• Title/Summary/Keyword: Flooding system

Search Result 431, Processing Time 0.024 seconds

A RealTime DNS Query Analysis System based On the Web (웹 기반 실시간 DNS 질의 분석 시스템)

  • Jang, Sang-Dong
    • Journal of Digital Convergence
    • /
    • v.13 no.10
    • /
    • pp.279-285
    • /
    • 2015
  • In this paper, we present the design and implementation of a realtime DNS Query Analysis System to detect and to protect from DNS attacks. The proposed system uses mirroring to collect data in DMZ, then analizes the collected data. As a result of the analysis, if the proposed system finds attack information, the information is used as a filtering information of firewall. statistic of the collected data is viewed as a realtime monitoring information on the web. To verify the effictiveness of the proposed system, we have built the proposed system and conducted some experiments. As the result, Our proposed system can be used effectively to defend DNS spoofing, DNS flooding attack, DNS amplification attack, can prevent interior network's attackers from attacking and provides realtime DNS query statistic information and geographic information for monitoring DNS query using GeoIP API and Google API. It can be useful information for ICT convergence and the future work.

A study on the Change in the Information Gathering System and Management of the Technical Cooperation (정보환경 변화와 기술협력 관리에 관한 연구)

  • 이진영
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.8 no.1
    • /
    • pp.19-54
    • /
    • 1997
  • This thesis is to study the change in the information gathering system and the management of the technical cooperation. It is on urgent business for an enterprise or a preson to get proper information in modern information flood. To come up with the developed countinues it need to estimate the current world economice condition and to investigate the world economice circumstances. By this investigation we can establish a strategy to get necessary information. Information management will be needed to deal with the flooding new infermations.

  • PDF

Drills for New Irrigation Methods in Xinjiang

  • Ba, Huizhen;Yang, Zhijun
    • Proceedings of the Korean Society for Agricultural Machinery Conference
    • /
    • 1993.10a
    • /
    • pp.239-245
    • /
    • 1993
  • Xinjiang locates on the Middle Eurasia. Droaght features Xinjiang's climate , especially during the spring sowing season. Therefore, efficiency irrigation system is indispensable to Xinjiang farming. Furrow orborder irrigation system has replaced flooding irrigation. In farmland , new irrigation methods have been developed and introduced to more fields. This article introduce tow sowing machines for new irrigation methods. (1) Furrow or border grain drill : (2) On-firm irrigation drill.

  • PDF

Efficient Flooding Algorithm for Mobile P2P Systems using Super Peer (슈퍼피어를 이용한 모바일 P2P시스템을 위한 효율적인 플러딩 알고리즘)

  • Kang, So-Young;Lee, Kwang-Jo;Yang, Sung-Bong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.2
    • /
    • pp.217-221
    • /
    • 2010
  • As the appearances of various new mobile devices and the explosive growth of mobile device users, many researches related to mobile P2P systems have been proceeded actively. In this paper, we propose a new search algorithm for the double-layered super peer system in the mobile environment. For the proposed search algorithm, we divide the entire experiment region into a grid of cells, each of which has the same size. The grid is configured properly by considering the communication range of a mobile device and the number of peers in the system. The proposed search algorithm is a partial flooding search method based on the directions of cells involved with the search. It reduces successfully the network traffic, but shows a low search hit ratio. To enhance the search hit ratio, we introduce a bridge-peer table for a super peer and utilize an n-way search. The experimental results show that the proposed algorithm made an average of 20~30% reduction in the number of message packets over the double-layered system. The success ratio was also improved about 2~5% over the double-layered system.

A Study for the Computer Simulation on the Flood Prevention Function of the Extensive Green Roof in Connection with RCP 8.5 Scenarios (RCP 8.5 시나리오와 연동한 저관리형 옥상녹화시스템의 수해방재 성능에 대한 전산모의 연구)

  • Kim, Tae Han;Park, Sang Yeon;Park, Eun Hee;Jang, Seung Wan
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.17 no.3
    • /
    • pp.1-11
    • /
    • 2014
  • Recently, major cities in Korea are suffering from frequent urban flooding caused by heavy rainfall. Such urban flooding mainly occurs due to the limited design capacity of the current drainage network, which increases the vulnerability of the cities to cope with intense precipitation events brought about by climate change. In other words, it can be interpreted that runoff exceeding the design capacity of the drainage network and increased impervious surfaces in the urban cities can overburden the current drainage system and cause floods. The study presents the green roof as a sustainable solution for this issue, and suggests the pre-design using the LID controls model in SWMM to establish more specific flood prevention system. In order to conduct the computer simulation in connection with Korean climate, the study used the measured precipitation data from Cheonan Station of Korea Meteorological Administration (KMA) and the forecasted precipitation data from RCP 8.5 scenario. As a result, Extensive Green Roof System reduced the peak runoff by 53.5% with the past storm events and by 54.9% with the future storm events. The runoff efficiency was decreased to 4% and 7%. This results can be understood that Extensive Green Roof System works effectively in reducing the peak runoff instead of reducing the total stormwater runoff.

Stateful Virtual Proxy Server for Attack Detection based on SIP Protocol State Monitoring Mechanism (SIP 프로토콜 상태정보 기반 공격 탐지 기능을 제공하는 가상 프록시 서버 설계 및 구현)

  • Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.37-48
    • /
    • 2008
  • VoIP service is a transmission of voice data using SIP protocol on IP based network, The SIP protocol has many advantages such as providing IP based voice communication and multimedia service with cheap communication cost and so on. Therefore the SIP protocol spread out very quickly. But, SIP protocol exposes new forms of vulnerabilities on malicious attacks such as Message Flooding attack and protocol parsing attack. And it also suffers threats from many existing vulnerabilities like on IP based protocol. In this paper, we propose a new Virtual Proxy Server system in front of the existed Proxy Server for anomaly detection of SIP attack and stateful management of SIP session with enhanced security. Based on stateful virtual proxy server, out solution shows promising SIP Message Flooding attack verification and detection performance with minimized latency on SIP packet transmission.

  • PDF

A Secure and Effective Optimal Path Searching Method on Certificate Chains in Mobile Ad hoc NETworks (모바일 애드흑 네트워크의 안전하고 효과적인 치적의 인증경로 탐색 기법)

  • Choi, Sung-Jae;Kim, Yong-Woo;Lee, Hong-Ki;Song, Joo-Seok;Nyang, Dae-Mon
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.310-317
    • /
    • 2005
  • In opposition to conventional networks, mobile ad hoc networks usually do not offer trust about nodes or online access through certificate authorities or centralized servers. But, nodes in those systems need process that can search path as well as trust each other to exchange data in safety For these reasons, traditional security measures that require online trusted authorities or certificate storages are not well-suited for securing ad hoc networks. In this paper, I propose a secure and effective method to search the optimized path using profitable flooding techniques on certificate chains in MANETS(Mobile Ad hoc NETworks). This system includes not only using routing protocols that are generally broadcasting packets but also finding nodes securely and verifing the process through tiust relationships between nodes that are searched.

A Study on the Stability of a Low Freeboard Coastwise Tanker Capsized in Turning (2) -Experimental Examination of the Outward Heel Moment Induced by Flooding of Seawater onto the Deck- (선회중 전복한 저건현 내항 탱커의 복원성에 관한 연구 (2) -갑판상 해수 침입이 경사 모멘트에 미치는 영향에 대한 실험적 조사 -)

  • Lee, Yun-Sok;Kim, Chol-Seong;Lee, Sang-Min
    • Journal of Navigation and Port Research
    • /
    • v.27 no.5
    • /
    • pp.465-471
    • /
    • 2003
  • A coastwise chemical tanker sailing at full speed has capsized during turning in calm water. In the previous paper, we investigated the reasons of the accident by demonstrating the proper correction for the free surface effect of the liquid cargo and the bow-sinkage effect. In this paper, we also carry out model experiments of a transverse pressure under the seawater and an outward heel moment according to the heel angle and rudder angle, on the basis of radius of turning circle, ship's speed and drift angle of model ship occurring in turning. It is also shown that the flooding of seawater onto the deck occurring in turning generated a significant outward heel moment and increased the vertical distance between the center of gravity of the ship and the center of lateral water drag.

A pioneer scheme in the detection and defense of DrDoS attack involving spoofed flooding packets

  • Kavisankar, L.;Chellappan, C.;Sivasankar, P.;Karthi, Ashwin;Srinivas, Avireddy
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.5
    • /
    • pp.1726-1743
    • /
    • 2014
  • DDoS (Distributed Denial of Service) has been a continuous threat to the cyber world with the growth in cyber technology. This technical evolution has given rise to a number of ultra-sophisticated ways for the attackers to perform their DDoS attack. In general, the attackers who generate the denial of service, use the vulnerabilities of the TCP. Some of the vulnerabilities like SYN (synchronization) flooding, and IP spoofing are used by the attacker to create these Distributed Reflected Denial of Service (DrDoS) attacks. An attacker, with the assistance of IP spoofing creates a number of attack packets, which reflects the flooded packets to an attacker's intended victim system, known as the primary target. The proposed scheme, Efficient Spoofed Flooding Defense (ESFD) provides two level checks which, consist of probing and non-repudiation, before allocating a service to the clients. The probing is used to determine the availability of the requested client. Non-repudiation is taken care of by the timestamp enabled in the packet, which is our major contribution. The real time experimental results showed the efficiency of our proposed ESFD scheme, by increasing the performance of the CPU up to 40%, the memory up to 52% and the network bandwidth up to 67%. This proves the fact that the proposed ESFD scheme is fast and efficient, negating the impact on the network, victim and primary target.

Development and Verification of Inundation Modeling with Urban Flooding Caused by the Surcharge of Storm Sewers (도시배수체계와 연계한 내수침수모형의 개발 및 검증)

  • Kim, Ji-Sung;Han, Kun-Yeun;Lee, Chang-Hee
    • Journal of Korea Water Resources Association
    • /
    • v.39 no.12 s.173
    • /
    • pp.1013-1022
    • /
    • 2006
  • Urban flooding is usually caused by the surcharge of storm sewers. For this reason, previous studies on urban flooding are mainly concentrated on the simulation of urban drainage systems. However these approaches that find the pipes which have insufficient drainage capacity are very approximate and unreasonable ways in establishing both flood prevention and flood-loss reduction planning. In this study, a two-dimensional model linked the existing ILLUDAS model is developed to calculate the accurate and resonable solution about urban flood inundation and it is verified by using the simulation of July 2001 flood in Seoul. In the urban area with a small difference of ground elevations, the two-dimensional flood propagation phases must be considered to make a accurate analysis for inundated area and depth. The result of this study can be used to construct fundamental data for a flood control plan and establish a urban flood forecasting/warning system.