• Title/Summary/Keyword: Connection Trace

Search Result 51, Processing Time 0.031 seconds

Design of watermark trace-back system to supplement connection maintenance problem

  • Kim, Hwan-Kuk;Han, Seung-Wan;Seo, Dong-Il;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2151-2154
    • /
    • 2003
  • Internet is deeply rooted in everyday life and many things are performed using internet in real-world, therefore internet users increased because of convenience. Also internet accident is on the increase rapidly. The security vendor developed security system to protect network and system from intruder. Many hackings can be prevented and detected by using these security solutions. However, the new hacking methods and tools that can detour or defeat these solutions have been emerging and even script kids using these methods and tools can easily hack the systems. In consequence, system has gone through various difficulties. So, Necessity of intruder trace-back technology is increased gradually. Trace-back technology is tracing back a malicious hacker to his real location. trace-back technology is largely divided into TCP connection trace-back and IP packet trace-back to trace spoofed IP of form denial-of-service attacks. TCP connection trace-back technology that autonomously traces back the real location of hacker who attacks system using stepping stone at real time. In this paper, We will describe watermark trace-back system using TCP hijacking technique to supplement difficult problem of connection maintenance happened at watermark insertion. Through proposed result, we may search attacker's real location which attempt attack through multiple connection by real time.

  • PDF

A Study of Connection Maintenance Techniques using TCP Hijacking

  • Kim, JeomGoo
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.57-63
    • /
    • 2014
  • Internet users drastically increases, also through the Internet to buy various intrusion significantly increased. These various methods of intrusion defense thinking hacker attempting to hack the actual position of the real-time tracking of the intruder backtracking technique for research have been actively carried out. In this paper, a technique used in TCP Connection trace-back System in one packet trace-back technique watermarking technique using TCP Hijacking Connection Reply packets how to solve the difficulties of maintaining presented.

ON DIFFERENTIABILITY OF THE MATRIX TRACE OPERATOR AND ITS APPLICATIONS

  • Dulov, E.V.;Andrianova, N.A.
    • Journal of applied mathematics & informatics
    • /
    • v.8 no.1
    • /
    • pp.97-109
    • /
    • 2001
  • This article is devoted to “forgotten” and rarely used technique of matrix analysis, introduced in 60-70th and enhanced by authors. We will study the matrix trace operator and it’s differentiability. This idea generalizes the notion of scalar derivative for matrix computations. The list of the most common derivatives is given at the end of the article. Additionally we point out a close connection of this technique with a least square problem in it’s classical and generalized case.

TRIVIALITY OF A TRACE ON THE SPACE OF COMMUTING TRACE-CLASS SELF-ADJOINT OPERATORS

  • Myung, Sung
    • Bulletin of the Korean Mathematical Society
    • /
    • v.47 no.6
    • /
    • pp.1205-1211
    • /
    • 2010
  • In the present article, we investigate the possibility of a real-valued map on the space of tuples of commuting trace-class self-adjoint operators, which behaves like the usual trace map on the space of trace-class linear operators. It turns out that such maps are related with continuous group homomorphisms from the Milnor's K-group of the real numbers into the additive group of real numbers. Using this connection, it is shown that any such trace map must be trivial, but it is proposed that the target group of a nontrivial trace should be a linearized version of Milnor's K-theory as with the case of universal determinant for commuting tuples of matrices rather than just the field of constants.

A Study on Image Acquisition and Usage Trace Analysis of Stick-PC (Stick-PC의 이미지 수집 및 사용흔적 분석에 대한 연구)

  • Lee, Han Hyoung;Bang, Seung Gyu;Baek, Hyun Woo;Jeong, Doo Won;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.7
    • /
    • pp.307-314
    • /
    • 2017
  • Stick-PC is small and portable, So it can be used like a desktop if you connect it to a display device such as a monitor or TV anytime and anywhere. Accordingly, Stick-PC can related to various crimes, and various evidence may remain. Stick-PC uses the same Windows version of the operating system as the regular Desktop, the artifacts to be analyzed are the same. However, unlike the Desktop, it can be used as a meaningful information for forensic investigation if it is possible to identify the actual user and trace the usage by finding the traces of peripheral devices before analyzing the system due to the mobility. In this paper, We presents a method of collecting images using Bootable OS, which is one of the image collection methods of Stick-PC. In addition, we show how to analyze the trace of peripheral connection and network connection trace such as Display, Bluetooth through the registry and event log, and suggest the application method from the forensic point of view through experimental scenario.

A Study of Trace-back Connection Maintenance Techniques using TCP Hijacking (TCP Hijacking을 이용한 역추적 Connection 유지 기법 연구)

  • Kim, Hwan-Kuk;Han, Seung-Wan;Seo, Dong-Il
    • Annual Conference of KIPS
    • /
    • 2003.05c
    • /
    • pp.2153-2156
    • /
    • 2003
  • 인터넷 사용자의 급증에 따라, 인터넷을 통한 각종 침해사고 역시 크게 증가되고 있다 이러한 각종 침해사고로부터의 대응 방법으로 해킹을 시도하는 해커의 실제 위치를 실시간으로 추적하는 침입자 역추적 기술에 대한 연구가 활발히 이루어지고 있다. 본 논문에서는 TCP Connection Traceback 기술에서 사용되는 기법 중에 하나인 패킷 워터마킹 역추적 기법에서 TCP Hijacking 해킹기술을 이용하여 Reply 패킷의 Connection 유지 어려움을 해결하는 방법을 제시한다.

  • PDF

A Verification of Intruder Trace-back Algorithm using Network Simulator (NS-2) (네트워크 시뮬레이터 도구를 이용한 침입자 역추적 알고리즘 검증)

  • Seo Dong-il;Kim Hwan-kuk;Lee Sang-ho
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.1
    • /
    • pp.1-11
    • /
    • 2005
  • Internet has become an essential part of our daily lives. Many of the day to day activities can already be carried out over Internet, and its convenience has greatly increased the number of Internet users. Hut as Internet gains its popularity, the illicit incidents over Internet has also proliferated. The intruder trace-back technology is the one that enables real time tracking the position of the hacker who attempts to invade the system through the various bypass routes. In this paper, the RTS algorithm which is the TCP connection trace-back system using the watermarking technology on Internet is proposed. Furthermore, the trace-bark elements are modeled by analyzing the Proposed trace-back algorithm, and the results of the simulation under the virtual topology network using ns-2, the network simulation tool are presented.

Comparative Studies on the Analysis of Pesticide Residues. in Rice, Barley and Wheat (주곡중의 잔류농약분석에 관한 연구)

  • Park Seung Heui
    • Korean journal of applied entomology
    • /
    • v.13 no.4 s.21
    • /
    • pp.235-243
    • /
    • 1974
  • Recenty, the pesticides Pollutions in connection with the maintenance of dietary life are poised as serious sanitary problems. Author have established an appropriate analysis method in this connection and, at the same time, analysed the levels of pesticides residues, such as organochloride pesticides and organic mercurials, contained in main cereals (rice, barley, and wheat) collected throughout the country. Using gas liquid chromatography method, comparative analyses were made of organochloride Pesticides with electron capture detector, and organic mercurials with electron capture detector and the Dithizone Method. As a result, the organic mercurials analysis using gas liquid chromatography is believed to hold out an especially good method for both in terms of its sensitivity and its Practical applications. The summary obtained from these results is as follows; The detectable limit of organochloride pesticides is $5\times10^{-10}$ grams and that of organic mecurials is $5\times10^{-9}$ grams. The detections using the Dithizone Method are difficult. The gas liquid chromatographic analysis of organic mercurials is very simple in its operation and high in its sensitivity, compare with the analysis using the Dithizone Method. Therefore, this analysis is expected to be a good method applicable to the pesticide residues analysis. The levels of pesticide residues contained in samples are very little for tolerance and, therefore, no problem i.: foreseen for eating. The appropriate conditions of gas liquid chromatographic analysis obtained from these results are expected very useful for the date establishing an officially authorized analysis method.

  • PDF

Development of HTTP-based extension Protocol for Tracking Learning Activities (학습 활동 추적을 위한 HTTP 기반 확장 프로토콜 개발)

  • Park, Jong-O
    • The Journal of Korean Association of Computer Education
    • /
    • v.6 no.2
    • /
    • pp.41-51
    • /
    • 2003
  • In the distance education systems, there are limited things while performing educational activities because there are to be problems in structural features of the Web. HTTP, a connection-less protocol, performs requests of client, however, does not hold on the status. Thus, by features of the Web, it is difficult to hold on the connection of learners and trace information asked by learners. Moreover, these problems make impossible not only a learner's connection continuity but also on-line interaction among the learners in the distance education. This thesis developed CHTP, an connection-based hypertext transfer protocol, based on HTTP and a new platform of distance education in order to track activities of learners. The developed web extension platform will make it easy to build up system for being helpful in a distance education because this thesis proposes a standardized way in the protocol.

  • PDF

Vehicle Tracing Method Using Adaptive High Order Correlation Analysis (적응적 고차 상관 처리를 이용한 차량의 주행 궤적 검출법)

  • 장경영;오재응;좌등탁송
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.4 no.3
    • /
    • pp.73-82
    • /
    • 1996
  • Vehicle movement detection by high order correlation analysis of optical sensor array signals is introduced. The optical sensors observe the road which is assumed to be a non-uniform speckle-like texture. The measurement system is applicable to general robotic movement detection because : 1) It employs a non-contact measurement method, 2) The system can be made very compact, and 3) It enables approximation of the movement trace with a sequence of arcs instead of the conventional connection of simple line segments. In this work, we have looked into estimation of running trace of an autonomous vehicle by observing the ground pattern.

  • PDF