• Title/Summary/Keyword: Continuous intrusion

Search Result 53, Processing Time 0.022 seconds

Implementation of a Web Service Intrusion Tolerance System based on Diversity and Redundancy (다양성과 중복성을 이용한 웹 서비스 침입감내 시스템 구현)

  • 김성기;나용희;민병준
    • Proceedings of the IEEK Conference
    • /
    • 2003.07d
    • /
    • pp.1359-1362
    • /
    • 2003
  • The intrusions appears continuously by new unknown attacks exploiting vulnerabilities of systems or components but there are no perfect solutions to protect this unknown attacks. To overcome this problem, in this paper, we have proposed and implemented a Web service intrusion tolerant system that provides continuous Web services to the end users transparently even after the occurrence of an attack against the Web services, and prevents the disclosure of system's configuration data from server Our system has an N+l node architecture which is to minimize the number of redundant server nodes and to tolerate the intrusion effectively, and it also supports diversity in its design. Experimental result obtained on an implemented system show that our system can cope with intrusion such as DoS, file modification, confidentiality compromise of system properly.

  • PDF

Diopside DSD (crystal size distribution) in the Contact Metamorphic Aureole (Hwanggangni Formation) near the Daeyasan Granite Goesan, Korea (괴산지역 대야산 화강암체 주변 접촉변성대(황강리층)에서의 투휘석 결정 크기분포)

  • Kim, Sangmyung;Kim, Hyung-Shik
    • The Journal of the Petrological Society of Korea
    • /
    • v.5 no.2
    • /
    • pp.161-167
    • /
    • 1996
  • The CSD (crystal size distribution) of diopside crystals in the calc-silicate hornfels of the Hwanggangni Formation intruded by the Cretaceous Daeyasan granite shows the patterns of continuous nucleation and growth. There is correlation between the distance from the intrusion contact and the slopes from the linear part of log(population density) vs. size diagrams. In the log(population density) vs. size diagrams of the samples systematically collected from the intrusion contact, two different groups are recognized; the slopes for the samples near the intrusion contact (horizontal distance from the contact less than 50m) are gentler (1500$cm^{-1}$) than those for the samples away from the intrusion contact (2500$cm^{-1}$, distance from the contact greater than 100 m). These differences may reflect the differences in growth rates and crystallization time, or the differences in diopside-forming reactions. All of the log(population density) vs. size diagrams show depletion of smaller crystals. The observed depletion may be due to Ostwald ripening or the changes in nucleation rates as the reactant phases diminishes. Similar grouping is also possible for the observed degree of depletion of smaller crystals; the depletion decreases with increasing distance from the intrusion contact, suggesting temperature-dependent rates of Ostwald ripening.

  • PDF

Case Studies on the Field Application of Miniature CPT's in South Korea (소형콘관입시험(Miniature CPT)의 국내현장적용 사례분석)

  • Yoon, Sung-Soo;Hwang, Dae-Jin;Kim, Jun-Ou;Ji, Wan-Goo
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2010.09a
    • /
    • pp.269-281
    • /
    • 2010
  • The cone penetration test(CPT) has been increasingly used for in situ site characterization. However, the use of CPT is often limited due to specific site conditions depending on the cone size, geometry, and capacity of the CPT system used. In South Korea, it has generally been considered that the CPT could be satisfactorily performed only in soft soils. Louisiana State University/ Louisiana Transportation Research Center has implemented a field-rugged continuous intrusion miniature cone penetration test (CIMCPT) system since the 1990s. The miniature cone penetrometer of the CIMCPT system has a cross-sectional cone area of $2cm^2$ allowing finer soil profiles compared to the standard $10cm^2$. The reduced cross-sectional area also enables a system capacity reduction leading to cost saving and ease in maintenance. In addition, the continuous intrusion mechanism allows fast and economic site investigations. Samsung C&T Corporation has recently implemented a similar CIMCPT system. In this study, case studies on the field application of Samsung CIMCPT system for the last 2 years are presented to illustrate its performance investigation and its usefulness and limitation. Results of the case studies show that the CIMCPT system can be applied to soils with cone tip resistance($q_c$) values up to about 30MPa and allows a reliable and useful way to characterize soft soils. The results also show that the rod buckling limits the investigation depth by the system and the large contact pressure of the CIMCPT truck prevents the use of the system at sites with soft surface soils. According to the results of the case studies, the Samsung CIMCPT system has been being upgraded with a miniature cone with a longer rod, a crawler-type transportation system, a pre-boring system, and so on.

  • PDF

A Hybrid PSO-BPSO Based Kernel Extreme Learning Machine Model for Intrusion Detection

  • Shen, Yanping;Zheng, Kangfeng;Wu, Chunhua
    • Journal of Information Processing Systems
    • /
    • v.18 no.1
    • /
    • pp.146-158
    • /
    • 2022
  • With the success of the digital economy and the rapid development of its technology, network security has received increasing attention. Intrusion detection technology has always been a focus and hotspot of research. A hybrid model that combines particle swarm optimization (PSO) and kernel extreme learning machine (KELM) is presented in this work. Continuous-valued PSO and binary PSO (BPSO) are adopted together to determine the parameter combination and the feature subset. A fitness function based on the detection rate and the number of selected features is proposed. The results show that the method can simultaneously determine the parameter values and select features. Furthermore, competitive or better accuracy can be obtained using approximately one quarter of the raw input features. Experiments proved that our method is slightly better than the genetic algorithm-based KELM model.

FLORA: Fuzzy Logic - Objective Risk Analysis for Intrusion Detection and Prevention

  • Alwi M Bamhdi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.179-192
    • /
    • 2023
  • The widespread use of Cloud Computing, Internet of Things (IoT), and social media in the Information Communication Technology (ICT) field has resulted in continuous and unavoidable cyber-attacks on users and critical infrastructures worldwide. Traditional security measures such as firewalls and encryption systems are not effective in countering these sophisticated cyber-attacks. Therefore, Intrusion Detection and Prevention Systems (IDPS) are necessary to reduce the risk to an absolute minimum. Although IDPSs can detect various types of cyber-attacks with high accuracy, their performance is limited by a high false alarm rate. This study proposes a new technique called Fuzzy Logic - Objective Risk Analysis (FLORA) that can significantly reduce false positive alarm rates and maintain a high level of security against serious cyber-attacks. The FLORA model has a high fuzzy accuracy rate of 90.11% and can predict vulnerabilities with a high level of certainty. It also has a mechanism for monitoring and recording digital forensic evidence which can be used in legal prosecution proceedings in different jurisdictions.

Scale Effects and Field Applications for Continuous Intrusion Miniature Cone Penetrometer (연속관입형 소형콘관입시험기에 대한 크기효과 및 현장적용)

  • Yoon, Sungsoo;Kim, Kyu-Sun;Lee, Jin Hyung;Shin, Dong-Hyun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.33 no.6
    • /
    • pp.2359-2368
    • /
    • 2013
  • Cone penetration tests (CPTs) have been increasingly used for site characterizations. However, the site investigations using CPTs are often limited due to soil conditions depending on the cone size and capacity of the CPT system. The small sectional area of a miniature cone improves the applicability of the CPT system due to the increased capacity of the CPT system. A continuous intrusion system using a coiled rod allows fast and cost effective site investigation. In this study, the performance of the continuous intrusion miniature cone penetration test (CIMCPT) system has been evaluated by comparison tests with the standard CPT system at several construction sites in Korea. The results show that the CIMCPT system has a same performance with the CPT system and has advantages on the mobility and applicability. According to field verification tests for scale effect evaluation, the cone tip resistance evaluated by CIMCPT overestimates by 10% comparing to standard CPTs. A crawler mounted with the CIMCPT system has been implemented to improve accessibility to soft ground, and has shown improvement over the truck type CIMCPT system. Therefore, the improved CIMCPT system can be utilized as a cost effective and highly reliable soil investigation methodology to detect the depth of soft ground and to evaluate soil classification.

An Intrusion Detection System using Time Delay Neural Networks (시간지연 신경망을 이용한 침입탐지 시스템)

  • 강흥식;강병두;정성윤;김상균
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.5
    • /
    • pp.778-787
    • /
    • 2003
  • Intrusion detection systems based on rules are not efficient for mutated attacks, because they need additional rules for the variations. In this paper, we propose an intrusion detection system using the time delay neural network. Packets on the network can be considered as gray images of which pixels represent bytes of them. Using this continuous packet images, we construct a neural network classifier that discriminates between normal and abnormal packet flows. The system deals well with various mutated attacks, as well as well known attacks.

  • PDF

Research on Network Design for Intrusion Tolerance of BcN (BcN에서의 침입감내를 위한 네트워크 디자인 연구)

  • Park, Hyun-Do;Kim, Soo;Lee, Hee-Jo;Im, Chae-Tae;Won, Yoo-Jae
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.5
    • /
    • pp.305-315
    • /
    • 2007
  • Broadband Convergence Network (BcN) is the network which unifies telephone network, the Internet and broadcasting networks. Threats to each network can bring serious problems in BcN environment since the whole network can be damaged by various types of attack. The purpose of this study is to suggest the prototype of intrusion-tolerant network design of BcN to guarantee the continuous operation of BcN services against malicious attacks. First, BcN service components, selected by analysis of service time and coverage importance, are classified into three groups by their type: server type, gateway type and hybrid type. Second, the necessity of applying intrusion tolerance on BcN services is deduced by possible attack scenarios on BcN. Finally, we suggest the intrusion-tolerant network design suitable to BcN, using hardware redundancy and secure policies. Also, we present that the suggested network design can increase the intrusion tolerance of BcN.

The Hybrid Model using SVM and Decision Tree for Intrusion Detection (SVM과 의사결정트리를 이용한 혼합형 침입탐지 모델)

  • Um, Nam-Kyoung;Woo, Sung-Hee;Lee, Sang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.14C no.1 s.111
    • /
    • pp.1-6
    • /
    • 2007
  • In order to operate a secure network, it is very important for the network to raise positive detection as well as lower negative detection for reducing the damage from network intrusion. By using SVM on the intrusion detection field, we expect to improve real-time detection of intrusion data. However, due to classification based on calculating values after having expressed input data in vector space by SVM, continuous data type can not be used as any input data. Therefore, we present the hybrid model between SVM and decision tree method to make up for the weak point. Accordingly, we see that intrusion detection rate, F-P error rate, F-N error rate are improved as 5.6%, 0.16%, 0.82%, respectively.

Design of NePID using Anomaly Traffic Analysis and Fuzzy Cognitive Maps (비정상 트래픽 분석과 퍼지인식도를 이용한 NePID 설계)

  • Kim, Hyeock-Jin;Ryu, Sang-Ryul;Lee, Se-Yul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.4
    • /
    • pp.811-817
    • /
    • 2009
  • The rapid growth of network based IT systems has resulted in continuous research of security issues. Probe intrusion detection is an area of increasing concerns in the internet community. Recently, a number of probe intrusion detection schemes have been proposed based on various technologies. However, the techniques, which have been applied in many systems, are useful only for the existing patterns of probe intrusion. They can not detect new patterns of probe intrusion. Therefore, it is necessary to develop a new Probe Intrusion Detection technology that can find new patterns of probe intrusion. In this paper, we proposed a new network based probe intrusion detector(NePID) using anomaly traffic analysis and fuzzy cognitive maps that can detect intrusion by the denial of services attack detection method utilizing the packet analyses. The probe intrusion detection using fuzzy cognitive maps capture and analyze the packet information to detect syn flooding attack. Using the result of the analysis of decision module, which adopts the fuzzy cognitive maps, the decision module measures the degree of risk of denial of service attack and trains the response module to deal with attacks. For the performance evaluation, the "IDS Evaluation Data Set" created by MIT was used. From the simulation we obtained the max-average true positive rate of 97.094% and the max-average false negative rate of 2.936%. The true positive error rate of the NePID is similar to that of Bernhard's true positive error rate.