• 제목/요약/키워드: Intruder

검색결과 157건 처리시간 0.023초

A Study of Connection Maintenance Techniques using TCP Hijacking

  • 김점구
    • 융합보안논문지
    • /
    • 제14권2호
    • /
    • pp.57-63
    • /
    • 2014
  • 인터넷 사용자의 급증에 따라, 인터넷을 통한 각종 침해사고 역시 크게 증가되고 있다. 이러한 각종 침해사고로부터의 대응 방법으로 해킹을 시도하는 해커의 실제 위치를 실시간으로 추적하는 침입자 역추적 기술에 대한 연구가 활발히 이루어지고 있다. 본 논문에서는 TCP Connection trace-back 시스템에서 사용되는 기법 중에 하나인 패킷 워터마킹 역추적 기법에서 TCP Hijacking 기법을 이용하여 Reply 패킷의 Connection 유지의 어려움을 해결하는 방법을 제시한다.

구조화된 에지정합을 통한 영상 열에서의 이동물체 에지검출 (Moving Object Edge Extraction from Sequence Image Based on the Structured Edge Matching)

  • 안기옥;채옥삼
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2003년도 신호처리소사이어티 추계학술대회 논문집
    • /
    • pp.425-428
    • /
    • 2003
  • Recently, the IDS(Intrusion Detection System) using a video camera is an important part of the home security systems which start gaining popularity. However, the video intruder detection has not been widely used in the home surveillance systems due to its unreliable performance in the environment with abrupt illumination change. In this paper, we propose an effective moving edge extraction algorithm from a sequence image. The proposed algorithm extracts edge segments from current image and eliminates the background edge segments by matching them with reference edge list, which is updated at every frame, to find the moving edge segments. The test results show that it can detect the contour of moving object in the noisy environment with abrupt illumination change.

  • PDF

Percolation Theory-Based Exposure-Path Prevention for 3D-Wireless Sensor Networks Coverage

  • Liu, Xiaoshuang;Kang, Guixia;Zhang, Ningbo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권1호
    • /
    • pp.126-148
    • /
    • 2015
  • Different from the existing works on coverage problems in wireless sensor networks (WSNs), this paper considers the exposure-path prevention problem by using the percolation theory in three dimensional (3D) WSNs, which can be implemented in intruder detecting applications. In this paper, to avoid the loose bounds of critical density, a bond percolation-based scheme is proposed to put the exposure-path problem into a 3D uniform lattice. Within this scheme, the tighter bonds of critical density for omnidirectional and directional sensor networks under random sensor deployment-a 3D Poisson process are derived. Extensive simulation results show that our scheme generates tighter bounds of critical density with no exposure path in 3D WSNs.

의료용 플라스틱광섬유 센서 매트 (Sensor Mat using POF for Medical Application)

  • 최규남
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2007년도 심포지엄 논문집 정보 및 제어부문
    • /
    • pp.363-365
    • /
    • 2007
  • Novel concept of sensor mat and its signal processing method is proposed for patient monitoring in medical application. Proposed sensor mat structure has sensing inner layer which has cross-linked arrangement using plastic optical fiber(POF). Large core diameter of plastic optical fiber behaved as band pass filter by averaging the noise component. caused by unwanted environmental factors. Signal processor followed by sensor output added noise immune performance by filtering out unwanted component. Fail-proof patient breath monitoring scheme was realized by using intelligent decision algorithm. Unlike the conventional approach by using mechanical sensor, which have high sensitivity both to intruder and to environmental noise, our approach provided reliable breath motion detection.

  • PDF

ON EFFICIENT TWO-FLOW ZERO-KNOWLEDGE IDENTIFICATION AND SIGNATURE

  • Lee, Young-Whan
    • Journal of applied mathematics & informatics
    • /
    • 제29권3_4호
    • /
    • pp.869-877
    • /
    • 2011
  • In this paper, we propose an efficient two-flow zero-knowledge blind identification protocol on the elliptic curve cryptographic (ECC) system. A. Saxena et al. first proposed a two-flow blind identification protocol in 2005. But it has a weakness of the active-intruder attack and uses the pairing operation that causes slow implementation in smart cards. But our protocol is secure under such attacks because of using the hash function. In particular, it is fast because we don't use the pairing operation and consists of only two message flows. It does not rely on any underlying signature or encryption scheme. Our protocol is secure assuming the hardness of the Discrete-Logarithm Problem in bilinear groups.

Multifactor Authentication Using a QR Code and a One-Time Password

  • Malik, Jyoti;Girdhar, Dhiraj;Dahiya, Ratna;Sainarayanan, G.
    • Journal of Information Processing Systems
    • /
    • 제10권3호
    • /
    • pp.483-490
    • /
    • 2014
  • In today's world, communication, the sharing of information, and money transactions are all possible to conduct via the Internet, but it is important that it these things are done by the actual person. It is possible via several means that an intruder can access user information. As such, several precautionary measures have to be taken to avoid such instances. The purpose of this paper is to introduce the idea of a one-time password (OTP), which makes unauthorized access difficult for unauthorized users. A OTP can be implemented using smart cards, time-based tokens, and short message service, but hardware based methodologies require maintenance costs and can be misplaced Therefore, the quick response code technique and personal assurance message has been added along with the OTP authentication.

MANET에서 규칙을 기반으로 한 계층형 침입 탐지에 관한 연구 (The Study of Hierarchical Intrusion Detection Based on Rules for MANET)

  • 정혜원
    • 디지털산업정보학회논문지
    • /
    • 제6권4호
    • /
    • pp.153-160
    • /
    • 2010
  • MANET composed mobile nodes without central concentration control like base station communicate through multi-hop route among nodes. Accordingly, it is hard to maintain stability of network because topology of network change at any time owing to movement of mobile nodes. MANET has security problems because of node mobility and needs intrusion detection system that can detect attack of malicious nodes. Therefore, system is protected from malicious attack of intruder in this environment and it has to correspond to attack immediately. In this paper, we propose intrusion detection system based on rules in order to more accurate intrusion detection. Cluster head perform role of monitor node to raise monitor efficiency of packet. In order to evaluate performance of proposed method, we used jamming attack, selective forwarding attack, repetition attack.

Disk Galaxy Warp Formation via Close Encounters

  • 김정환;;윤기윤;배현진;윤석진
    • 천문학회보
    • /
    • 제36권2호
    • /
    • pp.58.1-58.1
    • /
    • 2011
  • We present our N-body simulation study on the disk galaxy warp formation via close encounters. Using a publicly available code Gadget2, we investigate morphological and kinematical structures of disk galaxies while the galaxies are undergoing fly-by encounters with adjacent dark matter halos. In this study, we find that warps can be excited by impulsive encounters and sustained for a few billion years. Most of the warps from the simulation show inclination angles that are comparable to the observations. The creation of warps, their inclination and their lifetimes are governed primarily by the following three parameters: the impact parameter (the minimum distance between two halos), the mass ratio between two galaxies, and the incoming angle of the intruder. We discuss pros and cons about our alternative scenario in comparison with existing explanations.

  • PDF

철도 승강장 선로의 침입자 및 장애물 검지시스템에 관한 연구 (Rail Intruder and Obstacle Detection System for Railway Platform)

  • 김유호;김진철;최권희;편선호;황종규
    • 한국철도학회:학술대회논문집
    • /
    • 한국철도학회 2009년도 춘계학술대회 논문집
    • /
    • pp.872-878
    • /
    • 2009
  • Passenger safety is a primary concern of the railway system. However, dozens of people are killed every year when they accidently fall on to the track from the boarding platform. This is one of the most urgent issues to solve regarding the railway platform. The installation environment, and the blind area problems as well as maintenance and operating costs which are not efficient have to be looked at. To solve these problems, we propose a 3D laser radar sensor based monitoring system for the railway platform. This paper introduces an overview, the detecting method, and the interface with the signalling system in detecting a fallen passenger from the platform using the 3D laser radar sensor.

  • PDF

해킹기법을 응용한 침입자 역추적 시스템 (Intruder Tracing System Using Hacking Methods)

  • 채연주
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2000년도 가을 학술발표논문집 Vol.27 No.2 (3)
    • /
    • pp.352-354
    • /
    • 2000
  • 인터넷에서 해커 등 침입자를 추적하기 위한 방안들이 연구되고 있으나 아직 실용적인 연구성과가 거의 드문 실정이다. 지금까지는 침해사고대응팀(CERT)간의 협력과 상호 정보교류를 통한 대응체계를 통하여 이루어지고 있으나 실제 역추적으로서는 효과적인 방법이 아니며, 에이전트를 이용한 분석방법(AIAA)와 같은 경우도 에이전트의 수동적인 이동이 전제되어야 하는 것이다. 최근 해킹공격에 대한 적극적인 대응 방안으로 역공격 등의 적극적인 방법들이 고려되고 자신의 시스템에 대한 보호방법의 하나로서 받아들여지고 있는 경향이 있으므로 이러한 역공격 방법을 추적시스템에 접목하여 개량된 AIAA 모델로서 침입자 역추적방법을 설계하고 구현하였다. 여기에는 침입자 역공격 모듈과 침입자 미행모듈, AIAA 파견모듈등을 구현하여 자동적인 침입자 추적을 실현하였다.

  • PDF