• Title/Summary/Keyword: network address mutation technology

Search Result 4, Processing Time 0.021 seconds

A Study on the Impact of Applying Network Address Mutation Technology within the Network Protection System (네트워크 보호체계에서 네트워크 주소변이 기술 적용에 대한 영향성 연구)

  • Suwon Lee;Seyoung Hwang;SeukGue Hong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.939-946
    • /
    • 2023
  • In the hyper-connected network, which network equipment is diverse and network structure is complex, the attack surface has also increased. In this environment, MTD(Moving Target Defense) technology is being researched as a method to fundamentally defend against cyber attacks by actively changing the attack surface. network-based MTD technologies are being widely studied. However, in order for network address mutation technology to be applied within the existing fixed IP-based system, research is needed to determine what impact it will have. In this paper, we studied the impact of applying network address mutation technology to the existing network protection system. As a result of the study, factors to be considered when firewall, NAC, IPS, and network address mutation technologies are operated together were derived, and elements that must be managed in network address mutation technology for interoperability with the network analysis system were suggested.

An Approach for Applying Network-based Moving Target Defense into Internet of Things Networks

  • Park, Tae-Keun;Park, Kyung-Min;Moon, Dae-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.9
    • /
    • pp.35-42
    • /
    • 2019
  • In this paper, we propose an approach to apply network-based moving target defense into Internet of Things (IoT) networks. The IoT is a technology that provides the high interconnectivity of things like electronic devices. However, cyber security risks are expected to increase as the interconnectivity of such devices increases. One recent study demonstrated a man-in-the-middle attack in the statically configured IoT network. In recent years, a new approach to cyber security, called the moving target defense, has emerged as a potential solution to the challenge of static systems. The approach continuously changes system's attack surface to prevent attacks. After analyzing IPv4 / IPv6-based moving target defense schemes and IoT network-related technologies, we present our approach in terms of addressing systems, address mutation techniques, communication models, network configuration, and node mobility. In addition, we summarize the direction of future research in relation to the proposed approach.

Task Scheduling and Resource Management Strategy for Edge Cloud Computing Using Improved Genetic Algorithm

  • Xiuye Yin;Liyong Chen
    • Journal of Information Processing Systems
    • /
    • v.19 no.4
    • /
    • pp.450-464
    • /
    • 2023
  • To address the problems of large system overhead and low timeliness when dealing with task scheduling in mobile edge cloud computing, a task scheduling and resource management strategy for edge cloud computing based on an improved genetic algorithm was proposed. First, a user task scheduling system model based on edge cloud computing was constructed using the Shannon theorem, including calculation, communication, and network models. In addition, a multi-objective optimization model, including delay and energy consumption, was constructed to minimize the sum of two weights. Finally, the selection, crossover, and mutation operations of the genetic algorithm were improved using the best reservation selection algorithm and normal distribution crossover operator. Furthermore, an improved legacy algorithm was selected to deal with the multi-objective problem and acquire the optimal solution, that is, the best computing task scheduling scheme. The experimental analysis of the proposed strategy based on the MATLAB simulation platform shows that its energy loss does not exceed 50 J, and the time delay is 23.2 ms, which are better than those of other comparison strategies.

Brain Somatic Mutations in Epileptic Disorders

  • Koh, Hyun Yong;Lee, Jeong Ho
    • Molecules and Cells
    • /
    • v.41 no.10
    • /
    • pp.881-888
    • /
    • 2018
  • During the cortical development, cells in the brain acquire somatic mutations that can be implicated in various neurodevelopmental disorders. There is increasing evidence that brain somatic mutations lead to sporadic form of epileptic disorders with previously unknown etiology. In particular, malformation of cortical developments (MCD), ganglioglioma (GG) associated with intractable epilepsy and non-lesional focal epilepsy (NLFE) are known to be attributable to brain somatic mutations in mTOR pathway genes and others. In order to identify such somatic mutations presenting as low-level in epileptic brain tissues, the mutated cells should be enriched and sequenced with high-depth coverage. Nevertheless, there are a lot of technical limitations to accurately detect low-level of somatic mutations. Also, it is important to validate whether identified somatic mutations are truly causative for epileptic seizures or not. Furthermore, it will be necessary to understand the molecular mechanism of how brain somatic mutations disturb neuronal circuitry since epilepsy is a typical example of neural network disorder. In this review, we overview current genetic techniques and experimental tools in neuroscience that can address the existence and significance of brain somatic mutations in epileptic disorders as well as their effect on neuronal circuitry.