• Title/Summary/Keyword: trick

Search Result 82, Processing Time 0.025 seconds

A Study on DDoS Detection Technique based on Cluster in Mobile Ad-hoc Network (무선 애드혹 망에서 클러스터 기반 DDoS 탐지 기법에 관한 연구)

  • Yang, Hwan-Seok;Yoo, Seung-Jae
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.25-30
    • /
    • 2011
  • MANET has a weak construction in security more because it is consisted of only moving nodes and doesn't have central management system. The DDoS attack is a serious attack among these attacks which threaten wireless network. The DDoS attack has various object and trick and become intelligent. In this paper, we propose the technique to raise DDoS detection rate by classifying abnormal traffic pattern. Cluster head performs sentinel agent after nodes which compose MANET are made into cluster. The decision tree is applied to detect abnormal traffic pattern after the sentinel agent collects all traffics and it judges traffic pattern and detects attack also. We confirm high attack detection rate of proposed detection technique in this study through experimentation.

PSMS Design and Implementation for a Phishing Attack Intercept (피싱공격 차단을 위한 PSMS 설계 및 구현)

  • Yoo, Jae-Hyung;Lee, Dong-Hwi;Yang, Jae-Su;Park, Sang-Min;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.8 no.1
    • /
    • pp.49-56
    • /
    • 2008
  • Recently, Phising attack uses trick of URL and sites, and technical concealment method which infiltrates sophisticated malicious code. However, sometimes Phising security technology cannot cover all of Phising methods. Consequently, this research proposes inspection to solve this problem. First, we can install Proxy server for a strong open information exchange of web environment between web servers and clients. Therefore, it compares and analyzes harmful site and Phising URL with White domain list, and filters them. Finally, designs for stable web based information so that we can block Phising with least regulation and active control. So the purpose of this paper is introducing this design system and structure, and inspect them.

  • PDF

Estimation of nonlinear GARCH-M model (비선형 평균 일반화 이분산 자기회귀모형의 추정)

  • Shim, Joo-Yong;Lee, Jang-Taek
    • Journal of the Korean Data and Information Science Society
    • /
    • v.21 no.5
    • /
    • pp.831-839
    • /
    • 2010
  • Least squares support vector machine (LS-SVM) is a kernel trick gaining a lot of popularities in the regression and classification problems. We use LS-SVM to propose a iterative algorithm for a nonlinear generalized autoregressive conditional heteroscedasticity model in the mean (GARCH-M) model to estimate the mean and the conditional volatility of stock market returns. The proposed method combines a weighted LS-SVM for the mean and unweighted LS-SVM for the conditional volatility. In this paper, we show that nonlinear GARCH-M models have a higher performance than the linear GARCH model and the linear GARCH-M model via real data estimations.

Fast Image Splicing Detection Algorithm Using Markov Features (마코프 특징을 이용하는 고속 위조 영상 검출 알고리즘)

  • Kim, Soo-min;Park, Chun-Su
    • Journal of IKEEE
    • /
    • v.22 no.2
    • /
    • pp.227-232
    • /
    • 2018
  • Nowadays, image manipulation is enormously popular and easier than ever with tons of convenient images editing tools. After several simple operations, users can get visually attractive images which easily trick viewers. In this paper, we propose a fast algorithm which can detect the image splicing using the Markov features. The proposed algorithm reduces the computational complexity by removing unnecessary Markov features which are not used in the image splicing detection process. The performance of the proposed algorithm is evaluated using a famous image splicing dataset which is publicly available. The experimental results show that the proposed technique outperforms the state-of-the-art splicing detection methods.

A Study of the Cross Certification in Internet Banking (인터넷뱅킹에서의 상호인증에 관한 연구)

  • Lee, Young Gyo;Ahn, Jeong Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.87-97
    • /
    • 2014
  • Pharming attack is a confidence trick that the hacker catch away customers financial information on Internet banking. At first, a hacker installs malicious execution code on customers PC in secret. As a customer tries to connect a Internet banking Web site, the malicious code changes it to phishing site in Internet explorer. The hacker catch away customers financial information in process of internet banking. The hacker steals money from customer's bank account using stolen information. PKI is a widespread and strong technology for providing the security using public key techniques. The main idea of PKI is the digital certificate that is a digitally signed statement binding an user's identity information and his public key. The Internet banking service stands on the basis of PKI. However, the bank is trusted in natural, the only customer is certified in the present Internet banking. In this paper, we propose a method of cross certification in Internet banking. The customer certify a bank and the bank certify the customer in proposed method. The method can service to customer the secure Internet banking about pharming attack. We compare the proposed method with other methods.

A Study on the Origin decision standard and Certificate of Origin Preparation of Korea.ASEAN FTA (한.아세안 FTA의 원산지결정기준과 원산지증명서 작성에 관한 연구)

  • Nam, Phung-Woo;Choi, Jun-Ho
    • International Commerce and Information Review
    • /
    • v.9 no.2
    • /
    • pp.183-203
    • /
    • 2007
  • Origin regulation of Korea AESAN FTA prescribe by general standard fulfills alteration standards 40% standard or HS 4 units three times regional deputy inflicts, and define in item different place of origin(PSR) about 447 items as the exception. Also, Korea AESAN FTA except broad principles that decide place of origin in ASEAN FTA accumulation standard, smile standard, place of origin disapproval process standard and directly various repletion standard such as transport principle introduce. But, most export trader are circumstance judging can charge preferential tariff if export trader submits sending certificate of origin in the customs service without deep comprehension about place of origin regulation. Therefore, will have to be knowing well place of origin decision standard and creation trick of certificate of origin to receive exactly preferential tariff benefit. Also, because it can be difficult that all registered customs brokers who is acting for certificate of origin issuance booking get acquainted in place of origin problem, it is expected to can become confrontation plan train FTA and place of origin professional registered customs brokers.

  • PDF

Improvement Applied Cooling Off Period and A received Commodity Notice Period - the law related electronic commerce to protect customers' rights - (청약철회기간 및 상품수령통지기간의 적용 개선 방안 - 전자상거래등에서의 소비자보호에 관한 법률 -)

  • Chae, Hun;Kyung, Moon-Soo
    • International Commerce and Information Review
    • /
    • v.10 no.3
    • /
    • pp.75-99
    • /
    • 2008
  • In the commercial transaction sellers use various sales strategies to increase profits, and this kind of sales strategies often causes damage to customers, it, moreover, is true that these examples happen in the electronic commercial market much more than in traditional one because of the characteristics if the electronic commerce. That's why people transact one another without face-to-face meeting in the electronic commerce market, so people one likely to fall for a trick to cheat and deceive. It's no doubt that the frequency of crime is higher than in face-to-face market. For that reason Cooling Off System, Consumer Compensation Insurance, Mutual Aid Association and Billing Payment Deposit System are in force the law related electronic commerce to protect customers' rights. In this paper it will be discussed about the periods of Cooling Off System and a received commodity notice of the Billing Payment Deposit System. Regarding these periods seven days for Cooling Off period and three days for a received commodity notice period are stipulated under the law of related electronic commerce to protect customers' rights, But each period has to be differentiated depending on each goods for this period to be reasonable and proper. Therefore in this study it will be focused on these facts and each period will be classified by the goods' purpose of purchase and quality.

  • PDF

Performance and competitiveness of red vs. green phenotypes of a cyanobacterium grown under artificial lake browning

  • Erratta, Kevin;Creed, Irena;Chemali, Camille;Ferrara, Alexandra;Tai, Vera;Trick, Charles
    • ALGAE
    • /
    • v.36 no.3
    • /
    • pp.195-206
    • /
    • 2021
  • Increasing inputs of dissolved organic matter (DOM) to northern lakes is resulting in 'lake browning.' Lake browning profoundly affects phytoplankton community composition by modifying two important environmental drivers-light and nutrients. The impact of increased DOM on native isolates of red and green-pigmented cyanobacteria identified as Pseudanabaena, which emerged from a Dolichospermum bloom (Dickson Lake, Algonquin Provincial Park, Ontario, Canada) in 2015, were examined under controlled laboratory conditions. The genomes were sequenced to identify phylogenetic relatedness and physiological similarities, and the physical and chemical effects of increased DOM on cellular performance and competitiveness were assessed. Our study findings were that the isolated red and green phenotypes are two distinct species belonging to the genus Pseudanabaena; that both isolates remained physiologically unaffected when grown independently under defined DOM regimes; and that neither red nor green phenotype achieved a competitive advantage when grown together under defined DOM regimes. While photosynthetic pigment diversity among phytoplankton offers niche-differentiation opportunities, the results of this study illustrate the coexistence of two distinct photosynthetic pigment phenotypes under increasing DOM conditions.

A preparation and Strategy against Chemical and Biological Terrorism (화생방 테러의 양상과 예방대책)

  • Kim, Kyung-Hoe
    • Korean Security Journal
    • /
    • no.5
    • /
    • pp.19-40
    • /
    • 2002
  • For front, aspect of terror may have to prepare indeed even chemical terror or rocket and small size missile and radioactivity terror because is predicted to become various. Furthermore, when see motion of every countries about nuclear engineerses' bringing round and illicit sale of plutonium, our country may have to prepare in terrorism which is expected thus. So that can finish international event successfully because the United States of America supports great manpower and budget since New York's World Trade Center terror and when see that is considering terror prevention countermeasure, we operate temporarily bursting tube state complete charge team such as terror by each field specialist such as a concern interested including special CBR complete charge moving team among 2002 World Cups soccer game period ahead of international event, must consider safety countermeasure. Specially, biology weapon of chemical weapon and cholera etc. 13 kinds of 5000ton that North Korea plans CBR terror society confusion that North Korea that to terror support nation as well as nuclear weapons development suspicion is defending South Korea communization strategy as real condition that is amplified as well as is saving production brand gets imprinted uses CBR terror at normal times, when see that is planing powerlessness communization unity using CBR weapon at time of war, must operate until bias 2002 World Cups international event finishes cooperation safety countermeasure utensil safely under closer talk between the South Korea ${\cdot}$ Japan ${\cdot}$ North Korea. As for us which must serve 2002 World Cup successfully to accomplish perfectly preparedness of CBR terror firstly, all inhabitants knows well CBR protection trick, and secondly, CBR existing formation that solidify realignment CBR complete charge moving team which of course is consisted of CBR specialist compose and keeping immediate going out attitude operating, by third, that expand CBR individual protection equipment and CBR evacuation equipment and establish individual and group protection attitude naturally, supplement as there is main room that actualize CBR pollution patient's slogan countermeasure by fourth, and develop standard model for CBR terror provision by fifthBecause constructing infra of CBR safety establishing CBR preparedness that utilize it, must minimize damage and contribute inhabitants' life and property protection.

  • PDF

Research of video based Vibraimage technology stimulation examination KOCOSA (영상기반의 바이브라이미지 기술을 이용한 자극 검사에 대한 연구)

  • Lee, Jai-Suk;Lee, Il-ho;Lee, Tae-hyun;Choi, Jin-kwan;Chung, Suk-hwa;Han, Ji-soo
    • Convergence Security Journal
    • /
    • v.15 no.3_1
    • /
    • pp.41-51
    • /
    • 2015
  • Human have more complicate and skilled ability for lying even cheat ourself. It is not easy to cheat unconscious things like sweat, eyes, or voice, but if some one cheat own self, he can cheat every of that. Lie is one of the way to spread our gene and our instinct make a lie. Every living organism even bacteria or virus use similar trick to survive. In human body, there are more complicate and profound mechanism for lying like breathe, sweat, eyes, face or voice. We can control some of that and make a fake, but it can't be perfect. Human also called 'Homo Fallax' cause we have a language and skill to lie with it. In present, we can detect lie with polygraph, but it has few weakness. So we try to use Vibraimage technology for resolve it. In this paper, we describe how to use Vibraimage for lie detection and the research history.