• Title/Summary/Keyword: Continuous intrusion

Search Result 53, Processing Time 0.022 seconds

Intrusion Prevention Using Harmful Traffic Analysis (유해 트래픽 분석을 이용한 침입 방지)

  • Chang, Moon-Soo;Koo, Hyang-Ohk;Oh, Chang-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.4 s.36
    • /
    • pp.173-179
    • /
    • 2005
  • The continuous development of computing technique and network technology bring the explosive growth of the Internet, it accomplished the role which is import changes the base facility in the social whole and public infra, industrial infrastructure, culture on society-wide to Internet based environment. Recently the rapid development of information and technology environment is quick repeated the growth and a development which is really unexampled in the history but it has a be latent vulnerability, Therefore the damage from this vulnerability like worm, hacking increases continually. In this paper, in order to resolve this problem, implement the analysis system for harmful traffic for defending new types of attack and analyzing the traffic takes a real-time action against intrusion and harmful information packet.

  • PDF

A Policy-based Secure Framework for Constructing Secure Networking (안전한 네트워크 구성을 위한 정책기반 보안 프레임워크)

  • 박상길;장종수;손승원;노봉남
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.8C
    • /
    • pp.748-757
    • /
    • 2002
  • Cyber-terror trials are increased in nowadays and these attacks are commonly using security vulnerability and information gathering method by variable services grew by the continuous development of Internet Technology. IDS's application environment is affected by this increasing Cyber Terror. General Network based IDS detects intrusion by signature based Intrusion Detection module about inflowing packet through network devices. Up to now security in network is commonly secure host, an regional issue adopted in special security system but these system is vulnerable intrusion about the attack in globally connected Internet systems. Security mechanism should be produced to expand the security in whole networks. In this paper, we analyzer the DARPA's program and study Infusion Detection related Technology. We design policy security framework for policy enforcing in whole network and look at the modules's function. Enforcement of security policy is acted by Intrusion Detection system on gateway system which is located in network packet's inflow point. Additional security policy is operated on-line. We can design and execute central security policy in managed domain in this method.

Effects of Wave Action on Seawater Intrusion in Coastal Aquifer and Mitigation Strategies (파랑작용이 해안대수층의 해수침투에 미치는 영향 및 저감방안)

  • Lee, Woo-Dong;Jeong, Yeong-Han;Hur, Dong-Soo
    • Journal of Ocean Engineering and Technology
    • /
    • v.31 no.1
    • /
    • pp.47-59
    • /
    • 2017
  • This study conducted numerical simulations using LES-WASS-3D ver. 2.0 to analyze the seawater intrusion characteristics of the incident waves in a coastal aquifer. LES-WASS-3D directly analyzed the nonlinear interaction between the seawater and freshwater in a coastal aquifer, as well as the wave-current interaction in the coastal area. First, the LES-WASS-3D results were compared with the existing experimental results for the mean water level under wave action in the coastal aquifer and seawater penetration into the coastal aquifer. The mean water level, shape and position of the seawater-freshwater interface, and intrusion distance were well implemented in the results. This confirmed the validity and effectiveness of LES-WASS-3D. The overall seawater penetration distance increases in the coastal aquifer as a result of wave set-up and run-up in the swash zone caused by continuous wave actions, and it increases with the wave height and period. Furthermore, a numerical verification was performed by comparing the suggested existing structure and newly suggested curtain wall as a measure against seawater penetration. An existing underground dam showed a better effect with increased height. Additionally, the suggested curtain wall had a better effect when the embedded depth was increased.

A Research on Network Intrusion Detection based on Discrete Preprocessing Method and Convolution Neural Network (이산화 전처리 방식 및 컨볼루션 신경망을 활용한 네트워크 침입 탐지에 대한 연구)

  • Yoo, JiHoon;Min, Byeongjun;Kim, Sangsoo;Shin, Dongil;Shin, Dongkyoo
    • Journal of Internet Computing and Services
    • /
    • v.22 no.2
    • /
    • pp.29-39
    • /
    • 2021
  • As damages to individuals, private sectors, and businesses increase due to newly occurring cyber attacks, the underlying network security problem has emerged as a major problem in computer systems. Therefore, NIDS using machine learning and deep learning is being studied to improve the limitations that occur in the existing Network Intrusion Detection System. In this study, a deep learning-based NIDS model study is conducted using the Convolution Neural Network (CNN) algorithm. For the image classification-based CNN algorithm learning, a discrete algorithm for continuity variables was added in the preprocessing stage used previously, and the predicted variables were expressed in a linear relationship and converted into easy-to-interpret data. Finally, the network packet processed through the above process is mapped to a square matrix structure and converted into a pixel image. For the performance evaluation of the proposed model, NSL-KDD, a representative network packet data, was used, and accuracy, precision, recall, and f1-score were used as performance indicators. As a result of the experiment, the proposed model showed the highest performance with an accuracy of 85%, and the harmonic mean (F1-Score) of the R2L class with a small number of training samples was 71%, showing very good performance compared to other models.

The Field Application of Miniature Cone Penetration Test System in Korea (소형콘관입시험(Miniature Cone Penetration Test)의 국내현장 적용)

  • Yoon, Sung-Soo;Ji, Wan-Goo;Kim, Jun-Ou;Kim, Rae-Hyun
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2009.03a
    • /
    • pp.349-360
    • /
    • 2009
  • The cone penetration test(CPT) has gained its popularity in site characterization indebted by its reliability, speed, economy, and automatic measurement system since its development in the 1930s. The CPT results, commonly consisting of cone tip resistance, sleeve friction, and pore water pressure measurements, allow us to classify soils as well as to reveal their engineering characteristics. The site condition at which the CPT is allowable is often dependent on the capacity of a CPT system. In Korea, it has been considered that the CPT could be appled only to soft soils in most cases because CPT systems available for stiff soils are very rare due to their expensive procurement and maintenance cost. Luoisiana Transportation Research Center(LTRC) has developed and implemented a field-rugged continuous intrusion miniature cone penetration test(CIMCPT) system since the late 1990s. The miniature cone penetrometer has a sectional cone area of $2cm^2$ allowing system capacity reduction compared to the standard $10cm^2$ cone penetrometer. The continuous intrusion mechanism allows fast and economic site investigation. Samsung Engineering & Construction has recently developed and implemented a similar CIMCPT system based on its original version developed in LTRC. The performance of the Samsung CIMCPT system has been investigated by calibration with the standard CPT system at a well-characterized test site in Pusan, Korea. In addition, scale effect between the miniature cone penetrometer and the standard cone penetrometer has been investigated by comparing the field test results using the both systems.

  • PDF

Radar-based Security System: Implementation for Cluttered Environment

  • Lee, Tae-Yun;Skvortsov, Vladimir;Ka, Min-Ho
    • Journal of IKEEE
    • /
    • v.19 no.2
    • /
    • pp.160-167
    • /
    • 2015
  • We present an experimental implementation of the inexpensive microwave security sensor that can detect both static and slowly moving objects in cluttered environment. The prototype consists of a frequency-modulated continuous wave radar sensor, control board or computer and software. The prototype was tested in a cluttered indoor environment. In case of intrusion or change of environment the sensor will give an alarm, determine the location of new object, change in its location and can detect a slowly moving target. To make a low-cost unit we use commercially available automotive radar and own signal processing techniques for object detection and tracking. The intruder detection is based on a comparison between current 'image' in memory and 'no-intrusion' reference image. The main challenge is to develop a reliable technique for detection of a relatively low-magnitude object signals hidden in multipath clutter echo signals. Various experimental measurements and computations have shown the feasibility and performance of the system.

Transmission Performance of MANET with Intermittent Blackhole Attacks (간헐적 블랙홀 공격이 있는 MANET의 전송성능)

  • Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.1037-1040
    • /
    • 2013
  • Based on easy construction and operation compared with infra-structure communication netowrks, and rapid spreading of smart phone having high powered calculation ability and Wi/Fi function, usage of MANET(Mobile Ad-Hoc Network), which is configured with simply several terminals, is increased in applications of emergency communications, leisure, explorations. However, because of supporting difficulty of communication infra-structure makes some defects of malicious information intrusion like as hacking. In this paper, effects of transmission performance caused by information intrusion is analyzed. The results of published studies is based on environment of continuous intrusions, but this paper assumed intermittent attacking condition. In this paper, blackhole attack is used for intrusion type to MANET, voice traffic is used as a application traffic. Compuer simulation, based on NS-2, is used for measuring of performance parameters, and the analysis for the simulation results is shown as considerations of this paper.

  • PDF

Design of Effective Intrusion Detection System for Wireless Local Area Network (무선랜을 위한 효율적인 침입탐지시스템 설계)

  • Woo, Sung-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.2
    • /
    • pp.185-191
    • /
    • 2008
  • Most threats of WLAN are easily caused by attackers who access to the radio link between STA and AP, which involves some Problems to intercept network communications or inject additional messages into them. In comparison with wired LAN, severity of wireless LAN against threats is bigger than the other networks. To make up for the vulnerability of wireless LAN, it needs to use the Intrusion Detection System using a powerful intrusion detection method as SVM. However, due to classification based on calculating values after having expressed input data in vector space by SVM, continuous data type can not be used as any input data. In this paper, therefore, we design the IDS system for WLAN by tuning with SVM and data-mining mechanism to defend the vulnerability on certain WLAN and then we demonstrate the superiority of our method.

  • PDF

Saltwater Intrusion Monitoring Evaluation through Automatic Vertical Line Method in a Costal Aquifer of the Eastern Part of Jeju Island (수직 라인 관측시스템을 이용한 제주 동부 해안대수층에서 해수침투 모니터링 평가)

  • Jang, Hojune;Ha, Kyoochul;Hwang, Inuk;Kim, Gee-Pyo;Park, Won-Bae
    • Journal of Soil and Groundwater Environment
    • /
    • v.26 no.3
    • /
    • pp.1-13
    • /
    • 2021
  • Groundwater monitoring is commonly practiced with real-time sensors placed in several depth spots in aquifer. However, this method only provides monitoring data at the point where the sensors are installed. In this study, we developed a vertical line monitoring system (VLMS) that can provide continuous data of groundwater parameters along the vertical depth. The device was installed in a well located on the coast of the eastern part of Jeju island to monitor electrical conductivity, temperature, salinity, pH, dissolved oxygen, and oxidation-reduction potential over approximately 3 months from September 11 to December 3, 2020. The results indicated that the groundwater levels fluctuated with the tidal change of seawater level, and the upper and lower boundaries of the freshwater and saltwater zone in the groundwater were located at below 16 m and 36 m of mean sea level, respectively. There was a large variation in EC values during the high tide and temperature change was the greatest during flow tide. Although further investigation is needed for improvement of the device to obtain more accurate and reliable data, the device has a potential utility to provide fundamental data to understand the seawater intrusion and transport mechanisms in coastal aquifers.

Three-Dimensional Numerical Simulation of Impacts of Layered Heterogeneity and Groundwater Pumping Schemes on Seawater Intrusion (해수 침투에 대한 층상 불균질성 및 지하수 양수 방식의 영향 삼차원 수치 모의)

  • Park, Hwa-Seok;Kihm, Jung-Hwi;Yum, Byoung-Woo;Kim, Jun-Mo
    • Journal of Soil and Groundwater Environment
    • /
    • v.13 no.4
    • /
    • pp.8-21
    • /
    • 2008
  • A series of three-dimensional numerical simulations using a hydrodynamic dispersion numerical model is performed to analyze quantitatively impacts of layered heterogeneity of geologic media and groundwater pumping schemes on groundwater flow and salt transport in coastal aquifer systems. A two-layer heterogeneous coastal aquifer system composed of a lower sand layer (aquifer) and an upper clay layer (aquitard) and a corresponding single-layer homogeneous coastal aquifer system composed of an equivalent lumped material are simulated to evaluate impacts of layered heterogeneity on seawater intrusion. In addition, a continuous groundwater pumping scheme and two different periodical groundwater pumping schemes, which withdraw the same amount of groundwater during the total simulation time, are applied to the above two coastal aquifer systems to evaluate impacts of groundwater pumping schemes on seawater intrusion. The results of the numerical simulations show that the periodical groundwater pumping schemes have more significant adverse influences on groundwater flow and salt transport not only in the lower sand layer but also in the upper clay layer, and groundwater salinization becomes more intensified spatially and temporally as the pumping intensity is higher under the periodical groundwater pumping schemes. These imply that the continuous groundwater pumping scheme may be more suitable to minimize groundwater salinization due to seawater intrusion. The results of the numerical simulations also show that groundwater salinization in the upper clay layer occurs significantly different from that in the lower sand layer under the periodical groundwater pumping schemes. Such differences in groundwater salinization between the two adjacent layers may result from layered heterogeneity of the layered coastal aquifer system.