• Title/Summary/Keyword: Intruder

Search Result 157, Processing Time 0.038 seconds

A Study on the Design of Intruder Tracing System Using Intrusion Method (침입기법을 응용한 침입자 역추적 시스템 설계에 관한 연구)

  • 김효남
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.3
    • /
    • pp.34-39
    • /
    • 2003
  • There have been several researches to trace intruders on the Internet. But, up to now, few of them has shown a satisfactory and practicable result of the study. Recently, a little bit more active methods such as 'counter-attacking' have been considered to be an alternative to solve the problem of hacking, and some people showed a tendency to accept the method as one possible way to protect their systems. And the new intruder-retracing method suggested in this study is an improved AIAA(Autonomous Intrusion Analysis Agent) model which has been achieved by attaching the counter-attacking method to the existing tracing system. In this paper, the automatic intruder-tracking system is proposed, which was achieved through the design of the following three modules, such as the intruder-retracing module, intruder-tracing module and AIAA dispatch module.

  • PDF

Intrusion detection based on the sound field variation of audible frequency band (가청 주파수대 음장 변화 측정 기반 침입 감지 기술)

  • Lee, Sung-Q.;Park, Kang-Ho;Yang, Woo-Seok;Kim, Jong-Dae;Kim, Dae-Sung;Kim, Ki-Hyun;Wang, Se-Myung
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2010.10a
    • /
    • pp.187-192
    • /
    • 2010
  • In this paper, intrusion detection technique based on the sound field variation of audio frequency in the security space is proposed. The sound field formed by sound source can be detected with the microphone when the obstacle or intruder is positioned. The sound field variation due to the intruder is based on the interference of audio wave. With the help of numerical simulation of sound field formations, the increase or decrease of sound pressure level is analyzed not only the obstacle, but also the intruder. Even the microphone is positioned behind the source, sound pressure level can be increase or decrease due to the interference. Frequency response test is performed with Gaussian white noise signal to get the whole frequency response from 0 to half of sampling frequency. There are three security cases. Case 1 is the situation of empty space with and without intruder, case 2 is the situation of blocking obstacle with and without intruder, and case 3 is the situation of side blocking obstacle with and without intruder. At each case, the frequency response is obtained first at the security space without intruder, and second with intruder. From the experiment, intruder size of $50cm{\times}50cm$ can be successfully detected with the proposed technique. Moreover, the case 2 or case 3 bring about bigger sound field variation. It means that the proposed technique have the potential of more credible security sensing in real situation.

  • PDF

Intrusion Detection Based on the Sound Field Variation of Audible Frequency Band (가청 주파수대 음장 변화 측정 기반 침입 감지 기술)

  • Lee, Sung-Q;Park, Kang-Ho;Yang, Woo-Seok;Kim, Jong-Dae;Kim, Dae-Sung;Kim, Ki-Hyun;Wang, Se-Myung
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.21 no.3
    • /
    • pp.212-219
    • /
    • 2011
  • In this paper, intrusion detection technique based on the sound field variation of audio frequency in the security space is proposed. The sound field formed by sound source can be detected with the microphone when the obstacle or intruder is positioned. The sound field variation due to the intruder is mainly caused by the interference of audio wave. With the help of numerical simulation of sound field formations, the increase or decrease of sound pressure level is analyzed not only by the obstacle, but also by the intruder. Even the microphone is positioned behind the source, sound pressure level can be increased or decreased due to the interference of sound wave. Frequency response test is performed with Gaussian white noise signal to get the whole frequency response from 0 to half of sampling frequency. There are three security cases. Case 1 is the situation of empty space with and without intruder, case 2 is the situation of blocking obstacle with and without intruder, and case 3 is the situation of side blocking obstacle with and without intruder. At each case, the frequency response is obtained first at the security space without intruder, and second with intruder. From the experiment, intruder size of diameter of 50 cm pillar can be successfully detected with the proposed technique. Moreover, the case 2 and case 3 bring about bigger sound field variation. It means that the proposed technique have the potential of more credible security guarantee in real situation.

The intruder traceback mechanism based on active networks (액티브 네트워크 기반 침입자 역추적 메커니즘)

  • Lee Young-seok
    • Journal of Internet Computing and Services
    • /
    • v.6 no.1
    • /
    • pp.1-12
    • /
    • 2005
  • Recently, the patterns of cyber attack through internet have been various and have become more complicated and thus it is difficult to detect a network intruder effectively and to response the intrusion quickly. Therefore, It is almost not possible to chase the real location of a network intruder and to isolate the Intruder from network in UDP based DoS or DDoS attacks spoofing source IP address and in TCP based detour connection attacks. In this paper, we propose active security architecture on active network to correspond to various cyber attacks promptly. Security management framework is designed using active technology, and security control mechanism to chase and isolate a network intruder is implemented. We also test the operation of the active security mechanism implemented on test_bed according to several attack scenarios and analyze the experiment results.

  • PDF

Comparative Analysis of the Responses to Intruders with Anxiety-Related Behaviors of Mouse

  • Kim, Sang-Hyeon;Kang, Eun-Chai;Park, Chan-Kyu
    • Animal cells and systems
    • /
    • v.8 no.4
    • /
    • pp.301-306
    • /
    • 2004
  • Anxiety in mice can be measured by behavioral reactivity to social or non-social stressors. These behaviors were compared by performing the resident-intruder test (social) as well as the light-dark transition and open-field tests (non-social) for the FVB, C57BL/6, and BALB/c lines of mouse. The three inbred lines showed significant differences in their responses to intruder mice. Three factors, accounting for about 68% of the total variance, were extracted from the scores obtained from the three behavioral tests. The first two major factors are primarily associated with the anxiety-related behaviors. One includes anxiety behaviors with a locomotive basis, while the other includes defecation measured in both anxiety tests. The third factor explains the three social behaviors, facial investigation, ano-genital investigation, and following, observed in the resident intruder test, although facial investigation is also moderately associated with the second factor. The results indicate that the behavioral responses to an intruder share a component distinct from anxiety-related behaviors.

A Design of Intelligent Surveillance System Based on Mobile Robot and Network Camera (모바일 로봇 및 네트워크 카메라 기반 지능형 감시 시스템 설계)

  • Park, Jung-Hyun;Lee, Min-Young;Sim, Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.4
    • /
    • pp.476-481
    • /
    • 2008
  • The necessity of intelligent surveillance system is gradually considered seriously from the space where the security is important. From this paper will load Network Camera in Mobile Robot based on embedded Linux and Goal is in the system embodiment will be able to track the intruder. From Network Camera uses Wireless Lan transmits an image with server, grasps direction of the intruder used Block Matching algorithms from server, transmits direction information and tracks an intruder. The robot tracks the intruder according to gets the effective image of an intruder. In compliance with this paper the system which is embodied is linked with a different surveillance system and as intelligent surveillance system there is a possibility of becoming worse a reliability.

A Genetic Algorithm-Based Intrusion Detection System

  • Lee, Han H.;Lee, Duk;Kim, Hee S.;Park, Jong U.
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2000.04a
    • /
    • pp.343-346
    • /
    • 2000
  • In this paper, a novel approach to intruder detection is introduced. The approach, based on the genetic algorithms, improved detection rate of the host systems which has traditionally relied on known intruder patterns and host addresses. Rather than making judgments on whether the access is instrusion or not, the systems can continuously monitor systems with categorized security level. With the categorization, when the intruder attempts repeatedly to access the systems, the security level is incrementally escalated. In the simulation of a simple intrusion, it was shown that the current approach improves robustness of the security systems by enhancing detection and flexibility. The evolutionary approach to intruder detection enhances adaptability of the system.

  • PDF

Implementation and Analysis of Digital Signal Processing System for Intruder Detection using the Variations of the Optical Speckle Patterns (광 스페클 패턴 변화를 이용한 침입자 탐지용 디지털 신호처리 시스템 구현 및 성능 분석)

  • 김인수;강진석;김기만
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.15 no.4
    • /
    • pp.360-367
    • /
    • 2004
  • In this paper, we have implemented the digital signal processing system for intruder detection using speckle pattern variation in multi-me optical fiber with hypersensitive and high fidelity. The performance of the implemented system was evaluated by experiments. In order to improve the system performances we applied the adaptive digital filter. In experimental results we could see 96 % intruder detection and 90 % man/car discrimination probability.

Implementation of Autonomous Intrusion Analysis Agent(AIAA) and Tool for using Intruder Retrace (인터넷 해킹피해 시스템자동분석에이젼트(AIAA) 및 침입자 역추적 지원도구 구현)

  • Im, Chae-Ho;Won, Yu-Heon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11S
    • /
    • pp.3410-3419
    • /
    • 1999
  • Autonomous Intrusion Analysis Agent(AIAA) is Incident Response Team staff's tool that scans, analyses, reports and alerts the traces of intrusion based on system logs and intruder's backdoors inside compromised system by IR staff after security incident is reported to the IR team. AIAA is intelligent to recognize to check out who is intruder from all the user accounts and to report the suspected candidates to the master control system in IR team. IR staff who controls AIAA with master system can pick up an intruder from the candidates reported by AIAA agent and review all related summary reports and details including source host's mane, finger information, all illegal behavior and so on. AIAA is moved to compromised system by the staff to investigate the signature of intrusion along the trace of victim hosts and it is also operated in secret mode to detect the further intrusion. AIAA is alive in all victim systems until the incident is closed and IR staff can control AIAA operation and dialogue with AIAA agent in Web interface.

  • PDF

A Study on Detection Characteristic of Fiber Optic ROTDR Sensor for Real-Time Mornitoring (실시간감시를 위한 광섬유 ROTDR센서의 탐지특성 연구)

  • Park, Hyung-Jun;Kim, In-Soo
    • Journal of IKEEE
    • /
    • v.20 no.4
    • /
    • pp.367-372
    • /
    • 2016
  • We Designed and Conduct a study on the basic intrusion detection research for outside intruder, which can determine the location and the weight of an intruder into infrastructure, by using Fiber-Optic ROTDR( Rayleigh Optical Time Domain Reflectometer) sensor, which are buried in the sand, were prepared to respond the intruder effects. The signal of ROTDR was analyzed to confirm the detection performance. The weight could be detected as 4 grades, such as 20kg, 40kg, 60kg, and 80kg. which used long distance fiber for intruder detection on wide area. This sensor was possible for application of real-time monitoring of infrastructures.