• Title/Summary/Keyword: Intruder

Search Result 157, Processing Time 0.024 seconds

Development of CAN network intrusion detection algorithm to prevent external hacking (외부 해킹 방지를 위한 CAN 네트워크 침입 검출 알고리즘 개발)

  • Kim, Hyun-Hee;Shin, Eun Hye;Lee, Kyung-Chang;Hwang, Yeong-Yeun
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.20 no.2
    • /
    • pp.177-186
    • /
    • 2017
  • With the latest developments in ICT(Information Communication Technology) technology, research on Intelligent Car, Connected Car that support autonomous driving or services is actively underway. It is true that the number of inputs linked to external connections is likely to be exposed to a malicious intrusion. I studied possible security issues that may occur within the Connected Car. A variety of security issues may arise in the use of CAN, the most typical internal network of vehicles. The data can be encrypted by encrypting the entire data within the CAN network system to resolve the security issues, but can be time-consuming and time-consuming, and can cause the authentication process to be carried out in the event of a certification procedure. To resolve this problem, CAN network system can be used to authenticate nodes in the network to perform a unique authentication of nodes using nodes in the network to authenticate nodes in the nodes and By encoding the ID, identifying the identity of the data, changing the identity of the ID and decryption algorithm, and identifying the cipher and certification techniques of the external invader, the encryption and authentication techniques could be detected by detecting and verifying the external intruder. Add a monitoring node to the CAN network to resolve this. Share a unique ID that can be authenticated using the server that performs the initial certification of nodes within the network and encrypt IDs to secure data. By detecting external invaders, designing encryption and authentication techniques was designed to detect external intrusion and certification techniques, enabling them to detect external intrusions.

Design of Interrogator for Airspace Surveillance in Multilateration Systems (항공용 다변측정 감시시스템 적용을 위한 질문기 설계)

  • Koh, Young-Mok;Kim, Su-Hong
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.2
    • /
    • pp.108-115
    • /
    • 2015
  • Multilateration systems are used to provide the position of aircraft in flight or on airport runways. In the multilateration systems, the interrogator is an important transmitter that used to interrogate the airplanes with appropriately scenario in surveillance airspace. Whisper-Shout interrogation sequence, which is one of the key functions of the interrogator, can control airport traffic density when intruder airplanes are coming into the surveillance airspace. Therefore collision chance between airplanes could be reduced and also get highly accurate location of incoming airplane in multilateration systems. In this paper, we developed the interrogator that allows it to transmit Mode A/C and Mode S interrogations which is similar to existing secondary surveillance radar. With appropriately controlled Whisper-Shout sequence in the interrogator, the multilateration systems can avoid synchronous garbling and FRUIT phenomenons caused by receiving multiple responses from a number of airplanes.

Open Based Network Security System Architecture (개방형 네트워크 보안 시스템 구조)

  • Kim, Chang-Su;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.4
    • /
    • pp.643-650
    • /
    • 2008
  • If existing system need to expand security part, the security was established after paying much cost, processing of complicated installation and being patient with inconvenience at user's view because of closed structure. In this thesis, those defects could be overcome by using open security tools and constructing security server, which is firewall of 'bastion' form including proxy server, certification server and so on. Also each security object host comes to decide acceptance or denial where each packet comes from, then determines security level each hosts. Precisely it is possible choosing the packets from bastion host or following at the other policies. Although an intruder enter into inside directly, it is constructed safely because encryption algorithm is applied at communication with security object host. This thesis suggests more flexible, independent and open security system, which improves existing security through systematic linkage between system security and network security.

Integrated Data Structure for Quantum Key Management in Quantum Cryptographic Network (양자암호 통신망에서 양자키 관리를 위한 통합 데이터 구조)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.3-7
    • /
    • 2021
  • In quantum cryptographic communication based on quantum mechanics, each piece of information is loaded onto individual photons and transmitted. Therefore, it is impossible to eavesdrop on only a part, and even if an intruder illegally intercepts a photon and retransmits it to the recipient, it is impossible to send the same information to the photon by the principle of quantum duplication impossible. With the explosive increase of various network-based services, the security of the service is required to be guaranteed, and the establishment of a quantum cryptographic communication network and related services are being promoted in various forms. However, apart from the development of Quantum Key Distribution (QKD) technology, a lot of research is needed on how to provide network-level services using this. In this paper, based on the quantum encryption device, we propose an integrated data structure for transferring quantum keys between various quantum encryption communication network devices and realizing an encrypted transmission environment.

Design of the Personalized User Authentication Systems (개인 맞춤형 사용자 인증 시스템 설계)

  • Kim, Seong-Ryeol
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.143-148
    • /
    • 2018
  • In this paper, we propose a personalized user authentication system (PUAS) that can be used in multiple stages in user authentication by customizing the password keyword to be used in user authentication. The proposal concept is that the user oneself defines the password keyword to be used in user authentication so as to cope with a passive retransmission attack which reuses the password obtained when the server system is accessed in user authentication. The authentication phase is also designed so that it can be expanded in multiple stages in a single step. Also, it is designed to store user-defined password related information in an arbitrary encrypted place in the system, thereby designing to disable the illegal access of the network. Therefore, even if an intruder accesses the system using the proposed system, it is possible to generate personal authentication information by generating a password keyword through unique personal information possessed only by an individual and not know the place where the generated authentication information is stored, It has a strong security characteristic.

Realtime Theft Detection of Registered and Unregistered Objects in Surveillance Video (감시 비디오에서 등록 및 미등록 물체의 실시간 도난 탐지)

  • Park, Hyeseung;Park, Seungchul;Joo, Youngbok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.10
    • /
    • pp.1262-1270
    • /
    • 2020
  • Recently, the smart video surveillance research, which has been receiving increasing attention, has mainly focused on the intruder detection and tracking, and abandoned object detection. On the other hand, research on real-time detection of stolen objects is relatively insufficient compared to its importance. Considering various smart surveillance video application environments, this paper presents two different types of stolen object detection algorithms. We first propose an algorithm that detects theft of statically and dynamically registered surveillance objects using a dual background subtraction model. In addition, we propose another algorithm that detects theft of general surveillance objects by applying the dual background subtraction model and Mask R-CNN-based object segmentation technology. The former algorithm can provide economical theft detection service for pre-registered surveillance objects in low computational power environments, and the latter algorithm can be applied to the theft detection of a wider range of general surveillance objects in environments capable of providing sufficient computational power.

Lynching and Ethics in Faulkner's Fiction (포크너 소설에 나타난 린칭과 윤리의 문제)

  • Hwang, Eunjoo
    • Journal of English Language & Literature
    • /
    • v.54 no.2
    • /
    • pp.281-299
    • /
    • 2008
  • The main purpose of this essay is to suggest that Faulkner's "pro"-lynching letter published in Commercial-Appeal in 1931 does not contradict his antilynching works such as "Dry September," Light in August, Go Down, Moses, and Intruder in the Dust. In the letter, Faulkner writes, "they [lynching mobs] have a way of being right." The remark has been interpreted as the expression of Faulkner's sympathetic attitude toward lynching mobs; however, it can be also seen as Faulkner's observation and criticism of the southern white people's structures of feeling in his time that stubbornly justified lynching as a way to do justice to black people who did "not" deserve to be a legal subject. This essay argues that Faulkner understood that the legislation of anti-lynching law alone could not save black people from the violence of lynching as far as white people believed that black people were not their equals and that lynching was a right means to fulfill social justice. Faulkner's fictions such as Light in August and Go Down, Moses provide moments in which white male characters feel as if they were social others, and their experiences work as an ethical urge for them to stand up for social others. This essay illuminates how Faulkner depicts the process of white male characters' identity formation as a violent break from his strong tie with black friends, how they reverse the process to blur the border again through the experiences of becoming-other, and how the experience of becoming-other has a potentiality to play the role of an ethical agency in stopping the custom of lynching in the South.

Maternal separation in mice leads to anxiety-like/aggressive behavior and increases immunoreactivity for glutamic acid decarboxylase and parvalbumin in the adolescence ventral hippocampus

  • Eu-Gene Kim;Wonseok Chang;SangYep Shin;Anjana Silwal Adhikari;Geun Hee Seol;Dae-Yong Song;Sun Seek Min
    • The Korean Journal of Physiology and Pharmacology
    • /
    • v.27 no.1
    • /
    • pp.113-125
    • /
    • 2023
  • It has been reported that stressful events in early life influence behavior in adulthood and are associated with different psychiatric disorders, such as major depression, post-traumatic stress disorder, bipolar disorder, and anxiety disorder. Maternal separation (MS) is a representative animal model for reproducing childhood stress. It is used as an animal model for depression, and has well-known effects, such as increasing anxiety behavior and causing abnormalities in the hypothalamic-pituitary-adrenal (HPA) axis. This study investigated the effect of MS on anxiety or aggression-like behavior and the number of GABAergic neurons in the hippocampus. Mice were separated from their dams for four hours per day for 19 d from postnatal day two. Elevated plus maze (EPM) test, resident-intruder (RI) test, and counted glutamic acid decarboxylase 67 (GAD67) or parvalbumin (PV) positive cells in the hippocampus were executed using immunohistochemistry. The maternal segregation group exhibited increased anxiety and aggression in the EPM test and the RI test. GAD67-positive neurons were increased in the hippocampal regions we observed: dentate gyrus (DG), CA3, CA1, subiculum, presubiculum, and parasubiculum. PV-positive neurons were increased in the DG, CA3, presubiculum, and parasubiculum. Consistent with behavioral changes, corticosterone was increased in the MS group, suggesting that the behavioral changes induced by MS were expressed through the effect on the HPA axis. Altogether, MS alters anxiety and aggression levels, possibly through alteration of cytoarchitecture and output of the ventral hippocampus that induces the dysfunction of the HPA axis.

Container Vulnerability Intruder Detection Framework based on Memory Trap Technique (메모리 트랩기법을 활용한 컨테이너 취약점 침입 탐지 프레임워크)

  • Choi, Sang-Hoon;Jeon, Woo-Jin;Park, Ki-Woong
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.3
    • /
    • pp.26-33
    • /
    • 2017
  • Recently container technologies have been receiving attention for efficient use of the cloud platform. Container virtualization technology has the advantage of a highly portable, high density when compared with the existing hypervisor. Container virtualization technology, however, uses a virtualization technology at the operating system level, which is shared by a single kernel to run multiple instances. For this reason, the feature of container is that the attacker can obtain the root privilege of the host operating system internal the container. Due to the characteristics of the container, the attacker can attack the root privilege of the host operating system in the container utilizing the vulnerability of the kernel. In this paper, we propose a framework for efficiently detecting and responding to root privilege attacks of a host operating system in a container. This framework uses a memory trap technique to detect changes in a specific memory area of a container and to suspend the operation of the container when it is detected.

The Diversity of Reproductive and Foraging Behaviors on Breeding Season of Eurasian Oystercatcher (Haematopus ostralegus) (검은머리물떼새의 번식행동 및 번식기 섭식행동의 다양성)

  • Yoon, Moo-Boo
    • The Korean Journal of Ecology
    • /
    • v.27 no.6 s.122
    • /
    • pp.383-390
    • /
    • 2004
  • This study was conducted in three sites, Si-Hwa Lake, Dongman and Seoman island and Janguyeop island, from march, 1999 to september, 2002. The behaviors of pre-breeding season, territorial behaviors, reproductive ecology, foraging sites and behaviors, and the competition of reproduction and foods between intraspecific or interspecific of Eurasian Oystercatcher (Haematopus ostralegus) were observed in each studying sites. The breeding of Eurasian Oystercatcher started on the middle of April in Si-Hwa Lake and on the middle of May in Dongman and Seoman island and Janguyeop island. For intension of pair bond on pre-breeding season, Eurasian Oystercatcher foraged with pair and behaved male-female chasing flight behavior. The pair foraged with male and female before copulation. If other pairs and individuals approached in feeding site of pair, this pair attacked them with piping calling and intruder chasing flight. If continuos serial behaviors were not observed, the discrimination of male-female chasing flight and intruder chasing flight was difficult. Territorial behaviors classified four types; butterfly flight, calling behavior, chasing behavior, fight behavior. The important foraging sites in Si-Hwa Lake are the land place in Daeboo island, tidal flat of Bangameori, tidal flat a front of a stationary net for catching fishes and tidal flat a front of a view station for bird watching. Eurasian Oystercatcher foraged at tidal flat on low water of the tide and foraged at feeding sites near island on flood tide in Dongman and Seoman island. Eurasian Oystercater in Janguyeop island usually foraged feeding sites near island, because water level was not different between low water of the tide and flood tide. Eurasian Oystercatcher competed on foods of intraspecific and interspecific. They chased for taking foods by force in feeding sites and drove out intruders in feeding sites. The foods interspecific competition happened with Black-tailed Gull (Larus crassirostris). Eurasian Oystercatcher was robbed of foods and attacked by Black-tailed Gull. The individual of food competition with Black-tailed Gull was low foods intake rate comparison with other feeding sites and this individual flied out other feeding sites.