• Title/Summary/Keyword: legitimate

Search Result 376, Processing Time 0.024 seconds

Minority First Gateway for Protecting QoS of Legitimate Traffic from Intentional Network Congestion (인위적인 네트워크 혼잡으로부터 정상 트래픽의 서비스 품질을 보호하기 위한 소수자 우선 게이트웨이)

  • Ann Gae-Il
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.7B
    • /
    • pp.489-498
    • /
    • 2005
  • A Denial of Sewice (DoS) attack attempts to prevent legitimate users of a sewice from being adequately served by monopolizing networks resources and, eventually, resulting in network or system congestion. This paper proposes a Minority First (MF) gateway, which is capable of guaranteeing the Quality of Service (QoS) of legitimate service traffic under DoS situations. A MF gateway can rapidly determine whether an aggregated flow is a congestion-inducer and can protect the QoS of legitimate traffic by providing high priority service to the legitimate as aggregate flows, and localize network congestion only upon attack traffic by providing low priority to aggregate flows regarded as congestion-inducer. We verify through simulation that the suggested mechanism possesses excellence in that it guarantees the QoS of legitimate traffic not only under a regular DoS occurrence, but also under a Distributed DoS (DDoS) attack which brings about multiple concurrent occurrences of network congestion.

The Legitimate and Eldest Son Complex in Changseongameirok (<창선감의록>의 적장자 콤플렉스)

  • Jo, Kwangkuk
    • Journal of Korean Classical Literature and Education
    • /
    • no.38
    • /
    • pp.65-101
    • /
    • 2018
  • In the late Joseon Dynasty, patriarchal ideology became central to the family and the clan, and once again became acutely felt with "the familism of clan rules that centered around a legitimate and eldest son." The establishment of the family-clan system, though somewhat complex, was largely aimed at the family line of "a paternalist-a legitimate and eldest son." The trend was not limited to a particular family, but rather, was a historical and social trend. Changseonggameirok showed how to solve the family crisis by setting up a problem for the next generation's patriarch. This paper tries to explain the issue of Hwachun's complex as the legitimate and eldest son complex. First, it suggests that Hwachun's complex is as universal as the Cain complex, also known as the eldest son complex, and that Hwachun's complex is a special instance of the legitimate and eldest son complex in Changseonggameirok. Next this paper studies the aspects of Hwachun's legitimate and eldest son complex combined with Mrs. Sim's complex, as well as her daughter-in-law's complex, and eventually tracks the development of the family-clan complex. As a result, we've come to a new conclusion that the legitimate and eldest son complex was found in Changseonggameirok for the first time in Korean literary history. This paper also examines the fact that when the legitimate and eldest son complex was transferred to Hwajin, it became a family complex that Hwajin had to contend with; this paper tracks the process wherein Hwajin's filial piety solved the legitimate and eldest son complex. As a result, we realized that Hwajin's filial duty and brotherly love went beyond his feelings for Mrs. Sim and Hwachun, and supported the substantiation for "the familism of a clan that is based on rules of the legitimate and eldest son" in the course of public opinion. However the familism of these rules was not embodied in the absolute; in the royal family, for example, it was rather flexibly implemented when the characters admitted to breaking the law. In addition, this paper provides the room for a critical reading of Changseonggameirok, reflecting back on the underlying guilt and psychological pain of the characters who are affected by the particular rules, and concluding that guilt and suffering are fundamentally insoluble. This is because the two ideas, "the legitimate and eldest son complex" and "the familism of a clan rules centered on a legitimate and eldest son" are two sides of the same coin.

A Study on the ICSID Arbitration Cases for Fair and Equitable Treatment under International Investment Disputes - Focusing on the Protection of the Investor's Legitimate Expectations - (국제투자분쟁에서 공정·공평 대우에 관한 ICSID 중재사례 연구 - 외국인투자자의 정당한 기대 보호를 중심으로 -)

  • HWANG, Ji-Hyeon
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.71
    • /
    • pp.195-216
    • /
    • 2016
  • In determining the content of the FET standard, the tribunals stated protection of investor's legitimate expectations, due process and denial of justice, transparency, discrimination and arbitrariness, good faith, etc. The most major elements of the FET standard is the protection of the investor's legitimate and reasonable expectations. It is necessary to consider whether it is possible to what the expectations of investors are protected as legitimate and it is formed under any circumstances. If host state frustrate investor's legitimate expectations, it found a breach of the FET. The host state's specific assurance may reinforce investor's expectations, but such explicit statement is not always necessary. The host state must preserve a stable environment for investments. However, It must not be understood as the inalterability of the host state's legal framework. It implies that the host state's subsequent changes should be made consistently and predictably. The host state is entitled to exercise a reasonable regulatory authority to respond to changing circumstances in the public purpose. Therefore, whether the violation FET shall be determined through a balanced against the investor's legitimate expectations and the host state's reasonable regulatory exercise in the public interest. And investor should keep in mind that the principle of proportionality is applied unless host state provides stabilization clause or similar commitments to investor. Also host state should establish the basis of an argument about reasonable regulatory authority for public interest.

  • PDF

Information leakage in bi-directional IFD communication system with simultaneously transmitted jamming sequence

  • Ju, Hyungsik;Gwak, Donghyuk;Kim, Tae-Joong
    • ETRI Journal
    • /
    • v.42 no.1
    • /
    • pp.138-149
    • /
    • 2020
  • In this paper, we describe a simultaneously transmitted jamming (ST-jamming) for bi-directional in-band full-duplex (IFD) system to improve information security at the physical layer. By exploiting ST-jamming, each legitimate user transmits data samples and jamming samples together in one orthogonal frequency division multiplexing symbol according to given traffic asymmetry. Regardless of the traffic difference in both directions in IFD communication, eavesdropping of confidential information is prevented in both directions simultaneously without the loss of data rate. We first propose an encoding scheme and the corresponding decoding scheme for ST-jamming to be used by the legitimate users. In addition, we study a transceiver structure of the legitimate users including a baseband modem uniquely designed for the use of ST-jamming. The leakage of confidential information at an eavesdropper is then quantified by studying the mutual information between the confidential transmit signals and the received signals of the eavesdropper. Simulation results show that the proposed ST-jamming significantly reduces the leakage of legitimate information at the eavesdropper.

Secure Broadcasting Using Multiple Antennas

  • Ekrem, Ersen;Ulukus, Sennur
    • Journal of Communications and Networks
    • /
    • v.12 no.5
    • /
    • pp.411-432
    • /
    • 2010
  • We consider three different secure broadcasting scenarios: i) Broadcast channels with common and confidential messages (BCC), ii) multi-receiver wiretap channels with public and confidential messages, and iii) compound wiretap channels. The BCC is a broadcast channel with two users, where in addition to the common message sent to both users, a private message, which needs to be kept hidden as much as possible from the other user, is sent to each user. In this model, each user treats the other user as an eavesdropper. The multi-receiver wiretap channel is a broadcast channel with two legitimate users and an external eavesdropper, where the transmitter sends a pair of public and confidential messages to each legitimate user. Although there is no secrecy concern about the public messages, the confidential messages need to be kept perfectly secret from the eavesdropper. The compound wiretap channel is a compound broadcast channel with a group of legitimate users and a group of eavesdroppers. In this model, the transmitter sends a common confidential message to the legitimate users, and this confidential message needs to be kept perfectly secret from all eavesdroppers. In this paper, we provide a survey of the existing information-theoretic results for these three forms of secure broadcasting problems, with a closer look at the Gaussian multiple-input multiple-output (MIMO) channel models. We also present the existing results for the more general discrete memoryless channel models, as they are often the first step in obtaining the capacity results for the corresponding Gaussian MIMO channel models.

Hybrid Scaling Based Dynamic Time Warping for Detection of Low-rate TCP Attacks

  • So, Won-Ho;Yoo, Kyoung-Min;Kim, Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.7B
    • /
    • pp.592-600
    • /
    • 2008
  • In this paper, a Hybrid Scaling based DTW (HS-DTW) mechanism is proposed for detection of periodic shrew TCP attacks. A low-rate TCP attack which is a type of shrew DoS (Denial of Service) attacks, was reported recently, but it is difficult to detect the attack using previous flooding DoS detection mechanisms. A pattern matching method with DTW (Dynamic Time Warping) as a type of defense mechanisms was shown to be reasonable method of detecting and defending against a periodic low-rate TCP attack in an input traffic link. This method, however, has the problem that a legitimate link may be misidentified as an attack link, if the threshold of the DTW value is not reasonable. In order to effectively discriminate between attack traffic and legitimate traffic, the difference between their DTW values should be large as possible. To increase the difference, we analyze a critical problem with a previous algorithm and introduce a scaling method that increases the difference between DTW values. Four kinds of scaling methods are considered and the standard deviation of the sampling data is adopted. We can select an appropriate scaling scheme according to the standard deviation of an input signal. This is why the HS-DTW increases the difference between DTW values of legitimate and attack traffic. The result is that the determination of the threshold value for discrimination is easier and the probability of mistaking legitimate traffic for an attack is dramatically reduced.

Traffic Seasonality aware Threshold Adjustment for Effective Source-side DoS Attack Detection

  • Nguyen, Giang-Truong;Nguyen, Van-Quyet;Nguyen, Sinh-Ngoc;Kim, Kyungbaek
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2651-2673
    • /
    • 2019
  • In order to detect Denial of Service (DoS) attacks, victim-side detection methods are used popularly such as static threshold-based method and machine learning-based method. However, as DoS attacking methods become more sophisticated, these methods reveal some natural disadvantages such as the late detection and the difficulty of tracing back attackers. Recently, in order to mitigate these drawbacks, source-side DoS detection methods have been researched. But, the source-side DoS detection methods have limitations if the volume of attack traffic is relatively very small and it is blended into legitimate traffic. Especially, with the subtle attack traffic, DoS detection methods may suffer from high false positive, considering legitimate traffic as attack traffic. In this paper, we propose an effective source-side DoS detection method with traffic seasonality aware adaptive threshold. The threshold of detecting DoS attack is adjusted adaptively to the fluctuated legitimate traffic in order to detect subtle attack traffic. Moreover, by understanding the seasonality of legitimate traffic, the threshold can be updated more carefully even though subtle attack happens and it helps to achieve low false positive. The extensive evaluation with the real traffic logs presents that the proposed method achieves very high detection rate over 90% with low false positive rate down to 5%.

Legitimate Public Policy Objectives of and Exceptions to Digital Trade Agreements (디지털 무역협정의 예외 조항 및 사례 연구: 정당한 공공정책 목표를 중심으로)

  • Jin-Kyu Kim;Dong-Young Kim
    • Korea Trade Review
    • /
    • v.48 no.4
    • /
    • pp.285-301
    • /
    • 2023
  • The growing impact of cross-border movement of information is increasing interest in information policy through digital trade agreements in major trading countries. Major trading partners are calling for the inclusion of their digital policies in trade agreements to strengthen market dominance and protect personal information. This study analyzes the meaning and disputed settlement cases of the WTO's public policy objectives and examines the tendency of stakeholders to standardize legitimate exceptions to public policy objectives in digital trade. The study also examines the desirable direction of digital trade standardization suitable for the changing international trade environment. There is still debate about the specific objectives that should be included and the extent to which they should be allowed to restrict trade, however this study finds that there is a growing consensus on the need for legitimate public policy objectives to be included in digital trade agreements. The study concludes that the desirable direction of digital trade standardization is to strike a balance between the need to protect legitimate public policy objectives and the need to liberalize digital trade. This balance will need to be adjusted as the international trade environment continues to change.

A Study on the Supplement of the Architecture Act Related to the Act of Disability Discrimination - Focusing on the Cultural and Arts Facilities - (장애인차별금지법에 대한 건축 관련법의 보완에 관한 연구 - 문화예술시설을 중심으로 -)

  • Cho, Cheol-Ho;Soh, Jun-Young
    • Korean Institute of Interior Design Journal
    • /
    • v.20 no.6
    • /
    • pp.340-349
    • /
    • 2011
  • The Act of Disability Discrimination and Rights Restriction established in 2008 states that all services including cultural and artistic activities should be fair and easily accessible for both disabled and non-disabled. While the previous society focused on providing the basic necessaries of life to disabled, the modern society gradually tuming their attention to improving quality of the life of disabled, especially in culture and art related activities. The Act of Disability Discrimination and Rights Restriction also states that the services for cultural and artistic activities should be provided from 2010. However in reality, there are contradictions among the Disability Discrimination Act, the Convenience Improvement Act for the Disabled, the Aged, and the Pregnant Woman, and the laws related architecture. So they are having difficulties technically with applying these laws. First, this research contains the comparison of domestic and foreign acts related to the legitimate accommodation uses of cultural and arts facilities for the disabled. Second, this research also lists the facts of conflict between the laws of legitimate accommodation uses for the disabled and the Architecture related laws. Finally, several suggestions are stating for the complementarily improved architecture-related laws which were based on the standard of foreign countries for the disabled.

Wigner-Ville Distribution Applying the Rotating Window and Its Characteristics (회전 창문함수를 적용한 위그너-빌 분포함수와 그 특성)

  • 박연규;김양한
    • Journal of KSNVE
    • /
    • v.7 no.5
    • /
    • pp.747-756
    • /
    • 1997
  • Wigner-Ville distribution which is a time-frequency analysis has a fatal drawback, when the signal has multiple components. This is the cross-talk and often causes a neagative value in the distribution. Wingner-Ville distriution is an expression of power, therefore the cross-talk must be avoided. Smoothing the Wigner-Ville distribution by convoluting it with a window, is most commonly used to reduce the cross-talk. There can be infinite number of distributions depending on the windows. But, the smoothing reduces resolution in time-frequency plane; this motives to design a more effective window in reducing cross-talk while remaining resolution. The domain in which the cross-talk and legitimate components can be easily distinguished, is the ambiguity function. In the ambiguity function domain, the legitimate components appear as linear lines passing through the orgine. But, the cross-talk is widely distributes in the ambiguity function plane. Based on the relative distributions of cross-talk and legitimate components, rotating window can be designed to minimize cross-talk. Applying the rotating window to the ambiguity function corresponds to smoothing the Wigner-Ville distribution. Therefore, the effects of rotating window is estimated in terms of the bias error due to smooting the Wigner-Ville distribution. By applying the rotating window, not only the Wigner-Ville distribution but also its properties are changed. The properties of the new distribution are checked, in order to complete analyzing the rotating window.

  • PDF