• Title/Summary/Keyword: 방어 모델

Search Result 367, Processing Time 0.026 seconds

A Multistage Authentication Strategy for Reliable N-to-N Communication in CGSR based Mobile Ad Hoc Networks (CGSR 기반의 이동 애드 흑 네트워크에서 신뢰성 있는 통신을 위한 노드간 인증 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.659-667
    • /
    • 2005
  • A Mobile Ad Hoc Network(MANET) is a multi hop wireless network with no prepared base stations or centralized administrations, where flocks of peer systems gather and compose a network. Each node operates as a normal end system in public networks. In addition to it, a MANET node is required to work as a router to forward traffic from a source or intermediate node to others. Each node operates as a normal end system in public networks, and further a MANET node work as a router to forward traffic from a source or intermediate node to the next node via routing path. Applications of MANET are extensively wide, such as battle field or any unwired place; however, these are exposed to critical problems related to network management, node's capability, and security because of frequent and dynamic changes in network topology, absence of centralized controls, restricted usage on network resources, and vulnerability oi mobile nodes which results from the special MANET's character, shared wireless media. These problems induce MANET to be weak from security attacks from eavesdropping to DoS. To guarantee secure authentication is the main part of security service In MANET because networks without secure authentication are exposed to exterior attacks. In this paper, a multistage authentication strategy based on CGSR is proposed to guarantee that only genuine and veritable nodes participate in communications. The proposed authentication model is composed of key manager, cluster head and common nodes. The cluster head is elected from secure nodes, and key manager is elected from cluster heads. The cluster head will verify other common nodes within its cluster range in MANET. Especially, ID of each node is used on communication, which allows digital signature and blocks non repudiation. For performance evaluation, attacks against node authentication are analyzed. Based on security parameters, strategies to resolve these attacks are drawn up.

TFWT and OBT Concentrations in Soybean Plants Exposed to HTO Vapor at Different Growth Stages (콩의 생육단계별 HTO 증기 피폭에 따른 작물체내 TFWT 및 OBT 농도)

  • Lim, K.M.;Choi, Y.H.;Lee, W.Y.;Park, H.G.;Kang, H.S.;Choi, H.J.;Lee, H.S.
    • Journal of Radiation Protection and Research
    • /
    • v.29 no.4
    • /
    • pp.213-219
    • /
    • 2004
  • Soybean plants were exposed to HTO vapor in an exposure box for 1 hour at different growth stages. Relative concentrations of TFWT at the end of exposure (percent ratios of TFWT concentrations to mean HTO concentrations in air moisture in the box during exposure) decreased on the whole in the order of leaf > shell > seed > stem with the highest values of 40.2% and 6.4% for leaf and stem, respectively. TFWT concentrations reduced by factors of several thousands to several hundred-thousands from the end of exposure till the harvest. The reduction factor decreased in the order of leaf > shell > seed > stem. Relative OBT concentrations at harvest (ratios of the OBT concentration in the dry plant part at harvest to the initial leaf TFWT concentration, ml $g^{-1}$) were in the range of $2.2{\times}10^{-5}{\sim}9.5{\times}10^{-3}$ for seeds being the highest when the exposure was performed at the actively seed-developing stage. The exposure time-dependent variation in the OBT concentration was much greater in seeds and shells than in leaves and stems. It was indicated that OBT would contribute to almost all the radiation dose due to the consumption of soybean seeds in most cases after an acute exposure of growing plants to HTO vapor. Present results are applicable to establishing and validating soybean $^3H$ models for an acute accidental release of HTO.

A Feasibility Study on Using Neural Network for Dose Calculation in Radiation Treatment (방사선 치료 선량 계산을 위한 신경회로망의 적용 타당성)

  • Lee, Sang Kyung;Kim, Yong Nam;Kim, Soo Kon
    • Journal of Radiation Protection and Research
    • /
    • v.40 no.1
    • /
    • pp.55-64
    • /
    • 2015
  • Dose calculations which are a crucial requirement for radiotherapy treatment planning systems require accuracy and rapid calculations. The conventional radiotherapy treatment planning dose algorithms are rapid but lack precision. Monte Carlo methods are time consuming but the most accurate. The new combined system that Monte Carlo methods calculate part of interesting domain and the rest is calculated by neural can calculate the dose distribution rapidly and accurately. The preliminary study showed that neural networks can map functions which contain discontinuous points and inflection points which the dose distributions in inhomogeneous media also have. Performance results between scaled conjugated gradient algorithm and Levenberg-Marquardt algorithm which are used for training the neural network with a different number of neurons were compared. Finally, the dose distributions of homogeneous phantom calculated by a commercialized treatment planning system were used as training data of the neural network. In the case of homogeneous phantom;the mean squared error of percent depth dose was 0.00214. Further works are programmed to develop the neural network model for 3-dimensinal dose calculations in homogeneous phantoms and inhomogeneous phantoms.

Contaminated Surfaces in an Urban Environment (도시환경에서 방사능오염 표면의 중요도 분석)

  • Hwang, Won-Tae;Jeong, Hyo-Joon;Kim, Eun-Han;Han, Moon-Hee;Ahn, Min-Ho;Kim, In-Kyu
    • Journal of Radiation Protection and Research
    • /
    • v.36 no.3
    • /
    • pp.148-153
    • /
    • 2011
  • EMRAS-2 (Environmental Modelling for RAdiation Safety, Phase 2) is an international comparison program, which is organized by the International Atomic Energy Agency (IAEA), in order to harmonize the modelling of radionuclide behavior in the environment. To do so, the urban contamination working group within EMRAS-2 has designed the hypothetical scenarios for a specified urban area. In this study, the importance of contaminated surfaces composing an urban environment was analyzed in terms of dose rate using METRO-K, which has been developed to take a Korean urban environment into account. The contribution of contaminated surfaces to exposure dose rate showed distinctly a great difference as a function of specified locations and time following a hypothetical event. Moreover, it showed a distinct difference according to the existence of precipitation, and its intensity. Therefore, if an urban area is contaminated radioactively by any unexpected incidents such as an accident of nuclear power plants or an explosion of radioactive dispersion devices (RDDs), appropriate measures should be taken with consideration of the type of surface composing the contaminated environment in order to minimize not only radiation-induced health detriment but also economic and social impacts.

Implementation of a Network Simulator for Cyber Attacks and Detections based on SSFNet (SSFNet 기반 사이버 공격 및 탐지를 위한 네트워크 시뮬레이터의 구현)

  • Shim, Jae-Hong;Jung, Hong-Ki;Lee, Cheol-Won;Choi, Kyung-Hee;Park, Seung-Kyu;Jung, Gi-Hyun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.4
    • /
    • pp.457-467
    • /
    • 2002
  • In order to simulate cyber attacks and predict network behavior by attacks, we should represent attributes of network components in the simulation model, and should express characteristics of systems that carry out various cyber attacks and defend from these attacks. To simulate how network load may change under the cyber attacks, we extended SSF[9, 10] that is process-based event-oriented simulation system. We added a firewall class and a packet manipulator into the SSFNet that is a component of SSF. The firewall class, which is related to the security, is to simulate cyber attacks, and the packet manipulator is a set of functions to write attack programs for the simulation. The extended SSFNet enables to simulate a network with the security systems and provides advantages that make easy to port already exsiting attack programs and apply them to the simulation evironment. We made a vitual network model to verify operations of the added classes, and simulated a smurf attack that is a representative denial of sevive attack, and observed the network behavior under the smurf attack. The results showed that the firewall class and packet manipulator developed in this paper worked normaly.

The Effects of Panax Ginseng Extract on Antioxidative Enzyme Activity in Ovariectomized Rats (인삼 추출물이 난소를 절제한 백서의 항산화효소 활성에 미치는 영향)

  • 하배진;황일영
    • Journal of Life Science
    • /
    • v.12 no.3
    • /
    • pp.349-356
    • /
    • 2002
  • In order to observe the bioactivity of ovariectomized rats, nonovariertoized (sham) group, ovariectomized (Ovx) group, ovariectomized ginseng total saponin (GTS)-treated (Ovx+ GTS) group and ovariectomized ginseng water extract (GW)-treated (Ovx+CW) group were made. We measured AST (L-aspartate aminotransferase) and ALT (L-alanin aminotransferase) in sera, and MDA (malondialdehyde:lipid peroxidation), SOD (superoxide dismutase), catalase, total-glutathione (GSH + GSSG) and GPx (glutathione peroxidase) in liver tissue total homogenates of rat. AST activity of serum in Ovx group was 2.11 times increased, but ALT activity was not changed compared to Sham group. In AST activity, they tend to decrease significantly in each substance such as GTS and GW administered group. Lipidperoxides of each fraction in Ovx group were highly increased compared to Sham group. Extracts of ginseng-treated group markedly inhibited lipid peroxidation by 62% ∼72%. And as the result of the measurements of SOD, catalase, total-glutathione and GPx which are antioxidant enzyme, antioxidant enzymes in Ovx group much lower than in Sham group. But they were significantly increased in each substance such as GTS and GW, administered group. Based on the results, it is supposed that more produced free radicals decreased antioxidant enzyme. And it is also thought that extracts of ginseng can inhibit aging by reducing antioxidant enzyme.

A Study on System Construction to the Product Liability Law-with focus on a small & medium business (제조물책임법에 대응하기 위한 시스템 구축에 관한 연구 -중소기업을 중심으로-)

  • Han, Min-Suk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.6
    • /
    • pp.596-608
    • /
    • 2017
  • In 2002, the government arranged an institutional strategy to make it possible for a consumers to make a claim for damages caused by product defects against a business that produces and sells a product by enforcing the Product Liability Law(hereinafter referred to as 'PL'). On the other hand, due to the recent humidifier sterilizer accident, approximately 12 cases of related bills, such as a revised bill for the product liability law, have been proposed to the National Assembly at present in an effort to introduce the group action system and punitive compensation system for the purpose of the strengthening of the corporate product liability, and consumer damage relief. Ironically, as much as 62.6% of small & medium businesses, which are actual interested parties to this bill, are unaware of this. Many companies are responding to PL with the rationalization of document preparation & storage, clarification of responsibility relations with related business operators, and PL insurance policy purchase, or securing compensation funds as a means of Product Liability Defense(PLD), but the methods of preparation such as this leave much room for limits on the considerations of product design and product safety. This paper presents the individual management system model with more focus on product safety by looking into the clear concept of PL and the countermeasures against it, grasping the relevance between the PL system and individual management system, and integrating the PL response system in preparation for the PL. It is hoped that the result of this research objective will be evaluated as a rational countermeasure for small & medium businesses to respond effectively to the PL.

The Problem of the Repression and the Unconscious in Delueze and Guattari's schizo-analysis (들뢰즈, 가타리의 분열분석에서억압과 무의식의 문제)

  • Yon, Hyo-Sook
    • Journal of Korean Philosophical Society
    • /
    • no.121
    • /
    • pp.93-121
    • /
    • 2018
  • Deleuze and Guattari criticise in Anti-Oedipus theory of desire of Freud and Lacan as the idealist conception of desire as lack(fantasy) and try to search for a possibility of materialistic theory of desire. They criticise that Freud and Lacan trap the desire into the model of oedipal model and cut the flux of Libido of desire. This paper looks out for the different reason for the interpretation between psychoanalysis and schizoanalysis about the desire into the difference of interpretation about the 'repression' and 'the unconscious'. From this first of all, it examines the aspect of repression in Freud and Lacan, and it searchs for the meaning of distinction between 'psychic repression' and 'social repression' according to the interpretation in Deleuze and Guattari. Secondly, Freud and Lacan understand the unconscious as the region drived out by the defense mechanism of the mind activity, or the dimension of the unconscious structured like language. On the contrary, Deleuze and Guattari approach entirely differently interpretation about the unconscious. This paper analyzesespecially the unconscious of orphan, the unconscious productive and the unconscious molecular in the midst of manifold and new interpretation about the unconscious. In conclusion, it shows that the problem of desire and inhibition completely differently can be considered according to the new interpretation about the unconscious. It tries to serarch for the practical adaptability of schizoanalysis in Deleuze and Guattari on the real society.

North Korea's Cyber Attack Patterns and Behaviors : An Analysis Based on Cyber Power and Coercion Theory (북한의 대남 사이버공격 양상과 행태 : 사이버파워와 강압이론을 통한 분석)

  • Yoon, Taeyoung;Woo, Jeongmin
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.117-128
    • /
    • 2018
  • The purpose of this paper is to analyze the behavior of North Korea's cyber attack against South Korea since 2009 based on major international security theories and suggest South Korea's policy option. For this purpose, this paper applied the behavioral domain and characteristics of 'cyber power' and 'coercion dynamics' model, which are attracting attention in international security studies. The types of cyber attacks from North Korea are classified into the following categories: power-based incarceration, leadership attacks and intrusions, military operations interference, and social anxiety and confusion. In terms of types and means of cyber power, North Korean GPS disturbance, the Ministry of Defense server hacking and EMP are hard power with high retaliation and threat and cyber money cashing and ransomware are analyzed by force in the act of persuasion and incentive in the point of robbing or asking for a large amount of money with software pawns. North Korea 's cyber attack has the character of escape from realistic sanctions based on the second nuclear test. It is important for South Korea to clearly recognize that the aggressive cyberpower of North Korea is changing in its methods and capabilities, and to ensure that North Korea's actions result in far greater losses than can be achieved. To do this, it is necessary to strengthen the cyber security and competence to simultaneously attack and defend through institutional supplement and new establishment such as cyber psychological warfare, EMP attack preparation, and enhancement of security expertise against hacking.

  • PDF

Recombinant Production and Antimicrobial Activity of an Antimicrobial Model Peptide (Uu-ilys-CF) Derived from Spoon Worm Lysozyme, Uu-ilys (개불 라이소자임 유래 항균성 모델 펩타이드(Uu-ilys-CF)의 재조합 단백질 생산 및 항균 활성)

  • Oh, Hye Young;Go, Hye-Jin;Park, Nam Gyu
    • Journal of Life Science
    • /
    • v.31 no.1
    • /
    • pp.83-89
    • /
    • 2021
  • Uu-ilys, an i-type lysozyme from spoon worm (Urechis unicinctus), is an innate immune factor that plays an important role in the defense against pathogens. It also possesses non-enzymatic antibacterial activity. Thus, there is a possibility to develop an antimicrobial model peptide from Uu-ilys. In this study, we report the design, production, and antibacterial activity of an Uu-ilys analog that exhibits antibacterial activity. The Uu-ilys structure was fragmented according to its secondary structures to predict the regions with antimicrobial activity using antimicrobial peptide (AMP) prediction tools from different AMP databases. A peptide containing the C-terminal fragment was predicted to exert antimicrobial activity. The chosen fragment was designated as an Uu-ilys analog containing the C-terminal fragment, Uu-ilys-CF. To examine the possibility of developing an AMP using the sequence of Uu-ilys-CF, recombinant fusion protein (TrxA-Uu-ilys-CF) was produced in an expression system that was heterologous. The produced fusion protein was cleaved after methionine leaving Uu-ilys-CF free from the fusion protein. This was then isolated through high performance liquid chromatography and reverse phase column, CapCell-Pak C18. The antibacterial activity of Uu-ilys-CF against different microbial strains (four gram-positive, six gram-negative, and one fungal strain) were assessed through the ultrasensitive radial diffusion assay (URDA). Among the bacterial strains tested, Salmonella enterica was the most susceptible. While the fungal strain tested was not susceptible to Uu-ilys-CF, broad spectrum antibacterial activity was observed.