• Title/Summary/Keyword: Marking_ID

Search Result 9, Processing Time 0.019 seconds

Hacking Path Retracing Algorithm using Packet Marking (패킷 마킹을 이용한 해킹경로 역추적 알고리즘)

  • 원승영;한승완;서동일;김선영;오창석
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.1
    • /
    • pp.21-30
    • /
    • 2003
  • Retracing schemes using packet marking are currently being studied to protect network resources by isolating DDoS attack. One promising solution is the probabilistic packet marking (PPM). However, PPM can't use ICMP by encoding a mark into the IP identification field. Likewise, it can't identify the original source through a hash function used to encode trace information and reduce the mark size. In addition, the retracing problem overlaps with the result from the XOR operation. An algorithm is therefore proposed to pursue the attacker's source efficiently. The source is marked in a packet using a router ID, with marking information abstracted.

  • PDF

Implementation of commercial digital Forensic Marking systems (디지털 추적표시(For ensic Marking) 시스템 개발)

  • Kim, Jong-An;Kim, Jin-Han;Kim, Jong-Heum
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.142-146
    • /
    • 2007
  • Digital Rights Management (DRM) technology has been widely used for protecting the digital contents over the recent years. But the digital contents protected by DRM are vulnerable to various video memory capture programs when DRM packaged contents are decrypted on the consumers' multimedia devices. To make up for this kind of DRM security holes the Forensic Marking (FM) technology is being deployed into the content protection area. Most leading DRM companies as well as big electronics companies like Thomson and Philips already have commercial FM solutions. Forensic Marking technology uses the digital watermarking to insert the user information such as user id, content playing time and etc. into the decrypted and decoded content at the playback time on the consumer devices. When the content containing watermarked user information (Forensic Mark) is illegally captured and distributed over the Internet, the FM detection system takes out the inserted FM from the illegal contents and informs contents service providers of the illegal hacker's information. In this paper the requirements and test conditions are discussed for the commercial Forensic Marking systems.

  • PDF

A Study on Image Electronic Money based on Watermarking Technique (워터 마킹 기술을 활용한 이미지 전자화폐에 관한 연구)

  • Lee, Jung-Soo;Kim, Whoi-Yul
    • The KIPS Transactions:PartD
    • /
    • v.11D no.6
    • /
    • pp.1335-1340
    • /
    • 2004
  • This study introduces a technology utilizing digital images as electronic money by inserting watermark into the images. Watermarking technology assign contents ID to images and inserts the contents ID into the images in an unnoticeable way. The server that manages the issue and the usage of mage electronic money (called ‘WaterCash’ hereafter) stores issued contents ID to database and manage them as electronic money. WaterCash guarantees anonymity and prevents the forgery and modification of WaterCash based on semi-fragile watermarking technique. In addition, WaterCash is transferable and the illegal use of WaterCash can be prevented based on the watermarking technology. The watermarking .technology used in this paper was designed to be robust to image compression but vulnerable to intentional or non-intentional Image processing.

DDoS Attack Path Retracing Using Router IP Address (라우터 IP주소를 이용한 DDoS 공격경로 역추적)

  • 원승영;구경옥;오창석
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.05a
    • /
    • pp.223-226
    • /
    • 2003
  • The best way in order to protect the system resource front Distributed Denial of Service(DDoS) attack is cut off the source of DDoS attack with path retracing the packet which transferred by attacker. Packet marking method can not use ICMP cause by using IP identifier field as marking field. And in case of increasing the number of router, retracing method using router ID has the size of marking field's increasing problem. In this paper, we propose that retracing method can be available the ICMP using marking field for option field in IP header and the size of making Held do not change even though the number of router is increased using the mark information which value obtained through XOR operation on IP address.

  • PDF

Packet Filtering Architecture Using Statistical Marking against DDoS Attack (DDoS 공격 방지를 위한 통계적 마킹 방법을 이용한 패킷 필터링 구조)

  • Koo, Hee Jeong;Hong, Choong Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1287-1290
    • /
    • 2004
  • 인터넷의 급속한 발전은 지난 수년간 데이터 전송 속도의 고속화, 대용량의 데이터 전송 등을 가져오는 긍정적인 효과를 거두었지만 컴퓨터 시스템의 보안 침해 사고와 같은 역기능 또한 날로 증대되어 그 피해 규모가 점점 심각해지고 있다. 본 논문에서는 IDS의 제어 아래 통계적인 탐지 알고리즘을 이용하여 분산 서비스 거부(DDoS) 공격에 대응할 수 있는 패킷 필터링 구조를 제안한다. 이 구조는 탐지 알고리즘에 의해 DDoS 공격으로 인식된 패킷을 IDS가 탐지하여 필터링 모듈에서 효과적으로 공격을 막을 수 있다.

  • PDF

Treefrog lateral line as a mean of individual identification through visual and software assisted methodologies

  • Kim, Mi Yeon;Borzee, Amael;Kim, Jun Young;Jang, Yikweon
    • Journal of Ecology and Environment
    • /
    • v.41 no.12
    • /
    • pp.345-350
    • /
    • 2017
  • Background: Ecological research often requires monitoring of a specific individual over an extended period of time. To enable non-invasive re-identification, consistent external marking is required. Treefrogs possess lateral lines for crypticity. While these patterns decrease predator detection, they also are individual specific patterns. In this study, we tested the use of lateral lines in captive and wild populations of Dryophytes japonicus as natural markers for individual identification. For the purpose of the study, the results of visual and software assisted identifications were compared. Results: In normalized laboratory conditions, a visual individual identification method resulted in a 0.00 rate of false-negative identification (RFNI) and a 0.0068 rate of false-positive identification (RFPI), whereas Wild-ID resulted in RFNI = 0.25 and RFNI = 0.00. In the wild, female and male data sets were tested. For both data sets, visual identification resulted in RFNI and RFPI of 0.00, whereas the RFNI was 1.0 and RFPI was 0.00 with Wild-ID. Wild-ID did not perform as well as visual identification methods and had low scores for matching photographs. The matching scores were significantly correlated with the continuity of the type of camera used in the field. Conclusions: We provide clear methodological guidelines for photographic identification of D. japonicus using their lateral lines. We also recommend the use of Wild-ID as a supplemental tool rather the principal identification method when analyzing large datasets.

A Study on the Fingerprint Recognition Algorithm Using Enhancement Method of Fingerprint Ridge Structure (지문 융선 구조의 향상기법을 사용한 지문인식 알고리즘에 관한 연구)

  • 정용훈;노정석;이상범
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.4
    • /
    • pp.647-660
    • /
    • 2003
  • The present of state is situation that is realized by necessity of maintenance of public security about great many information is real condition been increasing continually in knowledge info-age been situating in wide field of national defense, public peace, banking, politics, education etc. Also, loss or forgetfulness, and peculation by ID for individual information and number increase of password in Internet called that is sea of information is resulting various social problem. By alternative about these problem, including Biometrics, several authentication systems through sign(Signature), Smart Card, Watermarking technology are developed. Therefore, This paper shows that extract factor that efficiency can get into peculiar feature in physical features for good fingerprint recognition algorithm implementation with old study finding that take advantage of special quality of these fingerprint.

  • PDF

A Design of TNA(Traceback against Network Attacks) Based on Multihop Clustering using the depth of Tree structure on Ad-hoc Networks (애드혹 네트워크 상에 트리구조 깊이를 이용한 다중홉 클러스터링 기반 TNA(Traceback against Network Attacks) 설계)

  • Kim, Ju-Yung;Lee, Byung-Kwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37A no.9
    • /
    • pp.772-779
    • /
    • 2012
  • In the current MANET, DOS or DDOS attacks are increasing, but as MANET has limited bandwidth, computational resources and battery power, the existing traceback mechanisms can not be applied to it. Therefore, in case of traceback techniques being applied to MANET, the resource of each node must be used efficiently. However, in the traceback techniques applied to an existing ad hoc network, as a cluster head which represents all nodes in the cluster area manages the traceback, the overhead of the cluster head shortens each node's life. In addition, in case of multi-hop clustering, as one Cluster head manages more node than one, its problem is getting even worse. This paper proposes TNA(Traceback against Network Attacks) based on multihop clustering using the depth of tree structure in order to reduce the overhead of distributed information management.

A Study on KAN Code ID for Promoting Distribution Information or Agricultural Products (농산물 유통 정보화 촉진을 위한 KAN코드 사용 확대에 관한 연구)

  • Ahn, Seung-Yong;Kang, Kyung-Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.8 no.5
    • /
    • pp.99-117
    • /
    • 2006
  • Consumers keep demanding for diversified high quality products, valuable services and safety. With this in mind, Distribution Industry is being updated rapidly to accomodate this demand. Meanwhile, Distribution Information Technology of agricultural products has been in slow progress with little in-depth studies. In this study, it has been analyzed the usage of Bar code which is the key element for agricultural Distribution Information Technology. The analysis was conducted through a survey utilizing questionnaire covering 5 Hypermarkets(Super-centers) including big 3 companies. Also, Japanese market trends have been studied to visit a Japan Government Organization concerned, GS1 Japan, an Agricultural Cooperative, an Agricultural Wholesale Market, and a Retail Company. If we could use KAN code for all agricultural products, we could collect and analyze the information of price and trade quantity of them. It opens a new era to understand the agricultural products supply and demand easily. This will certainly make a great contribution to the evolution of agricultural products distribution. From this research, it is suggested that collective efforts by suppliers, wholesalers, retailers and Government Officers are needed to make large scale mutual marketing Organizations, which specialize in sending out agricultural products. The Organization is recommended to standardize and pack every final agricultural products, to promote the use of KAN code.