• Title/Summary/Keyword: rogue

Search Result 43, Processing Time 0.026 seconds

Detecting Rogue AP using k-SVM method (k-SVM을 이용한 Rogue AP 탐지 기법 연구)

  • Lee, Jae-Wook;Lee, Si-Young;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.87-95
    • /
    • 2014
  • Under only authorized AP is allowable environment, rogue AP which is generated by a smartphone tethering can be a serious security breach. To solve rogue AP problem, this paper proposes classifying algorithm of Kernel Support Vector Machine using features of RTT data. Through our experiment, we can detect rogue AP from LTE mobile network.

A Study on the Convergence for the Nectar Ritual Painting of Buddhist Worldview and Game Elements of Rogue-like (감로왕도 불교세계관과 로그라이크 게임요소 융합 연구)

  • Lee, Young-Suk
    • Journal of Korea Game Society
    • /
    • v.20 no.2
    • /
    • pp.35-44
    • /
    • 2020
  • This study proposes the method for converging Buddhist Worldview into games. The Rogue-like game "Dungeed" and "Nectar Ritual Painting" were selected for analysis. Next, the characteristics of the Buddhist worldview in Nectar Ritual Painting and the Rogue-like game Dungeed were compared and analyzed. As a result, this study proposed game elements of Rogue-like that analyzed in the characteristics of Buddhist world view. In the future, we will examine the expandability of the game through the Buddhist Worldview.

Relaying Rogue AP detection scheme using SVM (SVM을 이용한 중계 로그 AP 탐지 기법)

  • Kang, Sung-Bae;Nyang, Dae-Hun;Choi, Jin-Chun;Lee, Sok-Joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.431-444
    • /
    • 2013
  • Widespread use of smartphones and wireless LAN accompany a threat called rogue AP. When a user connects to a rogue AP, the rogue AP can mount the man-in-the-middle attack against the user, so it can easily acquire user's private information. Many researches have been conducted on how to detect a various kinds of rogue APs, and in this paper, we are going to propose an algorithm to identify and detect a rogue AP that impersonates a regular AP by showing a regular AP's SSID and connecting to a regular AP. User is deceived easily because the rogue AP's SSID looks the same as that of a regular AP. To detect this type of rogue APs, we use a machine learning algorithm called SVM(Support Vector Machine). Our algorithm detects rogue APs with more than 90% accuracy, and also adjusts automatically detection criteria. We show the performance of our algorithm by experiments.

A Rogue AP Detection Method Based on DHCP Snooping (DHCP 스누핑 기반의 비인가 AP 탐지 기법)

  • Park, Seungchul
    • Journal of Internet Computing and Services
    • /
    • v.17 no.3
    • /
    • pp.11-18
    • /
    • 2016
  • Accessing unauthorized rogue APs in WiFi environments is a very dangerous behavior which may lead WiFi users to be exposed to the various cyber attacks such as sniffing, phishing, and pharming attacks. Therefore, prompt and precise detection of rogue APs and properly alarming to the corresponding users has become one of most essential requirements for the WiFi security. This paper proposes a new rogue AP detection method which is mainly using the installation information of authorized APs and the DHCP snooping information of the corresponding switches. The proposed method detects rogue APs promptly and precisely, and notify in realtime to the corresponding users. Since the proposed method is simple and does not require any special devices, it is very cost-effective comparing to the wireless intrusion prevention systems which are normally based on a number of detection sensors and servers. And it is highly precise and prompt in rogue AP detection and flexible in deployment comparing to the existing rogue AP detection methods based on the timing information, location information, and white list information.

Effective Rogue Access Point Detection Method in Wireless LAN (무선랜 환경에서 효과적인 Rogue AP 탐지 기법)

  • Kang, Daehyun;Kim, Kangseok;Choi, Okkyung;Kim, Kihyung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.733-734
    • /
    • 2011
  • 지난 몇 년 동안 무선랜(Wireless LAN)은 다양한 영역에서 가장 널리 사용 되었으며, 가장 크게 발전을 하였다. 그러나 무선랜의 특성상 해킹과 침투에 취약한 약점을 안고 있다. 아직도 많은 보안적 취약점을 가지고 있으며, 특히 그 중에서도 Rogue AP(Access Point)는 가장 심각한 보안 취약점으로 대두되고 있다. 현재 Rogue AP 탐지를 위하여 넷스텀블러와 같은 스니핑 소프트웨어를 설치하여 주변 지역을 돌아다니는 워드라이빙 형태의 탐지방법은 아직도 사용되고 있다. 그러나, 이러한 방법은 대규모로 확장되어 가는 무선랜 환경에 적합하지 않다. 본 논문은 무선랜 환경에서 Rogue AP 탐지 문제의 해결책을 제시한다. AP의 전파 영역을 이용하는 방식으로, AP가 신호를 받을 수 있도록 수정하여, 주변에 새로운 AP가 탐지될 경우, AP가 서버와 새롭게 발견된 AP에 신호를 보내고, 이를 바탕으로 서버는 WhiteList를 통해서 Rogue AP 여부를 결정한다. 따라서 본 논문의 제안 방식은 기존의 탐지 방식에 비해 Rogue AP의 효과적 탐지가 가능하다.

Experimental Study in Kinematics of Rogue Wave

  • Choi, Hae-Jin;Jung, Kwang-Hyo;Suh, Sung-Bu;Lee, Seung-Jae;Jo, Hyo-Jae;Choi, Han-Suk
    • Journal of Ocean Engineering and Technology
    • /
    • v.25 no.3
    • /
    • pp.11-18
    • /
    • 2011
  • The rogue wave was generated in a two-dimensional wave tank the rogue wave kinematics was investigated including local and convective accelerations of the water particle and verification of existing prediction methods. PIV technique was applied to measure the wave kinematics near the wave crest which extended to compute the local and convective accelerations. The experimental results were compared with several analytical predictions. The convective acceleration under the crest of rogue wave has a similar magnitude with the local acceleration.

A Study on Asynchronous Level Load in a Rogue-Like Game Using Level Streaming (Level Streaming을 활용한 Rogue-Like 게임에서의 Asynchronous Level Load에 관한 연구)

  • ChangWoo Lee;Jaeho Lee;HeaRyeong An;Youngjong Kim
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.35-36
    • /
    • 2023
  • Unreal Engine 5의 Level Streaming 기능은 플레이어가 플레이 도중 메모리에 Map을 로드/언 로드하는 등의 작업을 처리하는 기능이다. 이때 Level Streaming은 커다란 Map의 당장 필요한 부분에만 메모리에 로드하고, 렌더링하여 특히 Seamless Open world 장르에서 많이 사용된다. 본 논문에서 제안하는 방식은 이 Level Streaming 기능을 이용하여 현재 개발 진행 중인 Rogue-Like 장르 게임에서 비동기 방식의 로딩 화면과 Stage 전환을 통해 좀 더 부드러운, 즉 더 높은 Frames per Second(fps)를 플레이어에게 제공하기 위한 새로운 스테이지 시스템의 구현방식을 연구한다.

Rogue AP Protection System Based On Radius Authentication Serve (라디우스 인증 서버를 이용한 Rogue AP 차단 시스템 설계)

  • 김동필;강철범;김상욱
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.316-318
    • /
    • 2004
  • 최근 무선 네트워크 장비의 가격이 하락함에 따라 낮은 전송 속도를 가지는 이동 통신 시스템의 대안으로 무선랜 시스템의 수요가 증가하고 있다. 그러나 무선랜은 특성상 해킹와 침투에 취약한 약점을 안고 있다. 무선랜 환경에서 유선 네트워크와 무선 네트워크를 매개해주는 액세스 포인트는 내부 네트워크안에서만 접속이 이루어진다. 이러한 취약점을 이용하여 공격자는 위장 액세스 포인트를 설치하여 내부 망으로 침투할 수 있게 된다. 본 논문에서는 무선 구간 모니터링을 하여 위장 액세스 포인트를 탐지하고 AAA서버인 라디우스 인증 서버를 사용하여 위장 액세스 포인트를 차단하는 시스템을 제안한다.

  • PDF

Mechanism of Permanent Death in Rogue-like Games (로그라이크 게임에 나타난 영속적 죽음의 매커니즘 연구)

  • Ahn, Jin-Kyoung
    • Journal of Korea Game Society
    • /
    • v.16 no.1
    • /
    • pp.33-42
    • /
    • 2016
  • The Purpose of this study is to analyze the mechanism of permanent death and playing aspects in Rogue-like games. The death in digital game is not only punishment of failure, but reward for player's growth. However the mechanism of permanent death which does not allow to resurrect is critical penalty for players and causes play-cycle with high anxiety. In the mechanism of permanent death, players do critical play to evade the death. But when they replay the game they modify their unethical choices to build alternative game world. Through the mechanism of permanent death which demands critical and alternative play, it could be possible to find the way to design games with serious choice.

Nuclear Weapons Deployment and Diplomatic Bargaining Leverage: The Case of the January 2018 Hawaiian Ballistic Missile Attack False Alarm

  • Benedict E. DeDominicis
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.1
    • /
    • pp.110-134
    • /
    • 2023
  • North Korea's development and deployment of nuclear weapons increases Pyongyang's diplomatic bargaining leverage. It is a strategic response to counteract the great expansion in US leverage with the collapse of the USSR. Post-Cold War American influence and hegemony is justified partly by claiming victory in successfully containing an allegedly imperialist Soviet Union. The US created and led formal and informal international institutions as part of its decades-long containment grand strategy against the USSR. The US now exploits these institutions to expedite US unilateral global preeminence. Third World regimes perceived as remnants of the Cold War era that resist accommodating to American demands are stereotyped as rogue states. Rogue regimes are criminal offenders who should be brought to justice, i.e. regime change is required. The initiation of summit diplomacy between US President Trump and North Korean leader Kim Jong-un occurred following the January 2018 Hawaiian ballistic missile false alarm. This event and its political consequences illustrate the efficacy of nuclear weapons as bargaining leverage for so-called rogue actors. North Korea is highly unlikely to surrender those weapons that were the instigation for the subsequent summit diplomacy that occurred. A broader, critical trend-focused strategic analysis is necessary to adopt a longer-term view of the on-going Korean nuclear crisis. The aim would be to conceptualize long-term policies that increase the probability that nuclear weapons capability becomes a largely irrelevant issue in interaction between Pyongyang, Seoul, Beijing and Washington.