• Title/Summary/Keyword: IP block

Search Result 123, Processing Time 0.02 seconds

DENTAL CHARACTERISTICS OF A PATIENT WITH INCONTINENTIA PIGMENTI : A CASE REPORT (색소실조증 환자의 치과적 특성 : 증례보고)

  • Song, Jihyeo;Lee, Koeun;Song, Je Seon;Lee, Jaeho;Choi, Hyung-Jun
    • The Journal of Korea Assosiation for Disability and Oral Health
    • /
    • v.14 no.2
    • /
    • pp.88-91
    • /
    • 2018
  • Incontinentia pigmenti(IP), or Block-Sulzberger syndrome is a rare X-linked dominant genodermatosis that affects almost in female infant and is usually lethal for males in utero. IP is characterized by four cutaneous stages and is frequently associated with dental, ocular, central nervous system and structural anomalies. Dental problems are congenital missing of teeth, delayed eruption, abnormal crown shape. We reported a case of 5 year-old female with IP. She had congenital missing of multiple primary and permanent teeth, accessory cusp and cone-shaped crowns. Systemically, she had a problem of retina and hyperpigmented macules on her trunk and extremities as typical character of IP. As the syndrome involves many different medical problems and needs comprehensive consideration. Dental care should be performed in a multidisciplinary consultation system.

Detecting gold-farmers' group in MMORPG by analyzing connection pattern (연결패턴 정보 분석을 통한 온라인 게임 내 불량사용자 그룹 탐지에 관한 연구)

  • Seo, Dong-Nam;Woo, Ji-Young;Woo, Kyung-Moon;Kim, Chong-Kwon;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.585-600
    • /
    • 2012
  • Security issues in online games are increasing as the online game industry grows. Real money trading (RMT) by online game users has become a security issue in several countries including Korea because RMT is related to criminal activities such as money laundering or tax evasion. RMT-related activities are done by professional work forces, namely gold-farmers, and many of them employ the automated program, bot, to gain cyber asset in a quick and efficient way. Online game companies try to prevent the activities of gold-farmers using game bots detection algorithm and block their accounts or IP addresses. However, game bot detection algorithm can detect a part of gold-farmer's network and IP address blocking also can be detoured easily by using the virtual private server or IP spoofing. In this paper, we propose a method to detect gold-farmer groups by analyzing their connection patterns to the online game servers, particularly information on their routing and source locations. We verified that the proposed method can reveal gold-farmers' group effectively by analyzing real data from the famous MMORPG.

A Hardware Design of Ultra-Lightweight Block Cipher Algorithm PRESENT for IoT Applications (IoT 응용을 위한 초경량 블록 암호 알고리듬 PRESENT의 하드웨어 설계)

  • Cho, Wook-Lae;Kim, Ki-Bbeum;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.7
    • /
    • pp.1296-1302
    • /
    • 2016
  • A hardware implementation of ultra-lightweight block cipher algorithm PRESENT that was specified as a block cipher standard for lightweight cryptography ISO/IEC 29192-2 is described in this paper. Two types of crypto-core that support master key size of 80-bit are designed, one is for encryption-only function, and the other is for encryption and decryption functions. The designed PR80 crypto-cores implement the basic cipher mode of operation ECB (electronic code book), and it can process consecutive blocks of plaintext/ciphertext without reloading master key. The PR80 crypto-cores were designed in soft IP with Verilog HDL, and they were verified using Virtex5 FPGA device. The synthesis results using $0.18{\mu}m$ CMOS cell library show that the encryption-only core has 2,990 GE and the encryption/decryption core has 3,687 GE, so they are very suitable for IoT security applications requiring small gate count. The estimated maximum clock frequency is 500 MHz for the encryption-only core and 444 MHz for the encryption/decryption core.

Implementation of IPv6 based Virtual Storage System for Mobile Devices and Its Application (IPv6 기반의 모바일용 가상 저장장치 드라이버 구현 및 응용)

  • Lim, Hyo-Taek;Choi, Sae-Bom;Singh, Vinay;Cha, Kyung-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.1
    • /
    • pp.74-82
    • /
    • 2007
  • IPv6 is the internet protocol for next generation which can solve the problem of IPv4 protocol. Mobile IPv6 efficiently provides the mobility for mobile devices holding the properties of IPv6. iSCSI(Internet Small Computer System Interface) is a block-oriented storage access protocol that enables a user to recognize a remote storage as their own local block device through general TCP/IP networks. Since iSCSI uses a standard Ethernet switch and router for this kind of access, it can not only be applized to Ethernet technologies, but can also be used to create a storage networking system without any distance restrictions that can equally be applied to a wireless network environment. Accordingly, this paper presents an alternative approach to overcome the limited storage space of mobile devices based on the IPv6 iSCSI initiator driver which was originally designed for wired networks. Also, this paper describes about the implementation and performance analysis of mobile education service system using virtual storage devices in IPv6 wireless networks.

  • PDF

Implementation & Performance Analysis of Virtual Storage System Based on iSCSI Protocol in Wireless Networks (iSCSI 기반의 무선 네트워크 연결형 가상 저장장치 드라이버 구현 및 성능 분석)

  • Choi Sae-bom;Lim Hyotaek
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6A
    • /
    • pp.517-525
    • /
    • 2005
  • iSCSI(Internet Small Computer System Interface) is a block-oriented storage access protocol that enables a user to recognize a remote storage as their own local block device through general TCP/IP networks. Since iSCSI uses a standard ethernet switch and router for this kind of access, it can not only be applied to ethernet technologies, but can also be used to create a storage networking system without any distance restrictions that can equally be applied to a wireless network environment. Accordingly, focusing on this applicability, this paper presents an alternative approach to overcome the limited storage space of mobile devices based on the iSCSI initiator driver, which was originally designed for wired networks. Additionally, its potential with a wireless network is also evaluated.

A Conceptual Study on the Development of Intelligent Detection Model for the anonymous Communication bypassing the Cyber Defense System (사이버 방어체계를 우회하는 익명통신의 지능형 탐지모델개발을 위한 개념연구)

  • Jung, Ui Seob;Kim, Jae Hyun;Jeong, Chan Ki
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.77-85
    • /
    • 2019
  • As the Internet continues to evolve, cyber attacks are becoming more precise and covert. Anonymous communication, which is used to protect personal privacy, is also being used for cyber attacks. Not only it hides the attacker's IP address but also encrypts traffic, which allows users to bypass the information protection system that most organizations and institutions are using to defend cyber attacks. For this reason, anonymous communication can be used as a means of attacking malicious code or for downloading additional malware. Therefore, this study aims to suggest a method to detect and block encrypted anonymous communication as quickly as possible through artificial intelligence. Furthermore, it will be applied to the defense to detect malicious communication and contribute to preventing the leakage of important data and cyber attacks.

Traffic Extraction and Verification for Attack Detection Experimentation (공격탐지 실험을 위한 네트워크 트래픽 추출 및 검증)

  • Park, In-Sung;Lee, Eun-Young;Oh, Hyung-Geun;Lee, Do-Hoon
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.49-57
    • /
    • 2006
  • Firewall to block a network access of unauthorized IP system and IDS (Intrusion Detection System) to detect malicious code pattern to be known consisted the main current of the information security system at the past. But, with rapid growth the diffusion speed and damage of malicious code like the worm, study of the unknown attack traffic is processed actively. One of such method is detection technique using traffic statistics information on the network viewpoint not to be an individual system. But, it is very difficult but to reserve traffic raw data or statistics information. Therefore, we present extraction technique of a network traffic Raw data and a statistics information like the time series. Also, We confirm the validity of a mixing traffic and show the evidence which is suitable to the experiment.

  • PDF

Dynamic Load Balancing and Network Adaptive Virtual Storage Service for Mobile Appliances

  • Ong, Ivy;Lim, Hyo-Taek
    • Journal of Information Processing Systems
    • /
    • v.7 no.1
    • /
    • pp.53-62
    • /
    • 2011
  • With the steady growth of mobile technology and applications, demand for more storage in mobile devices has also increased. A lightweight block-level protocol, Internet Advanced Technology Attachment (iATA), has been developed to deliver a cost-effective storage network solution for mobile devices to obtain more storage. This paper seeks to contribute to designing and implementing Load Balancing (LB), Network Monitoring (NM) and Write Replication (WR) modules to improve the protocol's scalability and data availability. LB and NM modules are invoked to collect system resources states and current network status at each associate node (server machine). A dynamic weight factor is calculated based on the collected information and sent to a referral server. The referral server is responsible to analyze and allocate the most ideal node with the least weight to serve the client. With this approach, the client can avoid connecting to a heavily loaded node that may cause delays in subsequent in-band I/O operations. Write replication is applied to the remaining nodes through a WR module by utilizing the Unison file synchronization program. A client initially connected to node IP A for write operations will have no hindrances in executing the relevant read operations at node IP B in new connections. In the worst case scenario of a node crashing, data remain recoverable from other functioning nodes. We have conducted several benchmark tests and our results are evaluated and verified in a later section.

A Fast Handover Scheme of Multicast Traffics m PMIPv6 (PMIPv6에서 멀티캐스트 트래픽의 고속핸드오버 방안)

  • Oh, Dong-Kyu;Min, Sang-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.3B
    • /
    • pp.208-213
    • /
    • 2011
  • Since the wireless technologies based on the IP have been developed recently, a variety of mobile services has been proposed. For broadcasting services to utilize network resources efficiently, there is a need to support handover of multicast traffic in mobile networks. In this paper, we add a network function block to solve the tunnel convergence problem, and propose a new fast handover scheme to reduce handover latency for PMIPv6 networks with multicast function. With the simulation result, we show that our fast handover scheme has better performance than the draft in the IETF in the viewpoint of handover latency and multicast service disruption.

Multiplex Distribution Interface Analyzer Using Memory Sharing Techniqyes on Ethernet Mode for DRM/DRM+ Systems (DRM/DRM+ 이더넷모드의 다중화분산접속 설계분석)

  • Woo, Yongje;Kang, Mingoo;Seo, Jeongwook
    • Journal of Internet Computing and Services
    • /
    • v.15 no.2
    • /
    • pp.143-147
    • /
    • 2014
  • In this paper, a novel MDI(Multiplex Distribution Interface) analyzer is designed in Ethernet-mode for DRM(Digital Radio Mondiale), and DRM+(Digital Radio Mondiale Plus) systems. The proposed MDI analyzer can reduce the overload of MDI packets by using memory sharing techniques into a common module block. In consequence, it verifies the received MDI packets by composition information of IP(Internet Protocol) and FAC(Fast Access Channel)/SDC(Service Description Channel) in DRM/DRM+ systems for the next generation digital radio broadcasting systems.