• Title/Summary/Keyword: Security test

Search Result 1,256, Processing Time 0.04 seconds

Stepping Stones Attack Simulator for TCP Connection Traceback Test

  • Choi, Byeong-cheol;Seo, Dong-Il;Sohn, Sung-Won;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2112-2115
    • /
    • 2003
  • In this paper, we describe a SSAS (stepping stones attack simulator) that is automatic tool for testing and evaluation in TCP connection traceback system. The SSAS can pass multiple hosts that are included with hacker, middle-path hosts and victim’s system. And SSAS can also attack through commands to exploit the victim’s system. Usually, hackers do not expose their real attack positions through compromising the middle-path hosts like stepping-stones. Namely, hackers perform the stepping stones attacks in Internet. The SSAS can be utilized by developments and tests of the various countermeasure techniques of hacking. Specially, in this paper, it is used to test the performance of TCP connection traceback system.

  • PDF

Study on the design of the passenger cars bumper rail to reduce the weight (자동차 범퍼 레일의 경량화 설계에 관한 연구)

  • 김이규;조규종
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2000.11a
    • /
    • pp.563-566
    • /
    • 2000
  • Recently vehicle development trend puts emphasis on cost reduction and performance improvement through weight reduction, and safety security to protect passenger and chassis against external impact. Primary factors effected on vehicle safety are chassis structure, chassis system, and safety equipment like bumper. Research in part of weight reduction is proceeding actively about prohibition of over-design and material through optimal design method. Bumper in these factors is demanded two of all factors, safety security and weight reduction. It is the part that prohibits or reduces a physical impact in low speed crash. Bumper is composed of a few parts but this study exhibits the shape of bumper rail has a role on energy absorption of safety security and weight reduction from structure analysis of bumper rail's variable shape surface.

  • PDF

Information Flow Control using Model-Checking of Abstract Interpretation (요약 해석의 모델 검사를 이용한 정보흐름 제어)

  • 조순희;신승철;도경구
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2002.06a
    • /
    • pp.166-169
    • /
    • 2002
  • In this paper, implements the abstract interpretation of the imperative language While in SMV model-checker and explain how to apply the logic of CTL which example the security of information flow. And show the way to translate the abstract program of While into SMV program and explain the derive process of CTL logic to test the security of the information flow. For the various security test, it is suitable to use the model-checking than to implements the abstract interpretation.

  • PDF

A Development of Unknown Intrusion Detection System with SVM (SVM을 통한 미확인 침입탐지 시스템 개발)

  • Kim, Seok-Tae;Han, In-Gyu;Lee, Chang-Yong;Kho, Jeong-Ho;Lee, Do-Won;Oh, Jeong-Min;Bang, Cheol-Soo;Lee, Geuk
    • Convergence Security Journal
    • /
    • v.7 no.4
    • /
    • pp.23-28
    • /
    • 2007
  • In this research, we suggest the unknown intrusion detection system with SVM(Support Vector Machines). At the system, at first, collected training-packets are processed through packet image creating module. And then, it is studied by the SVM module. Finally, the studied SVM module classifies the test-data unsing test-packet-image. This system's stability and efficient characteristic of security is far superior than the existing it.

  • PDF

Analysis of Blockchain Network and Cryptocurrency Safety Issues

  • Taegyu Lee
    • International journal of advanced smart convergence
    • /
    • v.12 no.3
    • /
    • pp.40-50
    • /
    • 2023
  • Blockchain is a technology designed to prevent tampering with digital documents or information, safeguarding transaction data and managing it in a structured manner. This proves beneficial in addressing issues of trust and data protection in B2B, B2C, and C2B transactions. Blockchain finds utility not only in financial transactions but also across diverse industrial sectors. This study outlines significant cases and responses that jeopardize the security of blockchain networks and cryptocurrency technology. Additionally, it analyzes safety and risk factors related to blockchain and proposes effective testing methods to preemptively counter these challenges. Furthermore, this study presents key security evaluation metrics for blockchain to ensure a balanced assessment. Additionally, it provides evaluation methods and various test case models for validating the security of blockchain and cryptocurrency transaction services, making them easily applicable to the testing process.

A Study on the Proposal of Strength Presumption Equation of Concrete Using Rebound Test and Aging Effects of Underground Structures (지하구조물 공용년수를 고려한 반발경도법에 의한 강도추정식의 제안)

  • Na, Sung Oak;Yoon, Tae Gook;Rhee, Jong Woo
    • Journal of Korean Society of societal Security
    • /
    • v.2 no.4
    • /
    • pp.59-65
    • /
    • 2009
  • The rebound test using Schmidt hammer is most popular method to estimate strength of concrete. However, this method is inappropriate for Seoul Metro underground structures due to unsuitable aging effects. Consequently, the strength presumption equation of underground structures is proposed according to the correlation of uniaxial compressive strength, rebound test results and age of concrete. To achieve this, the results of in-depth inspection of Seoul Metro underground structures performed annually for last 8 years was anlayed.

  • PDF

The Plan and Tools for Vulnerability Testing in Information Software-Based System

  • Kim, In-Jung;Lee, Young-Gyo;Won, Dong-Ho
    • Journal of Information Processing Systems
    • /
    • v.1 no.1 s.1
    • /
    • pp.75-78
    • /
    • 2005
  • Although many tests for stabilization of the software have been done, vulnerability test for a system run by combination of the software of various products has not been conducted enough. This has led to increased threats and vulnerability of system. Especially, web-based software system, which is public, has inherent possibility of exposure to attacks and is likely to be seriously damaged by an accident. Consequently, comprehensive and systematic test plans and techniques are required. Moreover, it is necessary to establish a procedure for managing and handling the results of vulnerability test. This paper proposes vulnerability test plans and designs for implementing automated tools, both of which can be complied with on web-based software systems.

The Study of a Improving Method on a Primality Test (소수성 시험방법의 개선방안 연구)

  • Kim, Young-Jin;Hong, Soon-Jwa;Park, Joong-Gil
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.10a
    • /
    • pp.133-136
    • /
    • 2000
  • 이 논문에서는 먼저 소수성 시험 알고리즘의 기본 개념이 되는 Fermat 의 정리를 살펴본다. 그리고, 가장 널리 사용되고 구현이 용이한 소수성 시험 알고리즘인 Rabin-Miller 및 Rivest 알고리즘을 살펴보고, 이들 알고리즘의 수행 시간을 분석한다. 또한, Rivest 가 제시한 연구 결과를 바탕으로 소수성시험 방법의 수행성능 향상 방안을 고려함으로써, Rivest 알고리즘을 효율적으로 구현하여 암호 시스템 등의 응용에 적용할 수 있도록 개선 방안을 제시한다.

  • PDF

Application of Interior Point Method to Security Constrained Economic Dispatch (계통제약하에서의 Interior Point 법을 이용한 경제급전)

  • Kim, Kyoung-Shin;Lee, Seung-Chul
    • Proceedings of the KIEE Conference
    • /
    • 2001.07a
    • /
    • pp.122-124
    • /
    • 2001
  • This Paper presents an application technique for solving the Security Constrained Economic Dispatch(SCED) problem using the Interior Point Method. The optimal power flow solution is obtained by optimizing the given generation cost objectives function subject to the system security constraints. The proposed technique is applied to a prototype 6-bus system for evaluation and test.

  • PDF