• Title/Summary/Keyword: Code Red

Search Result 82, Processing Time 0.031 seconds

집중분석 / 한국, 코드레드 주 활동무대로 전락 ... 피해 사상 최대

  • Korea Database Promotion Center
    • Digital Contents
    • /
    • no.12 s.103
    • /
    • pp.52-53
    • /
    • 2001
  • 지난 8월은 국내의 컴퓨터 사용자들을 공포로 몰고 간 날들이었다. 이는 바로 서캠바이러스 폭풍의 여파가 채 가시기도 전에 강력한 바이러스인 코드레드(Code-Red)바이러스의 위협에 의한 것이기 때문이다. 최근들어 신종 바이러스의 종류는 눈에 뛰게 줄어들고는 있는 실정이지만, 소수 바이러스에 의한 피해사례는 급증하고 있어 컴퓨터 사용자들에게는 더더욱 공포의 대상이 된것이다. 코드레드바이러스는 지난 7월 19일 처음 배포된 이래 7월 20일 백악관에 분산서비스공격(DDoS)을 시도하면서 그 위험이 알려지기 시작했다. 그후 7월 28일부터 31일까지 잠복기를 지난후 다시 지난달 1일부터 활동이 시작되면서 3일후 코드레드 II가 배포됐다.

  • PDF

A Quantitative Analysis Method for Reliability Modeling of Ubiquitous Computing (유비쿼터스 컴퓨팅의 신뢰성 모델링을 위한 정량적 분석법)

  • 최창열;김성수
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.622-624
    • /
    • 2004
  • 유비쿼터스 컴퓨팅은 네트워크로 상호연결된 프로세서로 구성되며, 하나 이상의 컴퓨터로 이뤄진다. 하지만 기존 보안 솔류션은 존속성에 대한 명확한 정의가 결여되어 있어 본 논문에서는 유비쿼터스 컴퓨팅 시스템을 위한 존속성을 기반으로 하여 시스템의 보안 정도를 정량적으로 측정할 수 있는 기법을 제안한다. 존속성을 모델링하기 위한 논리적 첫 단계가 요구사항 도출이므로 먼저 공격 유형 모델을 도출하고 실제공격 사례 중 Code-Red 웜 공격을 공격 유형 모델과 존속성 모델을 통해 분석하였다.

  • PDF

Survey of Aflatoxin B1 and Ochratoxin A on Commercial Dried Red Pepper and Red Pepper Powder (유통 건고추 및 고춧가루의 아플라톡신 B1과 오크라톡신 A 오염도 조사)

  • Jegal, Seung;Kim, Ji-Hyeung;Joo, Gwang-Sig;Jung, Se-Jin;Na, Hyeon-Ju;Jo, Nam-Gyu;Lee, Jea-Man;Kim, Yong-Hee
    • Journal of Food Hygiene and Safety
    • /
    • v.28 no.3
    • /
    • pp.267-271
    • /
    • 2013
  • A survey of aflatoxin $B_1$ and ochratoxin A was conducted on dried red pepper and red pepper powder. Total number of 193 samples were collected from local markets in Incheon. The presence of aflatoxin $B_1$ and ochratoxin A was determined by high performance liquid chromatography (HPLC) with fluorescence detector using immunoaffinity column clean-up. The recovery rate of aflatoxin $B_1$ and ochratoxin A were more than 80% and the limits of quantification were 0.13 ${\mu}g/kg$ for aflatoxin $B_1$ and 0.30 ${\mu}g/kg$ for ochratoxin A. Aflatoxin $B_1$ was detected in 33 samples (17.1%) with a range of 0.14~9.67 ${\mu}g/kg$ and ochratoxin A was detected in 40 samples (20.7%) with a range of 0.31~3.31 ${\mu}g/kg$. These results show that the occurrence of aflatoxin $B_1$ and ochratoxin A in dried red pepper and red pepper powder tested in this study is low compared with the standard in Korea Food Code (10 ${\mu}g/kg$ as aflatoxin $B_1$ and 7 ${\mu}g/kg$ as ochratoxin A).

Scanning Worm Detection Algorithm Using Network Traffic Analysis (네트워크 트래픽 특성 분석을 통한 스캐닝 웜 탐지 기법)

  • Kang, Shin-Hun;Kim, Jae-Hyun
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.6
    • /
    • pp.474-481
    • /
    • 2008
  • Scanning worm increases network traffic load and result in severe network congestion because it is a self-replicating worm and send copies of itself to a number of hosts through the Internet. So an early detection system which can automatically detect scanning worms is needed to protect network from those attacks. Although many studies are conducted to detect scanning worms, most of them are focusing on the method using packet header information. The method using packet header information has long detection delay since it must examine the header information of all packets entering or leaving the network. Therefore we propose an algorithm to detect scanning worms using network traffic characteristics such as variance of traffic volume, differentiated traffic volume, mean of differentiated traffic volume, and product of mean traffic volume and mean of differentiated traffic volume. We verified the proposed algorithm by analyzing the normal traffic captured in the real network and the worm traffic generated by simulator. The proposed algorithm can detect CodeRed and Slammer which are not detected by existing algorithm. In addition, all worms were detected in early stage: Slammer was detected in 4 seconds and CodeRed and Witty were detected in 11 seconds.

Kate Middleton's Royal Fashion Style Analysis (케이트 미들턴의 로열 패션(Royal Fashion) 스타일 분석)

  • Lee, Seunghee;Kim, Jiyoung
    • Journal of Fashion Business
    • /
    • v.22 no.1
    • /
    • pp.1-19
    • /
    • 2018
  • The purpose of this study is to analyze the fashion style of Kate Middleton, the Royal Family, and to examine the social and cultural influence of Middleton fashion. We selected 314 photographs collected from a Google site and Gettyimages.com April 2011-December 2016 as the final research subjects. We categorized the situation by domestic events, royal events, diplomatic activities, and social contribution activities, and analyzed fashion styles focusing on item composition, color, material, silhouette, detail, trimming, and length. As a result of the study, the one piece was the highest in the combination of items, and the color was the most in white. The color tones were mostly vivid, and the material texture was silky. The image was classic, and the dress code was high in semi-formal. In a situational style, the coat was the most common at the Royal Family events and blue or white of the light tones appeared in the formal style of the classic image. In domestic events, there were many silky textures of modern image, and vivid, strong tonal knee length H line dress was the most prevalent. During diplomatic activities, various colors such as red, green, gray appeared in addition to blue or white and in social contribution activities, many dresses of vivid and dark tones of red appeared in the dress code as semi-formal. In conclusion, the stylistic features of Kate Middleton and the Royal Family are largely in the form of royal and noble, low cost and chic, and body-conscious styling.

Real-Time Visualization of Web Usage Patterns and Anomalous Sessions (실시간 웹 사용 현황과 이상 행위에 대한 시각화)

  • 이병희;조상현;차성덕
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.4
    • /
    • pp.97-110
    • /
    • 2004
  • As modem web services become enormously complex, web attacks has become frequent and serious. Existing security solutions such as firewalls or signature-based intrusion detection systems are generally inadequate in securing web services, and analysis of raw web log data is simply impractical for most organizations. Visual display of "interpreted" web logs, with emphasis on anomalous web requests, is essential for an organization to efficiently track web usage patterns and detect possible web attacks. In this paper, we discuss various issues related to effective real-time visualization of web usage patterns and anomalies. We implemented a software tool named SAD (session anomaly detection) Viewer to satisfy such need and conducted an empirical study in which anomalous web traffics such as Misuse attacks, DoS attacks, Code-Red worms and Whisker scans were injected. Our study confirms that SAD Viewer is useful in assisting web security engineers to monitor web usage patterns in general and anomalous web sessions in particular.articular.

Design and Theoretical Analysis of a Stepwise Intrusion Prevention Scheme (단계적 비정상 트래픽 대응 기법 설계 및 이론적 분석)

  • Ko Kwangsun;Kang Yong-hyeog;Eom Young Ik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.1
    • /
    • pp.55-63
    • /
    • 2006
  • Recently, there is much abnormal traffic driven by several worms, such as Nimda, Code Red, SQL Stammer, and so on, making badly severe damage to networks. Meanwhile, diverse prevention schemes for defeating abnormal traffic have been studied in the academic and commercial worlds. In this paper, we present the structure of a stepwise intrusion prevention system that is designed with the feature of putting limitation on the network bandwidth of each network traffic and dropping abnormal traffic, and then compare the proposed scheme with a pre-existing scheme, which is a True/False based an anomaly prevention scheme for several worm-patterns. There are two criteria for comparison of the schemes, which are Normal Traffic Rate (NTR) and False Positive Rate (FPR). Assuming that the abnormal traffic rate of a specific network is $\beta$ during a predefined time window, it is known that the average NTR of our stepwise intrusion prevention scheme increases by the factor of (1+$\beta$)/2 than that of True/False based anomaly prevention scheme and the average FPR of our scheme decrease by the factor of (1+$\beta$)/2.

Evaluation of Bearing Strength of Self-Tapping Screws according to the Grain Direction of Domestic Pinus densiflora

  • LEE, In-Hwan;KIM, Keonho;SHIM, Kug-bo
    • Journal of the Korean Wood Science and Technology
    • /
    • v.50 no.1
    • /
    • pp.1-11
    • /
    • 2022
  • To evaluate the bearing strength of red pine cross-laminated timber (CLT) with self-tapping screw (STS), which is widely used as a fastener for connection in CLT building, the bearing test was conducted. Accoring to the STS's diameters (8, 10, 12 mm), the bearing test specimens with half hole were manufactured. Bearing strength was compared and reviewed in consideration of the configuration in STS and the loading direction to the grain of red pine. As a result of the bearing test on the STS's diameter, the yield bearing load increases as the larger diameter of the STS in all directions of the red pine. The bearing strength of the thread part (thread + tip) was higher than the shank part (shank + shank cutter). In compared with the directions to the grain of red pine, the bearing strength of the cross section parallel to the loading direction was the highest, and the tangent section was the lowest bearing strength. The average bearing strength of the loading direction in parallel to the grain was 23.43 MPa, which was about 45% higher than the average 16.16 MPa in perpendicular to the grain. The predicted bearing strength calculated by Eurocode (EN) and Korean Building Code (KBC)'s equation was lower than the experimental value. It is nessesary to propose the new equations of bearing strength reflected the configuration information of STS.

Study on the Recognition Rate of Printed QR Codes by Digital Transfer Textile Printing -Focused on Changes in the Fineness and Color of Filament Textile- (디지털 전사날염으로 프린트 된 QR코드의 인식률 연구 -필라멘트 직물의 섬도와 색의 변화를 중심으로-)

  • Park, Suhrin;Kim, Jongjun
    • Journal of Fashion Business
    • /
    • v.20 no.4
    • /
    • pp.50-71
    • /
    • 2016
  • This study analyzed the recognition rate of QR codes printed by digital transfer textile printing for mobile application. The purpose was to identify conditions that increase recognition rates of QR codes printed on textile, in order to increase utility of QR codes in the textile and fashion industries. The study focused on differences in the color of the QR codes and denier, which is a unit of textile fineness measurement, of the textile on which the QR codes were printed. And the recognition rates of QR codes according to the color and denier were analyzed. According to the result of this study, the colors of QR codes had an effect on the recognition of the codes by mobile applications. Specifically, strong contrast, i.e., bright background and relatively dark module, increased the recognition rate of the QR codes. Digital transfer textile printing tend to change the hue of red and yellow and increase brightness, and change in the printed colors also had an effect on the recognition rate of QR codes. There was a clear difference in the color and recognition rate of the printed QR code according to the denier of the textile, and this suggests denier has an effect on the recognition rate. The findings in this study can provide basic data for future research on QR codes digital printed on textile.

Performance Analysis of ECTP Error Control Mechanism (ECTP 오류복구 성능평가)

  • 박주영;고석주;강신각
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.605-609
    • /
    • 2002
  • Reliable multicast data transmission in a 1:N environment needs more sophisticated error control mechanism than that of in 1:1 environment due to ACK implosion and duplicated retransmission. Although there have been many related research on error control in reliable multicast, real implemented protocols are rare. As one of the reliable multicast transport protocols, ECTP is selected as an international standard reliable multicast protocol by ITU-T and ISO and implemented on RedHat 7.2 machine by us. In this paper, we evaluate the performance of the error control mechanism in the respect of throughput and generated control packet numbers with a real implementation code. From the results, it is concluded that the suitable values of error control parameters can be obtained from the local group size and network environments.

  • PDF