• 제목/요약/키워드: Attack Role

검색결과 188건 처리시간 0.033초

유해 트래픽 분석을 이용한 침입 방지 (Intrusion Prevention Using Harmful Traffic Analysis)

  • 장문수;구향옥;오창석
    • 한국컴퓨터정보학회논문지
    • /
    • 제10권4호
    • /
    • pp.173-179
    • /
    • 2005
  • 컴퓨팅 기술과 네트워크 기술의 지속적인 발전은 인터넷의 폭발적인 성장을 가져왔으며, 사회 전반에 걸친 기반시설 및 공공 인프라, 산업 인프라 및 문화 환경을 인터넷 기반으로 변화시키는 중요한 역할을 수행했다. 최근 정보통신의 급속한 발전으로 인터넷을 이루는 컴퓨터 및 네트워크 환경은 초유의 성장과 발전을 거듭했지만, 잠재적인 취약점을 많이 가지고 있다. 이러한 취약점을 이용한 웜 및 해킹으로 인한 피해는 날로 심각하다. 본 논문에서는 이런 문제점들을 해결하기 위하여 유해 트래픽 분석 시스템을 설계하여 새로운 공격에 대한 방어와 네트워크의 트래픽을 분석함으로써 침입 및 유해 정보 여부를 판단하여 실시간으로 대응한다.

  • PDF

간질 치료에서 뇌파의 임상적 유용성에 관한 논란: 긍정적 관점에서 (Controversies in Usefulness of EEG for Clinical Decision in Epilepsy: Pros.)

  • 손영민;김영인
    • Annals of Clinical Neurophysiology
    • /
    • 제9권2호
    • /
    • pp.63-68
    • /
    • 2007
  • The EEG plays an important diagnostic role in epilepsy and provides supporting evidence of a seizure disorder as well as assisting with classification of seizures and epilepsy syndromes. There are a variety of electroclinical syndromes that are really defined by the EEG such as Lennox-Gastaut syndrome, benign rolandic epilepsy, childhood absence epilepsy, juvenile myoclonic epilepsy and also for localization purposes, it is vitally important especially for temporal lobe epilepsy. The sensitivity of first routine EEG in diagnosis of epilepsy has been known about 20-50%, but this proportion rises to 80-90% if sleep EEG and repetitive recording should be added. Convincing evidences suggest that the EEG may also provide useful prognostic information regarding seizure recurrence after a single unprovoked attack and following antiepileptic drug (AED) withdrawal. Moreover, patterns in the EEG make it possible to disclose an ictal feature of nonconvulsive status epilepticus, separate epileptic from other non-epileptic episodes and clarify the clues predictive of the cause of the encephalopathy (i.e., triphasic waves in metabolic encephalopathy). Therefore, regardless of its low sensitivity and other pitfalls, EEG should be considered not only in the situation of new onset episode such as a newly developed, unprovoked seizure or a condition manifesting decreased mentality from obscure origin, but also as a barometer of the long-term outcome following AED withdrawal.

  • PDF

The Dilemma of Parameterizing Propagation Time in Blockchain P2P Network

  • Rahmadika, Sandi;Noh, Siwan;Lee, Kyeongmo;Kweka, Bruno Joachim;Rhee, Kyung-Hyune
    • Journal of Information Processing Systems
    • /
    • 제16권3호
    • /
    • pp.699-717
    • /
    • 2020
  • Propagation time on permissionless blockchain plays a significant role in terms of stability and performance in the decentralized systems. A large number of activities are disseminated to the whole nodes in the decentralized peer-to-peer network, thus causing propagation delay. The stability of the system is our concern in the first place. The propagation delay opens up opportunities for attackers to apply their protocol. Either by accelerating or decelerating the propagation time directly without proper calculation, it brings numerous negative impacts to the entire blockchain system. In this paper, we thoroughly review and elaborate on several parameters related to the propagation time in such a system. We describe our findings in terms of data communication, transaction propagation, and the possibility of an interference attack that caused an extra propagation time. Furthermore, we present the influence of block size, consensus, and blockchain scalability, including the relation of parameters. In the last session, we remark several points associated with the propagation time and use cases to avoid dilemmas in the light of the experiments and literary works.

Fe-30at.%Al-5at.%Cr계 합금의 공식특성에 미치는 플라즈마질화의 영향 (Effects of Plasma-Nitriding on the Pitting Corrosion of Fe-30at%Al-5at%Cr Alloy)

  • 최한철
    • 한국표면공학회지
    • /
    • 제36권6호
    • /
    • pp.480-490
    • /
    • 2003
  • Effects of plasma-nitriding on the pitting corrosion of Fe-30at%Al-5at%Cr alloy containing Ti, Hf, and Zr were investigated using potentiostat in 0.1M HCl. The specimen was casted by the vacuum arc melting. The subsequent homogenization was carried out in Ar gas atmosphere at $1000^{\circ}C$ for 7days and phase stabilizing heat treatment was carried out in Ar gas atmosphere at $500^{\circ}C$ for 5 days. The specimen was nitrided in the $N_2$, and $H_2$, (1:1) mixed gas of $10^{-4}$ torr at $480^{\circ}C$ for 10 hrs. After the corrosion tests, the surface of the tested specimens were observed by the optical microscopy and scanning electron microscopy(SEM). For Fe-30at%Al-5Cr alloy, the addition of Hf has equi-axied structure and addition of Zr showed dendritic structure. For Fe-30at%Al-5Cr alloy containing Ti, plasma nitriding proved beneficial to decrease the pitting corrosion attack by increasing pitting potential due to formation of TiN film. Addition of Hf and Zr resulted in a higher activation current density and also a lower pitting potential. These results indicated the role of dendritic structure in decreasing the pitting corrosion resistance of Fe-30Al-5Cr alloy. Ti addition to Fe-30Al-5Cr decreased the number and size of pits. In the case of Zr and Hf addition, the pits nucleated remarkably at dendritic branches.

효과적인 보안관제를 위한 위협정보 우선순위 도출 (Analysis of Threat Information Priorities for Effective Security Monitoring & Control)

  • 강다연
    • 한국산업정보학회논문지
    • /
    • 제26권5호
    • /
    • pp.69-77
    • /
    • 2021
  • 본 논문에서는 기업의 IT시스템에 대한 위협에 대응하고자 하는 기업의 자산을 지켜주는데 매우 중요한 영역인 보안관제 위협정보를 확인하고자 한다. 보안관제는 보안 장비에서 발생한 이벤트, 로그를 중심으로 실시간 분석하여 위협을 판정하고 대응한다. 보안관제 업무에 있어서 우선적으로 위협정보를 평판정보와 분석정보로 구분하여 우선순위를 도출하고자 한다. 평판정보는 Hash, URL, IP, Domain으로 구성하였으며, 분석정보는 E-mail, CMD-Line, CVE, 공격동향정보로 구성하여 분석하였다. 연구결과, 평판정보의 우선순위가 상대적으로 높았으며 위협정보에 대한 정확성과 대응성을 높이는 것에 의의가 있다.

Novel miR-1958 Promotes Mycobacterium tuberculosis Survival in RAW264.7 Cells by Inhibiting Autophagy Via Atg5

  • Ding, Shuqin;Qu, Yuliang;Yang, Shaoqi;Zhao, Ya'e;Xu, Guangxian
    • Journal of Microbiology and Biotechnology
    • /
    • 제29권6호
    • /
    • pp.989-998
    • /
    • 2019
  • Autophagy is crucial for immune defense against Mycobacterium tuberculosis (Mtb) infection. Mtb can evade host immune attack and survival within macrophages by manipulating the autophagic process. MicroRNAs (miRNAs) are small, non-coding RNAs that are involved in regulating vital genes during Mtb infection. The precise role of miRNAs in autophagy with the exits of Mtb remains largely unknown. In this study, we found miR-1958, a new miRNA that could regulate autophagy by interacting with 3'UTR of autophagy-related gene 5 (Atg5). In addition, Mtb infection triggered miR-1958 expression in RAW264.7 cells. What's more, miR-1958 overexpression blocked autophagic flux by impairing the fusion of autophagosomes and lysosomes. Overexpression of miR-1958 reduced Atg5 expression and LC3 puncta while inhibition of miR-1958 brought an increase of Atg5 and LC3 puncta; the opposite results were observed in detection of p62. The survival of Mtb in RAW264.7 cells transfected with mimic of miR-1958 was enhanced. Taken together, our research demonstrated that a novel miR-1958 could inhibit autophagy by interacting with Atg5 and favored intracellular Mtb survival in RAW264.7 cells.

An Efficient Anonymous Authentication Scheme with Secure Communication in Intelligent Vehicular Ad-hoc Networks

  • Zhang, Xiaojun;Mu, Liming;Zhao, Jie;Xu, Chunxiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권6호
    • /
    • pp.3280-3298
    • /
    • 2019
  • Vehicular ad-hoc networks (VANETs) have become increasingly significant in intelligent transportation systems, they play a great role in improving traffic safety and efficiency. In the deployment of intelligent VANETs, intelligent vehicles can efficiently exchange important or urgent traffic information and make driving decisions. Meanwhile, secure data communication and vehicle's identity privacy have been highlighted. To cope with these security issues, in this paper, we construct an efficient anonymous authentication scheme with secure communication in intelligent VANETs. Combing the ElGamal encryption technique with a modified Schnorr signature technique, the proposed scheme provides secure anonymous authentication process for encrypted message in the vehicle-to-infrastructure communication model, and achieves identity privacy, forward security, and reply attack resistance simultaneously. Moreover, except the trusted authority (TA), any outside entity cannot trace the real identity of an intelligent vehicle. The proposed scheme is designed on an identity-based system, which can remove the costs of establishing public key infrastructure (PKI) and certificates management. Compared with existing authentication schemes, the proposed scheme is much more practical in intelligent VANETs.

Survey of Algorithms and Techniques Used to Improve the Security of A Public Wi-Fi Network

  • Aloufi, Hanouf;Alsuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • 제22권6호
    • /
    • pp.194-202
    • /
    • 2022
  • The use of public Wi-Fi has increased in recent years with many people like to spend their time outside in malls or café shops which provide public Wi-Fi for their customers. However, since the public Wi-Fi can be accessed from any device the security of public Wi-Fi plays a big role to prevent the stealing of information by an attacker with methods and techniques such as WPA, WPA2 and WPA3. However, it is well known to the attackers that these methods are not difficult to get hacked by the attacker device to take the client precious information. Some researches were done in increasing the security of public Wi-Fi each with their own different technique or algorithm to provide more secure connection to the public Wi-Fi and prevent any unauthorized user to connect to avoid stealing the data of another legal user. Theses research paper are evaluated to learn which method excel in protecting the public Wi-Fi security by giving an analysis to the methods provided by the research paper with comparing the pros and cons of each algorithm. Moreover, the research displays that there are methods to actually provide security to the public Wi-Fi with each being very different in implementation.

Review the Recent Fraud Detection Systems for Accounting Area using Blockchain Technology

  • Rania Alsulami;Raghad Albalawi;Manal Albalawi;Hetaf Alsugair;Khaled A. Alblowi;Adel R. Alharbi
    • International Journal of Computer Science & Network Security
    • /
    • 제23권5호
    • /
    • pp.109-120
    • /
    • 2023
  • With the increasing interest in blockchain technology and its employment in diverse sectors and industries, including: finance, business, voting, industrial and many other medical and educational applications. Recently, the blockchain technology has played significant role in preventing fraud transactions in accounting systems, as the blockchain offers high security measurements, reduces the need for centralized processing, and blocks access to the organization information and system. Therefore, this paper studies, analyses, and investigates the adoption of blockchain technology with accounting systems, through analyzing the results of several research works which have employed the blockchain technology to secure their accounting systems. In addition, we investigate the performance of applying the deep learning and machine learning approaches for the purpose of fraud detection and classification. As a result of this study, the adoption of blockchain technology will enhance the safety and security of accounting systems, through identifying and classifying the possible frauds that may attack the accounting and business organizations.

골프 스윙궤적 및 비거리 향상을 위한 기능성 골프 이너웨어의 테이핑 기법 연구 (A study on the taping techniques of functional golf inner-wear for improving golf swing trajectory & shot distance)

  • 김정우
    • 복식문화연구
    • /
    • 제32권1호
    • /
    • pp.58-69
    • /
    • 2024
  • The purpose of this study was to develop the Functional golf inner-wear by preventing the injuries and enhancing the performance of the Golf swing by checking the influence of the wearing of the functional golf inner-wear considering golf characteristics on the Swing trajectory and Shot distance. Functional inner-wear effective for golf swing was manufactured using the sports taping method. Changes in driver and iron swing before and after wearing the functional golf inner-wear manufactured in this way were measured using trackman equipment. Measurement variables were limited to Club Speed, Attack Angle, Club Path, Ball Speed, Smash Factor, and Priority. Before and after wearing functional golf inner-wear, there were statistically significant differences in driver club speed, iron club speed, driver etch angle, iron club pass, driver ball speed, driver smash factor, iron smash factor, driver carry, iron carry, and right shoulder joint proprioceptive sensory ability. As a result, functional golf inner-wear is effective for ball speed, impact, and carry by increasing club speed and efficient swing. Future research will focus on the development of functional golf that can improve the swing ability in a short game that plays an important role in the golf game through various sports taping grafting technique, textile, special material, film, Research on functional golf inner-wear.