• Title/Summary/Keyword: Attack Detection

Search Result 878, Processing Time 0.031 seconds

Mobile Botnet Attacks - an Emerging Threat: Classification, Review and Open Issues

  • Karim, Ahmad;Ali Shah, Syed Adeel;Salleh, Rosli Bin;Arif, Muhammad;Noor, Rafidah Md;Shamshirband, Shahaboddin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.4
    • /
    • pp.1471-1492
    • /
    • 2015
  • The rapid development of smartphone technologies have resulted in the evolution of mobile botnets. The implications of botnets have inspired attention from the academia and the industry alike, which includes vendors, investors, hackers, and researcher community. Above all, the capability of botnets is uncovered through a wide range of malicious activities, such as distributed denial of service (DDoS), theft of business information, remote access, online or click fraud, phishing, malware distribution, spam emails, and building mobile devices for the illegitimate exchange of information and materials. In this study, we investigate mobile botnet attacks by exploring attack vectors and subsequently present a well-defined thematic taxonomy. By identifying the significant parameters from the taxonomy, we compared the effects of existing mobile botnets on commercial platforms as well as open source mobile operating system platforms. The parameters for review include mobile botnet architecture, platform, target audience, vulnerabilities or loopholes, operational impact, and detection approaches. In relation to our findings, research challenges are then presented in this domain.

A System Design Method of Mine Warfare Using Information for SONAR and MDV (소나와 무인기뢰처리기 정보를 활용한 기뢰전 체계 설계 방안)

  • Kim, Jun-Young;Shin, Chang-Hong;Kim, Kyung-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.12
    • /
    • pp.1243-1249
    • /
    • 2014
  • The naval mine is the explosives that are installed in the water in order to attack surface ships or submarines. So mine warfare is a very important component of naval operations. In this paper, first, understanding of the general concept about mine warfare. Second, introduce the mine hunting progress and mine sweeping progress. And then, suggest the system design method of mine counter measure warfare using several functions. The functions are mine area detection algorithm for side scan sonar image using Adaboost algorithm, and calculation to mine hunting progress rate and mine sweeping progress rate. And techniques that lead the mine disposal vehicle(MDV) to mine.

Weighted Voting Game and Stochastic Learning Based Certificate Revocation for the Mobile Ad-hoc Network (이동 애드 혹 네트워크 환경에서 가중투표게임과 확률러닝을 이용한 악의적인 노드의 인증서 폐지 기법)

  • Kim, Min Jung;Kim, Sung Wook
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.7
    • /
    • pp.315-320
    • /
    • 2017
  • In this paper, I design a new scheme that is immune to malicious attack based on the weighted voting game. By using stochastic learning, the proposed scheme can revoke the certification of malicious node. Through the revocation process, the proposed scheme can effectively adapt the dynamic Mobile Ad hoc network situation. Simulation results clearly indicate that the developed scheme has better performance than other existing schemes under widely diverse network environments.

Clinical Evaluation of Patients Intoxicated by a Gas Leak at an Underground Shopping Center - Carbon Monoxide Poisoning - (지하상가 가스누출 사고 환자들에 대한 임상적 고찰 - 일산화탄소 중독 -)

  • Ahn, Ji-Young;Ko, Young-Gil
    • Journal of The Korean Society of Clinical Toxicology
    • /
    • v.4 no.2
    • /
    • pp.122-127
    • /
    • 2006
  • Purpose: It is not easy to detect carbon monoxide (CO) leakage, and CO-intoxicated patients do not show a specific set of symptoms. The aims of this study are to clinically evaluate patients with CO gas intoxication from a CO leak at an underground shopping center, and to discuss the establishment of a disaster prevention plan. Methods: A total of 51 patients intoxicated by CO gas exposure in a gas disaster at a underground shopping center in Seoul on September 8, 2006 were enrolled in this study, and the patients' medical records were retrospectively reviewed. Results: The mean patient age was $29.4{\pm}6.3$. The initial mean COHb level was $14.98{\pm}6.97%$. The number of patients with COHb greater than 25% was three, and six patients experienced a syncopal attack. Only one patient-was treated with hyperbaric oxygen therapy. However, none of the patients complained of severe neurologic or cardiovascular symptoms. Conclusion: The symptoms of CO intoxication are non-specific and difficult to define, and the detection of CO leak-age is difficult. Thus, workplaces should be equipped with leakage sensors and automatic alarm systems and should have develop disaster prevention plans.

  • PDF

Authentication Technologies of X-ray Inspection Image for Container Terminal Automation

  • Kim, Jong-Nam;Hwang, Jin-Ho;Ryu, Tae-Kyung;Moon, Kwang-Seok;Jung, Gwang-S.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1684-1688
    • /
    • 2005
  • In this paper, authentication technologies for X-ray inspection images in container merchandises are introduced and a method of authentication for X-ray inspection images is proposed. Until now, X-ray images of container merchandises have been managed without any authentication of inspection results and environments, it means that there was no any action for protection of illegal copy and counterfeiting of X-ray images from inspection results. Here, authentication identifies that who did inspect container X-ray images and, whether the container X-ray images were counterfeited or not. Our proposed algorithm indicates to put important information about X-ray inspection results on an X-ray image without affecting quality of the original image. Therefore, this paper will be useful in determining an appropriate technology and system specification for authentication of X-ray inspection images. As a result of experiment, we find that the information can be embedded to X-ray image without large degradation of image quality. Our proposed algorithm has high detection ratio by Quality 20 of JPEG attack.

  • PDF

The Design of Router Security Management System for Secure Networking

  • Jo, Su-Hyung;Kim, Ki-Young;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1594-1597
    • /
    • 2005
  • A rapid development and a wide use of the Internet have expanded a network environment. Further, the network environment has become more complex due to a simple and convenient network connection and various services of the Internet. However, the Internet has been constantly exposed to the danger of various network attacks such as a virus, a hacking, a system intrusion, a system manager authority acquisition, an intrusion cover-up and the like. As a result, a network security technology such as a virus vaccine, a firewall, an integrated security management, an intrusion detection system, and the like are required in order to handle the security problems of Internet. Accordingly, a router, which is a key component of the Internet, controls a data packet flow in a network and determines an optimal path thereof so as to reach an appropriate destination. An error of the router or an attack against the router can damage an entire network. This paper relates to a method for RSMS (router security management system) for secure networking based on a security policy. Security router provides functions of a packet filtering, an authentication, an access control, an intrusion analysis and an audit trail in a kernel region. Security policy has the definition of security function against a network intrusion.

  • PDF

Improved Visual Cryptography Using Cover Images (커버영상을 이용한 개선된 시각암호)

  • Jang, Si-Hwan;Choi, Yong Soo;Kim, Hyoung Joong
    • Journal of Digital Contents Society
    • /
    • v.13 no.4
    • /
    • pp.531-538
    • /
    • 2012
  • Visual cryptography is a scheme that recovers secret image through human vision by overlapping distributed share images without cryptographic operations. Distribution methods are still being developed for improving quality of shared images keeping size of images invariant and enhancing robustness against resize of images. Since visual cryptography only uses shared images, this fact is exploited to attack. From this fact, a scheme safe for sharing distributed images is needed. In this paper, a new visual cryptographic scheme using cover image is proposed. This scheme reduces the chance of detection against steganalysis and increases security. In addition, this paper shows that the proposed scheme can completely decrypt secret image without creating noise.

A Fatal Case of Naegleria fowleri Meningoencephalitis in Taiwan

  • Su, Mei-Yu;Lee, Ming-Shih;Shyu, Ling-Yuh;Lin, Wei-Chen;Hsiao, Pei-Ching;Wang, Chi-Ping;Ji, Dar-Der;Chen, Ke-Min;Lai, Shih-Chan
    • Parasites, Hosts and Diseases
    • /
    • v.51 no.2
    • /
    • pp.203-206
    • /
    • 2013
  • After bathing at a hot spring resort, a 75-year-old man presented to the emergency department because of seizure-like attack with loss of conscious. This is the first case of primary amebic meningoencephalitis (PAM) caused by Naegleria fowleri in Taiwan. PAM was diagnosed based on detection of actively motile trophozoites in cerebrospinal fluid using a wet-mount smear and the Liu's stain. The amoebae were further confirmed by PCR and gene sequencing. In spite of administering amphotericin B treatment, the patient died 25 days later.

Development of Protective Scheme against Collaborative Black Hole Attacks in Mobile Ad hoc Networks

  • Farooq, Muhammad Umar;Wang, Xingfu;Sajjad, Moizza;Qaisar, Sara
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.3
    • /
    • pp.1330-1347
    • /
    • 2018
  • Mobile Ad hoc Network (MANET) is a collection of nodes or communication devices that wish to communicate without any fixed infrastructure and predetermined organization of available links. The effort has been made by proposing a scheme to overcome the critical security issue in MANET. The insufficiency of security considerations in the design of Ad hoc On-Demand Distance Vector protocol makes it vulnerable to the threats of collaborative black hole attacks, where hacker nodes attack the data packets and drop them instead of forwarding. To secure mobile ad hoc networks from collaborative black hole attacks, we implement our scheme and considered sensor's energy as a key feature with a better packet delivery ratio, less delay time and high throughput. The proposed scheme has offered an improved solution to diminish collaborative black hole attacks with high performance and benchmark results as compared to the existing schemes EDRIAODV and DRIAODV respectively. This paper has shown that throughput and packet delivery ratio increase while the end to end delay decreases as compared to existing schemes. It also reduces the overall energy consumption and network traffic by maintaining accuracy and high detection rate which is more safe and reliable for future work.

High-resolution MR Imaging of Carotid Atherosclerotic Plaques (경동맥 경화판의 고해상도 자기공명영상)

  • Shin, Won-Seon;Kim, Sung-Mok;Choe, Yeon-Hyeon
    • Investigative Magnetic Resonance Imaging
    • /
    • v.16 no.2
    • /
    • pp.97-102
    • /
    • 2012
  • High-resolution carotid MRI allows visualization of carotid atherosclerotic plaque characteristics. MRI serves as a noninvasive option for the detection of active plaque inflammation and intraplaque hemorrhage. Significant gains in signal-tonoise ratio and contrast-to-noise ratio can be obtained for carotid atheroma imaging at 3T compared with 1.5T. Normalized wall index or wall area on MRI has shown its efficacy in monitoring the response after medical therapy. $T(2)^*$ quantification in carotid plaques before and after the administration of ultrasmall superparamagnetic iron oxide particles shows difference in response to treatment according to drug doses. In conclusion, high-resolution MRI is useful in the diagnosis and monitoring of carotid atherosclerotic plaques prone to transient ischemic attack and stroke.