• Title/Summary/Keyword: flooding detection

Search Result 97, Processing Time 0.028 seconds

Semantic Analysis on Traffic Flooding Attacks Detection System (트래픽 폭주 공격 탐지 시스템의 의미론적 해석)

  • Jaehak Yu;Seunggeun Oh;Hansung Lee;Jun-Sang Park;Myung-Sup Kim;Daihee Park
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.1496-1499
    • /
    • 2008
  • DoS/DDoS로 대표되는 트래픽 폭주 공격은 대상 시스템뿐만 아니라 네트워크 대역폭 및 시스템 자원 등을 고갈시킴으로써 네트워크에 심각한 장애를 유발하기 때문에, 신속한 공격 탐지와 공격유형별 분류는 안정적인 서비스 제공 및 시스템 운영에 필수요건이다. 본 논문에서는 1) 데이터마이닝의 대표적인 분류 모델인 C4.5 알고리즘을 기반으로 SNMP MIB 정보를 사용하여 트래픽 폭주공격을 탐지하고 각 공격유형별 분류를 수행하는 시스템을 설계 및 구현하였다; 2) C4.5에서 추가적으로 제공하는 동작원리에 관한 규칙들을 상세히 분석함으로써 공격탐지 및 공격유형별 분류에 관한 시스템의 의미론적 해석을 시도하였다; 3) C4.5는 주어진 SNMP MIB의 속성들의 정보이익 값을 이용하여 예측모형을 구축하는 알고리즘으로, 특징선택 및 축소의 효과를 추가적으로 얻었다. 따라서 시스템의 운용 시, 제안된 모델은 전체 13개의 MIB 정보 중 5개의 MIB 정보만을 사용하여 보다 신속하고, 정확하며, 또한 가벼운 공격탐지 및 공격유형별 분류를 수행함으로써 네트워크 시스템의 자원관리와 효율적인 시스템 운영에 기여하였다.

Applicability evaluation of radar-based sudden downpour risk prediction technique for flash flood disaster in a mountainous area (산지지역 수재해 대응을 위한 레이더 기반 돌발성 호우 위험성 사전 탐지 기술 적용성 평가)

  • Yoon, Seongsim;Son, Kyung-Hwan
    • Journal of Korea Water Resources Association
    • /
    • v.53 no.4
    • /
    • pp.313-322
    • /
    • 2020
  • There is always a risk of water disasters due to sudden storms in mountainous regions in Korea, which is more than 70% of the country's land. In this study, a radar-based risk prediction technique for sudden downpour is applied in the mountainous region and is evaluated for its applicability using Mt. Biseul rain radar. Eight local heavy rain events in mountain regions are selected and the information was calculated such as early detection of cumulonimbus convective cells, automatic detection of convective cells, and risk index of detected convective cells using the three-dimensional radar reflectivity, rainfall intensity, and doppler wind speed. As a result, it was possible to confirm the initial detection timing and location of convective cells that may develop as a localized heavy rain, and the magnitude and location of the risk determined according to whether or not vortices were generated. In particular, it was confirmed that the ground rain gauge network has limitations in detecting heavy rains that develop locally in a narrow area. Besides, it is possible to secure a time of at least 10 minutes to a maximum of 65 minutes until the maximum rainfall intensity occurs at the time of obtaining the risk information. Therefore, it would be useful as information to prevent flash flooding disaster and marooned accidents caused by heavy rain in the mountainous area using this technique.

Performance Evaluation of Scaling based Dynamic Time Warping Algorithms for the Detection of Low-rate TCP Attacks (Low-rate TCP 공격 탐지를 위한 스케일링 기반 DTW 알고리즘의 성능 분석)

  • So, Won-Ho;Shim, Sang-Heon;Yoo, Kyoung-Min;Kim, Young-Chon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.3 s.357
    • /
    • pp.33-40
    • /
    • 2007
  • In this paper, low-rate TCP attack as one of shrew attacks is considered and the scaling based dynamic time warping (S-DTW) algorithm is introduced. The low-rate TCP attack can not be detected by the detection method for the previous flooding DoS/DDoS (Denial of Service/Distirbuted Denial of Service) attacks due to its low average traffic rate. It, however, is a periodic short burst that exploits the homogeneity of the minimum retransmission timeout (RTO) of TCP flows and then some pattern matching mechanisms have been proposed to detect it among legitimate input flows. A DTW mechanism as one of detection approaches has proposed to detect attack input stream consisting of many legitimate or attack flows, and shown a depending method as well. This approach, however, has a problem that legitimate input stream may be caught as an attack one. In addition, it is difficult to decide a threshold for separation between the legitimate and the malicious. Thus, the causes of this problem are analyzed through simulation and the scaling by maximum auto-correlation value is executed before computing the DTW. We also discuss the results on applying various scaling approaches and using standard deviation of input streams monitored.

A Study on Mapping 3-D River Boundary Using the Spatial Information Datasets (공간정보를 이용한 3차원 하천 경계선 매핑에 관한 연구)

  • Choung, Yun-Jae;Park, Hyen-Cheol;Jo, Myung-Hee
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.15 no.1
    • /
    • pp.87-98
    • /
    • 2012
  • A river boundary is defined as the intersection between a main stream of a river and the land. Mapping of the river boundary is important for the protection of the properties in river areas, the prevention of flooding and the monitoring of the topographic changes in river areas. However, the utilization of the ground surveying technologies is not efficient for the mapping of the river boundary due to the irregular surfaces of river zones and the dynamic changes of water level of a river stream. Recently, the spatial information data sets such as the airborne LiDAR and aerial images are widely used for coastal mapping due to the acquisition of the topographic information without human accessibility. Due to these advantages, this research proposes a semi-automatic method for mapping of the river boundary using the spatial information data set such as the airborne LiDAR and the aerial photographs. Multiple image processing technologies such as the image segmentation algorithm and the edge detection algorithm are applied for the generation of the 3D river boundary using the aerial photographs and airborne topographic LiDAR data. Check points determined by the experienced expert are used for the measurement of the horizontal and vertical accuracy of the generated 3D river boundary. Statistical results show that the generated river boundary has a high accuracy in horizontal and vertical direction.

A Study on Fake Data Filtering Method of CCN (콘텐츠 중심 네트워킹 환경에서의 Fake Data Filtering Method 연구)

  • Kim, DaeYoub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.155-163
    • /
    • 2014
  • To enhance network efficiency, content-centric networking (CCN) proposes that intermediated network nodes on a content-delivery path temporally cache transmitted contents. Then if an intermediated node receives a content request message (Interest) for previously cached content, the node directly transmits the cached content as a response message (Data) to requestors and finishes the transmission of the received Interest. Since Interest is performed by intermediated network nodes, it is possible to efficiently transmit contents and to effectively solve a network congestion problem caused around contents sources. For that, CCN utilizes both content store to temporarily cache content and pending Interest table (PIT) to record Interest incoming Face. However, it has mentioned the possibility of denial service attack using both the limitation of PIT resource and fake Interests. In this paper, we briefly describe the presented PIT flooding attack utilizing fake Interest. Then we introduce new attack possibility using fake Data and propose a countermeasure for the proposed attack. Also we evaluate the performance of our proposal.

The Climate Change and Zoonosis (Zoonotic Disease Prevention and Control) (기후변화와 인수공통전염병 관리)

  • Jung, Suk-Chan
    • 한국환경농학회:학술대회논문집
    • /
    • 2009.07a
    • /
    • pp.228-239
    • /
    • 2009
  • The observations on climate change show a clear increase in the temperature of the Earth's surface and the oceans, a reduction in the land snow cover, and melting of the sea ice and glaciers. The effects of climate change are likely to include more variable weather, heat waves, increased mean temperature, rains, flooding and droughts. The threat of climate change and global warming on human and animal health is now recognized as a global issue. This presentation is described an overview of the latest scientific knowledge on the impact of climate change on zoonotic diseases. Climate strongly affects agriculture and livestock production and influences animal diseases, vectors and pathogens, and their habitat. Global warming are likely to change the temporal and geographical distribution of infectious diseases, including those that are vector-borne such as West Nile fever, Rift Valley fever, Japanese encephalitis, bluetongue, malaria and visceral leishmaniasis, and other diarrheal diseases. The distribution and prevalence of vector-borne diseases may be the most significant effect of climate change. The impact of climate change on the emergence and re-emergence of animal diseases has been confirmed by a majority of countries. Emerging zoonotic diseases are increasingly recognized as a global and regional issue with potential serious human health and economic impacts and their current upward trends are likely to continue. Coordinated international responses are therefore essential across veterinary and human health sectors, regions and countries to control and prevent emerging zoonoses. A new early warning and alert systems is developing and introducing for enhancing surveillance and response to zoonotic diseases. And international networks that include public health, research, medical and veterinary laboratories working with zoonotic pathogens should be established and strengthened. Facing this challenging future, the long-term strategies for zoonotic diseases that may be affected by climate change is need for better prevention and control measures in susceptible livestock, wildlife and vectors in Korea. In conclusion, strengthening global, regional and national early warning systems is extremely important, as are coordinated research programmes and subsequent prevention and control measures, and need for the global surveillance network essential for early detection of zoonotic diseases.

  • PDF

Harmful Traffic Detection by Protocol and Port Analysis (프로토콜과 포트 분석을 통한 유해 트래픽 탐지)

  • Shin Hyun-Jun;Choi Il-Jun;Oh Chang-Suk;Koo Hyang-Ohk
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.5
    • /
    • pp.172-181
    • /
    • 2005
  • The latest attack type against network traffic appeared by worm and bot that are advanced in DDoS. It is difficult to detect them because they are diversified, intelligent, concealed and automated. The exisiting traffic analysis method using SNMP has a vulnerable problem; it considers normal P2P and other application program to be harmful traffic. It also has limitation that does not analyze advanced programs such as worm and bot to harmful traffic. Therefore, we analyzed harmful traffic out Protocol and Port analysis. We also classified traffic by protocol, well-known port, P2P port, existing attack port, and specification port, apply singularity weight to detect, and analyze attack availability. As a result of simulation, it is proved that it can effectively detect P2P application, worm, bot, and DDoS attack.

  • PDF

Detection of Change in Water System Due to Collapse of Laos Xe pian-Xe namnoy Dam Using KOMPSAT-5 Satellites (KOMPSAT-5 위성 영상을 활용한 라오스 세피안-세남노이 댐 붕괴에 따른 수계변화 탐지)

  • Kim, Yunjee;Lee, Moungjin;Lee, Sunmin
    • Korean Journal of Remote Sensing
    • /
    • v.35 no.6_4
    • /
    • pp.1417-1424
    • /
    • 2019
  • Recently, disaster accidents have occurred frequently over the world, and disaster have been continuously studied using remote sensing due to large scale and hard-to-reach features. The collapse of Laos Xe pian-Xe namnoy dam in 2018 also caused a lot of human and economic damage. This study's purpose is to change detect water system due to the collapse of Xe pian-Xe namnoy dam in Laos and to derive areas where future flooding is expected. The water system is extracted from each image of KOMPSAT-5 before and after the dam collapse in order to quantitatively change detect in the water system. The result of the water system area increased more than 10 times after the dam collapse. In addition, it is confirmed that the newly created water system is thickly created in areas of low altitude area. This study result can be used in the future to systematize the pre-response to abnormalities and issues in existing operating dams. And then, if combined with other remote sensing data, more diverse and specific results could be obtained.

Analysis of the Efficient Clutter Removal Method Using an Array Antenna in a Local Weather Radar (국지적 기상 레이다에서의 배열 안테나를 이용한 효율적인 클러터 제거 방법 분석)

  • Lee, Jonggil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.8
    • /
    • pp.1180-1187
    • /
    • 2022
  • As the likelihood of occurrence of the localized microbursts or severe flooding is increased due to the unusual weather changes, it is the very urgent problem to detect these weather hazards with a local weather radar. For a local weather radar of this purpose, it is essential to detect the low altitude and the fast varying weather conditions. Therefore, the very fast update of the weather information and the efficient clutter removal is very important. To achieve this goal, the appropriate method should be applied which does not need the mechanical elevation scanning and has the capability of the efficient clutter removal. Therefore, in this paper, the usefulness of the implementation of elevational filter banks with the spatial FFT algorithm was analyzed and investigated using a simple array antenna. It is shown that the suggested method can be used for both the minimization of the ground clutter and the fast update of weather information.

Pedestrian path search based on the shortest distance algorithm using Map API (Map API를 활용한 최단 거리 알고리즘 기반 보행자 경로 탐색 연구)

  • Sungwoo, Jeon;Bokseon, Kang;Youngha, Park;Heo-kyung, Jung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.27 no.1
    • /
    • pp.117-123
    • /
    • 2023
  • There are casualties due to inundation and flooding due to intensive typhoons or heavy rains in summer. Due to such damage, the biggest disaster is flood, and in order to reduce human damage, this paper proposes a shortest distance algorithm-based pedestrian path search study using Map API. This system selects Map API through comparative analysis and provides the shortest route. The route explored is in JSON format and the data of the shelter is stored in the database. The route search system designed and implemented based on this data locates pedestrians and provides evacuation routes in case of flash floods. In addition, if the route cannot be entered while moving to the evacuation route, the current location of the pedestrian is identified, the route is re-searched, and a new route is provided. Therefore, it is believed that the pedestrian route search system proposed in this paper will prevent negligent accidents.