• Title/Summary/Keyword: sniffing

Search Result 124, Processing Time 0.02 seconds

Effects of Electromagnetic Radiation Exposure on Stress-Related Behaviors and Stress Hormones in Male Wistar Rats

  • Mahdavi, Seyed Mohammad;Sahraei, Hedayat;Yaghmaei, Parichehreh;Tavakoli, Hassan
    • Biomolecules & Therapeutics
    • /
    • v.22 no.6
    • /
    • pp.570-576
    • /
    • 2014
  • Studies have demonstrated that electromagnetic waves, as the one of the most important physical factors, may alter cognitive and non-cognitive behaviors, depending on the frequency and energy. Moreover, non-ionizing radiation of low energy waves e.g. very low frequency waves could alter this phenomenon via alterations in neurotransmitters and neurohormones. In this study, short, medium, and long-term exposure to the extremely low frequency electromagnetic field (ELF-EMF) (1 and 5 Hz radiation) on behavioral, hormonal, and metabolic changes in male Wistar rats (250 g) were studied. In addition, changes in plasma concentrations for two main stress hormones, noradrenaline and adrenocorticotropic hormone (ACTH) were evaluated. ELF-EMF exposure did not alter body weight, and food and water intake. Plasma glucose level was increased and decreased in the groups which exposed to the 5 and 1Hz wave, respectively. Plasma ACTH concentration increased in both using frequencies, whereas noradrenaline concentration showed overall reduction. At last, numbers of rearing, sniffing, locomotor activity was increased in group receiving 5 Hz wave over the time. In conclusions, these data showed that the effects of 1 and 5 Hz on the hormonal, metabolic and stress-like behaviors may be different. Moreover, the influence of waves on stress system is depending on time of exposure.

Analysis on a New Intrinsic Vulnerability to Keyboard Security (PS/2 키보드에서의 RESEND 명령을 이용한 패스워드 유출 취약점 분석)

  • Lee, Kyung-Roul;Yim, Kang-Bin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.177-182
    • /
    • 2011
  • This paper introduces a possibility for attackers to acquire the keyboard scan codes through using the RESEND command provided by the keyboard hardware itself, based on the PS/2 interface that is a dominant interface for input devices. Accordingly, a keyboard sniffing program using the introduced vulnerability is implemented to prove the severeness of the vulnerability, which shows that user passwords can be easily exposed. As one of the intrinsic vulnerabilities found on the existing platforms, for which there were little considerations on the security problems when they were designed, it is required to consider a hardware approach to countermeasure the introduced vulnerability.

A Method for Detecting Unauthorized Access Point over 3G Network (3G망을 사용하는 인가되지 않은 AP 탐지 방법)

  • Kim, I-luk;Cho, Jae-Ik;Shon, Tae-Shik;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.259-266
    • /
    • 2012
  • Malicious rogue AP has been used for variety attacks such as packet sniffing and Man-In-The-Middle Attack. It is used for the purpose of data leakage via 3G network within companies, and the unauthorized AP could be a reason of security incidents even though it is not intended. In this paper, we propose the method for detecting unauthorized access point over 3G networks throughout the RTT (Round Trip Time) value for classification. Through the experiments, we show that the method can classify the AP which is installed by normal way and the AP over 3G networks successfully.

Developing a Analysis Tool of Canopen Over EtherCat Protocol (Canopen over EtherCAT 프로토콜 분석 도구 개발)

  • Youn, Seung-Hui;Lee, Hyo-Rim;Choi, Guk-Choel;Lee, Chang-Hong;Kim, Dong-Hyun;Kim, Jong-Deok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.434-437
    • /
    • 2021
  • Canopen over EtherCAT(CoE) is a Canopen protocol that operates based on EtherCAT in industrial sites. In order to analyze a CoE network system and a performance through packet sniffing and reversing, it is necessary to know Data Objects structure and changes of its value. However, since Data Objects in Canopen is dependent on the devices, there is a limitation by using an existing packet analysis program like a Wireshark. Therefore, we designed and developed a system that infers Data Objects structure and system configuration.

  • PDF

A Study of Implementation for Home Networking Security System (홈 네트워크를 위한 보안 시스템 구현에 관한 연구)

  • Seol, Jeong-Hwan;Kim, In-Kyum;Lee, Ki-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.616-619
    • /
    • 2008
  • In this paper, we design and implement the authentication system for home network service and applied it to actual sensor nodes. We achieved authentication key, encryption and decryption applied RC5 encryption algorithm of SNEP. In addition, we used pair-wise key pre-distribution for prevention of authentication sniffing in wireless sensor network. The experiment environment consists of a base station receiving data and sensor nodes sending data. Each sensor nodes sends both the data and encrypted authentication key to the base station. As a simulation environment, we assumed some what-if scenarios of security menaces in home network service. And we slightly altered the TOS_Msg construction of TinyOS. The experiences had shown that the malfunction doesn't happen in communication among other groups. And we confirmed in tests that the system is secure when a sensor having malicious propose is added.

  • PDF

PERFORMANCE OF THE GOAT FED GRASS, SHRUB AND TREE FODDERS DURING THE DRY SEASON IN BALI, INDONESIA

  • Sukanten, I.W.;Nitis, I.M.;Uchida, S.;Putra, S.;Lana, K.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.9 no.4
    • /
    • pp.381-387
    • /
    • 1996
  • An experiment was carried out for 12 weeks to study the feeding behaviour, growth and carcass characteristics of cross-bred goats. Nine bucks with an average live weight of $18.02{\pm}0.9kg$ were allocated in a completely randomized block design arrangement, consisting of three feeding regimes and three blocks. The feeding regimes consisted of 100% natural grass (Treatment A), 100% gliricidia leaf (Treatment B) and 100% ficus leaf (Treatment C). Frequency of turning-over and sniffing the feed and duration and frequency of ruminating, defaecating, and urination of goats in treatment B were longer, while duration of masticating and jaw movement of chewing one bolus was shorter than those of goats in treatments C and A (p < 0.05). Furthermore, goats in treatment B gained more live weight, consumed more feed, consumed less water and was more efficient in utilizing the feed than goats in treatments C or A (p < 0.05). The dressing percentage, carcass length and carcass fat of goats in treatment B were higher and their bone percentages were lower than those in treatments C and A (p < 0.05). There is an indication that feeding gliricidia and ficus leaves during the dry season could not only increase the body weight and improve carcass quality of the goat but also save water for household needs.

Mobile Malicious AP Detection and Cut-off Mechanism based in Authentication Network (인증 네트워크 상의 비 인가된 모바일 AP 탐지 및 차단 기법)

  • Lim, Jae-Wan;Jang, Jong-Deok;Yoon, Chang-Pyo;Ryu, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.55-61
    • /
    • 2012
  • Owing to the development of wireless infrastructure and mobile communication technology, There is growing interest in smart phone using it. The resulting popularity of smart phone has increased the Mobile Malicious AP-related security threat and the access to the wireless AP(Access Point) using Wi-Fi. mobile AP mechanism is the use of a mobile device with Internet access such as 3G cellular service to serve as an Internet gateway or access point for other devices. Within the enterprise, the use of mobile AP mechanism made corporate information management difficult owing to use wireless system that is impossible to wire packet monitoring. In this thesis, we propose mobile AP mechanism-based mobile malicious AP detection and prevention mechanism in radius authentication server network. Detection approach detects mobile AP mechanism-based mobile malicious AP by sniffing the beacon frame and analyzing the difference between an authorized AP and a mobile AP mechanism-based mobile malicious AP detection.

Endotracheal Intubation of Paramedics in a Moving Ambulance (이동 중 구급차에서 1급 응급구조사의 기관내 삽관)

  • Shim, Gyu-Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.11
    • /
    • pp.5292-5298
    • /
    • 2012
  • The purpose of this study is to perform the effectively advanced airway management in an emergency patient with cardiac arrest and trauma by comparing the appearance of influence in a change of visual-field height upon endotracheal intubation according to a change in position with intubation of paramedics in a moving ambulance and by analyzing the appearance of the influence in a patient's change in position with intubation upon speed in endotracheal intubation. Research subjects were randomly extracted 60(30 people for control group, 30 people for experimental group) people as the paramedics who are working at 13 fire stations in C Province. Data analysis was carried out ${\chi}^2$-test, independent t-test, paired t-test by using SPSS WIN 14.0 Version. As a result of research, to improve speed of the advanced airway management, it is considered to be likely effective in a patient's sniffing position and in the endotracheal intubation in the upper space of the main stretcher. The self-confidence in intubation after experiment increased significantly. Thus, the continuous education(training) on the intubation position and method within ambulance is considered to be likely needed for improving efficiency of the advanced airway management.

Building of Remote Control Attack System for 2.4 GHz Wireless Keyboard Using an Android Smart Phone (안드로이드 스마트폰을 이용한 2.4 GHz 무선 키보드 원격제어 공격 시스템 구축)

  • Lee, Su-Jin;Park, Aesun;Sim, Bo-Yeon;Kim, Sang-su;Oh, Seung-Sup;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.871-883
    • /
    • 2016
  • It has been steadily increasing to use a wireless keyboard via Radio Frequency which is the input device. Especially, wireless keyboards that use 2.4 GHz frequency band are the most common items and their vulnerabilities have been reported since 2010. In this paper, we propose a 2.4 GHz wireless keyboard keystroke analysis and injection system based on the existing vulnerability researches of the Microsoft 2.4 GHz wireless keyboards. This system is possible to control on the remote. We also show that, via experiments using our proposed system, sensitive information of user can be revealed in the real world when using a 2.4 GHz wireless keyboard.

Dummy Data Insert Scheme for Privacy Preserving Frequent Itemset Mining in Data Stream (데이터 스트림 빈발항목 마이닝의 프라이버시 보호를 위한 더미 데이터 삽입 기법)

  • Jung, Jay Yeol;Kim, Kee Sung;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.383-393
    • /
    • 2013
  • Data stream mining is a technique to obtain the useful information by analyzing the data generated in real time. In data stream mining technology, frequent itemset mining is a method to find the frequent itemset while data is transmitting, and these itemsets are used for the purpose of pattern analyze and marketing in various fields. Existing techniques of finding frequent itemset mining are having problems when a malicious attacker sniffing the data, it reveals data provider's real-time information. These problems can be solved by using a method of inserting dummy data. By using this method, a attacker cannot distinguish the original data from the transmitting data. In this paper, we propose a method for privacy preserving frequent itemset mining by using the technique of inserting dummy data. In addition, the proposed method is effective in terms of calculation because it does not require encryption technology or other mathematical operations.