• Title/Summary/Keyword: Port Security

Search Result 312, Processing Time 0.025 seconds

An Improved Detection System for the Network Vulnerability Scan Attacks (네트워크 취약점 검색공격에 대한 개선된 탐지시스템)

  • You, Il-Sun;Cho, Kyung-San
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.543-550
    • /
    • 2001
  • In this paper, an improved detection system for the network vulnerability scan attacks is proposed. The proposed system improves the methodology for detecting the network vulnerability scan attacks and provides a global detection and response capability that can counter attacks occurring across an entire network enterprize. Through the simulation, we show that the proposed system can detect vulnerable port attacks, coordinated attacks, slow scans and slow coordinated attacks. We also show our system can achieve more global and hierarchical response to attacks through the correlation between server and agents than a stand-alone system can make.

  • PDF

Protecting Copyright Owners in Nigeria: A Panacea for Intellectual Development

  • Owushi, Emmanuel
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.10 no.1
    • /
    • pp.21-34
    • /
    • 2020
  • The paper looks at protecting copyright owners in Nigeria: a panacea for intellectual development. A descriptive survey design was adopted in carrying out the study. The sample size for the study was 112. Three research objectives guided the study. The study utilized a self-developed questionnaire for data collection. A total of 112 copies of the questionnaire were distributed to librarian and lecturers, out of which 108 copies were duly filled and returned, representing 96.4%. The collected data was arranged in frequency and analyzed using percentage and mean score. The findings revealed that protection of copyright will encourage creators of intellectual works, and that if authors are well remunerated there is likelihood of adequate availability of various publications to meet information needs of Nigerians. The result showed that the right to intellectual properties is one of the ways to encourage intellectual development. The finding revealed that copyright protection provides security for intellectual product and does not negatively affect the availability of intellectual materials. Based on the research findings, it was recommended that owners of intellectual property deserve good earnings for their intellectual works in order to promote Knowledge proliferation and availability so as to meet the reading needs of the citizens at the various levels. The study also recommended that all cases relating to copyright violation in our courts should be summarily dealt with. The study advocated that the provision on the punishment should be reviewed such that it could deter people from infringing on authors rights.

A Study on Rational Methods for Education of Radiocommunication complying with the Acceptance of GMDSS (GMDSS 도입에 따른 전파통신교육의 개선방안)

  • 김기문;박석주;양규식;예병덕
    • Journal of the Korean Institute of Navigation
    • /
    • v.17 no.2
    • /
    • pp.75-106
    • /
    • 1993
  • GMDSS(Global Maritime Distress and Safety system) is a new communication system for the distress and safety at sea which is utilizing the recent advancements in satellite communication and positioning system, digital communication system, computer and microelectronic technology, etc., and will completely substitute the current communication system by 1999. Although the improvements of education for producing qualified Radio Operators as well as the establi-shments of policy for accepting the system are required, the educational institutions and relating administ-rations have not yet prepared the rational and concrete schemes on the educational methods and accepting procedures for the system. In this study, as the result of analyzing the GMDSS, courses of training and relating data, the authors suggested principles for improving the course and contents of education and rational schemes for balan-cing the demand and supply of Radio Operators. The authors expect not only the consequences of this study can be utilized as reference materials for the instruction to ratio communication in the organs of education but also that the following effects can be obtained by the study. 1. Security of distress and safety communication system at sea by the establishment of relating regula-tions. 2. Rationalization of the management of radio communication at sea and improvement of the communi-cation system on the vessel. 3. Upgrading the quality of Radio Operators and presenting schemes for current qualified persons. 4. Activation of industry producing radio instruments. 5. Balance of the demand and supply of Radio Operators and development of shipping industry.

  • PDF

The case study to verify of a network based on router applying an ACL(: Access List) (ACL(: Access list)이 적용된 라우터 기반 네트워크의 검증 사례연구)

  • Kim, No-Whan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.5
    • /
    • pp.491-498
    • /
    • 2016
  • An ACL(: Access List), a list that determines network access, is used for the security of the network. An ACL if applied to a interface of router can filter particular packets. Also it can block or allow the access of certain unauthorized IPs or ports, based on the source address, destination address, and TCP/UDP port. This paper presents a simulation case to verify the effect of a router-based network applying Standard ACL or Extended ACL. The network was created through designing topology and then making a common virtual network using a Packet Tracer.

Implementation of an ASP Upload Component to Comply with RFC 1867 (RFC 1867 규격을 준수하는 ASP 업로드 컴포넌트 설계)

  • Hwang Hyun-Ju;Kang Koo-Hong
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.3
    • /
    • pp.63-74
    • /
    • 2006
  • Recently many ASP applications have been released which enable them to accept, save and manipulate files uploaded with a web browser. The files are uploaded via an HTML POST form using RFC 1867 In particular, the file transfer via the HTTP port is getting more important because of the current Internet security issues. In this paper, we implement a form-based ASP upload component and disclose explicitly most of the main codes. That is, the open source might be helpful to develop the new ASP applications including file upload function in the future. We also show the upload time and CPU usage time of the proposed upload component and compare with the well-known commercial ones, showing the performance metrics of the proposed component are comparable to those of commercial ones.

  • PDF

A Study on the DDoS Defense Algorithm using CFC based on Attack Pattern Analysis of TCP/IP Layers (TCP/IP Layer별 공격패턴 분석에 기반한 CFC를 이용한 DDoS 방어 알고리즘 연구)

  • Seo, Woo Seok;Park, Dea Woo;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.117-130
    • /
    • 2010
  • Paper is on defense for so-called internet crisis, the attack of DDoS (Distributed Denial of Service) which was targeted to the central government ministries, financial sector, and portal sites of chief counties including Korea on June 7th, 2009 as its start. By conducting attack with various DDoS attacking methods in the lab environment and dividing networks targeted by the attack by layers, this paper records and analyzes the chief information for attack, destination information of packets, defense policy setting, and the flow of packet attack with the subjects of the networks separated. This study suggests CFC system using multiple firewalls applying defense policy corresponding to the target layer for ultimate attack and tests it according to the result of analyzing the attack packet information and its amount, log analysis, access recording port, and MAC and IT information, etc. by layers. This article is meaningful in that it analyzes the attack by layers, establishes firewall policy for protecting each layer, and secures accurate mechanism for detect and defense.

Anomaly Detection Method Using Entropy of Network Traffic Distributions (네트워크 트래픽 분포 엔트로피를 이용한 비정상행위 탐지 방법)

  • Kang Koo-Hong;Oh Jin-Tae;Jang Jong-Soo
    • The KIPS Transactions:PartC
    • /
    • v.13C no.3 s.106
    • /
    • pp.283-294
    • /
    • 2006
  • Hostile network traffic is often different from normal traffic in ways that can be distinguished without knowing the exact nature of the attack. In this paper, we propose a new anomaly detection method using inbound network traffic distributions. For this purpose, we first characterize the traffic of a real campus network by the distributions of IP protocols, packet length, destination IP/port addresses, TTL value, TCP SYN packet, and fragment packet. And then we introduce the concept of entropy to transform the obtained baseline traffic distributions into manageable values. Finally, we can detect the anomalies by the difference of entropies between the current and baseline distributions. In particular, we apply the well-known denial-of-service attacks to a real campus network and show the experimental results.

Implementation of UPnP Protocol on the Linux System for Controlling Premises Equipment (구내외 정보통신기기 제어를 위한 Linux System상에서의 UPnP프로토콜 구현)

  • Choi, Dong-Jin
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.19 no.5
    • /
    • pp.103-108
    • /
    • 2005
  • In this article, it has been shown that penises devices such as illumination facilities, heating/cooling systems and security equipment can be controlled even outside premises using UPnP (Universal Plug and Play) applicable to the Internet or cellular phone services. To load UPnP protocol into each device, current manufacturers will be required to port flexible OS (Operating System), that is, Windows or Linux to these premises devices. Furthermore, prospective users want to experience a variety of specific functions based on more standardized and stable network. This study aims to provide application by implementing these functions on the Linux system.

Some Suggestions for the Development of the Nautical Education in Korea Maritime University (한국해기사의 교육개발에 관한 연구 (한국해양대학 승선학과교육의 발전과제))

  • 정세모;김효중;노장주;이상집
    • Journal of the Korean Institute of Navigation
    • /
    • v.8 no.1
    • /
    • pp.71-102
    • /
    • 1984
  • In Korea, the importance of keeping the see transportation facilities and well-trained maritime officers cannot be overemphasized, because of her geographical location and the national security in terms of both political and economical situations. In this paper, some points are suggested for the development of the nautical education in Korea Maritime University: (1) the strict regimental training should be kept as a vital important part of students life and its program should be designed to provide students with leadership training and experience, and to develope in the qualities of responsibilities for good citizenship and self-discipline to overcome hardwork for careers as leaders in Korea maritime industry. And therefore the dormitory and training vessel as essential parts of the educational facilities should be improved both in quality and quantity, (2) the undergraduate course should be extended to more than 5 years so that accredited baccalaureate curriculum and licensing professional education might be well conducted to meet the requirements to cope with the international competition in the facet of seafarers quality, (3) more enlarging the opportunities of incentive payments for students is required so that better qualified applicants can be admitted, (4) finally, a conjugal maritime officer service system should be put into practice in the foresseable furture so that seafarers might live normal family lives while staying at sea.

  • PDF

Network Traffic Classification Based on Deep Learning

  • Li, Junwei;Pan, Zhisong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.11
    • /
    • pp.4246-4267
    • /
    • 2020
  • As the network goes deep into all aspects of people's lives, the number and the complexity of network traffic is increasing, and traffic classification becomes more and more important. How to classify them effectively is an important prerequisite for network management and planning, and ensuring network security. With the continuous development of deep learning, more and more traffic classification begins to use it as the main method, which achieves better results than traditional classification methods. In this paper, we provide a comprehensive review of network traffic classification based on deep learning. Firstly, we introduce the research background and progress of network traffic classification. Then, we summarize and compare traffic classification based on deep learning such as stack autoencoder, one-dimensional convolution neural network, two-dimensional convolution neural network, three-dimensional convolution neural network, long short-term memory network and Deep Belief Networks. In addition, we compare traffic classification based on deep learning with other methods such as based on port number, deep packets detection and machine learning. Finally, the future research directions of network traffic classification based on deep learning are prospected.