• Title/Summary/Keyword: Active attack

Search Result 195, Processing Time 0.034 seconds

Attack Rate of Active Pulmonary Tuberculosis among Dusty Workers who Were Diagnosed with Pneumoconiosis in Korea (진폐환자에서 활동성 폐결핵 발병률)

  • Hwang, Joo Hwan
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.29 no.4
    • /
    • pp.582-589
    • /
    • 2019
  • Objectives: Although active pulmonary tuberculosis(active PTB) is manifested as one of the complications of pneumoconiosis, attacks of active PTB among patients with pneumoconiosis is still unexplored. The objective of the present study was to identify the attack rate of active PTB among workers in dusty environments who were diagnosed with pneumoconiosis. Methods: The study was performed using the results of the Pneumoconiosis Examination Council's assessment from the Korea Workers' Compensation and Welfare Service(KCOMWEL) database between January 1, 1984 and December 31, 2017. Pneumoconiosis was defined as Category 1 or more in the radiological findings of pneumoconiosis. Active PTB was defined as a positive result for active PTB in the results of the Pneumoconiosis Examination Council's assessment. Results: A total of 37,946 workers in dusty environments who received a health examination for diagnosing pneumoconiosis between January 1, 1984 and December 31, 2017 were selected as study subjects. The attack rate of active TB among subjects who were diagnosed with pneumoconiosis and those who were diagnosed without pneumoconiosis were 8.5% and 1.4%, respectively. In the multivariate logistic analysis including age, sex, radiological findings, complications, male[odds ratio(OR), 2.0; 95% confidence interval(CI), 1.4-3.1] and pneumoconiosis(OR, 6.5; 95% CI, 5.7-7.4) were associated with an increased risk of developing active PTB. Conclusions: The present study determined that dusty workers who were diagnosed with pneumoconiosis had a high rate of active PTB compared to TB patients and patients who were diagnosed with silicosis. Therefore, in addition to silicosis, it is necessary to include pneumoconiosis among the high-risk groups for TB.

The Scheme for Generate to Active Response Policy in Intrusion Detection System (침입 탐지 도구에서 능동 대응 정책 생성 방안)

  • Lee Jaw-Kwang;Paek Seung-Hyun;Oh Hyung-Geun;Park Eung-Ki;Kim Bong-Han
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.1
    • /
    • pp.151-159
    • /
    • 2006
  • This paper studied active response policy generation scheme in intrusion detection system. We considered seven requirements of intrusion detection system for active response with components as the preceding study We presented the scheme which I can generate signature with a base with integrate one model with NIDS and ADS. We studied detection of the Unknown Attack which was active, and studied scheme for generated to be able to do signature automatically through Unknown Attack detection.

  • PDF

Analysis & defence of detection technology in network Attacker (네트워크 침입자탐지기법 분석과 대응)

  • Yun, Dong Sic
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.155-163
    • /
    • 2013
  • Connection hijacking attack using the vulnerability of the TCP protocol to redirect TCP stream goes through your machine actively (Active Attack). The SKEY such as one-time password protection mechanisms that are provided by a ticket-based authentication system such as Kerberos or redirection, the attacker can bypass.Someone TCP connection if you have access on TCP packet sniffer or packet generator is very vulnerable. Sniffer to defend against attacks such as one-time passwords and token-based authentication and user identification scheme has been used. Active protection, but these methods does not sign or encrypt the data stream from sniffing passwords over insecure networks, they are still vulnerable from attacks. For many people, an active attack is very difficult and so I think the threat is low, but here to help break the illusion successful intrusion on the UNIX host, a very aggressive attack is presented. The tools available on the Internet that attempt to exploit this vulnerability, known as the recent theoretical measures is required. In this paper, we propose analysis techniques on a wireless network intruder detection.

A Study on the Active Traceback Scheme Respond ing to a Security Incident (침해사고 대응을 위한 능동적 역추적 기법에 관한 연구)

  • Park Myung Chan;Park Young Shin;Choi Yong Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.1 s.33
    • /
    • pp.27-34
    • /
    • 2005
  • Current security reinforcement systems are Passive defense system that only blocks filter to all traffic from the attacker. So, Those are weak re-attack and Stepping Stones attack because active response about attacker is lacking. Also, present techniques of traceback need much time and manpower by log information collection and trace through the personal inspection and active response is lacking. In this paper, We propose technique for TCP connection traceback that can apply in present internet and trace to inserted marking on IP header to correspond re-attack and Stepping Stones attack. Therefore, Proposed technique is unnecessary correction of existing network component and can reduce size of marked information and overhead of resources.

  • PDF

Development of Active Tuberculosis among Former Dusty Workers who Diagnosed with Latent Tuberculosis Infection (잠복결핵감염 양성인 분진작업 근로자에서 활동성 결핵 발병률)

  • Hwang, Joo Hwan
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.30 no.1
    • /
    • pp.67-74
    • /
    • 2020
  • Objectives: Previous study has shown that the positive rate of latent tuberculosis infection(LTBI) among former workers in dusty environments was higher than that among high-risk groups of tuberculosis(TB). The objective of the present study was to identify the development of active TB among former workers in dusty environments diagnosed with LTBI. Methods: Between January 2015 and May 2017, 796 former workers in dusty environments who had been subjects of epidemiology research for work-related chronic obstructive pulmonary disease(COPD) had received the QuantiFERON-TB® Gold In-Tube(QFT-GIT) from the Institute of Occupation and Environment(IOE) under the Korea Workers' Compensation and Welfare Service(KCOMWEL). Among them, 437 participants who received a health examination for work-related pneumoconiosis between January 2015 and December 2018 were selected as study subjects. Active TB was defined as a positive result for active PTB and non-tuberculosis mycobacteria infection in the result of the Pneumoconiosis Examination Council's assessment by KCOMWEL. Results: A total of 437 subjects were followed up for 2.1 years. Four of them(4/437, 0.9%) developed active TB during the follow-up period. The attack rate of active TB among subjects who were diagnosed LTBI positive and those who were diagnosed LTBI negative were 0.9%(3/320) and 0.9%(1/115), respectively. Conclusions: Most previous studies reported that the attack rate of the development of active TB in subjects who had been diagnosed LTBI positive was higher than that among subjects who had been diagnosed LTBI negative. To the contrary, the present study found that the rate of developing active TB among former workers in dusty environments diagnosed as LTBI positive was not higher than that in those who were diagnosed LTBI negative.

Response Methodology against Spoofed IP Attack using Active Networks Mechanism (액티브 네트워크를 이용한 위조 IP 공격 대응 메커니즘)

  • Park, Sang-Hyun;Ko, Haeng-Seok;Kwon, Oh-Seok
    • Journal of Internet Computing and Services
    • /
    • v.9 no.2
    • /
    • pp.69-81
    • /
    • 2008
  • It has become more difficult to correspond a cyber attack quickly as patterns of attack become various and complex. However, current security mechanism just have passive defense functionalities. In this paper, we propose new network security mechanism to respond various cyber attacks rapidly and to chase and isolate the attackers through cooperation between security zones. The proposed mechanism makes it possible to deal effectively with cyber attacks such as IP spoofing, by using active packet technology including a mobile code on active network. Also, it is designed to hove more active correspondent than that of existing mechanisms. We implemented these mechanisms in Linux routers and experimented on a testbed to verify realization possibility of attacker response framework using mobile code. The experimentation results are analyzed.

  • PDF

Security Audit System for Secure Router

  • Doo, So-Young;Kim, Ki-Young
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1602-1605
    • /
    • 2005
  • An audit tracer is one of the last ways to defend an attack for network equipments. Firewall and IDS which block off an attack in advance are active way and audit tracing is passive way which analogizes a type and a situation of an attack from log after an attack. This paper explains importance of audit trace function in network equipment for security and defines events which we must leave by security audit log. We design and implement security audit system for secure router. This paper explains the reason why we separate general audit log and security audit log.

  • PDF

DDoS Attack Response Framework using Mobile Code (DDoS 공격 대응 프레임워크 설계 및 구현)

  • Lee, Young-seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.3 no.3
    • /
    • pp.31-38
    • /
    • 2010
  • It has become more difficult to correspond an cyber attack quickly as patterns of attack become various and complex. However, current security mechanisms just have passive defense functionalities. In this paper, we propose new network security architecture to respond various cyber attacks rapidly and to chase and isolate the attackers through cooperation between security zones. The proposed architecture makes it possible to deal effectively with cyber attacks such as IP spoofing or DDoS(Distributed Denial of Service), by using active packet technology including a mobile code on active network. Also, it is designed to have more active correspondent than that of existing mechanisms. We implemented these mechanisms in Linux routers and experimented on a testbed to verify realization possibility of attacker response framework using mobile code. The experimentation results are analyzed.

  • PDF

Hyper-encryption Scheme for Data Confidentiality in Wireless Broadband (WiBro) Networks

  • Hamid, Abdul;Hong, Choong-Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1096-1097
    • /
    • 2007
  • We address the data confidentiality for wireless broadband (WiBro) networks. In WiBro, as the channel is wireless in nature, it suffers from passive and active attack. Passive attack, for example is to decrypt traffic based on statistical analysis and active attack is to modify traffic or inject new traffic from unauthorized mobile stations. Due to high mobility, frequent session key distribution is a bottleneck for the mobile stations. In aspect of WiBro, there is a communication between mobile station to base station, and also in mobile station to mobile station. It is expected to ensure data confidentiality while maintaining minimum overhead for the resource constrained mobile stations. In this paper, we proposed a security framework based on the concept of hyper-encryption to provide data confidentiality for wireless broadband networks.

  • PDF

The intruder traceback mechanism based on active networks (액티브 네트워크 기반 침입자 역추적 메커니즘)

  • Lee Young-seok
    • Journal of Internet Computing and Services
    • /
    • v.6 no.1
    • /
    • pp.1-12
    • /
    • 2005
  • Recently, the patterns of cyber attack through internet have been various and have become more complicated and thus it is difficult to detect a network intruder effectively and to response the intrusion quickly. Therefore, It is almost not possible to chase the real location of a network intruder and to isolate the Intruder from network in UDP based DoS or DDoS attacks spoofing source IP address and in TCP based detour connection attacks. In this paper, we propose active security architecture on active network to correspond to various cyber attacks promptly. Security management framework is designed using active technology, and security control mechanism to chase and isolate a network intruder is implemented. We also test the operation of the active security mechanism implemented on test_bed according to several attack scenarios and analyze the experiment results.

  • PDF