• Title/Summary/Keyword: Port Users

Search Result 235, Processing Time 0.027 seconds

Anomaly Detection Model based on Network using the Session Patterns (세션 패턴을 이용한 네트워크기반의 비정상 탐지 모델)

  • Park Soo-Jin;Choi Yong-Rak
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.719-724
    • /
    • 2004
  • Recently, since the number of internet users is increasing rapidly and, by using the public hacking tools, general network users can intrude computer systems easily, the hacking problem is getting more serious. In order to prevent the intrusion, it is needed to detect the sign in advance of intrusion in a positive prevention by detecting the various foms of hackers' intrusion trials to know the vulnerability of systems. The existing network-based anomaly detection algorithms that cope with port- scanning and the network vulnerability scans have some weakness in intrusion detection. they can not detect slow scans and coordinated scans. therefore, the new concept of algorithm is needed to detect effectively the various forms of abnormal accesses for intrusion regardless of the intrusion methods. In this paper, SPAD(Session Pattern Anomaly Detector) is presented, which detects the abnormal service patterns by comparing them with the ordinary normal service patterns.

A Study on the Security Threats of IoT Devices Exposed in Search Engine (검색엔진에 노출된 IoT 장치의 보안 위협에 대한 연구)

  • Han, Kyong-Ho;Lee, Seong-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.1
    • /
    • pp.128-134
    • /
    • 2016
  • IoT devices including smart devices are connected with internet, thus they have security threats everytime. Particularly, IoT devices are composed of low performance MCU and small-capacity memory because they are miniaturized, so they are likely to be exposed to various security threats like DoS attacks. In addition, in case of IoT devices installed for a remote place, it's not easy for users to control continuously them and to install immediately security patch for them. For most of IoT devices connected directly with internet under user's intention, devices exposed to outside by setting IoT gateway, and devices exposed to outside by the DMZ function or Port Forwarding function of router, specific protocol for IoT services was used and the devices show a response when services about related protocol are required from outside. From internet search engine for IoT devices, IP addresses are inspected on the basis of protocol mainly used for IoT devices and then IP addresses showing a response are maintained as database, so that users can utilize related information. Specially, IoT devices using HTTP and HTTPS protocol, which are used at usual web server, are easily searched at usual search engines like Google as well as search engine for the sole IoT devices. Ill-intentioned attackers get the IP addresses of vulnerable devices from search engine and try to attack the devices. The purpose of this study is to find the problems arisen when HTTP, HTTPS, CoAP, SOAP, and RestFUL protocols used for IoT devices are detected by search engine and are maintained as database, and to seek the solution for the problems. In particular, when the user ID and password of IoT devices set by manufacturing factory are still same or the already known vulnerabilities of IoT devices are not patched, the dangerousness of the IoT devices and its related solution were found in this study.

Design and Implementation of a Network Packet Scanner based on Multi-Platform (멀티 플랫폼 기반의 네트워크 패킷 스캐너 설계 및 구현)

  • Lee, Woo-In;Yang, Hae-Sool
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.3
    • /
    • pp.101-112
    • /
    • 2010
  • The recent trend of the hacking deals with all the IT infrastructure related to the profit of the companies. Presently, they attack the service itself, the source of the profit, while they tried to access to the service infrastructure through the non-service port in the past. Although they affect the service directly, it is difficult to block them with the old security solution or the old system and they threaten more and more companies with the demand of money menacing the protection of customers and the sustainable management. This paper aims to design and implement multi-platform network packet scanner targeting the exception handling network intrusion detection system which determines normal, abnormal by traffic. Linux and unix have the various network intrusion detection and packet management tools like ngrep, snort, TCPdump, but most of them are based on CUI (Character based User Interface) giving users discomfort who are not used to it. The proposed system is implemented based on GUI(Graphical User Interface) to support the intuitive and easy-to-use interface to users, and using Qt(c++) language that supports multi-platform to run on any operating system.

A Study on the Designation of MIPO Emergency Ancho (미포항 비상정박지 지정에 관한 연구)

  • Lee, Yun-Sok;Kim, Jong-Sung;Park, Jun-Mo;Yun, Gwi-Ho
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.18 no.4
    • /
    • pp.316-322
    • /
    • 2012
  • In the port of Ulsan with the area of harbor limit of $83km^2$, 25,432 vessels have been entering annually and only 35 vessels can anchor simultaneously at the anchorage. The area of harbor limit of Ulsan constitutes just 65 percent compared to $127.5km^2$ which is an average of main ports in Korea. In this regard, the port of Ulsan needs to expand the area of anchorages inevitably for enhancing the efficiency of port operation. To select the best anchorage area in Mipo harbor with the introduction of a concept of emergency anchorage, this study analyzed the safety of navigation and anchorage, and safety management, etc. in the prospected anchorage on the basis of the marine traffic survey observing traffic density. Furthermore, after drawing preliminary and final schemes through gathering the opinions from maritime users, safety management organizations and academic experts group, the best arrangement of emergency anchorage has been selected through the conference of interested parties. Then, the final scheme was also verified through figuring out the marine traffic system and carrying out the ship handling simulation.

A Study on the Service Quality Analysis and the Difference Between User Groups in Bulk Terminals of Busan Port (벌크터미널 서비스품질 분석 및 이용주체별 차이에 관한 연구: 부산항 벌크터미널을 중심으로)

  • Lee, Kyung-Nam;Yang, Han-Na;Wang, Gao-Feng;Shin, Chang-Hoon
    • Journal of Navigation and Port Research
    • /
    • v.40 no.4
    • /
    • pp.223-230
    • /
    • 2016
  • While marine transport freight is steadily increasing, people are more interested in terminals handling cargo. But the domestic researches on terminals were almost on container terminal. This study attempted to study the service quality for bulk terminals. The users of bulk terminal services were divided into shipowners and shippers to compare their differences by using bulk terminal service provided. During the attributions proposed in this study, Tangibles were descripted by the numbers of berth or depth, facilities, and so on. So it was suitable to consider the tangibles by formative indicators. And also this study has tried using "reflective model" and "formative model" to make a measurement model for comprehensive analyses. The results showed that all of the items were significant except the relation between empathy and performance satisfaction in the overall measurement model analyses. User groups difference analyses results have showed that the trust responsiveness impact on performance satisfaction was more importantly assessed by shippers than by shipowners. It was expected to use the results of this study as a good strategic resource to help bulk terminal administrators make various expansion plans to improve the bulk terminal's competitiveness in the future.

A Study on the Proper Location and Scale of Bridges Crossing navigable Waterways Considering the Safety of Marine Traffic (해상교통안전을 고려한 해상교량의 적정 위치 및 규모에 관한 연구)

  • Lee, Yun-Sok;Park, Young-Soo;Lee, Un;Jung, Chang-Hyun;Park, Jin-Soo
    • Journal of Navigation and Port Research
    • /
    • v.33 no.5
    • /
    • pp.295-301
    • /
    • 2009
  • Recently, considerable number of bridges crossing over navigable waterways are under construction for the connection of coastal islands with mainland and the optimization of logistic system However, the most planned bridges have been initiated without paying much attention to ships safety aspects but with great emphasis on the economic factors, it has often been confronted with difficult social issues arising from opposing views and conflicts between building bodies and affected port users. The main reason for the conflicts is the lack of standards or specifications on the bridge design The proper location and scale of sea bridges are suggested in this paper considering fairway design criteria of both domestic and foreign countries, status analysis on the designs of existing and planned bridges, investigation findings of bridge-related marine accidents, the views of pilots and navigators collected through questionnaire. Since there is no general domestic or international design rules on bridge's scale, the design standards proposed in this paper may be useful at initial design stage of bridge.

Analysis of LDC Message Reception Performance of Korean eLoran Pilot Service according to Modulation Methods (첨단 지상파항법시스템(eLoran) 시범서비스의 LDC 메시지 변조기법에 따른 수신성능 분석)

  • Pyo-Woong, Son;Sak, Lee;Tae Hyun, Fang;Kiyeol, Seo
    • Journal of Navigation and Port Research
    • /
    • v.46 no.6
    • /
    • pp.525-529
    • /
    • 2022
  • In the eLoran system, the Loran Data Channel (LDC) is used to provide precise timing and positioning. The LDC message can be modulated with the Eurofix method, which modulates the transmission time of the 3rd-8th pulse not used for navigation, and the 9th pulse method, which modulates data using the 9th additional pulse after the existing 8 Loran pulses. In this paper, we analyzed the reception performance of the LDC message transmitted from the eLoran transmitter according to the modulation method. The eLoran testbed transmitter in Incheon was set to transmit LDC messages simultaneously with the 9th pulse modulation method and the Eurofix modulation method. Then, the LDC messages stored in the databases of the eLoran differential stations in Incheon and Pyeongtaek were analyzed in terms of the message reception rate according to the modulation method. Using the navigation aid management ship Inseong No. 1, the range of LDC message reception of actual sea users near Incheon Port was also analyzed. The results of this study are expected to be utilized in the full operational capability service after the eLoran pilot service.

An exploratory study on Social Network Services in the context of Web 2.0 period (웹 2.0 시대의 SNS(Social Network Service)에 관한 고찰)

  • Lee, Seok-Yong;Jung, Lee-Sang
    • Management & Information Systems Review
    • /
    • v.29 no.4
    • /
    • pp.143-167
    • /
    • 2010
  • Diverse research topics relating to Social Network Services (SNS) such as, social affective factors in relationships among internet users, social capital value of SNS, comparing attributes why users are intending to participate in SNS, user's lifestyle and their preferences, and the exploratory seeking potential of SNS as a social capital need to be focused on. However, these researches that have been undertaken only consider facts at a particular period of the changing computing environment. In accordance with this indispensability, the integrated view on what technical, social and business characteristics and attributes need to be acknowledged. The purpose of this study is to analyze the evolving attributes and characteristics of SNS from Web 1.0 to Mobile web 2.0 through the Web 2.0 and Mobile 1.0 period. Based on the relevant literature, the attributes that drive the changing technological, social and business aspects of SNS have been developed and analyzed. This exploratory study analyzed major attributes and relationships between SNS and users by changing the paradigms which represented each period. It classified and chronicled each period by representing paradigms and deducted the attributes by considering three aspects such as technological, social and business administration. The major findings of this study are, firstly, the web based computing environment has been changed into the platform attribute for users in the aspect of technology. Users can only read, listen and view information through the web site in the early stages, but now it is possible that users can create, modify and distribute all kinds of information. Secondly, the few knowledge producers of web services have been changed into a collective intelligence by groups of people in the aspect of society. Information authority has been distributed and there is no limit to its spread. Many businesses recognized the potential of the SNS and they are considering how to utilize these advantages toward channel of promotion and marketing. Thirdly, the conventional marketing channel has been changed into oral transmission by using SNS. The market of innovative mobile technology such as smart phones, which provide convenience and access-ability toward customers, has been enlarged. New opportunities to build friendly relationship between business and customers as a new marketing chance have been created. Finally, the role of the consumer has been changed into the leading role of a prosumer. Users can create, modify and distribute information, and are performing the dual role of customer and producer.

  • PDF

Development of FPGA-based Programmable Timing Controller

  • Cho, Soung-Moon;Jeon, Jae-Wook
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1016-1021
    • /
    • 2003
  • The overall size of electronic product is becoming small according to development of technology. Accordingly it is difficult to inspect these small components by human eyes. So, an automation system for inspecting them has been used. The existing system put microprocessor or Programmable Logic Controller (PLC) use. The structure of microprocessor-based controller and PLC use basically composed of memory devices such as ROM, RAM and I/O ports. Accordingly, the system is not only becomes complicated and enlarged but also higher price. In this paper, we implement FPGA-based One-chip Programmable Timing Controller for Inspecting Small components to resolve above problems and design the high performance controller by using VHDL. With fast development, the FPGA of high capacity that can have memory and PLL have been introduced. By using the high-capacity FPGA, the peripherals of the existent controller, such as memory, I/O ports can be implemented in one FPGA. By doing this, because the complicated system can be simplified, the noise and power dissipation problems can be minimized and it can have the advantage in price. Since the proposed controller is organized to have internal register, counter, and software routines for generating timing signals, users do not have to problem the details about timing signals and need to only send some values about an inspection system through an RS232C port. By selecting theses values appropriate for a given inspection system, desired timing signals can be generated.

  • PDF

A RTSD Mechanism for Detection of DoS Attack on TCP Network (TCP 네트워크에서 서비스거부공격의 탐지를 위한 RTSD 메커니즘)

  • 이세열;김용수
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2002.05a
    • /
    • pp.252-255
    • /
    • 2002
  • As more critical services are provided in the internet, the risk to these services from malicious users increases. Several networks have experienced problems like Denial of Service(DoS) attacks recently. We analyse a network-based denial of service attack, which is called SYM flooding, to TCP-based networks. It occurs by an attacker who sends TCP connection requests with spoofed source address to a target system. Each request causes the targeted system to send instantly data packets out of a limited pool of resources. Then the target system's resources are exhausted and incoming TCP port connections can not be established. The paper is concerned with a detailed analysis of TCP SYN flooding denial of service attack. In this paper, we propose a Real Time Scan Detector(RTSD) mechanism and evaluate it\`s Performance.

  • PDF