• Title/Summary/Keyword: Vulnerable Time

Search Result 716, Processing Time 0.023 seconds

An Intrusion Detection Method by Tracing Root Privileged Processes (Root 권한 프로세스 추적을 통한 침입 탐지 기법)

  • Park, Jang-Su;Ahn, Byoung-Chul
    • The KIPS Transactions:PartC
    • /
    • v.15C no.4
    • /
    • pp.239-244
    • /
    • 2008
  • It is not enough to reduce damages of computer systems by just patching vulnerability codes after incidents occur. It is necessary to detect and block intrusions by boosting the durability of systems even if there are vulnerable codes in systems. This paper proposes a robust real-time intrusion detection method by monitoring root privileged processes instead of system administrators in Linux systems. This method saves IP addresses of users in the process table and monitors IP addresses of every root privileged process. The proposed method is verified to protect vulnerable programs against the buffer overflow by using KON program. A configuration protocol is proposed to manage systems remotely and host IP addresses are protected from intrusions safely through this protocol.

Genetic Variation and Conservation of the Endangered Species Cotoneaster wilsonii (Rosaceae) from Ulleung Island

  • Park, Jiwon;Lee, Junsoo;So, Soonku;Kim, Muyeol
    • Korean Journal of Plant Taxonomy
    • /
    • v.39 no.3
    • /
    • pp.125-129
    • /
    • 2009
  • The genetic diversity plays a significant role in determining a species' survival and perseverance. Endangered species often lack genetic variation, which makes them vulnerable to numerous dangers of extinction including selection, genetic drifts and human interference. Knowing an endangered species' genetic background greatly enhances conservation efforts since it reveals why, what and how to conserve that species. Cotoneaster wilsonii is an endangered plant species endemic to Ulleung island, but not enough genetic research has been done on this taxon for its effective conservation plans. In this study, three populations of C. wilsonii in Ulleung island underwent allozyme analysis through starch gel electrophoresis. 10 loci were analyzed and F-statistics was calculated. Overall data indicated that C. wilsonii possessed low genetic diversity with intense inbreeding, heterozygote deficiency and low differentiation among populations. These results implied that C. wilsonii was recently introduced to the Ulleung island from ancestor species, and did not have much time to differentiate. Current status of C. wilsonii habitats is very fragile and vulnerable, with increasing tourism constantly threatening the species' survival. It is very likely that C. wilsonii will become extinct in near future unless organized conservation protects its populations and genetic diversity.

Agriculture Under UNFCCC and Its Policy Implications (유엔기후변화협약의 농업부문 동향과 시사점)

  • Myeong, Soojeong
    • Journal of Climate Change Research
    • /
    • v.5 no.4
    • /
    • pp.313-321
    • /
    • 2014
  • Agriculture is a vulnerable sector to climate change because it is a primary industry directly exposed to climate. At the same time, it is a sector emitting greenhouse gases during agricultural activities, thereby affecting climate change. However, agriculture is a nascent subject under the UNFCCC. The agriculture sector needs both adaptation and mitigation. Currently, co-benefit of adaptation and mitigation is emphasized during climate change negotiation. Developing country parties are in a position to focus on adaptation rather than mitigation. As a result, mitigation is not being addressed enough during climate negotiation. Agriculture has been addressed through Nairobi Work Programme and NAPA. Since current efforts for greenhouse gas reduction are not sufficient for stabilizing the atmospheric system of the Earth to prevent climate change, the agriculture sector should also be considered for greenhouse gas reduction. For this, MRV for small farmers in developing countries and incentives for their mitigation efforts should be developed in agriculture sector. In addition, it is necessary to strengthen international cooperation for developing capacities for vulnerable countries and people to climate change.

A Frailty Management Program for the Vulnerable Elderly in Rural Areas (농촌 지역거주 노인을 대상으로 한 허약관리 프로그램의 효과)

  • Ahn, Heeok;Chin, Young Ran
    • Journal of Korean Academy of Rural Health Nursing
    • /
    • v.16 no.1
    • /
    • pp.18-28
    • /
    • 2021
  • Purpose: This study attempted to confirm whether the suicide prevention effect could be achieved by managing the frailty of the elderly in rural areas. Methods: This study is a single-group pre-post study design. The frailty management program was applied twice a week for 12 weeks for the vulnerable elderly in the rural area from 16th April to 31st May in 2020. The program consisted of physical exercise, health education on nutrition management and disease control, cognitive training, and protein drink provision. Results: The average age of the participants was 77.1 years, and they lived alone (88.6%). As a result of providing the program, there were positive results such as increase in body strength (pre 12.27: post 13.27) and weight (pre 58.51: post 59.13), and decrease in depression (pre 4.66: post 1.20), and there was no statistically significant change in quality of life, Time Up & Go, and BMI. Conclusion: Frailty should be managed to prevent suicide in the elderly. It is necessary to expand and apply various programs that combine physical functions and emotional interventions such as health education, and exercise to maintain muscle strength.

Analysis of Gyeonggi-do 911 emergency cases to identify emergency vulnerable area using clustering analysis (군집분석을 통한 응급취약지역의 유형화와 유형별 대응방안 제안: 경기도 119 구급사건 데이터를 기반으로)

  • Kim, Mirae;Kwon, Uijun;Geum, Youngjung
    • Journal of the Korea Management Engineers Society
    • /
    • v.23 no.4
    • /
    • pp.1-18
    • /
    • 2018
  • Emergency response has been considered as an important task in practice, because it is directly associated with the survival of patients. However, it is very difficult to increase the number of fire stations due to the budget and efficiency problem. Under this circumstances, it is critical to consider the suitability of current arrangement for 911 fire station. This is especially true in Gyeonggi-Do where the characteristics of each sub-area are different. In response, this study aims to identify types of areas that are vulnerable for emergency situations, and try to find relevant solutions for each type. For this purpose, we collected 151,463 data for emergency declaration data which exceeds 10 minutes for its response. Total 19 clustering variables which are used as input variables are selected, considering the characteristics of each area. As a result of clustering analysis, three clusters are identified and analyzed. Finally, areas whose emergence response time is in top 10% are selected and analyzed. This paper is expected to find current issues and problems of emergency response for each area, and help to understand and solve the problem for the local government.

Inter-carrier Interference of Multicarrier-CDMA System in Time Selective Fading Channel (시간선택적 페이딩 환경에서 멀티캐리어-CDMA 시스템의 서브캐리어간 간섭)

  • 김명진;김성필;하경민
    • Proceedings of the IEEK Conference
    • /
    • 2000.06a
    • /
    • pp.53-56
    • /
    • 2000
  • In MC-CDMA systems effects of delay spread of the channel are reduced with increased symbol duration by simultaneously transmitting data symbols on the parallel subcarriers. However, the increased symbol duration causes the system to be more vulnerable to time selective fading. In other words, although MC-CDMA systems are robust against frequency selective fading in a multipath environment, they are sensitive to Doppler spread and hence inter-carrier interference is increased. In this paper, we investigate the effects of time selective fading characteristics of the mobile channel from the viewpoint of desired signal power to inter-carrier interference power ratio at the combiner output of the MC-CDMA receiver.

  • PDF

Design and Stability Test of a HDD Hybrid Controller Using Sliding-Mode Control (슬라이딩 모드 제어를 이용한 HDD 하이브리드 제어기 설계 및 안정성 평가)

  • Byun Ji-Young;Kwak Sung-Woo;You Kwan-Ho
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.53 no.10
    • /
    • pp.671-677
    • /
    • 2004
  • This paper presents the design of a now controller for the read/write head of a hard disk drive. The general controller for seeking is the time-optimal control. However if we use only the time optimal control law, this could be vulnerable to chattering effect. To solve this problem, we propose a modified controller design algorithm in this paper. The proposed controller consists of bang-bang control for seeking and sliding-mode control for tracking. Moreover, to test the robustness and stability of control system, a bounded disturbance is selected to maximize a severity index. Simulation results show the superiority of the proposed controller through comparison with time optimal VSC(variable structure control).

An Analysis on Signal to Interchannel Interference Ratio of MC-CDMA System in Time Selective Fading Environments (시간선택적 페이딩 환경에서 MC-CDMA 시스템의 신호대 채널간 간섭의 비에 대한 분석)

  • 김명진;김성필;오종갑
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2001.06a
    • /
    • pp.33-36
    • /
    • 2001
  • In MC-CDMA systems effects of delay spread of the channel are reduced with increased symbol duration by simultaneously transmitting data symbols on the parallel subcarriers. However, the increased symbol duration causes the system to be more vulnerable to time selective fading. In this paper, we investigate the effects of time selective fading characteristics of the mobile channel from the viewpoint of desired signal power to inter-carrier interference power ratio at the combiner output of the MC-CDMA receiver.

  • PDF

Development of Roll Stability Control of Commercial Vehicles with Environment Information (환경 정보를 이용한 상용차량 전복 방지 알고리즘 개발)

  • Park, Dongwoo;Her, Hyundong;Yi, Kyongsu
    • Journal of Auto-vehicle Safety Association
    • /
    • v.5 no.1
    • /
    • pp.50-55
    • /
    • 2013
  • When it comes to commercial vehicles, their unique characteristics - center of gravity, size, weight distribution - make them particularly vulnerable to rollover. On top of that, conventional heavy vehicle brake exhibits longer actuation delays caused in part by long air lines from brake pedal to tires. This paper describes rollover prevention algorithm that copes with the characteristics of commercial vehicles. In regard of compensating for high actuating delay, predicted rollover index with short preview time has been designed. Moreover, predicted rollover index with longer preview time has been calculated by using road curvature information based on environment information. When rollover index becomes larger than specific threshold value, desired braking force is calculated in order to decrease the index. At the same time, braking force is distributed to each tire to make yaw rate track desired value.

Open Research Problem for effective IoT Authentication

  • Mihir Mehta;Kajal Patel
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.8
    • /
    • pp.174-178
    • /
    • 2024
  • IoT is collection of different "things" which are associated with open web. As all the things are connected to the Internet, it offers convenience to end users for accessing the resources from "Any Where, Any Time" throughout the globe. At the same time, open nature of IoT provides a fertile ground to an intruder for launching different security related threats. If we can no apply proper security safeguards to the IoT System, then it will be not useful to society. Authentication, Encryption, Trust Management and Secure Routing are different domains to offer security in IoT system. Among them, Authentication is very much important security service as it validates device identity before granting access to system services/ resources. Existing IoT Authentication algorithms are fail to verify device identity in unambiguous way. They are vulnerable to different security threats such as Key Stolen threat, MITM threat and Location Spoofing threat. So, it is a demand of time to design an efficient and secure Multi-factor IoT algorithm which can offer better security and validate device identity in unambiguous way.