• Title/Summary/Keyword: Continuous intrusion

Search Result 53, Processing Time 0.023 seconds

A Method for Preemptive Intrusion Detection and Protection Against DDoS Attacks (DDoS 공격에 대한 선제적 침입 탐지·차단 방안)

  • Kim, Dae Hwan;Lee, Soo Jin
    • Journal of Information Technology Services
    • /
    • v.15 no.2
    • /
    • pp.157-167
    • /
    • 2016
  • Task environment for enterprises and public institutions are moving into cyberspace-based environment and structing the LTE wireless network. The applications "App" operated in the LTE wireless network are mostly being developed with Android-based. But Android-based malwares are surging and they are the potential DDoS attacks. DDoS attack is a major information security threat and a means of cyber attacks. DDoS attacks are difficult to detect in advance and to defense effectively. To this end, a DMZ is set up in front of a network infrastructure and a particular server for defensive information security. Because There is the proliferation of mobile devices and apps, and the activation of android diversify DDoS attack methods. a DMZ is a limit to detect and to protect against DDoS attacks. This paper proposes an information security method to detect and Protect DDoS attacks from the terminal phase using a Preemptive military strategy concept. and then DDoS attack detection and protection app is implemented and proved its effectiveness by reducing web service request and memory usage. DDoS attack detection and protecting will ensure the efficiency of the mobile network resources. This method is necessary for a continuous usage of a wireless network environment for the national security and disaster control.

Design and Implementation of Firewall Log Message Analysis System based on XML (XML 기반의 침입차단 로그 메시지 분석 시스템 설계 및 구현)

  • 전석훈;김석훈;손우용;이창우;송정길
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.125-130
    • /
    • 2004
  • The Internet is aggregate of trustless networks essentially. Because the Internet is very difficult to control flowing of information, taking advantage of enough sporadic resource, security problem that can protect internal important stock from the Internet is risen seriously. Recently, virus accident and generation rate about system intrusion that happen become much higher and various than past. On these time, is progressing researcher for invasion cutout to keep away illegal act vigorouslyand do continuous development. In this paper, reporting administrator log information about invader's illegal act depending on XML format form, and I wished to solve problem that happen in administration side developing invasion interception system that can control to remote.

  • PDF

Classifying Rules by In-out Traffic Direction to Avoid Security Policy Anomaly

  • Kim, Sung-Hyun;Lee, Hee-Jo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.4
    • /
    • pp.671-690
    • /
    • 2010
  • The continuous growth of attacks in the Internet causes to generate a number of rules in security devices such as Intrusion Prevention Systems, firewalls, etc. Policy anomalies in security devices create security holes and prevent the system from determining quickly whether allow or deny a packet. Policy anomalies exist among the rules in multiple security devices as well as in a single security device. The solution for policy anomalies requires complex and complicated algorithms. In this paper, we propose a new method to remove policy anomalies in a single security device and avoid policy anomalies among the rules in distributed security devices. The proposed method classifies rules according to traffic direction and checks policy anomalies in each device. It is unnecessary to compare the rules for outgoing traffic with the rules for incoming traffic. Therefore, classifying rules by in-out traffic, the proposed method can reduce the number of rules to be compared up to a half. Instead of detecting policy anomalies in distributed security devices, one adopts the rules from others for avoiding anomaly. After removing policy anomalies in each device, other firewalls can keep the policy consistency without anomalies by adopting the rules of a trusted firewall. In addition, it blocks unnecessary traffic because a source side sends as much traffic as the destination side accepts. Also we explain another policy anomaly which can be found under a connection-oriented communication protocol.

Detects abnormal behavior using motor power consumption

  • Kim, KiHwan;Ryu, Su-Mi;Kim, Min-Kyu;Kang, Young-Jin;Kim, HyunHo;Lee, HoonJae;Lee, Jin-Heung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.10
    • /
    • pp.65-72
    • /
    • 2018
  • In this paper, we used LSTM as a method to detect abnormal behavior of motors. We fixed the high layout size to 1 and changed the range of the input values and the neural network structure to see what change in power consumption prediction. Now, as the fourth industrial revolution era, smart factories are attracting attention. All the physical actions of smart factories are done using motors. Continuous monitoring of motor malfunctions helps to detect malfunctions and efficient operation. However, it is difficult to acquire the power consumption constantly due to the influence of the noise. We have experimented with a simple experimental environment, a method of predicting similarity to input data by adjusting the range of the input data or by changing the neural network structure.

Study on the Intrusion Epochs of Younger Granites and their Bearing to Orogenies in South Korea (남한(南韓)의 신기화강암류(新期花崗岩類)의 관입시기(貫入時期)와 지각변동(地殼變動))

  • Kim, Ok Joon
    • Economic and Environmental Geology
    • /
    • v.4 no.1
    • /
    • pp.1-9
    • /
    • 1971
  • The "Younger Granites" in Korea were being believed to be late Cretaceous in age and named "Bulkuksa granites" by all previous works until the writer had discovered Jurassic granite in 1963. The present paper is to prove its validity by age dating on these granites which was carried out by Professor Y. Ueda, Tohoku University, Japan. The age of 37 granites samples from various localities ranges from 68 my to 181 my. Of these 10 samples belonged to early Jurassic, 6 samples to mid-Jurassic, 4 samples to late Jurassic, 5 samples to early Cretaceous, and 12 samples to late Cretaceous in age. It is of the writer's opinion that the granites intruded in from early Jurassic to early Cretaceous age belong to Daebo granites and are syntectonic plutons associated with Daebo orogeny, and only those of late Cretaceous age belong to Bulkuksa granites that were associated with Bulkuksa disturbance. Daebo granites are aligned along NE-SW Sinian direction in the middle parts of Korea and crop out in the cores of folded mountains which were formed by Daebo Orogeny, such as Charyong, Noryong, Sobaek, and Dukyu Ranges. On the contrary Bulkuksa granites are restricted in Kyongsang basin and adjacent few localities in distribution and show no alignment. Granites supposedly associated with other disturbances of post-precambrian Have not been found so far in S. Korea. Age dating of granites has revealed that Daebo orogeny might be continuous from Songrim distur bance of late Triassic age. From this viewpoint, it could be assumed that Daedong system of Jurassic age were deposited in separate intermontain basins while Daebo orogeny was active, so that Daedong system in separate localities in Korea could not been correlated in their lithology as well as stratig raphy.

  • PDF

Nursing approach to energy (Qi) flow (에너지 흐름(기(氣))의 간호학적 접근)

  • Kim, Myung-Ja;Lee, Myung-Suk
    • Journal of East-West Nursing Research
    • /
    • v.3 no.1
    • /
    • pp.7-16
    • /
    • 1998
  • This paper reviewed the concept of the energy flow in east and west. The differences in the views of the energy flow between oriental and western thought were compaired according to the ontological point of view. Human body take up energy and material on open system which maintains homeostasis. Human and environment are continuously interacting in a state of co-existence. Human has energy field called "aura" and seven chakra in energy outflow moving came as meridian. Qi is an invisible cosmic energy helping the fundamental human activity and changes. The basic action of Qi is helping the human growth and development, maintain the body temperature and preventing the intrusion of microorganism. In the normal healthy organism, all are maintained in balance and in a continuous circulation of Qi, while illness is the result of the disturbed Qi flow in the aspect of Qi-theory. Although there are differences between oriental and western medicine in approaches to clients, the basic point of view and philosophy have many similarities on fundamental level. An understanding of the basic thought of energy flow and oriental concept of energy flow implies a more comprehensive meaning than the perspective of unitary transformation discussed in modern western thought of energy flow. Now we should avoid narrow view of energy concept and regard energy flow as an integrated concept with Korean culture. Regarding Qi-theory which provides a comprehensive and humanistic and ethical foundation for nursing philisophy through this overview, it is hoped that a contribution will be made to the development of nursing intervention which is suitable to Korean context.

  • PDF

Long-term Prediction of Groundwater Level in Jeju Island Using Artificial Neural Network Model (인공신경망 모형을 이용한 제주 지하수위의 장기예측)

  • Chung, Il-Moon;Lee, Jeongwoo;Chang, Sun Woo
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.37 no.6
    • /
    • pp.981-987
    • /
    • 2017
  • Jeju Island is a volcanic island which has a large permeability. Groundwater is a major water resources and its proper management is essential. Especially, there is a multilevel restriction due to the groundwater level decline during a drought period to protect sea water intrusion. Preliminary countermeasure using long-term groundwater level prediction is necessary to use agricultural groundwater properly. For this purpose, the monthly groundwater level prediction technique by Artificial Neural Network model was developed and applied to the representative monitoring wells. The monthly prediction model showed excellent results for training and test periods. The continuous groundwater level prediction model also developed, which used the monthly forecasted values adaptively as input data. The characteristics of groundwater declines were analyzed under extreme cases without precipitation for several months.

A Study on Hydrogeologic, Hydrodispersive Characterization and Groundwater Contamination Assessment of an H-site (H 연구지역의 수리지질-수리분산특성과 지하수 오염가능성 평가연구)

  • Hahn, Jeongsang
    • Economic and Environmental Geology
    • /
    • v.27 no.3
    • /
    • pp.295-311
    • /
    • 1994
  • A comprehensive in-situ tests are performed to define the hydrogeologic and hydrodispersive characteristics such as hydraulic conductivities, longitudinal dispersivity, and average linear velocities as well as conducting flow-net analysis at the study area. The results show that the study area is very heterogeneous so that hydraulic conductivities range from $6.45{\times}10^{-7}$ to $1.15{\times}10^{-5}m/s$ with average linear velocities of 0.34~0.62m/day. Whole groundwater in upper-most aquifer is discharging into the sea with specific discharge rate of $7.2{\times}10^{-3}$ to $1.3{\times}10^{-2}m/day$. The longitudinal dispersivity of the aquifer is estimated about 4.8m through In-situ injection phase test. The area is highly vulnerable to potential contaminant sources due to it's high value of DRASTIC index ranging from 139 to 155 and also under water table condition with very shallow groundwater level. To delineate contaminant plumes of toxic NaOH and carcinogenic benzene when these substances are assumed to be leaked through existing TSDF at the study area by unexpected accidents or spill, Aquifer Simulation Model (ASM) including Flow and Transport Model is used. Te simulated results reveal that the size of NaOH plume after 5 years continuous leak is about $250{\times}100m$ and benzene after 10 years, $490{\times}100m$. When the groundwater is abstracted about 50 days, which is maximum continuously sustained no-precipitation period during 30 years, with pumping rate of $100m^3/day$, THWELL program shows that the groundwater is adversly affected by sea water intrusion.

  • PDF

A Safety Assessment for the Wolsong LILW Disposal Center: As a part of safety case for the first stage disposal (월성원자력환경관리센터의 폐쇄후 처분안전성평가: 1단계 인허가 적용사례를 중심으로)

  • Park, Joo-Wan;Yoon, Jeong-Hyun;Kim, Chang-Lak
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.6 no.4
    • /
    • pp.329-346
    • /
    • 2008
  • Post-closure safety assessment for the Wolsong Low- and Intermediate-level radioactive waste Disposal Center is described. Based on assessment context, closure concept and ground water flow characteristics of the disposal site, brief descriptions are included on the assessment scenarios, models, input parameters and tools. Radionuclide transport modeling in the near-field and far-field, gas generation and transport modeling, human intrusion and biosphere transport are also described briefly. Assessment results for each scenarios are shown to meet the performance criteria of regulatory body. Further and continuous efforts to improve the safety of disposal facility will be made during the construction and operational period.

  • PDF

Surgical approach and orthodontic treatment of mandibular condylar osteochondroma

  • Yang, So Jin;Chung, Nam Hyung;Kim, Jong Ghee;Jeon, Young-Mi
    • The korean journal of orthodontics
    • /
    • v.50 no.3
    • /
    • pp.206-215
    • /
    • 2020
  • Osteochondroma is a common benign tumor of bones, but it is rare in the mandibular condyle. With its outgrowth it manifests clinically as deviation of the mandible limitation of mouth opening, and facial asymmetry. After the tumor is diagnosed on the basis of clinical symptoms and radiographic examination including cone-beam computed tomography (CBCT) analysis, an appropriate surgery and treatment plan should be formulated. Herein, we present the case of a 44-year-old female patient who visited our dental hospital because her chin point had been deviating to the left side slowly but progressively over the last 3 years and she had difficulty masticating. Based on CBCT, she was diagnosed with skeletal Class III malocclusion accompanied by osteochondroma of the right mandibular condyle. Maxillary occlusal cant with the right side down was observed, but it was confirmed to be an extrusion of the molars associated with dental compensation. Therefore, after intrusion of the right molars with the use of temporary anchorage devices, sagittal split ramus osteotomy was used to remove the tumor and perform orthognathic surgery simultaneously. During 6 months after the surgery, continuous bone resorption and remodeling were observed in the condyle of the affected side, which led to a change in occlusion. During the postoperative orthodontic treatment, intrusive force and buccal torque were applied to the molars on the affected side, and a proper buccal overjet was created. After 18 months, CBCT revealed that the rate of bone absorption was continuously reduced, bone corticalization appeared, and good occlusion and a satisfying facial profile were achieved.