• Title/Summary/Keyword: Zombie

Search Result 49, Processing Time 0.023 seconds

CNN Based Real-Time DNS DDoS Attack Detection System (CNN 기반의 실시간 DNS DDoS 공격 탐지 시스템)

  • Seo, In Hyuk;Lee, Ki-Taek;Yu, Jinhyun;Kim, Seungjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.3
    • /
    • pp.135-142
    • /
    • 2017
  • DDoS (Distributed Denial of Service) exhausts the target server's resources using the large number of zombie pc, As a result normal users don't access to server. DDoS Attacks steadly increase by many attacker, and almost target of the attack is critical system such as IT Service Provider, Government Agency, Financial Institution. In this paper, We will introduce the CNN (Convolutional Neural Network) of deep learning based real-time detection system for DNS amplification Attack (DNS DDoS Attack). We use the dataset which is mixed with collected data in the real environment in order to overcome existing research limits that use only the data collected in the experiment environment. Also, we build a deep learning model based on Convolutional Neural Network (CNN) that is used in pattern recognition.

A Study on Make-up Expression of Horror Character in Horror Movie (공포영화에 나타난 공포 캐릭터의 분장표현 연구)

  • Kim, Yu-Kyoung;Cho, Ji-Na
    • Journal of Fashion Business
    • /
    • v.12 no.5
    • /
    • pp.77-93
    • /
    • 2008
  • The purpose of the study was to examine make-up expression elements of horror characters as an evil spirit, a vampire, a zombie, a monster and a psycho murderer through make-up, focused on horror movies of the United States after1960s. First, an evil spirit was expressed that the pupil grew dim without a focus and the skin was torn by going bad and rot completely. Also, it was expressed that its teeth was changed to pointed canine teeth as a wild beast and its pale and bloodless face showed blood vessels clearly. To express its bloodless and pale skin, air brush was swept into the skin over several times. Its canine tooth was made acryl powder into its shape and was harden to make its shape smooth. Also, it was colored to show people like the real thing. Second, a vampire was expressed by make-up elements as long nails, a sharp canine tooth, a pale skin with a blood vessel and dead eyes. Its rough skin and long nails were manufactured with latex foam, which was colored like the skin. Third, a monster image as a werewolf was expressed by make-up elements as fur, sharp teeth, changed nails and toenails, a rough skin and a face changed to a wolf. Rubber mask and rubber body suit were manufactured as a make-up of special character and so all its body was changed. Fourth, a psycho murderer and body-deformed man were expressed by make-up elements as a distorted mask, swelled-up and deformed skull and face form, terribly deformed body, discolored and hang down skin and teeth with an indeterminate form. Its body and face were manufactured by the foam latex technology according to make-up design as a make-up of special character.

A Study on Cloud Computing for Detecting Cyber Attacks (사이버공격 탐지를 위한 클라우드 컴퓨팅 활용방안에 관한 연구)

  • Lee, Jun-Won;Cho, Jae-Ik;Lee, Seok-Jun;Won, Dong-Ho
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.6
    • /
    • pp.816-822
    • /
    • 2013
  • In modern networks, data rate is getting faster and transferred data is extremely increased. At this point, the malicious codes are evolving to various types very fast, and the frequency of occurring new malicious code is very short. So, it is hard to collect/analyze data using general networks with the techniques like traditional intrusion detection or anormaly detection. In this paper, we collect and analyze the data more effectively with cloud environment than general simple networks. Also we analyze the malicious code which is similar to real network's malware, using botnet server/client includes DNS Spoofing attack.

A study on the effective method of detecting denial of service attack to protect Guest OS in paravirtualization (반가상화 환경 Guest OS 보호를 위한 효율적인 서비스 거부 공격 탐지 방법에 관한 연구)

  • Shin, Seung-Hun;Jung, Man-Hyun;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.659-666
    • /
    • 2012
  • Recently, cloud computing service has become a rising issue in terms of utilizing sources more efficiently and saving costs. However, the service still has some limitations to be popularized because it lacks the verification towards security safety. In particular, the possibility to induce Denial of service is increasing as it is used as Zombie PC with exposure to security weakness of Guest OS's. This paper suggests how cloud system, which is implemented by Xen, detects intrusion caused by Denial of service using hypercall. Through the experiment, the method suggested by K-means and EM shows that two data, collected for 2 mins, 5 mins, 10mins and 20mins each, are distinguished 90% when collected for 2mins and 5mins while collected over 10mins are distinguished 100% successfully.

A Study on Narrative by the Control of the Time: Focused on the Analysis of the Trailer for Dead Island (시간의 조정을 통한 내러티브 연구 : <데드 아일랜드> 예고편 분석을 중심으로)

  • Roh, Chul-Hwan
    • Cartoon and Animation Studies
    • /
    • s.40
    • /
    • pp.397-421
    • /
    • 2015
  • Aristotle's Poetics is the earliest work of dramaturgy. It explains some of the most important narrative notions, for example, Mimesis, Katharsis, Mythos(Plot), Ethos(Character), Anagnorisis and Peripeteia. etc. Aristotle considered the plot which is the arrangement of events, as the most important element of drama. This paper presents an example of a plot configuration as an alternative to the traditional narration used since Aristotle. Dead Island, developed by Techland and published by Deep Silver, is one of the most successful action role-playing survival zombie video games. Its trailer, the Winner of Gold Prize for Internet Film at Cannes Lions International Festival of Creativity in 2011. Since the purpose of the trailer is to attract the audiences/gamers to the film/game, it has generally a similer narrative method from its own works. But Dead Island trailer is different. We treat this trailer as an short animation. It could be a new example of the non-linear narrative by the control of the time for example, temporal arrangement, direction and speed. We analyse all shots of Dead Island's trailer with Poetics' rules and with $G{\acute{e}}rard$ Genette's some narrative notions for example temporal order and duration. Furthermore we look for how to maximize the audiences' curiosity by the adjustment of the time, combined with its shocking images.

A Detect and Defense Mechanism of Stateful DRDoS Attacks (상태기반 DRDoS 공격에 대한 탐지 및 방어기법)

  • Kim, Minjun;Seo, Kyungryong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.5
    • /
    • pp.127-134
    • /
    • 2014
  • In DRDoS(Distributed Reflective Denial of Service) attacks, the victim is bombarded by packets from legitimate reflector unlike DDoS(Distributed Denial of Service) attacks through zombie, which is more dangerous than DDoS attack because it is in stronger disguise. Therefore, the method of filtering packet method on router are useless. Moreover SCTP(Stream Control Transmission Protocol) multi-homing feature, such as with an improved transmission protocol allows detecting attacks is more difficult and the effect of the attack can be maximized. In this paper we propose a DRDoS detection mechanism based on DRDoS utilizing attention to the characteristics of stateful protocols. The proposed scheme is backed by stateful firewall, and detect DRDoS attacks through a rules table and perform a defense treatment against DRDoS attack. Rules table with a simple structure is possible to easily adapt for any kind of stateful protocol can used by DRDoS attack. The experimental result confirm that our proposed scheme well detect DRDoS attacks using SCTP, the next-generation transmission protocol which not known by victim, and reduce the attacking packets rapidly.

Implementation and Validation of the Web DDoS Shelter System(WDSS) (웹 DDoS 대피소 시스템(WDSS) 구현 및 성능검증)

  • Park, Jae-Hyung;Kim, Kang-Hyoun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.4
    • /
    • pp.135-140
    • /
    • 2015
  • The WDSS improves defensive capacity against web application layer DDoS attack by using web cache server and L7 switch which are added on the DDoS shelter system. When web DDoS attack occurs, security agents divert traffic from backbone network to sub-network of the WDSS and then DDoS protection device and L7 switch block abnormal packets. In the meantime, web cache server responds only to requests of normal clients and maintains stable web service. In this way, the WDSS can counteract the web DDoS attack which generates small traffic and depletes server-client session resource. Furthermore, the WDSS does not require IP tunneling because it is not necessary to retransfer the normal requests to original web server. In this paper, we validate operation of the WDSS and verify defensive capability against web application layer DDoS attacks. In order to do this, we built the WDSS on backbone network of an ISP. And we performed web DDoS tests by using a testing system that consists of zombie PCs. The tests were performed by three types and various amounts of web DDoS attacks. Test results suggest that the WDSS can detect small traffic of the web DDoS attacks which do not have repeat flow whereas the formal DDoS shelter system cannot.

The Asian mode of production of Japanese Manga Higajima -The protests of the Political Structure and Asian mode of production (일본 만화 <피안도(彼岸島(Higajima))>와 아시아적 생산 양식 아시아적 생산양식의 정치구조와 투쟁)

  • Lee, Ho-Young
    • Cartoon and Animation Studies
    • /
    • s.25
    • /
    • pp.109-132
    • /
    • 2011
  • The Vampire has relatively universal images in through the cultural and verbal usages. The comic Higajima and movie display the latest image of Japanese Vampire of asian mode of production. After the Meiji political reformation of 18th Century, Japanese had rapidly changed into European style in every places. However, the Higajima is denied the structural changes, it is insisted that the changing is only the skin deep and colour of hair but the structure of the society is same as feudal Japan. Asian mode of production is claimed by Karl Marx, according to him, it is before the historical developing model in Europe and it was controversial. The major character of modern Japanese history would be the change of hierarchy of king-shogun-samurai-peasant based on the regional ground. The feudal structure is changed by the Meiji reformation and Japan was rushed for the westernized country rather than the asian mode of production. However, Higajima argued that the changing is just the clothes of ruler but the democracy and individual citizenship was lost in that reformation. Vampire is cursed creature that cannot see the sun and it has not the functioned as a human organ. For human it is dead but this creature actively moves and stronger than human and much superior than human in every aspects. It is managed the feeding through the suck the human blood and power to seduction. Even it is not exist, it is quite symbolic phenomenon of cultural usage of superior entity of chain of feeding. The aim of this paper is display the symbolic code Vampire of Asian mode of production in Higajima and political struggling of Japan in actual. To search of the cultural meaning and possibility of the Korean solution of modernity.

The Techno-mediated Rebirth of Young Precariat's Working Conditions Today (동시대 청년 알바노동의 테크노미디어적 재구성)

  • Lee, Kwang-Suk
    • Korean journal of communication and information
    • /
    • v.83
    • /
    • pp.157-185
    • /
    • 2017
  • The present study examines the dialectic tensions arising within the ICT-mediated labor culture between the dominant power of conglomerates and the precarious labor subjects in the labor practices, as smartphones and tablet PCs have grown in popularity. The present study explores how much young precarious workers named 'Cheongyeon Alba' (young precariat in S Korea) suffers from continually precarious job positions as temporary staff or contract workers, being trapped at the bottom of the pay scale, and also being electronically connected to the workplace in a seamless way. Concretely, this study investigates how the mobile phone becomes deeply entangled with the 'precarious' labor culture in the metropolitan city of Seoul. The mobile precariat has been in a disadvantaged position, in terms not only of the moral issue of exploitation in business but also of social injustice. Labor exploitation of young workers has been reinforced by the mobile labor culture, in which they are remotely monitored by live surveillance mobile apps, and mobile instant messaging from a boss can intrude incessantly into their private life. This study depicts the extension of the business's surveillant power by mobilizing the mobile phone in the working practices.

  • PDF