• Title/Summary/Keyword: Network Scanning Tool

Search Result 16, Processing Time 0.026 seconds

Scan Modeling and Performance Analysis for Extensive Terminal Information Identification (광범위한 단말 정보 식별을 위한 스캔 모델링 및 성능 분석)

  • Im, Sun-young;Shin, Seung-hun;Roh, Byeong-hee;Lee, Jung-tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.4
    • /
    • pp.785-790
    • /
    • 2017
  • Network scanning tools typically use port scans to steal information from network terminals and identify vulnerabilities. In particular, Shodan and Censys use a network scanning tool to gather a wide range of terminal information, store it in their database and provide it to the users. In order to prevent such information gathering, it is required to know the scanning methods of Shodan and Censys. However, the scanning model used by Shodan and Censys is not known exactly. Therefore, this paper estimates scanning models of Shodan and Censys and analyzes the performance of each models.

Method of Vulnerability Analysis from Layer Scanning (Layer별 Scanning을 사용한 취약성 분석 방법)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.277-280
    • /
    • 2010
  • Network based on the OSI 7 Layer communication protocol is implemented, and the Internet TCP / IP Layer Based on the vulnerability is discovered and attacked. In this paper, using the programs on the network Layer Scanning conducted by the Layer-by each subsequent vulnerability analysis. Layer by Scanning each vulnerability analysis program to analyze the differences will be studied. Scanning for the studies in the program reflects the characteristics of the Scanning Features of way, and security countermeasures by each Layer is presented. The results of this study was to analyze its vulnerability to hackers and security for defense policy as the data is utilized to enhance the security of the network will contribute.

  • PDF

The Intelligence Algorithm of Semiconductor Package Evaluation by using Scanning Acoustic Tomograph (Scanning Acoustic Tomograph 방식을 이용한 지능형 반도체 평가 알고리즘)

  • Kim J. Y.;Kim C. H.;Song K. S.;Yang D. J.;Jhang J. H.
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 2005.05a
    • /
    • pp.91-96
    • /
    • 2005
  • In this study, researchers developed the estimative algorithm for artificial defects in semiconductor packages and performed it by pattern recognition technology. For this purpose, the estimative algorithm was included that researchers made software with MATLAB. The software consists of some procedures including ultrasonic image acquisition, equalization filtering, Self-Organizing Map and Backpropagation Neural Network. Self-Organizing Map and Backpropagation Neural Network are belong to methods of Neural Networks. And the pattern recognition technology has applied to classify three kinds of detective patterns in semiconductor packages: Crack, Delamination and Normal. According to the results, we were confirmed that estimative algorithm was provided the recognition rates of $75.7\%$ (for Crack) and $83_4\%$ (for Delamination) and $87.2\%$ (for Normal).

  • PDF

Hybrid Neural Networks for Intrusion Detection System

  • Jirapummin, Chaivat;Kanthamanon, Prasert
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.928-931
    • /
    • 2002
  • Network based intrusion detection system is a computer network security tool. In this paper, we present an intrusion detection system based on Self-Organizing Maps (SOM) and Resilient Propagation Neural Network (RPROP) for visualizing and classifying intrusion and normal patterns. We introduce a cluster matching equation for finding principal associated components in component planes. We apply data from The Third International Knowledge Discovery and Data Mining Tools Competition (KDD cup'99) for training and testing our prototype. From our experimental results with different network data, our scheme archives more than 90 percent detection rate, and less than 5 percent false alarm rate in one SYN flooding and two port scanning attack types.

  • PDF

Microstructure of Tool Steel Castings for Cold-Work Die Inserts (냉간금형 인서트(insert)용 주강의 미세조직)

  • Kang, Jun-Yun;Park, Jun-Young;Kim, Hoyoung;Kim, Byunghwan
    • Journal of the Korean Society for Heat Treatment
    • /
    • v.30 no.5
    • /
    • pp.197-206
    • /
    • 2017
  • The microstructure of a high-carbon and high-chromium cast steel (HK700) for cold-work die inserts was analyzed by advanced scanning electron microscopy. A continuous network of primary $M_7C_3$ carbide was developed among austenitic matrix after casting. A small amount of $M_2C$ was added to the carbide network owing to the enrichment of Mo and W during the solidification. After quenching in which the austenitization was performed at $1030^{\circ}C$ and double tempering at $520^{\circ}C$, the network structure of $M_7C_3$ was preserved while most of the matrix was transformed to martensite because of additional carbide precipitation. The $M_2C$ in the as-cast microstructure was also transformed to $M_6C$ due to its instability. The continuous network of coarse carbides owing to the absence of hot-working had little influence on the hardness after quenching and tempering, whereas it resulted in severe brittleness upon flexural loading.

An Automatic Network Vulnerability Analysis System using Multiple Vulnerability Scanners (다양한 취약점 점검 도구를 이용한 자동화된 네트워크 취약점 통합 분석 시스템 설계)

  • Yoon, Jun;Sim, Won-Tae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.2
    • /
    • pp.246-250
    • /
    • 2008
  • This paper presents the design of network vulnerability analysis system which can integrate various vulnerability assessment tools to improve the preciseness of the vulnerability scan result. Manual checking method performed by a security expert is the most precise and safe way. But this is not appropriate for the large-scale network which has a lot of systems and network devices. Therefore automatic scanning tool is recommended for fast and convenient use. The scanning targets may be different according to the kind of vulnerability scanners, or otherwise even for the same scanning target, the scanning items and the scanning results may be different by each vulnerability scanner, Accordingly, there are the cases in which various scanners, instead of a single scanner, are simultaneously utilized with the purpose of complementing each other. However, in the case of simultaneously utilizing various scanners on the large-scale network, the integrative analysis and relevance analysis on vulnerability information by a security manager becomes time-consumable or impossible. The network vulnerability analysis system suggested in this paper provides interface which allows various vulnerability assessment tools to easily be integrated, common policy which can be applied for various tools at the same time, and automated integrative process.

Nano-Resolution Connectomics Using Large-Volume Electron Microscopy

  • Kim, Gyu Hyun;Gim, Ja Won;Lee, Kea Joo
    • Applied Microscopy
    • /
    • v.46 no.4
    • /
    • pp.171-175
    • /
    • 2016
  • A distinctive neuronal network in the brain is believed to make us unique individuals. Electron microscopy is a valuable tool for examining ultrastructural characteristics of neurons, synapses, and subcellular organelles. A recent technological breakthrough in volume electron microscopy allows large-scale circuit reconstruction of the nervous system with unprecedented detail. Serial-section electron microscopy-previously the domain of specialists-became automated with the advent of innovative systems such as the focused ion beam and serial block-face scanning electron microscopes and the automated tape-collecting ultramicrotome. Further advances in microscopic design and instrumentation are also available, which allow the reconstruction of unprecedentedly large volumes of brain tissue at high speed. The recent introduction of correlative light and electron microscopy will help to identify specific neural circuits associated with behavioral characteristics and revolutionize our understanding of how the brain works.

Development of a Cast Tool Steel with Excellent Performance for Application to Cold-Work Press Dies (냉간프레스금형용 고성능 주강 개발)

  • Kang, Jun-Yun;Park, Jun-Young;Kim, Byunghwan;Kim, Hoyoung
    • Journal of the Korean Society for Heat Treatment
    • /
    • v.31 no.6
    • /
    • pp.290-299
    • /
    • 2018
  • The microstructure of a newly developed alloy tool steel (KV1) for casting cold-work press dies was analyzed using advanced scanning electron microscopy. Its mechanical properties and durability in use as piercing inserts were tested. It contained a continuous network structure which originated from the micro-segregation during solidification and was composed of retained austenite and primary carbides. However, after quenching and tempering, its continuity was destroyed due to the decomposition of austenite. The discontinuous spatial distribution and the smaller amount of primary carbide in the network presented KV1 enhanced ductility compared to the common alloy (HK700). The reduced C and Cr, the addition of V resulted in a small amount of primary carbides which primarily consisted of MC, as well as fine and uniform dispersion of precipitates. Owing to these features, KV1 exhibited delayed initiation of chipping when used for piercing inserts.

Study on Collecting Server Information through Banner Grabbing (배너 그래빙을 통한 서버 정보 수집에 관한 연구)

  • Kang, HongGoo;Kim, HyeonHak;Lee, HyunSeung;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1317-1330
    • /
    • 2017
  • To collect server information and construct network map enable us to prevent security breach, prepare for national cyber warfare and make effective policies. In this paper, we analyze well-known network scanners, Nmap and ZMap, and construct network map using banner grabbing. We use multiple threads in order to increase scanning speed and arrange IP lists by specific order to reduce the load on information gathering targets. Also, we applied performance tests to compare the real-time banner grabbing tool with the existing network scanners. As a result, we gathered server information from domestic and overseas servers and derived a risk index based on the collected database. Although there are slight differences among countries, we can identify the risky situation that many users in every country are exposed to several security breaches.

Monitoring of Laser Fusion Cutting Using Acoustic Emission (AE센서를 이용한 레이저 용융 절단 모니터링)

  • 이성환;민헌식;안선응
    • Transactions of the Korean Society of Machine Tool Engineers
    • /
    • v.11 no.3
    • /
    • pp.39-44
    • /
    • 2002
  • As laser cutting process is widely used in industry, an automated on-line process control system has become very important. In this paper, development of a laser cutting monitoring system, which is regarded as the fundamental step toward automation of the process, is presented. Acoustic emission and an artificial neural network were used for the monitoring system. With given process Parameters including laser power and scanning speed the system can predict the suitability of laser beam for the cutting or a stainless steel (STS304) plate.