• Title/Summary/Keyword: Dos

Search Result 428, Processing Time 0.027 seconds

Limiting user process method based on PAM against DoS attacks (DoS 공격에 대비한 PAM 기반 사용자 프로세스 제한 기법)

  • Lee, Jae-Ung;Jung, Sung-Jae;Bae, Yu-Mi;Jang, Rae-Young;Soh, Woo-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.309-312
    • /
    • 2016
  • Considering that interkorean relations got worse and worse recently, cyber terror of North Korea has seriously become a possibility. Therefore, DoS(Denial of Service), a typical way of cyber terror, is becoming a big issue. Consequently, people are growing more and more interested in information security. Internal DoS attacks, out of a variety of ways of Dos attacks, include disks and memories and shortages of process resources. PAM(Pluggable Authentication Module) is one of the ways of preventing internal DoS attacks in Linux system. This paper provides with a method to internally respond to dos attacks and efficiently prevent shortages of resources by utilizing PAM.

  • PDF

WAP Abstract Kernel Layer Supporting Multi-platform (다중 플랫폼 지원을 위한 WAP 추상 커널 계층)

  • Gang, Yeong-Man;Han, Sun-Hui;Jo, Guk-Hyeon
    • The KIPS Transactions:PartD
    • /
    • v.8D no.3
    • /
    • pp.265-272
    • /
    • 2001
  • In case of implementing a complicated application like WAP (Wireless Application Protocol) in a mobile terminal with the characteristics of bare machine and versatile kernel aspects of which are control, interrupt and IPC(Inter Process Communication), a special methodology should be needed. If not, it will cause more cost and human resources, even delayed product into launching for the time-to-market. This paper suggests AKL, (Abstract Kernel Layer) for the design and implementation of WAP on basis of multi-platform. AKL is running on the various kernel including REX, MS-DOS, MS-Window, UNIX and LINUX. For the purpose of it, AKL makes machine-dependant features be minimized and supports a consistent interface on API (Application Program Interface) point of view. Therefore, it makes poring times of a device be shorten and makes easy of maintenance. We validated our suggestion as a consequent of porting WAP into PlamV PDA and mobile phone with AKL.

  • PDF

Synthesis and Characterization of 1-DABTR as Insensitive Energetic Plasticizer (둔감 에너지 가소제 1-DABTR의 합성 및 특성 평가)

  • Lee, Woonghee;Kim, Minjun;Park, Youngchul;Lee, Bumjae
    • Journal of the Korean Society of Propulsion Engineers
    • /
    • v.21 no.6
    • /
    • pp.32-38
    • /
    • 2017
  • Plasticizers play roles in increasing plasticity or fluidity during mixing. Representative plasticizers are DOS, DOA, IDP and BTTN. In particular, BTTN is an energy plasticizer that helps propellant performance and is widely used. However these compounds are sensitive relatively. So, in order to develop insensitive energetic plasticizer, synthesis of one of the derivatives of triazole, 4,5-bis (azido methyl)-(1-butyl)-1,2,3-triazole (1-DABTR), was studied. Also, the compound was characterized by NMR, IR spectroscopy, and physicochemical properties such as glass transition temperature, melting point, decomposition temperature, density, viscosity and impact sensitivity were measured. In addition, the heats of formation (${\Delta}H_f$) of 1-DABTR was also calculated using Gaussian 09.

Prevalence of Benign Diseases Mimicking Lung Cancer: Experience from a University Hospital of Southern Brazil

  • Homrich, Gustavo Kohler;Andrade, Cristiano Feijo;Marchiori, Roseane Cardoso;Dos Santos Lidtke, Grazielli;Martins, Fabio Pacheco;Dos Santos, Jose Wellington Alves
    • Tuberculosis and Respiratory Diseases
    • /
    • v.78 no.2
    • /
    • pp.72-77
    • /
    • 2015
  • Background: Lung cancer is the most lethal type of cancer in the world. Several benign lung diseases may mimic lung carcinoma in its clinical and radiological presentation, which makes the differential diagnosis for granulomatous diseases more relevant in endemic regions like Brazil. This study was designed to describe the prevalence and the diagnostic work-up of benign diseases that mimic primary lung cancer in patients hospitalized at a university hospital from south of Brazil. Methods: This was a transversal study, which evaluated the medical records of 1,056 patients hospitalized for lung cancer treatment from September 2003 to September 2013 at University Hospital of Santa Maria. Results: Eight hundred and four patients underwent invasive procedures for suspected primary lung carcinoma. Primary lung cancer was confirmed in 77.4% of the patients. Benign disease was confirmed in 8% of all patients. Tuberculosis (n=14) and paracoccidioidomycosis (n=9) were the most frequent infectious diseases. The diagnosis of benign diseases was obtained by flexible bronchoscopy in 55.6% of the cases and by thoracotomy in 33.4%. Conclusion: Infectious diseases are the most frequent benign diseases mimicking lung cancer at their initial presentation. Many of these cases could be diagnosed by minimally invasive procedures such as flexible bronchoscopy. Benign diseases should be included in the differential diagnosis during the investigation for primary lung cancer in order to avoid higher cost procedures and mortality.

Secure file distribution method using distribution P2P system (분산 P2P 시스템을 활용한 안전한 파일 분산 방안)

  • Kim, Jin-Hong;Kim, Seon-Young;Lee, Yoon-Jin;Jo, In-June
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.545-548
    • /
    • 2005
  • Recently, the computing environment of P2P come out to solve the excessive load of the server in the computing environment of the client/server. Currently, operated computing environment of P2P is mainly spreading out P2P system of read name or anonymity base about a publisher, sender and receiver of the file. But, to the current file protection there is three problem. The first problem is to a host become attack target. The second is to received file loose attack of Brute Force. The third is to define target of attack of DOS. To solve the this problem. it divide file into block unit. Each block is safely scattered peers. This paper propose the distribution P2P system of file division. Both proposing system solve the this problem and promote efficiency of file application.

  • PDF

Development of Real-Time Drought Outlook System in Chungcheongnam-do (충청남도 실시간 가뭄 전망 시스템 개발)

  • Gwon, Yong Hyeon;Kang, Tae Hoon;Jung, Ui Seok;Lee, Byong Ju
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2019.05a
    • /
    • pp.406-406
    • /
    • 2019
  • 최근 전세계적으로 기후변화로 인해 가뭄의 발생 가능성이 높아지고 있으며 그에 대한 인적피해와 경제적 손실로 인한 피해액은 증가하는 추세이다. 특히, 국내의 충남지역은 최근 강수량이 평년대비 75% 수준으로 감소하고 있으며, 지속적인 가뭄이 발생하여 용수 확보에 어려움을 겪고 있다. 또한, 2015년에는 강수량 감소로 인해 보령댐을 상수원으로 사용하고 있는 충남 서북부지역 8개 시군에 용수 공급에 큰 차질이 있었다. 지속적인 가뭄상황이 반복되면서 정부 지자체 공공기관 등에서는 가뭄의 규모 및 단계에 따른 공간적 범위를 표출하는 가뭄 모니터링과 가뭄 전망 시스템을 구축하여 운영하고 있다. 다만 하천과 저수지를 연계하여 지역적 특성을 고려한 중규모 지역에 대한 가뭄전망 시스템은 부족한 실정이다. 이를 해결하고자 하천과 저수지에 대한 실시간 유출 및 물수지 분석기술을 이용하여 미래 무강수 조건에서 일단위 공급가능량, 공급량, 부족량, 잉여공급량, 가뭄위험등급을 전망하는 DOS(Drought Outlook System)을 개발하였다. 본 시스템은 지속적인 가뭄이 발생하고 있는 충남 서북부지역 8개 시군에 대한 436개의 하천유역을 구성하고 129개의 저수지를 대상으로 구축하였다. 기상자료는 기상청 ASOS 일 관측자료를 실시간으로 수집하여 티센법 기반의 436개 유역평균 일단위 강우량과 잠재증발산량을 산정하고 미래 90일에 대해서는 무강우와 평균 잠재증발산량을 적용하였다. TANK 모델과 물수지분석을 통해 과거 400일과 미래 90일에 대한 일단위 하천유량, 저수량, 부족량, 가뭄위험등급 등을 산정하여 매일 14시에 GIS기반 웹시스템에 표출된다. 본 시스템을 통해 하천유역 및 저수지에 대한 미래의 물공급 변화 및 가뭄위험 변화를 판단하고 추정할 수 있으며 추후 타지역 확장을 통해 전국에 대한 가뭄위험을 전망하고 가뭄대책수립에 기여 할 수 있을 것으로 판단된다.

  • PDF

Positioning errors of dental implants and their associations with adjacent structures and anatomical variations: A CBCT-based study

  • Ribas, Beatriz Ribeiro;Nascimento, Eduarda Helena Leandro;Freitas, Deborah Queiroz;Pontual, Andrea dos Anjos;Pontual, Maria Luiza dos Anjos;Perez, Danyel Elias Cruz;Ramos-Perez, Flavia Maria Moraes
    • Imaging Science in Dentistry
    • /
    • v.50 no.4
    • /
    • pp.281-290
    • /
    • 2020
  • Purpose: The objective of the present study was to evaluate the prevalence of dental implants positioning errors and their associations with adjacent structures and anatomical variations by means of cone-beam computed tomography (CBCT). Materials and Methods: CBCT images of 207 patients (584 dental implants) were evaluated by 2 oral radiologists. The distance between the implant and the adjacent teeth/implants was measured and classified as adequate (≥1.5 mm and ≥3 mm, respectively) or inadequate. The presence of thread exposure, cortical perforation, implant dehiscence, implant penetration into adjacent structures, and anatomical variations was also recorded. The incisor canal diameter and the depth of the concavity of the submandibular fossa were measured in order to evaluate their correlations with the frequency of implant penetration in these structures. Descriptive analyses, the Fisher exact test, and Spearman correlation analysis were performed (α=0.05). Results: The overall prevalence of positioning errors was 82.9%. The most common error was the inadequate distance between the implant and the adjacent teeth/implants. The presence of anatomical variations did not significantly influence the overall prevalence of errors (P>0.05). There was a positive correlation between the diameter of the incisor canal and the frequency of implant penetration in this structure (r=0.232, P<0.05). Conclusion: There was a high prevalence of dental implant positioning errors, and positioning errors were not associated with the presence of anatomical variations. Professionals should be aware of the space available for implant placement during the preoperative planning stage.

CFD Study for the Design of Coolant Path in Cryogenic Etch Chuck

  • Jo, Soo Hyun;Han, Ji Hee;Kim, Jong Oh;Han, Hwi;Hong, Sang Jeen
    • Journal of the Semiconductor & Display Technology
    • /
    • v.20 no.2
    • /
    • pp.92-97
    • /
    • 2021
  • The importance of processes in cryogenic environments is increasing in a way to address problems such as critical dimension (CD) narrow and bottlenecks in micro-processing. Accordingly, in this paper, we proceed with the design and analysis of Electrostatic Chuck(ESC) and Coolant in cryogenic environments, and present optimal model conditions to provide the temperature distribution analysis of ESC in these environments and the appropriate optimal design. The wafer temperature uniformity was selected as the reference model that the operating conditions of the refrigerant of the liquid nitrogen in the doubled aluminum path were excellent. Design of simulation (DOS) was carried out based on the wheel settings within the selected reference model and the classification of three mass flow and diameter case, respectively. The comparison between factors with p-value less than 0.05 indicates that the optimal design point is when five turns of coolant have a flow rate of 0.3 kg/s and a diameter of 12 mm. ANOVA determines the interactions between the above factor, indicating that mass flow is the most significant among the parameters of interests. In variable selection procedure, Case 2 was also determined to be superior through the two-Sample T-Test of the mean and variance values by dividing five coolant wheels into two (Case 1 : 2+3, Case 2: 3+2). Finally, heat transfer analysis processes such as final difference method (FDM) and heat transfer were also performed to demonstrate the feasibility and adequacy of the analysis process.

Texture analysis in cone-beam computed tomographic images of medication-related osteonecrosis of the jaw

  • Polyane Mazucatto Queiroz;Karolina Castilho Fardim;Andre Luiz Ferreira Costa;Ricardo Alves Matheus;Sergio Lucio Pereira Castro Lopes
    • Imaging Science in Dentistry
    • /
    • v.53 no.2
    • /
    • pp.109-115
    • /
    • 2023
  • Purpose: The aim of this study was to evaluate changes in the trabecular bone through texture analysis and compare the texture analysis characteristics of different areas in patients with medication-related osteonecrosis of the jaw (MRONJ). Materials and Methods: Cone-beam computed tomographic images of 16 patients diagnosed with MRONJ were used. In sagittal images, 3 regions were chosen: active osteonecrosis(AO); intermediate tissue (IT), which presented a zone of apparently healthy tissue adjacent to the AO area; and healthy bone tissue (HT) (control area). Texture analysis was performed evaluating 7 parameters: secondary angular momentum, contrast, correlation, sum of squares, inverse moment of difference, sum of entropies, and entropy. Data were analyzed using the Kruskal-Wallis test with a significance level of 5%. Results: Comparing the areas of AO, IT, and HT, significant differences (P<0.05) were observed. The IT and AO area images showed higher values for parameters such as contrast, entropy, and secondary angular momentum than the HT area, indicating greater disorder in these tissues. Conclusion: Through texture analysis, changes in the bone pattern could be observed in areas of osteonecrosis. The texture analysis demonstrated that areas visually identified and classified as IT still had necrotic tissue, thereby increasing the accuracy of delimiting the real extension of MRONJ.

Vulnerability Analysis of Remote Multi-Server User Authentication System Based on Smart Card and Dynamic ID (스마트 카드 및 동적 ID 기반 멀티서버 원격 사용자 인증 프로토콜의 취약점 분석)

  • Kwon Soon Hyung;Byeon Hae won;Choi Youn Sung
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.43-52
    • /
    • 2023
  • Many businesses and organizations use smartcard-based user authentication for remote access. In the meantime, through various studies, dynamic ID-based remote user authentication protocols for distributed multi-server environments have been proposed to protect the connection between users and servers. Among them, Qiu et al. proposed an efficient smart card-based remote user authentication system that provides mutual authentication and key agreement, user anonymity, and resistance to various types of attacks. Later, Andola et al. found various vulnerabilities in the authentication scheme proposed by Qiu et al., and overcame the flaws in their authentication scheme, and whenever the user wants to log in to the server, the user ID is dynamically changed before logging in. An improved authentication protocol is proposed. In this paper, by analyzing the operation process and vulnerabilities of the protocol proposed by Andola et al., it was revealed that the protocol proposed by Andola et al. was vulnerable to offline smart card attack, dos attack, lack of perfect forward secrecy, and session key attack.