• Title/Summary/Keyword: DoIP

Search Result 348, Processing Time 0.023 seconds

Effects of Recombinant Imperatoxin A $(IpTx_a$ mutants on $Ca^{2+}$ Release Channel/Ryanodine Receptor in Rabbit Skeletal Sarcoplasmic Reticulum

  • Seo, In-Ra;Park, Murim;Kim, Do-Han
    • Proceedings of the Korean Biophysical Society Conference
    • /
    • 1999.06a
    • /
    • pp.55-55
    • /
    • 1999
  • Imperatoxin A (IpTx$_{a}$), a 3.7 kDa peptide from the African scorpion Pandinus imperator, has been known as an agonist of skeletal ryanodine receptor (RyR). In order to study the structure and function of the toxins on RyR, the IpTx$_{a}$ cDNA was PCR-amplified using 3 pairs of primers and the toxin was expressed in E. coli expression system.(omitted)ted)

  • PDF

Attack Origin Traceback with Advanced Packet Making Mechanism on Ad-Hoc Network (Ad-Hoc 네트웨크에서의 패킷 마킹 기법을 이용한 공격 근원지 역추적 기법)

  • 김길한;이형우
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2004.05a
    • /
    • pp.21-24
    • /
    • 2004
  • Ad Hoc 네트워크는 이동 노드만으로 구성된 자율/수평적 네트워크로서, 이동 노드는 중재자의 도움 없이 능동적인 연결 선정을 통해 무선 네트워크 환경을 제공한다. 이와 같은 Ad Hoc 네트워크에서도 일반적인 유선 기반 네트워크와 동일하게 서비스 거부 공격(DoS)이 가능하다. DDoS은 해킹 공격자가 공격 근원지 IP 주소를 스누핑하여 공격목표로 하는 시스템의 가용자원을 고갈시키거나 과도한 부하를 유발시켜 서비스를 중단시킨다. 이에 대한 대응 기술로 제시된 IP 역추적 기술은 DDoS 공격의 근원지를 판별하고 공격 패킷이 네트워크 상에서 전달된 경로를 재구성하는 기법이다 본 연구에서는 기존의 역추적 기술인 패킷 마킹 기법에서 DDoS 공격에 대한 판별 과정 없이 임의의 패킷에 대해 역추적 정보를 생성 즉 DDoS 공격에 능동적으로 대응하고 있지 못하는 단점에 착안하여 DDoS 공격 패킷에 대해 개선된 패킷 마킹 기법을 제시하고, 또한 TTL을 통하석 스누핑된 IP 근원지를 효율적으로 역추적하는 방안을 제시하였으며. 실험 결과 네트워크 부하를 줄이면서도 역추적 성능을 향상시킬 수 있었다.

  • PDF

The computer power-saving system using DHCP (DHCP를 이용한 컴퓨터 절전 시스템)

  • Kim, Hong-Yoon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.5
    • /
    • pp.75-82
    • /
    • 2009
  • It is possible that gain good effect for saving electric charges by power-saving education to organizer, instead of buying new energy saving computer in the company, school and public organization. But this kind of education needs time very much. And power management system for controling whole computer of organizer is released, but it is hard to set up. In this paper we prevent computers which do not have power shutdown software, from obtaining IP address by DHCP. So we induce organizer to setup power shutdown software.

A pioneer scheme in the detection and defense of DrDoS attack involving spoofed flooding packets

  • Kavisankar, L.;Chellappan, C.;Sivasankar, P.;Karthi, Ashwin;Srinivas, Avireddy
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.5
    • /
    • pp.1726-1743
    • /
    • 2014
  • DDoS (Distributed Denial of Service) has been a continuous threat to the cyber world with the growth in cyber technology. This technical evolution has given rise to a number of ultra-sophisticated ways for the attackers to perform their DDoS attack. In general, the attackers who generate the denial of service, use the vulnerabilities of the TCP. Some of the vulnerabilities like SYN (synchronization) flooding, and IP spoofing are used by the attacker to create these Distributed Reflected Denial of Service (DrDoS) attacks. An attacker, with the assistance of IP spoofing creates a number of attack packets, which reflects the flooded packets to an attacker's intended victim system, known as the primary target. The proposed scheme, Efficient Spoofed Flooding Defense (ESFD) provides two level checks which, consist of probing and non-repudiation, before allocating a service to the clients. The probing is used to determine the availability of the requested client. Non-repudiation is taken care of by the timestamp enabled in the packet, which is our major contribution. The real time experimental results showed the efficiency of our proposed ESFD scheme, by increasing the performance of the CPU up to 40%, the memory up to 52% and the network bandwidth up to 67%. This proves the fact that the proposed ESFD scheme is fast and efficient, negating the impact on the network, victim and primary target.

Mathematics Teachers(算學訓導) and Professors(算學敎授) in Chosen Dynasty (조선(朝鮮)의 산학훈도(算學訓導)와 산학교수(算學敎授))

  • Hong Sung-Sa;Hong Young-Hee
    • Journal for History of Mathematics
    • /
    • v.19 no.3
    • /
    • pp.1-20
    • /
    • 2006
  • The administrative service in Chosun Dynasty relating to mathematics was carried out by the middle class(中人) mathematicians selected by the official selection examination(取才). They belong to HoJo(戶曹) department and their ranks are GyeSa(計士), ByulJe(別提), HunDo(訓導 = mathematics teacher), and GyoSu(敎授 = mathematics professor). We call them SanWon(算員). HunDo and GyoSu played very important role although their ranks are low, for they educate SanWon and manage the official selection examination. Using JuHakSeonSaengAn(籌學先生案, List of mathematics teachers) and JuHakIpGyukAn(籌學入格案, List of successful candidates in the official selection examination for mathematics), we investigate HunDo and GyoSu in Chosun Dynasty.

  • PDF

Coordination of Anti-Spoofing Mechanisms in Partial Deployments

  • An, Hyok;Lee, Heejo;Perrig, Adrian
    • Journal of Communications and Networks
    • /
    • v.18 no.6
    • /
    • pp.948-961
    • /
    • 2016
  • Internet protocol (IP) spoofing is a serious problem on the Internet. It is an attractive technique for adversaries who wish to amplify their network attacks and retain anonymity. Many approaches have been proposed to prevent IP spoofing attacks; however, they do not address a significant deployment issue, i.e., filtering inefficiency caused by a lack of deployment incentives for adopters. To defeat attacks effectively, one mechanism must be widely deployed on the network; however, the majority of the anti-spoofing mechanisms are unsuitable to solve the deployment issue by themselves. Each mechanism can work separately; however, their defensive power is considerably weak when insufficiently deployed. If we coordinate partially deployed mechanisms such that they work together, they demonstrate considerably superior performance by creating a synergy effect that overcomes their limited deployment. Therefore, we propose a universal anti-spoofing (UAS) mechanism that incorporates existing mechanisms to thwart IP spoofing attacks. In the proposed mechanism, intermediate routers utilize any existing anti-spoofing mechanism that can ascertain if a packet is spoofed and records this decision in the packet header. The edge routers of a victim network can estimate the forgery of a packet based on this information sent by the upstream routers. The results of experiments conducted with real Internet topologies indicate that UAS reduces false alarms up to 84.5% compared to the case where each mechanism operates individually.

A Study on MT-Serpent Cryptographic Algorithm Design for the Portable Security System (휴대용 보안시스템에 적합한 MT-Serpent 암호알고리즘 설계에 관한 연구)

  • Lee, Seon-Keun;Jeong, Woo-Yeol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.6
    • /
    • pp.195-201
    • /
    • 2008
  • We proposed that is suitable network environment and wire/wireless communication network, easy of implementation, security level preservation, scalable & reconfigurable to TCP/IP protocol architecture to implement suitable smart card MS-Serpent cryptographic algorithm for smart card by hardware base chip level that software base is not implement. Implemented MT-Serpent cryptosystem have 4,032 in gate counter and 406.2Mbps@2.44MHz in throughput. Implemented MS-Serpent cryptographic algorithm strengthens security vulnerability of TCP/IP protocol to do to rescue characteristic of smart card and though several kind of services are available and keep security about many user in wire/wireless environment, there is important purpose.

  • PDF

A Study regarding IP Traceback designs and security audit data generation. (IP 역추적 설계 및 보안감사 자료생성에 관한 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • KSCI Review
    • /
    • v.15 no.1
    • /
    • pp.53-64
    • /
    • 2007
  • Avoid at damage systems in order to avoid own IP address exposure, and an invader does not attack directly a system in recent hacking accidents at these papers, and use Stepping stone and carry out a roundabout attack. Use network audit Policy and use a CIS, AIAA technique and algorithm, the Sleep Watermark Tracking technique that used Thumbprints Algorithm, Timing based Algorithm, TCP Sequence number at network bases, and Presented a traceback system at TCP bases at log bases, and be at these papers Use the existing algorithm that is not one module in a system one harm for responding to invasion technology develop day by day in order to supplement the disadvantage where is physical logical complexity of configuration of present Internet network is large, and to have a fast technology development speed, and presentation will do an effective traceback system.

  • PDF

A Virtual Environment for Optimal use of Video Analytic of IP Cameras and Feasibility Study (IP 카메라의 VIDEO ANALYTIC 최적 활용을 위한 가상환경 구축 및 유용성 분석 연구)

  • Ryu, Hong-Nam;Kim, Jong-Hun;Yoo, Gyeong-Mo;Hong, Ju-Yeong;Choi, Byoung-Wook
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.29 no.11
    • /
    • pp.96-101
    • /
    • 2015
  • In recent years, researches regarding optimal placement of CCTV(Closed-circuit Television) cameras via architecture modeling has been conducted. However, for analyzing surveillance coverage through actual human movement, the application of VA(Video Analytics) function of IP(Internet Protocol) cameras has not been studied. This paper compares two methods using data captured from real-world cameras and data acquired from a virtual environment. In using real cameras, we develop GUI(Graphical User Interface) to be used as a logfile which is stored hourly and daily through VA functions and to be used commercially for placement of products inside a shop. The virtual environment was constructed to emulate an real world such as the building structure and the camera with its specifications. Moreover, suitable placement of the camera is done by recognizing obstacles and the number of people counted within the camera's range of view. This research aims to solve time and economic constraints of actual installation of surveillance cameras in real-world environment and to do feasibility study of virtual environment.

An Adaptive FEC based Error Control Algorithm for VoIP (VoIP를 위한 적응적 FEC 기반 에러 제어 알고리즘)

  • Choe, Tae-Uk;Jeong, Gi-Dong
    • The KIPS Transactions:PartC
    • /
    • v.9C no.3
    • /
    • pp.375-384
    • /
    • 2002
  • In the current Internet, the QoS of interactive applications is hardly guaranteed because of variable bandwidth, packet loss and delay. Moreover, VoIP which is becoming an important part of the information infra-structure in these days, is susceptible to network packet loss and end-to-end delay. Therefore, it needs error control mechanisms in network level or application level. The FEC-based error control mechanisms are used for interactive audio application such as VoIP. The FEC sends a main information along with redundant information to recover the lost packets and adjusts redundant information depending on network conditions to reduce the bandwidth overhead. However, because most of the error control mechanisms do not consider end-to-end delay but packet loss rate, their performances are poor. In this paper, we propose a new error control algorithm, SCCRP, considering packet loss rate as well as end-to-end delay. Through experiments, we confirm that the SCCRP has a lower packet loss rate and a lower end-to-end delay after reconstruction.