• Title/Summary/Keyword: interception

Search Result 337, Processing Time 0.026 seconds

A Study about Wiretapping Attack and Security of VoIP Service (VoIP 서비스의 도청 공격과 보안에 관한 연구)

  • Park Dea-Woo;Yoon Seok-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.4 s.42
    • /
    • pp.155-164
    • /
    • 2006
  • VoIP technology is Eight New Services among Ubiquitous-IT839 strategies. This paper tested wiretapping or VoIP service in connected a soft phone and LAN and WAN sections, Internet telephones and a device. IP PBX, a banner operator network to have been connected to VoIP Internet network. As a result of having experimented on wiretapping of VoIP networks, Vulnerability was found. and a wiretapping by attacks of a hacker was succeeded in a terminal and proxy and attachment points of a VoIP network like a hub to follow a CVE list. Currently applied a security plan of an each wiretapping section in viewpoints of 6 security function of Access Control. Confidentiality, Authentication. Availability, Integrity. Non-repudiation in VoIP networks named to 070. Prevented wiretapping of contents by the results, the AES encryption that executed wiretapping experiment about a packet after application of a security plan. Prevented wiretapping, and kept security and audit log. and were able to accomplish VoIP information protection to network monitoring and audit log by an access interception and qualification and message hash functions and use of an incoming refusal.

  • PDF

Impact Angle Control for Non-maneuvering Target with Look Angle Measurements and Line of Sight (지향각, 시선각 정보를 이용한 이동표적의 충돌각 제어)

  • Park, Jang-Seong;Lee, Dong-Hee;Park, Sang-Hyuk;Kim, Yoon-Hwan
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.47 no.7
    • /
    • pp.508-516
    • /
    • 2019
  • In this paper, we propose a guidance law to control Impact Angle in consideration of look angle limit of the missile with strapdown seeker on the non-maneuvering target. The proposed law is based on sliding mode algorithm and generates acceleration commands using look angle and line of sight information provided by the strapdown seeker and navigation system. And, target velocity and target path angle are provided by like TADS (Target Acquisition and Designation System) at launch time. We can confirm that the target interception and impact angle control are possible through the convergence of the proposed sliding surface. In addition, it is possible to confirm that the sign of derivative result of the look angle at the maximum and minimum look angle is opposite to the sign of the look angle, so the look angle limit is not exceeded.

Design of the Secured SMTP Gateway for Spam-Mail Interception (스팸메일 차단을 위한 SMTP 보안 게이트웨이 설계)

  • Lee, Chang-Sung;Lee, Eun-Sun;Han, Young-Ju;Kim, Hee-Seung;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1087-1090
    • /
    • 2004
  • 인터넷이 발전함에 따라 기업의 업무, 커뮤니케이션 등이 온라인으로 전환되고 있으며, 정보 전달의 통로로써 전자 메일의 사용이 나날이 늘어남과 동시에 전자 메일을 통한 스팸메일의 폭발적인 증가로 인한 심각성 또한 대두되고 있다. 현재 스팸메일을 막기 위한 여러 가지 방법이 제안되었으나, 대부분 메일 서버내의 정책에 따른 메일 필터링 방식으로써 완벽한 스팸메일 탐지를 제공하지 못하며, 스팸메일로 인한 메일서버 및 네트워크 자원 손실 문제는 여전히 해결되지 않고 있다. 본 논문에서는 스팸메일 탐지율을 높이고 네트워크 내 자원 손실을 예방할 수 있는 SMTP 보안 게이트웨이를 제안하고자 한다. 본 SMTP 보안 게이트웨이는 스팸메일 차단 규칙에 의한 메일 필터링을 기본적으로 제공하고, 룰에 정의되지 않은 메일에 대해서는 사용자 선택에 기반한 메일 전송을 제공한다. 이는 규칙에 정의되지 않은 스팸메일에 대한 탐지 가능성을 높이며, 궁극적으로 메일서버의 자원 및 네트워크 자원의 가용성을 높일 수 있다.

  • PDF

Application of plasma lighting for growth and flowering of tomato plants

  • Park, Kyoung Sub;Kim, Sung Kyeom;Lee, Sang Gyu;Lee, Hee Ju;Kwon, Joon Kook
    • Horticulture, Environment, and Biotechnology : HEB
    • /
    • v.59 no.6
    • /
    • pp.827-833
    • /
    • 2018
  • Plasma lighting systems have been engineered to simulate sunlight. The objective of this study was to determine the effects of plasma lighting on tomato plant growth, photosynthetic characteristics, flowering rate, and physiological disorders. Tomato plants were grown in growth chambers at air temperatures of $25/23^{\circ}C$ (light/dark period), in a $16h\;day^{-1}$ light period provided by four different light sources: 1 kW and 700 W sulfur plasma lights (1 SPL and 0.7 SPL), 1 kW indium bromide plasma light, and 700 W high pressure sodium lamp (0.7 HPS) as a control. The totaldry weight and leaf area at 0.7 SPL were approximately 1.2 and 1.3 times greater, respectively, than that of 0.7 HPS at the 62 days after sowing (DAS). The maximum light assimilation rate was observed at 1 SPL at the 73 DAS. In addition, the light compensation and saturation points of the plants treated with plasma lighting were 98.5% higher compared with HPS. Those differences appeared to be related to more efficient light interception, provided by the SPL spectrum. The percentage of flowering at 0.7 SPL was 30.5%, which was higher than that at 0.7 HPS; however, there were some instances of severe blossom end rot. Results indicate that plasma lighting promotes tomato growth, flowering, and photosynthesis. Therefore, a plasma lighting system may be a valuable supplemental light source in a greenhouse or plant factory.

Delivery Tracing Protect Model Based Smart Contract for Guaranteed Anonymity (익명성 보호를 위한 스마트 컨트랙트의 배송추적 방지 모델)

  • Kim, Young Chan;Kim, Young Soo;Im, Kwang Hyuk
    • Journal of Industrial Convergence
    • /
    • v.16 no.1
    • /
    • pp.15-20
    • /
    • 2018
  • Along with the increase of internet shopping, crimes that exploited personal information on the invoice of goods are becoming more and more advanced and becoming more and more classified from the interception of goods through voice phishing attack, injury, sexual offense. Therefore, in order to guarantee the anonymity of the customer's delivery information, there is a need for a delivery tracking prevention system which keeps the route information of the product's destination secret among delivery companies. For this purpose, We suggest that delivery tracing protect model based smart contract for guaranteed anonymity to protect the anonymity by encrypting delivery information and by separation of payment and personal information using the anonymity technique of block chain-based cryptography. Our proposed model contributes to expansion of internet shopping based on block chaining by providing information about product sales to company and guaranteeing anonymity of customer's delivery information to customer.

Comparison of sampling methods in biodiversity analysis of plant communities living in a riparian park area of Nakdong river (낙동강 수변공원에 서식하는 식물 군집의 종 다양성 분석 : 조사 방법에 따른 차이 비교)

  • Nam, Ki-jung;Kim, Min-jung
    • Journal of Wetlands Research
    • /
    • v.24 no.4
    • /
    • pp.312-319
    • /
    • 2022
  • The species diversity of plant communities is quantitatively measured, and can be affected by plant monitoring methods. This study experimentally compared the structure and diversity of plant communities living in five waterfront park areas in Nak-dong River using three plant survey methods (modified Whittaker, modified Daubenmire, and modified point-line intercept method). According to the diversity profile, the modified Whittaker method produced the highest species richness regardless of the location, but which method makes the highest diversity of dominant species varies depending on the location. The Beta diversity of the communites calculated from the modified Whittaker and the modified Daubenmire suggested that structures of plant communities in five locations were similar, while the Point-line interception method suggested that a small number of dominant species were shared between communities.

A Government Agency Environment Protects Information System Design using Intrusion Prevention System and Role-Base Security Policy (침입방지시스템과 역할기반 보안정책을 이용한 정부기관 정보보호 시스템 설계)

  • Ahn Joung Choul
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.91-103
    • /
    • 2004
  • The survey of network firewall system has been focused on the deny policy that protects information from the unlicensed and the intrusion detection system. Government has solved several firewall problems as building the intranet separated from the intranet. However, the new firewall system would been satisfied both the denialpolicy and information share with the public, according as government recently emphasizes electronic service. Namely, it has to provide the functions such as the information exchange among divisions, partial share of information with the public, network connection and the interception of illegal access. Also, it considers the solution that protects system from hacking by inner user and damage of virus such as Worm. This Paper suggests the protects information system using the intrusion prevention system and role-based security policy to support the partial opennessand the security that satisfied information share among governments and public service.

Design Evaluation of the Post-installed Anchor considering Effective Embedded Depth and Concrete Strength (유효 묻힘 깊이와 콘크리트 강도를 고려한 후설치 앵커의 설계식 평가)

  • Hur, Moo-Won;Chae, Kyoung-Hun;Won, Jae-Sik;Park, Tae-Won
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.25 no.3
    • /
    • pp.13-20
    • /
    • 2021
  • Post-installed anchor is a structural material that connects structural and non-structural members to existing concrete members. However, there are cases where rebar interception and construction error occur at the site. In that case, measures are needed to prevent performance degradation of the rear-installation anchors. In this study, in order to evaluate the performance of torsional control expandable post-installed anchors for compressive strength and effective depth of the reference concrete was tested. The results of the most commonly used tests of M10 and M20 showed that had variable coefficients within 15%, satisfying the reliability presented in KCI(2017). It was also confirmed that the depth of the buried and the strength of concrete affect the strength of the pavement. Based on the results of the existing similar studies and the results of this study, the design equation of the post-installed anchor was proposed and the results were compared with the existing design.

A Study of Multi-to-Majority Response on Threat Assessment and Weapon Assignment Algorithm: by Adjusting Ballistic Missiles and Long-Range Artillery Threat (다대다 대응 위협평가 및 무기할당 알고리즘 연구: 탄도미사일 및 장사정포 위협을 중심으로)

  • Im, Jun Sung;Yoo, Byeong Chun;Kim, Ju Hyun;Choi, Bong Wan
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.44 no.4
    • /
    • pp.43-52
    • /
    • 2021
  • In weapon assignment studies to defend against threats such as ballistic missiles and long range artillery, threat assessment was partially lacking in analysis of various threat attributes, and considering the threat characteristics of warheads, which are difficult to judge in the early flight stages, it is very important to apply more reliable optimal solutions than approximate solution using LP model, Meta heuristics Genetic Algorithm, Tabu search and Particle swarm optimization etc. Our studies suggest Generic Rule based threat evaluation and weapon assignment algorithm in the basis of various attributes of threats. First job of studies analyzes information on Various attributes such as the type of target, Flight trajectory and flight time, range and intercept altitude of the intercept system, etc. Second job of studies propose Rule based threat evaluation and weapon assignment algorithm were applied to obtain a more reliable solution by reflection the importance of the interception system. It analyzes ballistic missiles and long-range artillery was assigned to multiple intercept system by real time threat assessment reflecting various threat information. The results of this study are provided reliable solution for Weapon Assignment problem as well as considered to be applicable to establishing a missile and long range artillery defense system.

A Study on Inspecting Position Accuracy of DACS Pintle (위치자세제어장치의 핀틀 위치정확도 점검 방안 연구)

  • Tak, Jun Mo
    • Journal of Aerospace System Engineering
    • /
    • v.15 no.3
    • /
    • pp.57-64
    • /
    • 2021
  • In the study, to minimize the error on guided control of the KV (Kill Vehicle) and to secure the hit-to-kill performance, a position accuracy inspection for the DACS (Divert and Attitude Control System) actuation system was proposed. The accuracy performance of the DACS actuation system is one of the most important factors in the interception of ballistic missiles. In order to validate actuation control accuracy of DACS system, an inspection item was set for position accuracy, and the inspection system was designed for DACS pintle. To measure the absolute position value of the DACS pintle, an external measurement system was developed using laser displacement sensors. The inspection system was designed so that it can be compared with the actuation command in real time. The proposed position accuracy inspection system can be inspected not only in a DACS system but also in missile system level. The position accuracy inspection was performed using the designed inspection system, and analysis of the inspection result.