• Title/Summary/Keyword: intrusion

Search Result 2,141, Processing Time 0.029 seconds

Study on mobile agents for the intrusion detection in pervasive computing environment (퍼베이시브 컴퓨팅 환경에서의 침입탐지용 모바일 에이전트에 대한 연구)

  • Oh, Byung-Jin;Um, Nam-Kyoung;Mun, Hyung-Jin;Lee, Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.3
    • /
    • pp.231-237
    • /
    • 2006
  • Pervasive computing environment is similar to the meaning of ubiquitous computing, however it is a kind of the commercial product, which is made from the collaboration between NIST and IBM. On the basis of this environment, the research of mobile agents for intrusion detection is going on in progress. In this paper, we study the research about mobile agents for the intrusion detection and then suggest scenarios using moving mobile agents based on the multiple mobile agents in the intrusion detection. Subsequently, we could figure out the problems which occurred through progress of integrity movement as a matter of the intrusion detection.

  • PDF

Development of Smart Device Module for Perimeter Intrusion Detection (외곽 침입 감지를 위한 스마트 디바이스의 개발)

  • Ryu, Dae-Hyun;Choi, Tae-Wan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.2
    • /
    • pp.363-370
    • /
    • 2021
  • The perimeter intrusion detection system is very important in physical security. In this study, a micro smart device (module) using MEMS sensor was developed in IoT environment for external intrusion detection. The outer intrusion detection system applying the smart device developed in this study is installed in various installation environments, such as barbed wire of various materials and shapes, the city center, the beach, and the mountain, so that it can detect external intrusion and its location as well as false alarms. As a smart sensor that can minimize the false alarm rate and economical construction cost, it is expected that it can be used for the safe operation of major facilities and prevention of disasters and crimes.

Development of a reference framework to assess stylized human intrusion scenarios using GENII Version 2 considering design features of planned near-surface disposal facility in Korea

  • Kwon, Ki Nam;Cheong, Jae Hak
    • Nuclear Engineering and Technology
    • /
    • v.51 no.6
    • /
    • pp.1561-1574
    • /
    • 2019
  • A standard form of six stylized human intrusion scenarios for a near-surface disposal facility (e.g. the planned Korean repository, Gyeongju Phase II) is proposed through re-categorization of totally thirty-one past cases reported in public literature. A reference assessment framework for inadvertent human intrusion is newly developed using GENII Version 2 conforming to the ICRP Publication 60 and thereafter. Calculated dose from the assessment framework is verified by comparing with hand calculation results for simplified model equations independently derived. Results from GENII Version 2 and 1.485 show inevitable differences, which is mainly attributed to the difference in the external dose assessment model. If intake dose coefficients in GENII Version 1.485 are modified, the difference can be reduced but still exist to an extent. Through deterministic and probabilistic sensitivity analysis, most affecting four parameters are derived and uncertainties of the parameters are quantified. It is expected that the reference assessment framework together with representative stylized scenarios can be used to do a human intrusion impact assessment for a specific repository using site-specific information. Especially, the past practice of human intrusion impact assessment using GENII Version 1.485 with or without modification may be replaced with the new assessment framework developed in this study.

Design and Analysis of Real-time Intrusion Detection Model for Distributed Environment (분산환경을 위한 실시간 침입 탐지 모델의 설계)

  • 이문구;전문석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.1
    • /
    • pp.71-84
    • /
    • 1999
  • The most of intrusion detection methods do not detect intrusion when it happens. To solve the problem, we are studying a real-time intrusion detection. Because a previous intrusion detection system(IDS) is running on the host level, it difficult to port and to extend to other system on the network level that distributed environment. Also IDS provides the confidentiality of messages when it sends each other. This paper proposes a model of real-time intrusion detection using agents. It applies to distributed environment using an extensibility and communication mechanism among agents, supports a portability, an extensibility and a confidentiality of IDS.

A Study on Hierarchical Distributed Intrusion Detection for Secure Home Networks Service (안전한 홈네트워크 서비스를 위한 계층적 분산 침입탐지에 관한 연구)

  • Yu, Jae-Hak;Choi, Sung-Back;Yang, Sung-Hyun;Park, Dai-Hee;Chung, Yong-Wha
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.49-57
    • /
    • 2008
  • In this paper, we propose a novel hierarchical distributed intrusion detection system, named HNHDIDS(Home Network Hierarchical Distributed Intrusion Detection System), which is not only based on the structure of distributed intrusion detection system, but also fully consider the environment of secure home networks service. The proposed system is hierarchically composed of the one-class support vector machine(support vector data description) and local agents, in which it is designed for optimizing for the environment of secure home networks service. We support our findings with computer experiments and analysis.

Design of NePID using Anomaly Traffic Analysis and Fuzzy Cognitive Maps (비정상 트래픽 분석과 퍼지인식도를 이용한 NePID 설계)

  • Kim, Hyeock-Jin;Ryu, Sang-Ryul;Lee, Se-Yul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.4
    • /
    • pp.811-817
    • /
    • 2009
  • The rapid growth of network based IT systems has resulted in continuous research of security issues. Probe intrusion detection is an area of increasing concerns in the internet community. Recently, a number of probe intrusion detection schemes have been proposed based on various technologies. However, the techniques, which have been applied in many systems, are useful only for the existing patterns of probe intrusion. They can not detect new patterns of probe intrusion. Therefore, it is necessary to develop a new Probe Intrusion Detection technology that can find new patterns of probe intrusion. In this paper, we proposed a new network based probe intrusion detector(NePID) using anomaly traffic analysis and fuzzy cognitive maps that can detect intrusion by the denial of services attack detection method utilizing the packet analyses. The probe intrusion detection using fuzzy cognitive maps capture and analyze the packet information to detect syn flooding attack. Using the result of the analysis of decision module, which adopts the fuzzy cognitive maps, the decision module measures the degree of risk of denial of service attack and trains the response module to deal with attacks. For the performance evaluation, the "IDS Evaluation Data Set" created by MIT was used. From the simulation we obtained the max-average true positive rate of 97.094% and the max-average false negative rate of 2.936%. The true positive error rate of the NePID is similar to that of Bernhard's true positive error rate.

Change of Seawater Intrusion Range by the Difference of Longitudinal Dispersivity in Hydrodynamic Modeling (수리동역학적 모델링에서 분산지수에 따른 해수침투 범위의 변화)

  • 심병완;정상용;김희준;성익환
    • Journal of Soil and Groundwater Environment
    • /
    • v.7 no.4
    • /
    • pp.59-67
    • /
    • 2002
  • As a parameter for hydrodynamic modeling to define the range of seawater intrusion, dispersivities are frequently determined from pre-experiments or theoretical studies because field experiments need a lot of time and expenses. If the dispersivities are inadequate for an aquifer, the numerical results may have some errors. We examined the validity of longitudinal dispersivities by comparing the ranges of seawater intrusion with numerical modeling, field data and apparent resistivity sections. In the numerical modeling the TDS distributions simulated by the Xu's longitudinal dispersivity are more similar to the values of TDS measured at monitoring wet]s and boreholes than those by the Neuman's longitudinal dispersivity. The ranges of seawater intrusion by numerical simulations using Xu's longitudinal dispersivity show that the contour line of 1000 ㎎/L. as TDS is located at 480 m from the coast in May, while at 390 m in July. The difference is originated from the shift of the interface between seawater and fresh water. It moved toward the coast in July because of the seasonal increase of hydraulic gradient according to rainfall. A contour line of 15 ohm-m was used to define the range of seawater intrusion in apparent resistivity sections. From this criterion on the interface between seawater and fresh water, the range of seawater intrusion is located at 450 m from the coast. This result is similar to the range of seawater intrusion simulated by the numerical modeling using Xu's dispersivity. Therefore the range of seawater intrusion shows the difference due to the dispersivities used for the hydrodynamic modeling and the dispersivity generated by the Xu's equation is considered more effective to decide the range of seawater intrusion in this study area.

Cone-beam computed tomographic evaluation of mandibular incisor alveolar bone changes for the intrusion arch technique: A retrospective cohort research

  • Lin Lu;Jiaping Si;Zhikang Wang;Xiaoyan Chen
    • The korean journal of orthodontics
    • /
    • v.54 no.2
    • /
    • pp.79-88
    • /
    • 2024
  • Objective: Alveolar bone loss is a common adverse effect of intrusion treatment. Mandibular incisors are prone to dehiscence and fenestrations as they suffer from thinner alveolar bone thickness. Methods: Thirty skeletal class II patients treated with mandibular intrusion arch therapy were included in this study. Lateral cephalograms and cone-beam computed tomography images were taken before treatment (T1) and immediately after intrusion arch removal (T2) to evaluate the tooth displacement and the alveolar bone changes. Pearson's and Spearman's correlation was used to identify risk factors of alveolar bone loss during the intrusion treatment. Results: Deep overbite was successfully corrected (P < 0.05), accompanied by mandibular incisor proclination (P < 0.05). There were no statistically significant change in the true incisor intrusion (P > 0.05). The labial and lingual vertical alveolar bone levels showed a significant decrease (P < 0.05). The alveolar bone is thinning in the labial crestal area and lingual apical area (P < 0.05); accompanied by thickening in the labial apical area (P < 0.05). Proclined incisors, non-extraction treatment, and increased A point-nasion-B point (ANB) degree were positively correlated with alveolar bone loss. Conclusions: While the mandibular intrusion arch effectively corrected the deep overbite, it did cause some unwanted incisor labial tipping/flaring. During the intrusion treatment, the alveolar bone underwent corresponding changes, which was thinning in the labial crestal area and thickening in the labial apical area vice versa. And increased axis change of incisors, non-extraction treatment, and increased ANB were identified as risk factors for alveolar bone loss in patients with mandibular intrusion therapy.

A Study on Developing Intrusion Detection System Using APEX : A Collaborative Research Project with Jade Solution Company (APEX 기반 침입 탐지 시스템 개발에 관한 연구 : (주)제이드 솔류션과 공동 연구)

  • Kim, Byung-Joo
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.1
    • /
    • pp.38-45
    • /
    • 2017
  • Attacking of computer and network is increasing as information processing technology heavily depends on computer and network. To prevent the attack of system and network, host and network based intrusion detection system has developed. But previous rule based system has a lot of difficulties. For this reason demand for developing a intrusion detection system which detects and cope with the attack of system and network resource in real time. In this paper we develop a real time intrusion detection system which is combination of APEX and LS-SVM classifier. Proposed system is for nonlinear data and guarantees convergence. While real time processing system has its advantages, such as memory efficiency and allowing a new training data, it also has its disadvantages of inaccuracy compared to batch way. Therefore proposed real time intrusion detection system shows similar performance in accuracy compared to batch way intrusion detection system, it can be deployed on a commercial scale.

Design of Intrustion Prevention System(IPS) in Linux Environment (리눅스 환경에서의 침입방지시스템(IPS) 설계)

  • 이상훈;김우년;이도훈;박응기
    • Convergence Security Journal
    • /
    • v.4 no.2
    • /
    • pp.1-7
    • /
    • 2004
  • The growth of incidents on the Internet has reflected growth of the internet itself and growth of the computing Power. while in Previous years, external attacks tended to originate from those interested trend in exploring the Internet for its own sake and testing their skills, there is an increasing trend towards intrusions motivated by financial, Political, and military objectives. so, attacks on the nation's computer infrastructures are becoming an increasingly serious problem. Even though the problem is ubiquitious, government agencies are particularly appealing targets and they tend to be more willing to reveal such events than commercial organizations. The threat of damage made necessity of security's recognition, as a result, many researches have been carried out into security of system actively. Intrusion Detection technology is detection of intrusion using audit data differently from using traditional simple filtering and informs manager of it. It has security manager of system deal with the intrusion more quickly. but, cause current environment of Internet manager can't doing response Intrusion alert immediately That's why IPS needed. IPS can response automatically the intrusion alert. so, manager is more comfortable and can response quickly.

  • PDF