• Title/Summary/Keyword: illegal

Search Result 1,457, Processing Time 0.037 seconds

A Detection Method for Network Intrusion using the NFR (NFR을 이용한 네트워크 침입 탐지)

  • 최선철;차현철
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2001.05a
    • /
    • pp.261-267
    • /
    • 2001
  • In this paper, we have illustrated implementations and there results of network attacks and detections. We consider two attacks, smurf attach and network mapping attack, which are one of the typical intrusions using the ICMP The NFR/sup TM/ is used to capture all of our interesting packets within the network traffic. We implement the smurf and network mapping attacks with the UNIX raw socket, and build the NFR's backend for it's detection. The N-Code programming is used to build the backend. The implementing results show the possibility of preventing illegal intruding to network systems.

  • PDF

A Branch and Bound Algorithm for the Transportation Problem under Limited Company Owned Vehicles (제한된 수의 자가차량을 이용한 수송문제의 분지한계법)

  • 진희채;박순달
    • Korean Management Science Review
    • /
    • v.10 no.1
    • /
    • pp.207-216
    • /
    • 1993
  • The purpose of this paper is to develop a branch and bound algorithm for the transportation problem with a limited number of company owned vehicles. First, we find an initial solution by solving quasi-assignment subproblem induced by relaxing constraints of the vehicle capacity and illegal tours elimination equations. Second, we build routing from the assignment, and if there is a routings which violates relaxed constraints, we introduce branches of the subproblem in order to remove it. After all branches are searched, we get the optimal solution.

  • PDF

Watermarking Algorithm for 1-bit Image Authentication using Edges (Edge를 이용한 1-bit 영상의 원본 증명용 워터마킹 알고리즘)

  • 박용정;권오진
    • Proceedings of the IEEK Conference
    • /
    • 2002.06d
    • /
    • pp.105-108
    • /
    • 2002
  • This paper proposes a new watermarking algorithm to embed data in 1-bit images using edges for protecting illegal copies or modifications. This method is based on edge detection to decide the most invisible region. This paper also introduces a new shuffling method which embeds data in each blocks uniformly and finds Positions under the limited attacks. In experiment, we compare the proposed shuffling method with M. Wu's method.

  • PDF

An Iterative Watermarking Method Using Human Visual System (인간 시각 시스템을 이용한 반복적 워터마킹 기법)

  • 김희정;김지홍
    • Proceedings of the IEEK Conference
    • /
    • 2002.06d
    • /
    • pp.267-270
    • /
    • 2002
  • In this paper, a new watermarking method using an iterative scheme is proposed. The proposed method consists of two parts: watermark generation and its insertion. In the watermark generation, random signals with normalized distribution N(0,1) are produced and modified using an iterative scheme. In the watermark insertion, the resulting watermark signals are inserted into selected transform coefficients with various scaling parameters in order to achieve the invisibility and robustness against illegal attacks. The simulation results show that the proposed method has good performance for various attacks including image compression, filtering, etc.

  • PDF

A Deployment Strategy for ISP's Active Response Service (ISP의 능동 대응 서비스 제공 방안)

  • 이승민;남택용
    • Proceedings of the IEEK Conference
    • /
    • 2002.06a
    • /
    • pp.391-394
    • /
    • 2002
  • Because of great damages by illegal hacking, demand for security of the public network as well as the private is seemingly limitless. This critic리 requirement is leading ISPS to deploy new security services for their customers. In this paper, we present active responses for the security of a ISP's network, and describe the deployment of a new security service using the network secured by that responses.

  • PDF

A Study on Fingerprinting Code for Illegal Distribution Prevention (불법 유통 방지를 위한 핑거프린팅 코드에 관한 연구)

  • Lee, Jin-Heung;Park, Ji-Hwan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11c
    • /
    • pp.1839-1842
    • /
    • 2003
  • 핑거프린팅은 컨텐츠 유통 시, 구매자의 정보를 컨텐츠에 삽입함으로써 불법 유통 행위된 컨텐츠에 대하여 불법 배포자를 추적할 수 있는 기법이다. 이 방법에는 서로 다른 구매자에 의한 핑거프린팅코드를 제거하려는 공모 공격(collusion attacks)이 발생할 수 있다. 본 논문에서는 고차의 원시다항식을 이용하여 효율적이면서 공모 공격에 강인한 핑거프린팅 코드 구성 방법을 제안한다. 그리고, 제안된 방법을 오디오 데이터에 적용하여 공모 공격에 대하여 안전한 코드임을 보이고 있다.

  • PDF

A DRM Model for Illegal Copyrights Protection based on Agent (Agent기반 불법 복제 방지 DRM모델)

  • 이덕규;박희운;이임영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.682-684
    • /
    • 2001
  • 디지털 컨텐cm의 지적 재산권 보호를 위한 디지털 워터마킹 기술 및 핑거프린팅의 연구가 활발히 진행되고 있다. DRM(Digital Rights Management)는 디지털 컨텐츠 지적 재산권 보호뿐만 아니라 컨텐츠 에 대한 출판, 유통 및 사용에 필요한 관리와 보호체계이다. 본 논문에서는 컨텐츠 보호 기술 중에서 컨텐츠에 대한 유통/서비스에 해당하는 기술을 만족하는 프로토콜을 제시한 것이다. 이를 위해 컨텐츠 불법복제 빛 불법사용을 방지할 수 있도륵 Agent를 이용한다. Agent는 특별한 설치가 필요 없이 컨텐츠 내에 내포되어 있게 된다. 내포된 Agent는 불법복제 및 불법사용에 대해 체크함으로써 불법복제의 사용을 차단할 수 있도록 한다.

  • PDF