• 제목/요약/키워드: protect

검색결과 7,459건 처리시간 0.036초

Utilizing OpenFlow and sFlow to Detect and Mitigate SYN Flooding Attack

  • Nugraha, Muhammad;Paramita, Isyana;Musa, Ardiansyah;Choi, Deokjai;Cho, Buseung
    • 한국멀티미디어학회논문지
    • /
    • 제17권8호
    • /
    • pp.988-994
    • /
    • 2014
  • Software Defined Network (SDN) is a new technology in computer network area which enables user to centralize control plane. The security issue is important in computer network to protect system from attackers. SYN flooding attack is one of Distributed Denial of Service attack methods which are popular to degrade availability of targeted service on Internet. There are many methods to protect system from attackers, i.e. firewall and IDS. Even though firewall is designed to protect network system, but it cannot mitigate DDoS attack well because it is not designed to do so. To improve performance of DDOS mitigation we utilize another mechanism by using SDN technology such as OpenFlow and sFlow. The methodology of sFlow to detect attacker is by capturing and sum cumulative traffic from each agent to send to sFlow collector to analyze. When sFlow collector detect some traffics as attacker, OpenFlow controller will modify the rule in OpenFlow table to mitigate attacks by blocking attack traffic. Hence, by combining sum cumulative traffic use sFlow and blocking traffic use OpenFlow we can detect and mitigate SYN flooding attack quickly and cheaply.

물리치료사의 환자 의료정보 보호 실천행위 (Behavior for Protecting Patient Medical Record of Physical Therapists)

  • 이인희;박희준;신아미;손창식;김윤년
    • 재활복지공학회논문지
    • /
    • 제3권1호
    • /
    • pp.15-20
    • /
    • 2009
  • 본 연구의 목적은 환자의 치료를 위해 환자와 임상에서 많은 시간을 환자와의 많은 대화 및 소통하는 물리치료사를 대상으로 하여 의료정보에 대한 보호실천행위와 실천의도, 실천태도 등을 조사해 봄으로서 의료정보 보호에 관한 관심을 모으고자 하였다. 8개 병원에 종사하는 물리치료사를 대상으로 설문조사를 거쳐 그 결과를 분석하였으며, 업무의 특성상 항상 의료정보 누출의 위험에 놓여 있는 물리치료사를 대상으로 의료정보보호 행동을 관찰하고 의료정보 보호 행동과 행동의도를 분석하고자 하였다. 연령이 증가하고 건강상태가 좋을수록 의료정보 보호 실천 활동에 연관성이 높은 실천의도와 태도가 정도가 높은 것으로 나타났다. 분석 결과, 현재 의료정보 실천 활동정도는 만족할 만한 수준에는 미치지 못하였으며, 이를 개선하고자하는 노력이 교육 등을 통해서 강조되어야 할 것으로 생각된다.

  • PDF

국내 DTV 서비스 보호를 위한 은닉 노드 마진 연구 (A Study on Hidden Node Margin to Protect DTV Service in Korea)

  • 강규민;조상인;정병장
    • 한국전자파학회논문지
    • /
    • 제22권12호
    • /
    • pp.1165-1171
    • /
    • 2011
  • 본 논문에서는 국내 전파 환경에서 DTV 서비스를 안전하게 보호하면서 동시에 TV 유휴 대역 기기를 효과적으로 운용하기 위해 은닉 노드에 의한 DTV 신호 감쇄 영향을 살펴본다. 이를 위해, 국내 전파 환경을 지리적 특성에 따라 해안형, 분지형, 도시형 지역으로 분류하고, 각 지역을 지형적 특징에 따라 다시 8개 지형으로 세분화하여 측정 지점을 선정한 후 DTV 신호의 은닉 노드 감쇄 정도를 측정하고 분석한다. 국내 대도시의 경우 빌딩 건물 지역과 주상 복합 지역이 다른 나라에 비해 상대적으로 밀집해 있기 때문에, 국내 DTV 서비스를 안전하게 보호하기 위해서는 은닉 노드 마진을 최소한 38 dB 이상 설정해야 한다.

스마트카드 기반의 효율적인 해킹 방지 시스템 설계 (Design of Efficient Hacking Prevention Systems Using a Smart Card)

  • 황선태;박종선
    • Journal of Information Technology Applications and Management
    • /
    • 제11권2호
    • /
    • pp.179-190
    • /
    • 2004
  • This paper describes the design of hacking prevention systems using a smart card. It consists of two parts, i.e., PC authentication and Keyboard-buffer hacking prevention. PC authentication function is a procedure to handle the access control to the target PC. The card's serial number is used for PIN(Personal Identification Number) and is converted into hash-code by SHA-1 hash-function to verify the valid users. The Keyboard-buffer hacking prevention function converts the scan codes into the encoded forms using RSA algorithm on the Java Card, and puts them into the keyboard-buffer to protect from illegal hacking. The encoded information in the buffer is again decoded by the RSA algorithm and displayed on the screen. in this paper, we use RSA_PKCS#1 algorithm for encoding and decoding. The reason using RSA technique instead of DES or Triple-DES is for the expansion to multi-functions in the future on PKI. Moreover, in the ubiquitous computing environment, this smart card security system can be used to protect the private information from the illegal attack in any computing device anywhere. Therefore, our security system can protect PC user's information more efficiently and guarantee a legal PC access authority against any illegal attack in a very convenient way.

  • PDF

중심 가새 골조에 형성되는 연약층을 방지하기 위한 시스템의 내진 성능 평가 (Seismic Performance Evaluation of System to Protect the Occurrence of Weak-Story With Braced Frame)

  • 김다영;유정한
    • 한국공간구조학회논문집
    • /
    • 제19권4호
    • /
    • pp.45-52
    • /
    • 2019
  • The purpose of the paper is to introduce a system that reduces the occurrence of weak-story in the event of earthquake. Weak-story concentrates deformation on the story and causes all member to collapse before the capacity of all member is reached. This paper introduces Strong-Back system (SB) to protect weak story. SB is a hybrid of zipper frame, tied eccentrically braced frame, and elastic truss system and it is divided into elastic and inelastic areas. Elastic areas prevent the generation of weak story by distributing energy, and inelastic areas dissipate energy through buckling or yielding. In this paper, the seismic performance is evaluated by comparing the four type braced frame with SB through push-over analysis. The four criteria are compared from the base shear, the ductility capacity, the column failure order, and the quantity of brace. As a result, SB proved to have sufficient performance to protect the weak-story.

피스톤 스커트 표면의 트라이볼로지 거동에 미치는 표면형상과 코팅의 영향 (The Effects of Surface Porfiles and Coatings on the Tribological Behaviors of the Surfaces of Piston Skirt)

  • 조대현;정순오;원영덕;한만철;이영제
    • Tribology and Lubricants
    • /
    • 제24권3호
    • /
    • pp.122-128
    • /
    • 2008
  • To reduce the friction losses and the wear amounts in the piston assembly two methods were proposed. One is the modification of surface profile of the skirt part. The surface coating is another method to protect the sliding surfaces. To modify the profile of the skirt surfaces the surfaces were ground to have three different shapes of profiles. Also, several coatings, such as graphite, TiN, and $MoS_2$, and DLC, were used to protect the surfaces of the piston skirts. The specimens of the skirt and the cylinder bores were tested with the reciprocating wear tester. SAE 5W40 engine oil was used in boundary lubrication regime. Among several coatings the graphite and DLC coatings were very effective to reduce the friction forces. Especially, DLC film represented much better tribological performances than the others. The friction coefficient of the graphite coating was the lowest, but the graphite coating was not effective to protect the surfaces.

Hashing을 이용한 불법 복제 콘텐츠 검출을 위한 내용 기반 영상 검색 (Content-based Video Retrieval for Illegal Copying Contents Detection using Hashing)

  • 손희수;변성우;이석필
    • 전기학회논문지
    • /
    • 제67권10호
    • /
    • pp.1358-1363
    • /
    • 2018
  • As the usage of the Internet grows and digital media become more diversified, it has become much easier for digital contents to be distributed and shared. This makes easier to access the desired digital contents. On the other hand, there is an increasing need to protect the copyright of digital works. There are some prevalent ways to protect ownership, but they accompany several disadvantages. Among those ways, watermarking methods have the advantage of ensuring invisibility, but they also have a disadvantage that they are vulnerable to external attacks such as a noise and signal processing. In this paper, we propose the detecting method of illegal contents that is robust against external attacks to protect digital works. We extract HSV and LBP features from images and use Euclidian-based hashing techniques to shorten the searching time on high-dimensional and near-duplicate videos. According to the results, the proposed method showed higher detection rates than that of the Watermarking techniques in terms of the images with fabrications or deformations.

Fingerprint Template Protection using Fuzzy Vault

  • 문대성;이성주;정승환;정용화;문기영
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2006년도 하계학술대회
    • /
    • pp.123-132
    • /
    • 2006
  • Biometric-based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as the compromise of the data will be permanent. To protect the biometric data, we need to store it in a non-invertible transformed version. Thus, even if the transformed version is compromised, the actual biometric data remains safe. In this paper, we propose an approach to protect finger-print templates by using the idea of the fuzzy vault. Fuzzy vault is a recently developed cryptographic construct to secure critical data with the fingerprint data in a way that only the authorized user can access the secret by providing the valid fingerprint. We modify the fuzzy vault to protect fingerprint templates and to perform fingerprint verification with the protected template at the same time. This is challenging because the fingerprint verification is performed in the domain of the protected form. Based on the experimental results, we confirm that the proposed approach can perform the fingerprint verification with the protected template.

  • PDF

국제계약에서 투자가보호를 위한 최소보호요건에 관한 연구 (A Study on the Minimum Protection of Investor in International Contract)

  • 김재성
    • 무역상무연구
    • /
    • 제58권
    • /
    • pp.313-328
    • /
    • 2013
  • Today FTA extends over the world and Korea as a main member of international trade is no exception. In the past Korea, as the developing countries, has made endlessly effort to induce foreign investment from foreign enterprise and/or government to be a truly OECD countries today and made it. Korea's trade economy was reached 1 trillion dollars in 2012. Now we have to find a new way to produce, process, procure goods from foreign investment and also need to protect our profit and/or rights within foreign judicial territory. There are two method to protect foreign enterprise or government. First they rely on general principles in WTO or Bilateral Investment Treaty that the principle of equality, national treatment, and most-favored-nation treatment, you can create a predictable environment to protect foreign enterprise and/or government. Second they need to incorporate contractual clauses in their agreement such as stabilization clause, force majeure, arbitration, governing law or sovereign immunity. Of course there are many things left behind to consider I hope it will be helpful to those who prepare foreign investment contract.

  • PDF

벡터 맵 데이터의 정확성과 위상을 고려한 디지털 워터마킹 (Digital Watermarking of 2D Vector Map Data for the Accuracy and Topology of the Data)

  • 김정엽;박수홍
    • Spatial Information Research
    • /
    • 제17권1호
    • /
    • pp.51-66
    • /
    • 2009
  • 정보통신 기술의 발달과 더불어 여러 데이터를 디지털화함에 따라 데이터 소유자의 권리를 보호하고자 하는 저작권 보호에 대한 관심이 많아졌다. 디지털 워터마킹은 저작권 보호를 위한 강력한 방법 중에 하나이다. GIS에서 많이 사용되는 벡터 맵 데이터에 대한 저작권 보호를 위해 본 연구에서는 새로운 디지털 워터마킹 기법을 제안하고자 한다. 제안하는 방법은 CRC의 원리를 이용하여 워터마크를 삽입하고 검출하는 방법으로 실험 결과 여러 공격에서도 삽입한 워터마크를 검출하여 데이터 소유권을 보호할 수 있음을 알 수 있었다. 따라서 제안하는 방법은 벡터 맵 데이터의 소유권을 보호하기 위한 방법으로 활용 가능할 것으로 기대된다.

  • PDF