• Title/Summary/Keyword: DoS detection

Search Result 541, Processing Time 0.026 seconds

An Attack Origin Detection Mechanism in IP Traceback Using Marking Algorithm (마킹 알고리듬 기반 IP 역추적에서의 공격 근원지 발견 기법)

  • 김병룡;김수덕;김유성;김기창
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.19-26
    • /
    • 2003
  • Recently, the number of internet service companies is increasing and so is the number of malicious attackers. Damage such as distrust about credit and instability of the service by these attacks may influence us fatally as it makes companies image failing down. One of the frequent and fatal attacks is DoS(Denial-of-Service). Because the attacker performs IP spoofing for hiding his location in DoS attack it is hard to get an exact location of the attacker from source IP address only. and even if the system recovers from the attack successfully, if attack origin has not been identified, we have to consider the possibility that there may be another attack again in near future by the same attacker. This study suggests to find the attack origin through MAC address marking of the attack origin. It is based on an IP trace algorithm, called Marking Algorithm. It modifies the Martins Algorithm so that we can convey the MAC address of the intervening routers, and as a result it can trace the exact IP address of the original attacker. To improve the detection time, our algorithm also contains a technique to improve the packet arrival rate. By adjusting marking probability according to the distance from the packet origin we were able to decrease the number of needed packets to traceback the IP address.

Design Model for Extensible Architecture of Smart Contract Vulnerability Detection Tool

  • Choi, Yun-seok;Lee, Wan Yeon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.189-195
    • /
    • 2020
  • Smart contract, one of the applications of blockchain, is expected to be used in various industries. However, there is risks of damages caused by attacks on vulnerabilities in smart contract codes. Tool support is essential to detect vulnerabilities, and as new vulnerabilities emerge and smart contract implementation languages increase, the tools must have extensibility for them. We propose a design model for extensible architecture of smart contract vulnerability detection tools that detect vulnerabilities in smart contract source codes. The proposed model is composed of design pattern-based structures that provides extensibility to easily support extension of detecting modules for new vulnerabilities and other implementation languages of smart contract. In the model, detecting modules are composed of independent module, so modifying or adding of module do not affect other modules and the system structure.

A study of obstacles detection using RSS(Received Signal Strength) (RSS(Received Signal Strength)를 이용한 장애물 판단에 관한 연구)

  • Hong, Seok Mi
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.321-326
    • /
    • 2013
  • GPS reception rate in the room has less features. To overcome these shortcomings, the AP positioning using RSS technology research and development is being done. If we use positioning technology and signal strength in order to detect a obstacles, it has the advantage of no-cost in terms of utilization and efficiency when we do this applied service. In this paper, We are presented method to determine the obstacles using RSS(Received Signal Strength).

Perception of child abuse and attitudes towards mandatory reporting among dental hygienist (치과위생사의 아동학대 인식 및 신고 의무태도에 관한 연구)

  • Kim, Seon-Yeong
    • Journal of Korean society of Dental Hygiene
    • /
    • v.21 no.5
    • /
    • pp.667-674
    • /
    • 2021
  • Objectives: This study aimed to enhance the role of dental hygienists by identifying perceptions of child abuse, attitude towards reporting obligations, and awareness of the reporting system, and providing basic data for early detection and reporting of child abuse reporting obligations. Methods: From 2021-06-20 to 2021-09-09, 156 dental hygienists working at dental clinics and hospitals in Gwangju and Jeollanam-do were surveyed. Statistical analyses were performed using t-tests, ANOVA, and Pearson's correlation analysis. Results: The points for awareness of child abuse, obligatory reporting attitude, and awareness of mandatory reporting system were found to be 3.52, 3.01, and 2.30, respectively. A significant positive correlation was observed between the negative attitude to report child abuse (r=0.332, p<0.01) and the perception of the mandatory reporting system (r=0.343, p<0.01). Conclusions: This study confirmed that various educational programs and research are needed for the early detection and reporting of child abuse by dental hygienists.

Facilitating Conditions and the Use of Plagiarism Detection Software by Postgraduates of the University of Ibadan, Oyo State, Nigeria

  • Oluwaseun Jolayemi;Olawale Oyewole;Oluwatosin Oladejo
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.14 no.3
    • /
    • pp.39-57
    • /
    • 2024
  • Plagiarism detection software is beneficial in detecting plagiarism in research works of postgraduate students. Despite the benefits of using plagiarism detection software, studies have revealed that most students, including postgraduates, do not use plagiarism detection software as expected. This could depend on the provision of facilitating conditions like internet connectivity, training opportunities and electricity. Thus, this study examined facilitating conditions and the use of plagiarism detection software among postgraduates of the University of Ibadan, Nigeria. A descriptive survey research design of the correlational type was used for this study, with a population of 2143 postgraduates. The multi-stage random sampling technique was used to determine the sample size of 242. The questionnaire was the research instrument, and data was analysed using descriptive statistics. Results showed that most postgraduates agreed that the university provided facilitating conditions like internet connectivity. The majority of the respondents noted that they used Turnitin monthly. Most of the respondents noted that they used plagiarism detection software to paraphrase their work and check the correctness of the grammar in their documents. The most prominent challenges confronting plagiarism detection software use by most respondents were their inability to afford subscription payment to use the plagiarism detection software and slow internet connectivity. There was a significant positive relationship between facilitating conditions and the use of plagiarism detection software by the postgraduates of the University of Ibadan, Nigeria. Some of the recommendations for the institution's management include leveraging the vast network of alumni willing to give back to the institution and intervening in the provision of internet connectivity and electricity.

A method for automatically adjusting threshold to improve the intercept pulse detection performance of submarine (잠수함의 방수펄스탐지 성능 향상을 위한 문턱값 자동 조절 방법)

  • Kim, Do-Young;Shin, Kee-Cheol;Eom, Min-Jeong;Kwon, Sung-Chur
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.22 no.4
    • /
    • pp.213-219
    • /
    • 2021
  • The submarine's intercept pulse detection detects pulses radiated from enemy surface ships, submarines, and torpedoes, and performs an important function of providing maneuverability and survivability of submarine. Whether or not the intercept pulse is detected is determined by comparing the size of the received pulse with the threshold value by the operator. In the case of intercept pulses, the intensity of the pulses is frequently reduced under the influence of various environmental factors. In the situation, if detection is performed with a fixed threshold, a non-detection problem occurs and persists until the operator sets a low threshold. In this paper, we proposed method for automatically adjusting threshold to reduce the non-detection problem caused by a fixed threshold. Simulation were preformed on 4 cases with different pulse level fluctuation widths, and it was confirmed that the detection performance was improved by increasing the number of detections when a method for automatically adjusting threshold was applied to all cases. Through the proposed method, it is expected that the intercept pulse detection performance will be improved in the marine environment the large fluctuations in pulse level in the future.

Automatic Detection of Fetal Movement Using M-Mode Ultrasonography (M-Mode 초음파 영상을 이용한 태동의 자동 검출)

  • Kwon, J.H.;Kang, D.J.;Kim, S.B.;Park, M.I.;Kim, Sun-I.
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1998 no.11
    • /
    • pp.179-180
    • /
    • 1998
  • In this paper, we propose an algorithm to detect fetal movements using M-mode ultrasonography. To do this work automatically, we find the crosscorrelation between the current data vector of the depth direction of M-mode image and the previous one. In the crosscorrelation estimator, the variations of time lag $\tau$ at maximum crosscorrelation value means fetal movements. A woman in the 37th week of pregnancy was monitored and the ultrasonic image of fetus was recorded over 20-minute period to detect fetal movements using B-mode and M-mode ultrasonography simultaneously. And the presented method was compared with maternal perception and B-mode ultrasonography observed by clinician. The maternal perception method detected only 57% of all fetal movements observed by clinician. The detection of the presented method corresponds to the clinician's detection result.

  • PDF

Risk assessment of pesticide residues in fruits collected in Gyeonggi-do, Korea from 2006 to 2010 (경기도내 유통 과실류의 잔류농약 위해평가(2006~2010))

  • Do, Young-Sook;Kim, Jung-Beom;Kang, Suk-Ho;Kim, Nan-Young;Um, Mi-Na;Park, Yong-Bae;Oh, Mun-Seok;Yoon, Mi-Hye
    • The Korean Journal of Pesticide Science
    • /
    • v.16 no.2
    • /
    • pp.85-97
    • /
    • 2012
  • The monitoring of pesticide residues was performed on 33 fruit commodities collected in Gyeonggi-do, Korea from 2006 to 2010. Pesticide residues were detected in 431 samples (16.8%) of total 2,558 samples and violated in 12 samples (0.5%). Annual detection rate showed 6.9%~19.4% with the rate of violation of 0.3%~0.9%. Twenty three samples (69.7%) of 33 commodities were detected and 4 samples (12.1%) were violated. Eight pesticides (EPN, dicofol, carbaryl, procymidone, methidathion, prothiofos, fenitrothion and phenthoate) were violated and 62 pesticides were detected. Chloropyrifos was detected most frequently. The rate of detection and violation of citrus fruits in fruits showed the highest level. Organophosphorus pesticides (35%) and insecticide (57%) were detected most frequently. The hazard index (%ADI) of chronic dietary risk assessment by deterministic approach showed that the lower limit value and upper limit value for the whole population were 0.0000~0.7526 and 0.0000~1.3237 respectively. For the only consumer group, the lower limit value and upper limit value were 0.0006~9.7801 and 0.0058~15.9258 respectively. Therefore the hazard index for the whole population and the only consumer group were evaluated as a safe level.

Detection of Face-element for Facial Analysis (표정분석을 위한 얼굴 구성 요소 검출)

  • 이철희;문성룡
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.41 no.2
    • /
    • pp.131-136
    • /
    • 2004
  • According to development of media, various information is recorded in media, expression is one during interesting information. Because expression includes of relationship of human inside. Intention of inside is expressed by gesture, but expression has more information. And, expression can manufacture voluntarily, include plan of inside on the man. Also, expression has unique character in a person, have alliance that do division possibility. In this paper, to analyze expression of USB camera animation, wish to detect facial building block. Because characteristic point by person's expression change exists on face component. For component detection, in animation one frame with Capture, grasp facial position, and separate face area, and detect characteristic points of face component.

Head/Rear Lamp Detection for Stop and Wrong Way Vehicle in the Tunnel (터널 내 정차 및 역주행 차량 인식을 위한 전조등과 후미등 검출 알고리즘)

  • Kim, Gyu-Yeong;Do, Jin-Kyu;Park, Jang-Sik;Kim, Hyun-Tae;Yu, Yun-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.601-602
    • /
    • 2011
  • In this paper, we propose head/rear lamp detection algorithm for stopped and wrong way vehicle recognition. It is shown that our algorithm detected vehicles based on the experimental analysis about the color information of vehicle's lamps. The simulation results show the detection rate about stopped and wrong way vehicles is achieved over 94% and 96% in the tunnel HD(High Definition) video image.

  • PDF