• Title/Summary/Keyword: DoS detection

Search Result 540, Processing Time 0.032 seconds

Malicious Codes Re-grouping Methods using Fuzzy Clustering based on Native API Frequency (Native API 빈도 기반의 퍼지 군집화를 이용한 악성코드 재그룹화 기법연구)

  • Kwon, O-Chul;Bae, Seong-Jae;Cho, Jae-Ik;Moon, Jung-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.115-127
    • /
    • 2008
  • The Native API is a system call which can only be accessed with the authentication of the administrator. It can be used to detect a variety of malicious codes which can only be executed with the administrator's authority. Therefore, much research is being done on detection methods using the characteristics of the Native API. Most of these researches are being done by using supervised learning methods of machine learning. However, the classification standards of Anti-Virus companies do not reflect the characteristics of the Native API. As a result the population data used in the supervised learning methods are not accurate. Therefore, more research is needed on the topic of classification standards using the Native API for detection. This paper proposes a method for re-grouping malicious codes using fuzzy clustering methods with the Native API standard. The accuracy of the proposed re-grouping method uses machine learning to compare detection rates with previous classifying methods for evaluation.

Morphological Feature Extraction of Microorganisms Using Image Processing

  • Kim Hak-Kyeong;Jeong Nam-Su;Kim Sang-Bong;Lee Myung-Suk
    • Fisheries and Aquatic Sciences
    • /
    • v.4 no.1
    • /
    • pp.1-9
    • /
    • 2001
  • This paper describes a procedure extracting feature vector of a target cell more precisely in the case of identifying specified cell. The classification of object type is based on feature vector such as area, complexity, centroid, rotation angle, effective diameter, perimeter, width and height of the object So, the feature vector plays very important role in classifying objects. Because the feature vectors is affected by noises and holes, it is necessary to remove noises contaminated in original image to get feature vector extraction exactly. In this paper, we propose the following method to do to get feature vector extraction exactly. First, by Otsu's optimal threshold selection method and morphological filters such as cleaning, filling and opening filters, we separate objects from background an get rid of isolated particles. After the labeling step by 4-adjacent neighborhood, the labeled image is filtered by the area filter. From this area-filtered image, feature vector such as area, complexity, centroid, rotation angle, effective diameter, the perimeter based on chain code and the width and height based on rotation matrix are extracted. To prove the effectiveness, the proposed method is applied for yeast Zygosaccharomyces rouxn. It is also shown that the experimental results from the proposed method is more efficient in measuring feature vectors than from only Otsu's optimal threshold detection method.

  • PDF

High Frequency Permeability Measurement of Magnetic Films (자성막의 고주파 투자율 측정)

  • Choi, Hyung;Jang, Kyung-Do;Kwon, Sang-Il
    • Journal of the Korean Magnetics Society
    • /
    • v.5 no.1
    • /
    • pp.71-78
    • /
    • 1995
  • We introduced and compared the two methods, 'figure-8 coil method' and 's-parameter method', to measure high frequency permeability of magnetic films. We made a permeameter by using s-parameter method and discussed about problems and solutions in measuring permeability. We can measure the permeability rapidly and exactly up to 200 MHz with the aid of computer program and the low level permeance detection limit is about $1\mu\textrm{m}$.

  • PDF

The Detection of Signaling Dos on 4G LTE Cellular Network (4G LTE 이동통신망에서의 시그널링 DoS 탐지 기술)

  • Jang, Woung;Kim, Se-Kwon;Oh, Joo-Hyung;Im, Chae-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.146-149
    • /
    • 2013
  • For in recently years, global cellular network service is changing rapidly to 4G. However, the fast introducing of 4G has been going with not enough research about security threat, it could be many kind of vulnerability. Therefore the research about security threat on 4G network is ongoing in external countries, but not sufficient in domestic. particularly in domestic situation of rapidly increased subscribers, The security threats which are hindering stability and usability could make a fatal effect on many users. 4G network should be considered about the feature of mobile network to protect 4G network stable. Mobile network has limited radio resources, it releases the radio resource which is not used in selected time and reallocate when detected the data transmission. Many signaling messages are transferred in the network entities to allocate or release the radio resource. In this paper, it will be introduced the technology to detect signaling DoS traffic hindering the stability and usability of network entities managing the radio resources by huge signaling message from the repetitive wireless connection/release message.

  • PDF

Theoretical Performance Analysis between Attack Prevention Schemes and Attack Mitigation Schemes (공격차단 기법과 공격경감 기법 간 이론적 성능 분석)

  • Ko Kwang-Sun;Eom Young-Ik
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.84-92
    • /
    • 2006
  • To defeat abnormal traffic driven by DoS (Denial-of-Service) or DDoS (Distributed DoS), there has been a variety of researches or studies in a few decades. In this paper, we present the results of theoretical performance analysis between attack prevention schemes and attack mitigation schemes. The former is a scheme that prevents abnormal incoming traffic from forwarding into a specific network based on filtering rules, and the latter is a scheme that makes some perimeter or intermediate routers, which exist on the traffic forwarding path, prevent abnormal traffic based on their own abnormal traffic information, or that mitigates abnormal traffic by using quality-of-service mechanisms at the gateway of the target network. The aspects of theoretical performance analysis are defined as the transit rates of either normal traffic or false-positive traffic after an attack detection routine processes its job, and we also present the concrete network bandwidth rates to control incoming traffic.

A Study on Worm Detection Algorithm Using Network Traffic Analysis (네트워크 트래픽 분석을 통한 웜 탐지방법에 관한 연구)

  • Noh Dae-Jong;Noh Tea-Yol;Park Seung-Seob
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.521-524
    • /
    • 2006
  • 인터넷 사용의 급증과 함께 Code-Red나 Slammer와 같은 웜이 급격히 확산 되고 있으며 네트워크를 통해 스스로 전파되면서 네트워크 자원을 고갈시킴으로써 문제가 더욱 심각해지고 있다. 이에 따라 웜을 탐지하기 위한 많은 방법들이 제시되었다. 본 논문에서는 DoS 탐지를 위해 고안 된 트래픽 비율 분석법을 이용하여 정상 네트워크와 웜이 발생 시키는 스캐닝 관련 행위에 대한 패킷 비율을 비교하였다. 이 방법을 통해 네트워크 내에서 웜에 감염된 호스트를 찾아내고 오탐지율을 최소화하는 방법과 웜 전파 행위를 탐지해 내는 방법에 대해서 제안한다. 또한 실제 네트워크에서 수집된 트래픽으로부터 웜의 특성을 분석해 본 결과 최근 웜들의 전파방식을 분석 할 수 있었다.

  • PDF

Review of S/W Test Automation Tools for the Improvement of the Software Quality (소프트웨어 품질 향상을 위한 테스트 자동화 도구에 관한 동향분석)

  • Jeong Seung-Hwan;Lee Keum-Suk;Kim Gi-Jong
    • Proceedings of the KSR Conference
    • /
    • 2004.06a
    • /
    • pp.1477-1478
    • /
    • 2004
  • Science the change of development methods and environment of the software is rapidly kept going in industry, previous manual test methods will not be able to guarantee the quality of software. Therefore the software test automation tools is being developed actively. And many of the tools which is reliable is applied and used in domestic organizations. Indirect test techniques currently are used For the improvement of the software quality, such as formal specification and design, structural programming. And also the various do direct test techniques are used to the measurement of software quality through the fault detection and modification, such as black box, which box and test automation tools. In this survey, the software test automation tools which predicate and access the software quality at the software development phase for the improvement of the software quality should be introduced.

  • PDF

New Rectangle Feature Type Selection for Real-time Facial Expression Recognition (실시간 얼굴 표정 인식을 위한 새로운 사각 특징 형태 선택기법)

  • Kim Do Hyoung;An Kwang Ho;Chung Myung Jin;Jung Sung Uk
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.12 no.2
    • /
    • pp.130-137
    • /
    • 2006
  • In this paper, we propose a method of selecting new types of rectangle features that are suitable for facial expression recognition. The basic concept in this paper is similar to Viola's approach, which is used for face detection. Instead of previous Haar-like features we choose rectangle features for facial expression recognition among all possible rectangle types in a 3${\times}$3 matrix form using the AdaBoost algorithm. The facial expression recognition system constituted with the proposed rectangle features is also compared to that with previous rectangle features with regard to its capacity. The simulation and experimental results show that the proposed approach has better performance in facial expression recognition.

Automatic Face Identification System Using Adaptive Face Region Detection and Facial Feature Vector Classification

  • Kim, Jung-Hoon;Do, Kyeong-Hoon;Lee, Eung-Joo
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.1252-1255
    • /
    • 2002
  • In this paper, face recognition algorithm, by using skin color information of HSI color coordinate collected from face images, elliptical mask, fratures of face including eyes, nose and mouth, and geometrical feature vectors of face and facial angles, is proposed. The proposed algorithm improved face region extraction efficacy by using HSI information relatively similar to human's visual system along with color tone information about skin colors of face, elliptical mask and intensity information. Moreover, it improved face recognition efficacy with using feature information of eyes, nose and mouth, and Θ1(ACRED), Θ2(AMRED) and Θ 3(ANRED), which are geometrical face angles of face. In the proposed algorithm, it enables exact face reading by using color tone information, elliptical mask, brightness information and structural characteristic angle together, not like using only brightness information in existing algorithm. Moreover, it uses structural related value of characteristics and certain vectors together for the recognition method.

  • PDF

Pathogenicity of Iridovirus against Marine Fish and Its Detection in Culturing Seawater (Iridovirus의 해산 양식어류에 대한 병원성과 사육수에서의 검출)

  • Jeong, Joon-Bum;Jeong, Hyun-Do
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.41 no.1
    • /
    • pp.20-25
    • /
    • 2008
  • The susceptibility of five different marine fish to iridovirus IVS-1 infection was analyzed and found a higher the cumulative mortality in the order of rock bream (Oplegnathus fasciatus), red sea bream (Pagrus major), sea perch (Lateolabrax sp.), rockfish (Sebastes schlegeli) and black porgy (Acanthopagrus schlegeli). However, the concentrations of virus in the infected spleens of these species did not differ significantly. To determine the release of iridovirus from infected fish into culturing seawater, rock bream were challenged with iridovirus IVS-1 and the concentration of virus in the water was analyzed using PCR. Over the 10 days of the analysis, the linear relationship between the number of dead fish and viral DNA concentration found in culturing seawater should be considered direct evidence of horizontal iridovirus transmission.