

Response of Terrestrial Insect Community to the Vegetation Invasion at a Sand-Bed Stream (모래하천에서 식생 침입에 대한 육상곤충 군집의 반응)

  • Cho, Geonho;Cho, Kang-Hyun
    • Ecology and Resilient Infrastructure
    • /
    • v.4 no.1
    • /
    • pp.44-53
    • /
    • 2017
  • In order to investigate the response in fauna and biological communities of terrestrial insects to the vegetation encroachment on the sandbar, species composition, species diversity, functional species traits and community structure of land-dwelling insects sampled by a pit-fall trap were compared at the bare and vegetated sandbar of a typical sand-bed stream, the Naeseong Stream, Korea. Species diversity of the insects was increased but their density was decreased as the riparian vegetation encroached at the sandbar. In particular, indicator species of bare sandbar such as Cicindela laetescripta and Dianemobius csikii, were found at the bar sandbar. The insect communities were clearly classified at the bare and vegetated sandbar according to coverages of riparian plants. The food web of the bare sandbar was composed of detritus - detritivore and scavenger - predator consisted mainly of Coleoptera. On the other hand, the food web of the vegetated sandbar was composed of plants - sucking and chewing herbivore - parasitoid and predator. These results showed that biodiversity of terrestrial insects was increased, food web was changed from grazing to detritus food chain, and insect fauna specific bare sandbar disappeared as the riparian vegetation invaded on the sandbar of a sand-bed stream.

The assessment of Seoul City school sheriff system and developmental expansion plan - Around the righteousness proof of the security industry law application - (서울시 학교보안관 제도의 평가와 발전적 확대방안 - 경비업법 적용의 당위성 논증을 중심으로 -)

  • Lee, Sang-Hun
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.163-191
    • /
    • 2011
  • Recently, the problems in school violence did not stop on the crime between the members at the school and which developed into the invasion crime of the school caused by outsiders. The school is no more the safety zone from the crime. Particularly, in the case of the elementary school, because there are nearly no people who oppose to the outside attacker and can control this, it is the place where it is vulnerable to the invasion crime. The Metropolis of Seoul implements the School Sheriff system within the jurisdiction bureau, in the public elementary school. However, actually the School Sheriff business is being managed, never applying a rule in the Security Industry Law with the main content, that is the Security Industry Law application is excluded. Because the jurisdiction on the contract of Seoul City and operating company are run, the various issues is caused. First, since it is not being considered as a security business, the commercial liability insurance for security company has no chance to applicate when the operation company and the School Sheriff have related damage generation. So the security for the indemnification of loss of the victim is weak. Second, The task of the School Sheriff is ruled just by in the individual contracts. But it is insufficient with this thing. The related duties are required some supplement like a general rule application including the obligation of the guard in the security industry law. Third, the education of the School Sheriff needs to connect with the educational programme in the security industry law. The related professional education specially needed for the prevention of school violence ought to be reserved compensation. Forth, the citizens still demand the strengthening of police patrol for the surroundings of a school in spite of the result of Seoul City's public survey. Therefore, the active relation of cooperation with the police needs to be supported legally and institutionally with the Security Industry Law application. Fifthly, the success of the School Sheriff business can be more guaranteed with the supervision of the legal and institutional device like a the Security Industry Law application or police and all sorts of administrative execution's and etc.

  • PDF

Detection and Location-based Visualization of Anomalous Web Sessions (비정상 웹 세션 탐지 및 지역 기반 시각화)

  • Kim, Sang-Rok;Lee, Jun-Sup;Seo, Jeong-Seok;Cha, Sung-Deok
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10c
    • /
    • pp.616-620
    • /
    • 2006
  • 한 해에도 수많은 해킹 사고가 발생하고 있고, 이 중에서 웹 해킹이 차지하는 비율은 급격하게 증가하고 있다. 또한 최근의 해킹 동향을 분석해 보았을 때 웹 해킹의 비율은 더욱 증가할 것이라고 예상된다. HTTP 프로토콜을 이용한 공격의 특성 상 정상행위와 비정상 행위의 구분이 어렵다. 따라서 웹 서비스에 특화된 침입탐지 시스템이 요구된다. 또한 웹 사이트 관리자는 빠른 탐지와 대응을 위해 이상 행위에 대한 신속하고 정확한 인식을 필요로 한다. 본 논문에서는 이러한 필요성을 기반으로 Location-based Visualization Tool을 제안한다. 웹 사용 현황 및 이상행위에 대해 시각적인 정보를 제공하기 위해 웹 서버의 access log를 분석하여 이상 행위를 탐지하였고, IP정보를 기반으로 지역 정보의 시각화를 구현하였다.

  • PDF

DDoS Attack Detection on the IPv6 Environment (IPv6환경에서 DDoS 침입탐지)

  • Koo, Min-Jeong;Oh, Chang-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.185-192
    • /
    • 2006
  • By mistaking normal packets for harmful traffic, it may not offer service according to the intention of attacker with harmful traffic, because it is not easy to classify network traffic for normal service and it for DUoS(Distributed DoS) attack like the Internet worm. And in the IPv6 environment these researches on harmful traffic are weak. In this dissertation, hosts in the IPv6 environment are attacked by NETWIB and their attack traffic is monitored, then the statistical information of the traffic is obtained from MIB(Management Information Base) objects used in the IPv6. By adapting the ESM(Exponential Smoothing Method) to this information, a normal traffic boundary, i.e., a threshold is determined. Input traffic over the threshold is thought of as attack traffic.

  • PDF

An Authentication Protocol Design in RFID System for Mobility (유동성을 지닌 RFID 시스템을 위한 인증 프로토콜 설계)

  • Kim, Young-Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.1
    • /
    • pp.122-128
    • /
    • 2010
  • RFID is method used on wireless system. However, this mechanism is not used for authentication and security. Therefore, it is very vulnerable to attacks such as dropping attacks and traffic attacks. the RFID Tags are of the limited nature due to environment factors and there is greater constraints in designing authentication protocol. If we do not RFID to secure corporate information and product all the information will be exposed. The attacker will break into the RFID system and stop the distribution system. So, this paper proposes a new authentication protocol which provides not only unlimited access to Tag and Reader of mobile and connection between Tag and Reader bet also provides authentication mechanism by defining the key distribution.

Inhibition of lipopolysaccharide-stimulated inflammatory mediator production in RAW264.7 macrophages by Foeniculum vulgare fruit extract (LPS로 자극한 RAW264.7 대식세포주에서 회향 추출물에 의한 염증성 매개물의 생성 억제)

  • Choi Eun-Mi;Koo Sung-Ja
    • Korean journal of food and cookery science
    • /
    • v.20 no.5
    • /
    • pp.505-510
    • /
    • 2004
  • 이물질 침입에 대한 인식의 결과 NO, PGE$_2$, TNF-, IL-6와 같은 여러 신호전달물질의 분비가 개시되며 이들을 억제하는 물질을 항염증제라고 볼 수 있다. 본 연구에서는 회향(Foeniculum vulgare Mill.) 열매 추출물이 mouse macrophages RAW264.7 세포에서 lipopolysaccharide(LPS)로 유도한 NO(iNOS 산물), PGE$_2$(COX-2 산물) 및 cytokines (TNF-$\alpha$, IL-6) 생성 억제에 미치는 영향을 살펴보았다. 회향 열매의 methanol 추출물 및 분획물(chloroform, butanol, and aqueous fractions)은 4~100$\mu$g/mL 농도에서 LPS가 활성화된 대식 세포에서 NO 생성을 억제하였으며 독성을 나타내지 않았다. LPS가 유도한 PGE$_2$ 생성은 butanol 분획(100 $\mu$g/mL)에 의해서만 유의적으로 감소하였다(P<0.05). 회향 열매 추출물 및 분획물은 TNF-$\alpha$의 생성을 유의적으로 감소시켰으며 IL-6의 생성은 methanol extract(4~100 $\mu$g/mL), chloroform fraction(4 $\mu$g/mL), butanol fraction(4 and 100$\mu$g/mL) 및 aqueous fraction(4~100 $\mu$g/mL)에 의해 감소되었다(P<0.05). 이는 회향 열매 추출물은 염증 상태에서 유용할 것이며 COX-2와 iNOS를 억제하는 butanol 분획은 새로운 항염증제 개발에 사용될 수 있음을 시사하여 주었다.