• Title/Summary/Keyword: Drop attack

Search Result 54, Processing Time 0.024 seconds

Respond System for Low-Level DDoS Attack (저대역 DDoS 공격 대응 시스템)

  • Lee, Hyung-Su;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.10
    • /
    • pp.732-742
    • /
    • 2016
  • This study suggests methods of defense against low-level high-bandwidth DDoS attacks by adding a solution with a time limit factor (TLF) to an existing high-bandwidth DDoS defense system. Low-level DDoS attacks cause faults to the service requests of normal users by acting as a normal service connection and continuously positioning the connected session. Considering this, the proposed method makes it possible for users to show a down-related session by considering it as a low-level DDoS attack if the abnormal flow is detected after checking the amount of traffic. However, the service might be blocked when misjudging a low-level DDoS attack in the case of a communication fault resulting from a network fault, even with a normal connection status. Thus, we made it possible to reaccess the related information through a certain period of blocking instead of a drop through blacklist. In a test of the system, it was unable to block the session because it recognized sessions that are simply connected with a low-level DDoS attack as a normal communication.

The Outcome of Corpus Callosotomy for Intractable Epilepsy : 10 Years Experience of Corpus Callosotomy

  • Seo, Jeong-Suk;Lee, Jong-Ju;Lee, Jung-Kyo;Kang, Jung-Gu;Lee, Sang-Am;Ko, Tae-Sung
    • Journal of Korean Neurosurgical Society
    • /
    • v.39 no.1
    • /
    • pp.16-19
    • /
    • 2006
  • Objective : The purpose of this study is to evaluate the effect of the corpus callosotomy and to elucidate possible prognostic factors. Methods : The cases of 39 patients who underwent corpus callosotomy were reviewed retrospectively. Clinical outcomes were analyzed using Engel's classification, with consideration of various presurgical conditions and the extent of the callosal resection during follow-up more than one year. Results : Satisfactory outcome [Engel's class I, II] was obtained in 20 patients [51%] of 39 patients. In 36 cases with drop attack seizures, the class I, II outcomes were 22 patients [61%]. When the patients were grouped according to the extent of callosal resection, the class I, II outcomes were 50% of the patients with anterior 1/2 or 2/3, 50% of those with anterior 4/5 callosotomy, and 57% of those with total callosotomy, respectively. The mean follow-up period was 34 months [24 to 58 months]. Conclusion : Although it is not statistically significant, the patients who had underwent total callosotomy show better outcomes than those with partial callosotomy. Corpus callosotomy is efficacious in controlling medically intractable epilepsy in appropriately selected patients.

Heat Transfer in a Two Wall Divergent Rectangular Channel with V-Shaped Ribs on One Wall (한 벽면에 V형 리브가 있는 2면 확대 사각채널의 열전달)

  • Lee, Myung-Sung;Ahn, Soo-Whan
    • Journal of Power System Engineering
    • /
    • v.19 no.5
    • /
    • pp.32-37
    • /
    • 2015
  • The present study is to investigates the convective heat transfer characteristics and pressure drop inside the rib-roughened cooling passage of gas turbine blades. The divergent rectangular channel is fabricated with V-shaped ribs on one wall only and the inlet hydraulic diameter to outlet hydraulic diameter ratio($D_{ho}/D_{hi}$) of 1.49 is used. The current investigation has covered a Reynolds number (Re) range of 22,000~75,000, relative roughness height ($e/D_h$) of 0.1~0.2, and rib angle of attack (a) of $30^{\circ}$, $45^{\circ}$, and $60^{\circ}$ for a fixed relative pitch of 10. Results show that the Nusselt numbers are the greatest in the $60^{\circ}$-angled ribs; however, the total friction factors are the highest in the $30^{\circ}$-angled ribs.

A Case of Pial Arteriovenous Fistula with Giant Venous Aneurysm and Multiple Varices Treated with Coil Embolization

  • Oh, Hyuk-Jin;Yoon, Seok-Mann;Kim, Sung-Ho;Shim, Jai-Joon
    • Journal of Korean Neurosurgical Society
    • /
    • v.50 no.3
    • /
    • pp.248-251
    • /
    • 2011
  • Intracranial pial arteriovenous fistulas (AVFs) are rare vascular lesions of the brain. These lesions consist of one or more arterial connection to a single venous channel without true intervening nidus. A 24-year-old woman visited to our hospital because of headache, vomiting, dizziness and memory disturbance that persisted for three days. She complained several times of drop attack because of sudden weakness on both leg. Cerebral angiograms demonstrated a giant venous aneurysm on right frontal lobe beyond the genu of corpus callosum, multiple varices on both frontal lobes fed by azygos anterior cerebral artery, and markedly dilated draining vein into superior sagittal sinus, suggesting single channel pial AVF with multiple varices. Transarterial coil embolization of giant aneurysm and fistulous portion resulted in complete disappearance of pial AVF without complication.

Control Method for the number of check-point nodes in detection scheme for selective forwarding attacks (선택적 전달 공격 탐지 기법에서의 감시 노드 수 제어기법)

  • Lee, Sang-Jin;Cho, Tae-Ho
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.387-390
    • /
    • 2009
  • Wireless Sensor Network (WSN) can easily compromised from attackers because it has the limited resource and deployed in exposed environments. When the sensitive packets are occurred such as enemy's movement or fire alarm, attackers can selectively drop them using a compromised node. It brings the isolation between the basestation and the sensor fields. To detect selective forwarding attack, Xiao, Yu and Gao proposed checkpoint-based multi-hop acknowledgement scheme (CHEMAS). The check-point nodes are used to detect the area which generating selective forwarding attacks. However, CHEMAS has static probability of selecting check-point nodes. It cannot achieve the flexibility to coordinate between the detection ability and the energy consumption. In this paper, we propose the control method for the number fo check-point nodes. Through the control method, we can achieve the flexibility which can provide the sufficient detection ability while conserving the energy consumption.

  • PDF

A Numerical Study on Cavitation Suppression Using Local Cooling

  • Zhang, Yuan-Yuan;Sun, Xiao-Jing;Huang, Dian-Gui
    • International Journal of Fluid Machinery and Systems
    • /
    • v.3 no.4
    • /
    • pp.292-300
    • /
    • 2010
  • This study strives to develop an effective strategy to inhibit cavitation inception on hydrofoils by using local cooling technique. By setting up a temperature boundary condition and cooling a small area on the upper surface of a hydrofoil, the fluid temperature around the cooling surface will be decreased and thereby the corresponding liquid saturation pressure will drop below the lowest absolute pressure within the flow field. Hence, cavitation can never occur. In this paper, a NACA0015 hydrofoil at $4^{\circ}$ angle of attack was numerically investigated to verify the effectiveness of the proposed technique. The CFD results indicate that the cooling temperature and the cooling surface roughness are the critical factors affecting the success of such technique used for cavitation suppression.

Video Watermarking Algorithm using the Frame-dependent Key (프레임에 기반한 키를 이용한 동영상 워터마킹)

  • 안일영;박성한
    • Journal of Broadcast Engineering
    • /
    • v.8 no.4
    • /
    • pp.501-504
    • /
    • 2003
  • In this out watermarking method, a key is determined by quantizing the maximum motion difference between frames. We have a problem the key value for embedding and detection are different in 1 to 3% frames of all frames. This problem can be easily solved by using a new key according to bit error rate of the extracted watermark. Since the watermark is embedded in each frame nth different keys and detected In all the frames, out method is resistant against attacks such as the frame averaging and frame drop.

A Threshold Determining Method for the Dynamic Filtering in Wireless Sensor Networks Using Fuzzy System (동적 여과 프로토콜 적용 센서 네트워크에서의 퍼지 기반 보안 경계 값 결정 기법)

  • Lee, Sang-Jin;Lee, Hae-Young;Cho, Tae-Ho
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.197-200
    • /
    • 2008
  • In most sensor networks, nodes can be easily compromised by adversaries due to hostile environments. Adversaries may use compromised nodes to inject false reports into the sensor networks. Such false report attacks will cause false alarms that can waste real-world response effort, and draining the finite amount of energy resource in the battery-powered network. A dynamic enroute scheme proposed by Yu and Guan can detect and drop such false reports during the forwarding phase. In this scheme, choosing a threshold value is very important, as it trades off between security power and energy consumption. In this paper, we propose a threshold determining method which uses the fuzzy rule-based system. The base station periodically determines a threshold value though the fuzzy rule-based system. The number of cluster nodes, the value of the key dissemination limit, and the remaining energy of nodes are used to determine the threshold value.

  • PDF

Biomechanical Comparative Analysis of Two Goal-kick Motion in Soccer (두 가지 축구 골킥 동작의 운동역학적 비교 분석)

  • Jin, Young-Wan;Shin, Je-Min
    • Korean Journal of Applied Biomechanics
    • /
    • v.15 no.1
    • /
    • pp.29-44
    • /
    • 2005
  • The purpose of this study is to reveal the effects of two different kicks, the drop kick and the punt kick, into the kicking motion, through the kinetic comparative analysis of the kicking motion, which is conducted when one kicks a soccer goal. To grasp kinetic changing factors, which is performed by individual's each body segment, I connected kicking motions, which were analyzed by a two dimension co-ordination, into the personal computer to concrete the digits of it and smoothed by 10Hz. Using the smoothed data, I found a needed kinematical data by inputting an analytical program into the computer. The result of comparative analysis of two kicking motions can be summarized as below. 1. There was not a big difference between the time of the loading phase and the time of the swing phase, which can affect the exact impact and the angle of balls aviation direction. 2. The two kicks were not affected the timing and the velocity of the kicking leg's segment. 3. In the goal kick motion, the maximum velocity timing of the kicking leg's lower segment showed the following orders: the thigh(-0.06sec), the lower leg(-0.05sec), the foot(-0.018sec) in the drop kick, and the thigh(-0.06sec), the lower leg(-0.05sec), the foot(-0.015sec) in the punt kick. It showed that whipping motion increases the velocity of the foot at the time of impact. 4. At the time of impact, there was not a significant difference in the supporting leg's knee and ankle. When one does the punt kick, the subject spreads out his hip joint more at the time of impact. 5. When the impact performed, kicking leg's every segment was similar. Because the height of the ball is higher in the punt kick than in the drop kick, the subject has to stretch the knees more when he kicks a ball, so there is a significant affect on the angle and the distance of the ball's flying. 6. When one performs the drop kick, the stride is 0.02m shorter than the punt kick, and the ratio of height of the drop kick is 0.05 smaller than the punt kick. This difference greatly affects the center of the ball, the supporting leg's location, and the location of the center of gravity with the center of the ball at the time of impact. 7. Right before the moment of the impact, the center of gravity was located from the center of the ball, the height of the drop kick was 0.67m ratio of height was 0.37, and the height of the punt kick was 0.65m ratio of height was 0.36. The drop kick was located more to the back 0.21m ratio of height was 0.12, the punt kick was located more to the back 0.28m ratio of height was 0.16. 8. There was not a significant difference in the absolute angle of incidence and the maximum distance, but the absolute velocity of incidence showed a significant difference. This difference is caused from that whether players have the time to perform of not; the drop kick is used when the players have time to perform, and punt kick is used when the players launch a shifting attack. 9. The surface reaction force of the supporting leg had some relation with the approaching angle. Vertical reaction force (Fz) showed some differences in the two movements(p<0.05). The maximum force of the right and left surface reaction force (Fx) didn't have much differences (p<0.05), but it showed the tendency that the maximum force occurs before the peak force of the front and back surface (Fy) occurs.

Survivability Analysis of MANET Routing Protocols under DOS Attacks

  • Abbas, Sohail;Haqdad, Muhammad;Khan, Muhammad Zahid;Rehman, Haseeb Ur;Khan, Ajab;Khan, Atta ur Rehman
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.9
    • /
    • pp.3639-3662
    • /
    • 2020
  • The network capability to accomplish its functions in a timely fashion under failures and attacks is known as survivability. Ad hoc routing protocols have been studied and extended to various domains, such as Intelligent Transport Systems (ITSs), Unmanned Aerial Vehicles (UAVs), underwater acoustic networks, and Internet of Things (IoT) focusing on different aspects, such as security, QoS, energy. The existing solutions proposed in this domain incur substantial overhead and eventually become burden on the network, especially when there are fewer attacks or no attack at all. There is a need that the effectiveness of these routing protocols be analyzed in the presence of Denial of Service (DoS) attacks without any intrusion detection or prevention system. This will enable us to establish and identify the inherently stable routing protocols that are capable to survive longer in the presence of these attacks. This work presents a DoS attack case study to perform theoretical analysis of survivability on node and network level in the presence of DoS attacks. We evaluate the performance of reactive and proactive routing protocols and analyse their survivability. For experimentation, we use NS-2 simulator without detection or prevention capabilities. Results show that proactive protocols perform better in terms of throughput, overhead and packet drop.