• Title/Summary/Keyword: DoS detection

Search Result 540, Processing Time 0.028 seconds

An Attack Origin Detection Mechanism in IP Traceback Using Marking Algorithm (마킹 알고리듬 기반 IP 역추적에서의 공격 근원지 발견 기법)

  • 김병룡;김수덕;김유성;김기창
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.19-26
    • /
    • 2003
  • Recently, the number of internet service companies is increasing and so is the number of malicious attackers. Damage such as distrust about credit and instability of the service by these attacks may influence us fatally as it makes companies image failing down. One of the frequent and fatal attacks is DoS(Denial-of-Service). Because the attacker performs IP spoofing for hiding his location in DoS attack it is hard to get an exact location of the attacker from source IP address only. and even if the system recovers from the attack successfully, if attack origin has not been identified, we have to consider the possibility that there may be another attack again in near future by the same attacker. This study suggests to find the attack origin through MAC address marking of the attack origin. It is based on an IP trace algorithm, called Marking Algorithm. It modifies the Martins Algorithm so that we can convey the MAC address of the intervening routers, and as a result it can trace the exact IP address of the original attacker. To improve the detection time, our algorithm also contains a technique to improve the packet arrival rate. By adjusting marking probability according to the distance from the packet origin we were able to decrease the number of needed packets to traceback the IP address.

Design Model for Extensible Architecture of Smart Contract Vulnerability Detection Tool

  • Choi, Yun-seok;Lee, Wan Yeon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.189-195
    • /
    • 2020
  • Smart contract, one of the applications of blockchain, is expected to be used in various industries. However, there is risks of damages caused by attacks on vulnerabilities in smart contract codes. Tool support is essential to detect vulnerabilities, and as new vulnerabilities emerge and smart contract implementation languages increase, the tools must have extensibility for them. We propose a design model for extensible architecture of smart contract vulnerability detection tools that detect vulnerabilities in smart contract source codes. The proposed model is composed of design pattern-based structures that provides extensibility to easily support extension of detecting modules for new vulnerabilities and other implementation languages of smart contract. In the model, detecting modules are composed of independent module, so modifying or adding of module do not affect other modules and the system structure.

A study of obstacles detection using RSS(Received Signal Strength) (RSS(Received Signal Strength)를 이용한 장애물 판단에 관한 연구)

  • Hong, Seok Mi
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.321-326
    • /
    • 2013
  • GPS reception rate in the room has less features. To overcome these shortcomings, the AP positioning using RSS technology research and development is being done. If we use positioning technology and signal strength in order to detect a obstacles, it has the advantage of no-cost in terms of utilization and efficiency when we do this applied service. In this paper, We are presented method to determine the obstacles using RSS(Received Signal Strength).

Perception of child abuse and attitudes towards mandatory reporting among dental hygienist (치과위생사의 아동학대 인식 및 신고 의무태도에 관한 연구)

  • Kim, Seon-Yeong
    • Journal of Korean society of Dental Hygiene
    • /
    • v.21 no.5
    • /
    • pp.667-674
    • /
    • 2021
  • Objectives: This study aimed to enhance the role of dental hygienists by identifying perceptions of child abuse, attitude towards reporting obligations, and awareness of the reporting system, and providing basic data for early detection and reporting of child abuse reporting obligations. Methods: From 2021-06-20 to 2021-09-09, 156 dental hygienists working at dental clinics and hospitals in Gwangju and Jeollanam-do were surveyed. Statistical analyses were performed using t-tests, ANOVA, and Pearson's correlation analysis. Results: The points for awareness of child abuse, obligatory reporting attitude, and awareness of mandatory reporting system were found to be 3.52, 3.01, and 2.30, respectively. A significant positive correlation was observed between the negative attitude to report child abuse (r=0.332, p<0.01) and the perception of the mandatory reporting system (r=0.343, p<0.01). Conclusions: This study confirmed that various educational programs and research are needed for the early detection and reporting of child abuse by dental hygienists.

A method for automatically adjusting threshold to improve the intercept pulse detection performance of submarine (잠수함의 방수펄스탐지 성능 향상을 위한 문턱값 자동 조절 방법)

  • Kim, Do-Young;Shin, Kee-Cheol;Eom, Min-Jeong;Kwon, Sung-Chur
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.22 no.4
    • /
    • pp.213-219
    • /
    • 2021
  • The submarine's intercept pulse detection detects pulses radiated from enemy surface ships, submarines, and torpedoes, and performs an important function of providing maneuverability and survivability of submarine. Whether or not the intercept pulse is detected is determined by comparing the size of the received pulse with the threshold value by the operator. In the case of intercept pulses, the intensity of the pulses is frequently reduced under the influence of various environmental factors. In the situation, if detection is performed with a fixed threshold, a non-detection problem occurs and persists until the operator sets a low threshold. In this paper, we proposed method for automatically adjusting threshold to reduce the non-detection problem caused by a fixed threshold. Simulation were preformed on 4 cases with different pulse level fluctuation widths, and it was confirmed that the detection performance was improved by increasing the number of detections when a method for automatically adjusting threshold was applied to all cases. Through the proposed method, it is expected that the intercept pulse detection performance will be improved in the marine environment the large fluctuations in pulse level in the future.

Automatic Detection of Fetal Movement Using M-Mode Ultrasonography (M-Mode 초음파 영상을 이용한 태동의 자동 검출)

  • Kwon, J.H.;Kang, D.J.;Kim, S.B.;Park, M.I.;Kim, Sun-I.
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1998 no.11
    • /
    • pp.179-180
    • /
    • 1998
  • In this paper, we propose an algorithm to detect fetal movements using M-mode ultrasonography. To do this work automatically, we find the crosscorrelation between the current data vector of the depth direction of M-mode image and the previous one. In the crosscorrelation estimator, the variations of time lag $\tau$ at maximum crosscorrelation value means fetal movements. A woman in the 37th week of pregnancy was monitored and the ultrasonic image of fetus was recorded over 20-minute period to detect fetal movements using B-mode and M-mode ultrasonography simultaneously. And the presented method was compared with maternal perception and B-mode ultrasonography observed by clinician. The maternal perception method detected only 57% of all fetal movements observed by clinician. The detection of the presented method corresponds to the clinician's detection result.

  • PDF

Risk assessment of pesticide residues in fruits collected in Gyeonggi-do, Korea from 2006 to 2010 (경기도내 유통 과실류의 잔류농약 위해평가(2006~2010))

  • Do, Young-Sook;Kim, Jung-Beom;Kang, Suk-Ho;Kim, Nan-Young;Um, Mi-Na;Park, Yong-Bae;Oh, Mun-Seok;Yoon, Mi-Hye
    • The Korean Journal of Pesticide Science
    • /
    • v.16 no.2
    • /
    • pp.85-97
    • /
    • 2012
  • The monitoring of pesticide residues was performed on 33 fruit commodities collected in Gyeonggi-do, Korea from 2006 to 2010. Pesticide residues were detected in 431 samples (16.8%) of total 2,558 samples and violated in 12 samples (0.5%). Annual detection rate showed 6.9%~19.4% with the rate of violation of 0.3%~0.9%. Twenty three samples (69.7%) of 33 commodities were detected and 4 samples (12.1%) were violated. Eight pesticides (EPN, dicofol, carbaryl, procymidone, methidathion, prothiofos, fenitrothion and phenthoate) were violated and 62 pesticides were detected. Chloropyrifos was detected most frequently. The rate of detection and violation of citrus fruits in fruits showed the highest level. Organophosphorus pesticides (35%) and insecticide (57%) were detected most frequently. The hazard index (%ADI) of chronic dietary risk assessment by deterministic approach showed that the lower limit value and upper limit value for the whole population were 0.0000~0.7526 and 0.0000~1.3237 respectively. For the only consumer group, the lower limit value and upper limit value were 0.0006~9.7801 and 0.0058~15.9258 respectively. Therefore the hazard index for the whole population and the only consumer group were evaluated as a safe level.

Detection of Face-element for Facial Analysis (표정분석을 위한 얼굴 구성 요소 검출)

  • 이철희;문성룡
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.41 no.2
    • /
    • pp.131-136
    • /
    • 2004
  • According to development of media, various information is recorded in media, expression is one during interesting information. Because expression includes of relationship of human inside. Intention of inside is expressed by gesture, but expression has more information. And, expression can manufacture voluntarily, include plan of inside on the man. Also, expression has unique character in a person, have alliance that do division possibility. In this paper, to analyze expression of USB camera animation, wish to detect facial building block. Because characteristic point by person's expression change exists on face component. For component detection, in animation one frame with Capture, grasp facial position, and separate face area, and detect characteristic points of face component.

Head/Rear Lamp Detection for Stop and Wrong Way Vehicle in the Tunnel (터널 내 정차 및 역주행 차량 인식을 위한 전조등과 후미등 검출 알고리즘)

  • Kim, Gyu-Yeong;Do, Jin-Kyu;Park, Jang-Sik;Kim, Hyun-Tae;Yu, Yun-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.601-602
    • /
    • 2011
  • In this paper, we propose head/rear lamp detection algorithm for stopped and wrong way vehicle recognition. It is shown that our algorithm detected vehicles based on the experimental analysis about the color information of vehicle's lamps. The simulation results show the detection rate about stopped and wrong way vehicles is achieved over 94% and 96% in the tunnel HD(High Definition) video image.

  • PDF

Detection Accuracy Improvement of Hang Region using Kinect (키넥트를 이용한 손 영역 검출의 정확도 개선)

  • Kim, Heeae;Lee, Chang Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.11
    • /
    • pp.2727-2732
    • /
    • 2014
  • Recently, the researches of object tracking and recognition using Microsoft's Kinect are being actively studied. In this environment human hand detection and tracking is the most basic technique for human computer interaction. This paper proposes a method of improving the accuracy of the detected hand region's boundary in the cluttered background. To do this, we combine the hand detection results using the skin color with the extracted depth image from Kinect. From the experimental results, we show that the proposed method increase the accuracy of the hand region detection than the method of detecting a hand region with a depth image only. If the proposed method is applied to the sign language or gesture recognition system it is expected to contribute much to accuracy improvement.