• Title/Summary/Keyword: attack detection

Search Result 884, Processing Time 0.03 seconds

Authentication Technologies of X-ray Inspection Image for Container Terminal Automation

  • Kim, Jong-Nam;Hwang, Jin-Ho;Ryu, Tae-Kyung;Moon, Kwang-Seok;Jung, Gwang-S.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1684-1688
    • /
    • 2005
  • In this paper, authentication technologies for X-ray inspection images in container merchandises are introduced and a method of authentication for X-ray inspection images is proposed. Until now, X-ray images of container merchandises have been managed without any authentication of inspection results and environments, it means that there was no any action for protection of illegal copy and counterfeiting of X-ray images from inspection results. Here, authentication identifies that who did inspect container X-ray images and, whether the container X-ray images were counterfeited or not. Our proposed algorithm indicates to put important information about X-ray inspection results on an X-ray image without affecting quality of the original image. Therefore, this paper will be useful in determining an appropriate technology and system specification for authentication of X-ray inspection images. As a result of experiment, we find that the information can be embedded to X-ray image without large degradation of image quality. Our proposed algorithm has high detection ratio by Quality 20 of JPEG attack.

  • PDF

The Design of Router Security Management System for Secure Networking

  • Jo, Su-Hyung;Kim, Ki-Young;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1594-1597
    • /
    • 2005
  • A rapid development and a wide use of the Internet have expanded a network environment. Further, the network environment has become more complex due to a simple and convenient network connection and various services of the Internet. However, the Internet has been constantly exposed to the danger of various network attacks such as a virus, a hacking, a system intrusion, a system manager authority acquisition, an intrusion cover-up and the like. As a result, a network security technology such as a virus vaccine, a firewall, an integrated security management, an intrusion detection system, and the like are required in order to handle the security problems of Internet. Accordingly, a router, which is a key component of the Internet, controls a data packet flow in a network and determines an optimal path thereof so as to reach an appropriate destination. An error of the router or an attack against the router can damage an entire network. This paper relates to a method for RSMS (router security management system) for secure networking based on a security policy. Security router provides functions of a packet filtering, an authentication, an access control, an intrusion analysis and an audit trail in a kernel region. Security policy has the definition of security function against a network intrusion.

  • PDF

Improved Visual Cryptography Using Cover Images (커버영상을 이용한 개선된 시각암호)

  • Jang, Si-Hwan;Choi, Yong Soo;Kim, Hyoung Joong
    • Journal of Digital Contents Society
    • /
    • v.13 no.4
    • /
    • pp.531-538
    • /
    • 2012
  • Visual cryptography is a scheme that recovers secret image through human vision by overlapping distributed share images without cryptographic operations. Distribution methods are still being developed for improving quality of shared images keeping size of images invariant and enhancing robustness against resize of images. Since visual cryptography only uses shared images, this fact is exploited to attack. From this fact, a scheme safe for sharing distributed images is needed. In this paper, a new visual cryptographic scheme using cover image is proposed. This scheme reduces the chance of detection against steganalysis and increases security. In addition, this paper shows that the proposed scheme can completely decrypt secret image without creating noise.

A Fatal Case of Naegleria fowleri Meningoencephalitis in Taiwan

  • Su, Mei-Yu;Lee, Ming-Shih;Shyu, Ling-Yuh;Lin, Wei-Chen;Hsiao, Pei-Ching;Wang, Chi-Ping;Ji, Dar-Der;Chen, Ke-Min;Lai, Shih-Chan
    • Parasites, Hosts and Diseases
    • /
    • v.51 no.2
    • /
    • pp.203-206
    • /
    • 2013
  • After bathing at a hot spring resort, a 75-year-old man presented to the emergency department because of seizure-like attack with loss of conscious. This is the first case of primary amebic meningoencephalitis (PAM) caused by Naegleria fowleri in Taiwan. PAM was diagnosed based on detection of actively motile trophozoites in cerebrospinal fluid using a wet-mount smear and the Liu's stain. The amoebae were further confirmed by PCR and gene sequencing. In spite of administering amphotericin B treatment, the patient died 25 days later.

Development of Protective Scheme against Collaborative Black Hole Attacks in Mobile Ad hoc Networks

  • Farooq, Muhammad Umar;Wang, Xingfu;Sajjad, Moizza;Qaisar, Sara
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.3
    • /
    • pp.1330-1347
    • /
    • 2018
  • Mobile Ad hoc Network (MANET) is a collection of nodes or communication devices that wish to communicate without any fixed infrastructure and predetermined organization of available links. The effort has been made by proposing a scheme to overcome the critical security issue in MANET. The insufficiency of security considerations in the design of Ad hoc On-Demand Distance Vector protocol makes it vulnerable to the threats of collaborative black hole attacks, where hacker nodes attack the data packets and drop them instead of forwarding. To secure mobile ad hoc networks from collaborative black hole attacks, we implement our scheme and considered sensor's energy as a key feature with a better packet delivery ratio, less delay time and high throughput. The proposed scheme has offered an improved solution to diminish collaborative black hole attacks with high performance and benchmark results as compared to the existing schemes EDRIAODV and DRIAODV respectively. This paper has shown that throughput and packet delivery ratio increase while the end to end delay decreases as compared to existing schemes. It also reduces the overall energy consumption and network traffic by maintaining accuracy and high detection rate which is more safe and reliable for future work.

High-resolution MR Imaging of Carotid Atherosclerotic Plaques (경동맥 경화판의 고해상도 자기공명영상)

  • Shin, Won-Seon;Kim, Sung-Mok;Choe, Yeon-Hyeon
    • Investigative Magnetic Resonance Imaging
    • /
    • v.16 no.2
    • /
    • pp.97-102
    • /
    • 2012
  • High-resolution carotid MRI allows visualization of carotid atherosclerotic plaque characteristics. MRI serves as a noninvasive option for the detection of active plaque inflammation and intraplaque hemorrhage. Significant gains in signal-tonoise ratio and contrast-to-noise ratio can be obtained for carotid atheroma imaging at 3T compared with 1.5T. Normalized wall index or wall area on MRI has shown its efficacy in monitoring the response after medical therapy. $T(2)^*$ quantification in carotid plaques before and after the administration of ultrasmall superparamagnetic iron oxide particles shows difference in response to treatment according to drug doses. In conclusion, high-resolution MRI is useful in the diagnosis and monitoring of carotid atherosclerotic plaques prone to transient ischemic attack and stroke.

Study on the API Hooking Method Based on the Windows (윈도우 API 후킹 탐지 방법에 대한 연구)

  • Kim, Wan-Kyung;Soh, Woo-Young;Sung, Kyung
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.6
    • /
    • pp.884-893
    • /
    • 2009
  • Recently, malicious attacks for Windows operate through Window API hooking in the Windows Kernel. This paper presents the API hooking attack and protection techniques based on Windows kernel. Also this paper develops a detection tool for Windows API hooking that enables to detect dll files which are operated in the kernel. Proposed tool can detect behaviors that imports from dll files or exports to dll files such as kernel32.dll, snmpapi.dll, ntdll.dll and advapidll.dll, etc.. Test results show that the tool can check name, location, and behavior of API in testing system.

  • PDF

A Study on Assault and Violence in Elevator Using χ2 Histogram (χ2히스토그램을 이용한 승강기 내에서 폭행 및 폭력사건에 관한 연구)

  • Shin, Seong-Yoon;Kim, Hee-Ae;Jin, Chan-Yong;Park, Sang-Joon;Rhee, Yang-Won;Lee, Hyun-Chang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.109-111
    • /
    • 2013
  • The attack refers to the act deliberately to stimulate an abomination to the people. Of violence, such as physical aggression, direct physical forcing. Assault said to contact the opponent's body with the power to superior opponent. In other words, it is the act of hitting an opponent with the fist. In this paper, the violence and assaults that occur in elevators extracted using a color histogram of scene change detection technique.

  • PDF

A Resource Reallocation Scheme Enhancing the Survivability of Essential Services (필수 서비스 생존성 향상을 위한 자원 재할당 기법)

  • Kim, Sung-Ki;Min, Byoung-Joon;Choi, Joong-Sup;Kim, Hong-Geun
    • The KIPS Transactions:PartC
    • /
    • v.10C no.1
    • /
    • pp.95-102
    • /
    • 2003
  • In order to guarantee the survivability of essential services against attacks based on new methodology, we need a solution to recognize important resources for the services and to adapt the urgent situation properly. In this paper, we present a dynamic resource reallocation scheme which is one of the core technologies for the construction of intrusion tolerant systems. By means of resource reallocation within a host, this scheme enables selected essential services to survive even after the occurrence if a system attack. Experimental result obtained on a test-bed reveals the validity of the proposed scheme for resource reallocation. This scheme may work together with IDS (Intrusion Detection System) to produce more effective responsive mechanisms against attacks.

A Design of Invite Flooding Attack Detection and Defense Using SIP in VoIP Service (SIP을 이용한 VoIP 서비스에서의 Invite Flooding 공격 탐지 및 방어 기법 설계)

  • Yun, Snag-Jun;Kim, Kee-Chen
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06d
    • /
    • pp.215-218
    • /
    • 2011
  • VoIP(Voice over Internet Protocol) 서비스는 기존의 음성전화 서비스(Public Switched Telephone Network, PSTN)와 달리 IP 프로토콜을 이용한 저렴한 통신비용 등의 장점이 있는 음성통신 기술로써, 기존의 아날로그 음성전화 서비스를 대신하는 서비스이며, 새로운 인터넷 융합서비스로 많은 사용자가 이용하고 있다. 하지만 VoIP 서비스가 인터넷망을 이용함으로 IP Spoofing, DoS (Denial of Server) / DDoS(Distributed Denial of Service), 등의 여러 가지 보안의 문제점을 가지고 있다. VoIP 서비스에서 DDoS 공격은 Proxy 서버 등에 대량의 공격 메시지를 보냄으로써 서버의 자원을 고갈시켜 정상적인 서비스를 하지 못하게 한다. DoS, DDoS 공격 중 Invite Flooding 공격은 1분에 수천 개의 Invite 메시지를 보내 회선의 자원을 고갈시키는 공격이다. 특히 IP/Port 위조하여 공격 경우 공격 패킷 탐지하기 어려우므로 차단할 수 없다. 따라서 본 논문에서는 VoIP의 DoS/DDoS 중 하나인 Invite Flooding 공격 시 SIP Proxy Server에서 메시지 분산시키는 방법과 MAC Address와 사용자 번호 등 IP 이외의 고정적인 사용자 정보를 확인하여 공격을 탐지하고, 공격 Agent에 감염된 Phone을 공격차단서비스로 보내 복구시키는 방법을 제안한다.