• Title/Summary/Keyword: Worm Virus

Search Result 62, Processing Time 0.022 seconds

$F(ab)_2$-ELISA for the Detection of Nuclear Polyhedrosis Virus of Silk-worm, Bombyx mori L.

  • Sivaprasad, V.;Nataraju, B.;Baig, M.;Samson, M.V.;Datta, R.K.
    • International Journal of Industrial Entomology and Biomaterials
    • /
    • v.6 no.2
    • /
    • pp.179-181
    • /
    • 2003
  • $F(ab`)_2$-ELISA and direct antigen coating-ELISA (DAC-ELISA) were evaluated in the detection of purified Bombyx mori nuclear polyhedrosis virus (BmNPV) and nuclear polyhedrosis virus infection in silkworm larvae inoculated with BmNPV polyhedra. Although nanogram levels of BmNPV was detected in both DAC- and $F(ab`)_2$-ELISA, similar concentrations of antigen was detected in case of F(ab’)$_2$-ELISA even at higher dilution of antibody (up to 1 : 20 K). One hundred percent nuclear polyhedrosis infection was detected 6 hrs after inoculation in BmNPV infected silkworm larvae by $F(ab`)_2$-ELISA. On the other hand, detection of 100% infection was observed only three days after inoculation in DAC-ELISA. In this study, it was observed $F(ab`)_2$-ELISA was more sensitive than DAC-ELISA in the detection of purified BmNPV as well as nuclear polyhedrosis infection in silkworm larvae.

A Countermeasures on the Cyber Terror for the National Key Organizations (정부 주요기관에 대한 사이버 공격의 대처 방법)

  • Lee, Young-Gyo;Park, Joong-Soon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.2
    • /
    • pp.39-47
    • /
    • 2008
  • As internet is spreaded widely, the number of cyber terror using hacking and virus is increased. Also the international cyber terror to the national key organizations go on increasing. If the national key organizations is attacked by the attack, the national paper, document and records are exposed to the other nations. The national paper, document and records can give damage to the nation. Especially, the unknown attack can give much damage to the nation. Therefore, this paper suggested a countermeasures on the cyber terror for the national key organizations provided the inner of the organization is safe. The uneffective item and invasion privacy item are included among the countermeasures. However the countermeasures can protect only one cyber terror to the national key organizations.

Threat Analysis of Mobile Environment (모바일 환경에서의 보안위협 분석)

  • Jeong Youn-Seo;Kim Ki-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.749-753
    • /
    • 2006
  • Since the appearance of the first computer virus in 1986, a significant number of new viruses has appeared every year. Recently, there has been a marked increase in the number of mobile malicious code(virus, worm, trojan) in Mobile devices(smart phone, PDA). As a growing number of people use mobile device, we have to prepare for coming mobile attacks. In this paper, we study trends and characteristics of mobile malicious code. And, we describe considerations of on-device and network security in mobile environment.

  • PDF

Preventing Botnet Damage Technique and It's Effect using Bot DNS Sinkhole (DNS 싱크홀 적용을 통한 악성봇 피해방지 기법 및 효과)

  • Kim, Young-Baek;Lee, Dong-Ryun;Choi, Joong-Sup;Youm, Heung-Youl
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.1
    • /
    • pp.47-55
    • /
    • 2009
  • Bot is a kind of worm/virus that is remotely controlled by a herder. Bot can be used to launch distributed denial-of-service(DDoS) attacks or send spam e-mails etc. Launching cyber attacks using malicious Bots is motivated by increased monetary gain which is not the objective of worm/virus. However, it is very difficult for infected user to detect this infection of Botnet which becomes more serious problems. This is why botnet is a dangerous, malicious program. The Bot DNS Sinkhole is a domestic bot mitigation scheme which will be proved in this paper as one of an efficient ways to prevent malicious activities caused by bots and command/control servers. In this paper, we analysis botnet activities over more than one-year period, including Bot's lifetime, Bot command/control server's characterizing. And we analysis more efficient ways to prevent botnet activities. We have showed that DNS sinkhole scheme is one of the most effective Bot mitigation schemes.

A Probabilistic Model of Damage Propagation based on the Markov Process (마코프 프로세스에 기반한 확률적 피해 파급 모델)

  • Kim Young-Gab;Baek Young-Kyo;In Hoh-Peter;Baik Doo-Kwon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.8
    • /
    • pp.524-535
    • /
    • 2006
  • With rapid development of Internet technology, business management in an organization or an enterprise depends on Internet-based technology for the most part. Furthermore, as dependency and cohesiveness of network in the communication facilities are increasing, cyber attacks have been increased against vulnerable resource in the information system. Hence, to protect private information and computer resource, research for damage propagation is required in this situation. However the proposed traditional models present just mechanism for risk management, or are able to be applied to the specified threats such as virus or worm. Therefore, we propose the probabilistic model of damage propagation based on the Markov process, which can be applied to diverse threats in the information systems. Using the proposed model in this paper, we can predict the occurrence probability and occurrence frequency for each threats in the entire system.

A Study on the Worm.Virus Attack Technique of Cyber Warfare (사이버 정보전 웜.바이러스 공격 기술 연구)

  • 김환국;서동일;이상호
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.776-779
    • /
    • 2004
  • With the rapid progress of information technique, it is getting more difficult to protect information systems from cyber terrorism, because of bugs and vulnerabilities of software and the properties of cyberspace such as anonymity. furthermore cyber terror techniques are highly developed and complicated and their use for a malicious intent and a military purpose are increasing recently. Therefore a study of warfare attack technology on the cyber space is necessary for establishing trusted society and further national security. Specially, worms/viruses are becoming a more common occurrence on the cyber space. Also, The worm caused a great deal of damage to the large number of networks around the world in a very short period of time. Therefore, we will describe worms/viruses in the warfare attack technique in this paper.

  • PDF

Biochemical Characteristics of the Granulosis Viruses Proteins of Common Cabbage Worm, Pieris rapae and Pieris brassicae (배추흰나비 과립병바이러스 단백질의 생화학적 특성)

  • 류강선;진병래;강석권
    • Korean journal of applied entomology
    • /
    • v.30 no.3
    • /
    • pp.180-186
    • /
    • 1991
  • This study was carried out to acquire some basic biochemical informations on the granulosis virus(GV) of Pieris rapae and Pieris brassicae. The capsule protein was composed of a single polypeptide with a molecular weight of 30,000 dalton for P. rapae GV and 31,000 dalton for P. brassicae GV. The major amino acids of capsule protein were glutamic acid, aspartic acid and lysine. When the capsule protein was partially digested with trypsin, chymotrypsin, papain or Staphylococcus aureus V8 protease, the digested products of the two viruses showed no difference in electrophoretic mobility. The patterns of the polypeptides of the two virus particle on SOS-polyacrylamide gel showed a little difference in high molecular weight region(over MW 100 kd).

  • PDF

Biochemical Characteristics of the Granulosis Viruses DNA of Common Cabbage Worm, Pieris rapae and Pieris brassicae (배추흰나비 과립병바이러스 DNA의 생화학적 특성)

  • 류강선;진병래;강석권
    • Korean journal of applied entomology
    • /
    • v.30 no.2
    • /
    • pp.138-143
    • /
    • 1991
  • This study was carried out to acquire some basic biochemical informations on the granulosis virus (GV) DNA of Pieris rapae and Pieris brassicae. The thermal denaturation temperature (Tm) and G+C content of the DNA of the viruses were $83.7^{\circ}C$ and 35.5% for P. rapae GV, $84.0^{\circ}C$ and 35.9% for P. brassicae GV, respectively. There were some differences in the DNA fragmentation patterns of the two GV's produced by digestion with restriction endonucleases such as EcoR I , BamH I and Hind m . The homololgy between the two DNAs was caculated to be 97.0%. The size of the genome was estimated to be 103 kbp for P. rapae GV and 108 kbp for P. brassicae GV.

  • PDF

A Design of Script worm virus detection system using the Genetic Algorithm (유전자 알고리즘을 적용한 스크립트형 웜 바이러스 탐지 시스템 설계)

  • Choi, Jun-Ho;Kim, Pan-Koo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.1013-1016
    • /
    • 2001
  • 최근 인터넷의 전자 메일 서비스 사용의 증가로 인해 스크립트형 웜 바이러스에 대한 피해가 확산되고 있다. 전자 메일을 통하여 유포되는 스크립트형 웜 바이러스는 지속적으로 새로운 형태로 변이되어 나타나고 있지만, 이에 대한 예방 방법은 새로운 패턴이 분석된 후 이를 토대로 탐지하기 때문에 적극적인 대응을 하지 못하는 실정이다. 이에 본 논문에서는 스크립트형 웜 바이러스의 행위를 추출하여 일정한 패턴을 정의한 후 이를 기반으로 스크립트형 웜 바이러스 탐지 시스템을 설계하고, 기존의 패턴에 유전자 알고리즘을 적용하여 알려지지 않은 새로운 패턴을 생성한 후 바이러스 탐지에 활용할 수 있는 방안을 연구한다.

  • PDF

The Design of Immune System for Blocking unknown Worm Virus Spreading (Unknown 웜바이러스 확산 방지를 위한 면역시스템 설계)

  • Kim, D.H.;Lim, M.H.;Oh, G.T.;Kim, P.K.
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.1025-1028
    • /
    • 2001
  • 인터넷의 확산과 이용자의 급증으로 웜바이러스에 대한 문제가 최근에 크게 대두되고 있다. 스크립트 형 웜바이러스의 경우 제작이 쉬워 누구나 몇 시간의 학습을 통하여 바이러스를 제작찬 수 있다. 이러한 문제의 심각성은 최근 7개월 동안의 바이러스 통계에서도 나타나는데 전체 바이러스 중 평균 22.5%를 차지하고 있다. 이러한 웜바이러스를 차단하기 위해서 여러 가지 방법들이 사용되고 있으나 E-mail로 급속하게 퍼지는 웜바이러스의 확산을 차단하기 위해서 네트워크 기반의 시스템 보호방법이 요구되어지고 있다. 이에 본 논문에서는 알려지지 않은 웜바이러스로부터 내부 네트워크를 방어하기 위한 면역시스템을 제안한다. 자동화된 면역 시스템은 분산된 각각의 웜바이러스 탐지 시스템들이 새로운 바이러스 정보를 동적으로 공유할 수 있도록 하여 새로운 바이러스로부터 해당 시스템과 그 시스템이 속해 있는 내부 네트워크를 바이러스로부터 보호할 수 있도록 한다.

  • PDF