• Title/Summary/Keyword: 침입 차단

Search Result 278, Processing Time 0.025 seconds

A Study on Analysis and Control of Circumvent Connection to the Private Network of Corporation (기업 사설 네트워크 우회 접속 분석 및 통제 대책 연구)

  • Lee, Chul-Won;Kim, Huy-Kang;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.183-194
    • /
    • 2010
  • A company's private network protected by a firewall and NAT(Network Address Translation) is not accessible directly through an external internet. However, as Reverse Connection technology used by NetCat extends to the technologies such as SSH Tunnel or HTTP Tunnel, now anyone can easily access a private network of corporation protected by a firewall and NAT. Furthermore, while these kinds of technologies are commercially stretching out to various services such as a remote control and HTTP Tunnel, security managers in a company or general users are confused under the circumstances of inner or outer regulation which is not allowed to access to an internal system with a remote control. What is more serious is to make a covert channel invading a company's private network through a malicious code and all that technologies. By the way, what matters is that a given security system such as a firewall cannot shield from these perceived dangers. So, we analyze the indirect access of technological methods and the status quo about a company's internal network and find a solution to get rid of the related dangers.

A study on machine learning-based defense system proposal through web shell collection and analysis (웹쉘 수집 및 분석을 통한 머신러닝기반 방어시스템 제안 연구)

  • Kim, Ki-hwan;Shin, Yong-tae
    • Journal of Internet Computing and Services
    • /
    • v.23 no.4
    • /
    • pp.87-94
    • /
    • 2022
  • Recently, with the development of information and communication infrastructure, the number of Internet access devices is rapidly increasing. Smartphones, laptops, computers, and even IoT devices are receiving information and communication services through Internet access. Since most of the device operating environment consists of web (WEB), it is vulnerable to web cyber attacks using web shells. When the web shell is uploaded to the web server, it is confirmed that the attack frequency is high because the control of the web server can be easily performed. As the damage caused by the web shell occurs a lot, each company is responding to attacks with various security devices such as intrusion prevention systems, firewalls, and web firewalls. In this case, it is difficult to detect, and in order to prevent and cope with web shell attacks due to these characteristics, it is difficult to respond only with the existing system and security software. Therefore, it is an automated defense system through the collection and analysis of web shells based on artificial intelligence machine learning that can cope with new cyber attacks such as detecting unknown web shells in advance by using artificial intelligence machine learning and deep learning techniques in existing security software. We would like to propose about. The machine learning-based web shell defense system model proposed in this paper quickly collects, analyzes, and detects malicious web shells, one of the cyberattacks on the web environment. I think it will be very helpful in designing and building a security system.

Development of Software-Defined Perimeter-based Access Control System for Security of Cloud and IoT System (Cloud 및 IoT 시스템의 보안을 위한 소프트웨어 정의 경계기반의 접근제어시스템 개발)

  • Park, Seung-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.2
    • /
    • pp.15-26
    • /
    • 2021
  • Recently, as the introduction of cloud, mobile, and IoT has become active, there is a growing need for technology development that can supplement the limitations of traditional security solutions based on fixed perimeters such as firewalls and Network Access Control (NAC). In response to this, SDP (Software Defined Perimeter) has recently emerged as a new base technology. Unlike existing security technologies, SDP can sets security boundaries (install Gateway S/W) regardless of the location of the protected resources (servers, IoT gateways, etc.) and neutralize most of the network-based hacking attacks that are becoming increasingly sofiscated. In particular, SDP is regarded as a security technology suitable for the cloud and IoT fields. In this study, a new access control system was proposed by combining SDP and hash tree-based large-scale data high-speed signature technology. Through the process authentication function using large-scale data high-speed signature technology, it prevents the threat of unknown malware intruding into the endpoint in advance, and implements a kernel-level security technology that makes it impossible for user-level attacks during the backup and recovery of major data. As a result, endpoint security, which is a weak part of SDP, has been strengthened. The proposed system was developed as a prototype, and the performance test was completed through a test of an authorized testing agency (TTA V&V Test). The SDP-based access control solution is a technology with high potential that can be used in smart car security.

A Comparative Considerations of the Moat at the East and West (동.서양 해자(垓字)의 비교 고찰)

  • Jung, Yong-Jo;Park, Joo-Sung;Sim, Woo-Kyung
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.28 no.3
    • /
    • pp.29-38
    • /
    • 2010
  • A moat is a pond or waterway paved on the outside of a fortress that is one of the facilities to prevent enemy from approaching the fortress wall or classify it as the boundary space, and this study was undertaken to find out the characteristics of the moat that was existed in the East and the West from ancient time to medieval time with the following result. First, the moat in the East was installed of natural moat and artificial moat at the same time while the moat in the West had the fortress built in naturally advantageous site to use natural most substantially more. Second, the moats of Korea were smaller in scale compared to other countries (Japan, China and the Western countries). Third, the fortresses in the East were built to protect towns or royal palace while the West had the fortress to protect the residence of kings, lords, great wealthy persons and the like, and they were used jointly with the natural moat and artificial moat to defend against the infiltration of enemy. Fourth, the Pungsujiri in the Orient is one of the numerous ideologies forming the supplementary ideologic system of Korean people that could not be denied as the perception that influences on Korean people after the Silla Dynasty, and this Pungsujiri was considered when determining the location of the castle. The moat surrounding the castle had the role to keep the good energy in the castle from escaping away. Fifth, the Ha-Ha technique in the west was designed to prevent the external power from infiltration by digging the ditch on the place applicable to the boundary of the garden site, rather than the fence. While walking around along the water-side path without knowing the existence of this ditch, when the road is discovered with the cut off in the ditch, people had the exclamation without actually recognizing such astonishment. It was originally the dike for military purpose during the medieval time that was designed to look into the garden without physical boundary surrounded with the vertical fence in the garden that by having the deep ditch like shape on the boundary line of the garden which was designed to form the farm by preventing various types of cattle from coming inside the garden and bring in the garden element for farms, forestry, agricultural land and the like.

EVA Sheet and Butyl Rubber based Waterproofing·Anti-Corrosion Sheet for Corrosion Maintenance and Repairing in the Interior Side of the Large Steel Pipes in Water Treatment Facilities (상수도용 대구경 녹 발생 강관 내부의 보수 및 성능 유지를 위한 EVA 시트와 부틸고무를 합지한 자착식 방수방식 시트의 부착성능 평가)

  • An, Ki-Won;Kim, Byoung-Il;Oh, Sang-Keun
    • Journal of the Korean Recycled Construction Resources Institute
    • /
    • v.5 no.3
    • /
    • pp.267-274
    • /
    • 2017
  • This study discusses the applicability of environmental friendly EVA based butyl rubber self-adhesive waterproof sheet designed to prevent corrosion of large scale pipes used in the water treatment facilities during th water treatment process. The experiments conducted tested the waterproofing sheet's adhesion strength on the steel surface of the pipes and checked for whether the material has the proper response properties against the various environmental conditions. In addition, it the sheet adhered to the steel pipe was to see if the adhesion hold against the water pressure due to the ingress of inflow water. Finally, the waterproofing sheet's adhesion strength was tested on a rusted steel surface to confirm whether the material has the necessary properties to secure stable adhesion strength and prevent corrosion of steel pipes at the same time during the process of installation or maintenance. As a result, the self-adhesive waterproof sheets showed that all attachments in the untreated, long term pressuring, immersion in chemical substance (hydrochloric acid, hypochlorous acid, sodium hydroxide), low temperature ($-20^{\circ}C$) conditions showed a adhesion performance of higher than 1.5N/mm, which is the performance standard of KS F 4934. Also, in the testing to check for the adhesion property against inverse water pressure, it was observed that the adhesion failure did not occur even up to $3.0N/mm^2$ pressure. Also, in the process of assessing the adhesion performance on rusted steel surface, specimens after 12 hours of corrosion treatment was shown to have 2.1N/mm, and specimens after 168 hours of corrosion treatment was shown to have 2.0N/mm adhesion strength performance.

Effects of Endotoxin and Verapamil on Superoxide Production by Rat Alveolar Macrophage (백서폐포대식세포에서의 Superoxide 생산에 미치는 내독소 및 Verapamil의 영향)

  • Lee, Choon-Taek;Kim, Keun-Youl
    • Tuberculosis and Respiratory Diseases
    • /
    • v.40 no.3
    • /
    • pp.223-235
    • /
    • 1993
  • Background: Superoxide anion which was produced by macrophage and neutrophil has a defensive role to kill invasive microorganisms and also an injurious role to produce self lung damage. Production of oxygen free radicals including superoxide is a main mechanism of acute lung injury caused by bacterial endotoxin. Endotoxin is known to activate alveolar macrophage to produce increased oxygen free radicals after the stimulation with various biological materials (priming effect). Calcium is a very important intracellular messenger in that cellular process of superoxide production. Method: This experiment was performed to elucidate the effects of endotoxin and calcium on superoxide production by phorbol myristate acetate-stimulated alveolar macrophage and the effect of verapamil on priming effect of endotoxin. Results: 1) Preincubation of macrophages with endotoxin (E. coli 055-B5) primed the cells to respond with increased superoxide production after the stimulation with PMA. Priming with endotoxin ($10^{-1}$ug/ml) produced a maximal enhancement of superoxide production (43%). 2) Verapamil could inhibit the superoxide production by PMA stimulated macrophage regardless of the presence of extracellular calcium. This means that the inhibitory effect of verapamil is caused by a mechanism independent of blocking calcium influx. 3) Verapamil could inhibit the priming effect of endotoxin on alveolar macrophage (from 30% increment to 13% increment) and could inhibit the superoxide production by PMA-stimulated macrophage preincubated with endotoxin. Conclusion: We concluded that verapamil could inhibit the superoxide production by PMA-stimulated rat alveolar macrophage and also inhibit the priming effect of endotoxin on alveolar macrophage. These inhibitory effects of verapamil could be one of the mechanisms of verapamil effects on endotoxin induced lung injury.

  • PDF

A Study on Termite Monitoring Method Using Magnetic Sensors and IoT(Internet of Things) (자력센서와 IoT(사물인터넷)를 활용한 흰개미 모니터링 방법 연구)

  • Go, Hyeongsun;Choe, Byunghak
    • Korean Journal of Heritage: History & Science
    • /
    • v.54 no.1
    • /
    • pp.206-219
    • /
    • 2021
  • The warming of the climate is increasing the damage caused by termites to wooden buildings, cultural properties and houses. A group removal system can be installed around the building to detect and remove termite damage; however, if the site is not visited regularly, every one to two months, you cannot observe whether termites have spread within, and it is difficult to take prompt effective action. In addition, since the system is installed and operated in an exposed state for a long period of time, it may be ineffective or damaged, resulting in a loss of function. Furthermore if the system is installed near a cultural site, it may affect the aesthetic environment of the site. In this study, we created a detection system that uses wood, cellulose, magnets, and magnetic sensors to determine whether termites have entered the area. The data was then transferred to a low power LoRa Network which displayed the results without the necessity of visiting the site. The wood was made in the shape of a pile, and holes were made from the top to the bottom to make it easier for termites to enter and produce a cellulose sample. The cellulose sample was made in a cylindrical shape with a magnet wrapped in cellulose and inserted into the top of a hole in the wood. Then, the upper part of the wood pile was covered with a stopper to prevent foreign matter from entering. It also served to block external factors such as light and rainfall, and to create an environment where termites could add cellulose samples. When the cellulose was added by the termites, a space was created around the magnet, causing the magnet to either fall or tilt. The magnetic sensor inside the stopper was fixed on the top of the cellulose sample and measured the change in the distance between the magnet and the sensor according to the movement of the magnet. In outdoor experiments, 11 cellulose samples were inserted into the wood detection system and the termite inflow was confirmed through the movement of the magnet without visiting the site within 5 to 17 days. When making further improvements to the function and operation of the system it in the future, it is possible to confirm that termites have invaded without visiting the site. Then it is also possible to reduce damage and fruiting due to product exposure, and which would improve the condition and appearance of cultural properties.

Report on the Eradication of Nutria (Myocastor coypus Molina, 1782), an Invasive Alien Species, from Jeju-do, South Korea - Case of Songdang-ri, Jeju-si - (제주도 침입외래생물 Nutria (Mycastor coypus Molina, 1782)의 퇴치 사례 보고 - 제주시 송당지역의 사례 -)

  • Ga-Ram Kim;Jun-Won Lee;Seon-Mi Park;Sung-Hwan Choi;Young-Hun Jung;Hong-Shik Oh
    • Korean Journal of Environment and Ecology
    • /
    • v.36 no.6
    • /
    • pp.582-591
    • /
    • 2022
  • This study was conducted to eliminate Myocastor coypusMolina, 1782 (Nutria) from Jeju Special Self-Governing Province, South Korea. Habitat identification and eradication were carried out from September to November 2013, and a survey was carried out until June 2022 to check whether the eradication was successful. The habitat was identified with unmanned cameras, interviews, and literature surveys, and the capture was performed using the trapping method with food to attract nutria to the habitat area. The study area for the follow-up survey, which was set relatively wide considering nutria's home range, included wetlands and rivers within 4.0 km2 of the habitat area (eradication area). As a result, nutria's habitat was confirmed only at Songdang Ranch, Songdang-ri, of Jeju Island, with traces of habitat (footprints, excrement, and burrows) confirmed in waterways and ponds within the pasture. Eight individuals were captured, including four females, three males, and one individual in too advanced a state of decay to identify the sex. The follow-up survey thoroughly investigated the habitat and its surroundings, focusing on three areas with permanent water, Seongeup Reservoir, Cheonmi Creek, and Molsuni Pond, but no signs of habitat were identified. Therefore, it is determined that nutria inhabiting Jeju Island has been completely eradicated. It is believed that the successful eradication of nutria in the Jeju Special Autonomous Region was possible due to a synergy between 1) the eradication of nutria at the beginning of the settlement phase through rapid capture after confirming the nutria habitat and 2) the delayed expansion period because of rare presence of wetlands, where water is constantly stagnant, on Jeju Island. These results imply that quickly identifying the ecological characteristics of the species and preventing disturbances before they or at the beginning of the ecological disturbance through control and eradication at the initial stage of settlement before the expansion stage is an effective measure to cope with the influx of alien species.