• Title/Summary/Keyword: 주소정보

Search Result 1,330, Processing Time 0.023 seconds

Attack Scenarios and Countermeasures using CoAP in IoT Environment (IoT기기에서 SSDP 증폭 공격을 이용한 공격기법 및 대응 방안)

  • Oh, Ju-Hye;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.4
    • /
    • pp.33-38
    • /
    • 2016
  • DDoS attack has been continuously utilized that caused the excessively large amount of traffic that network bandwidth or server was unable to deal with paralyzing the service. Most of the people regard NTP as the biggest cause of DDoS. However, according to recently executed DDoS attack, there have been many SSDP attack in the use of amplified technique. According to characteristics of SSDP, there is no connection for making a forgery of source IP address and amplified resources feasible. Therefore, it is frequently used for attack. Especially, as it is mostly used as a protocol for causing DDoS attack on IoT devices that constitute smart home including a wireless router, media server, webcam, smart TV, and network printer. Hereupon, it is anticipated for servers of attacks to gradually increase. This might cause a serious threat to major information of human lives, major government bodies, and company system as well as on IoT devices. This study is intended to identify DDoS attack techniques in the use of weakness of SSDP protocol occurring in IoT devices and attacking scenario and counter-measures on them.

Automatic Detection of the Updating Object by Areal Feature Matching Based on Shape Similarity (형상유사도 기반의 면 객체 매칭을 통한 갱신 객체 탐지)

  • Kim, Ji-Young;Yu, Ki-Yun
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.30 no.1
    • /
    • pp.59-65
    • /
    • 2012
  • In this paper, we proposed a method for automatic detection of a updating object from spatial data sets of different scale and updating cycle by using areal feature matching based on shape similarity. For this, we defined a updating object by analysing matching relationships between two different spatial data sets. Next, we firstly eliminated systematic errors in different scale by using affine transformation. Secondly, if any object is overlaid with several areal features of other data sets, we changed several areal features into a single areal feature. Finally, we detected the updating objects by applying areal feature matching based on shape similarity into the changed spatial data sets. After applying the proposed method into digital topographic map and a base map of Korean Address Information System in South Korea, we confirmed that F-measure is highly 0.958 in a statistical evaluation and that significant updating objects are detected from a visual evaluation.

A Study on Asynchronous MAC Protocol with Dynamic Preamble Length in Wireless Sensor Networks (WSN에서 프리앰블 다이나믹을 이용한 비동기 MAC 프로토콜 연구)

  • Han, Hyeon-Ho;Hong, Yeong-Pyo;Lee, Sang-Hun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.9
    • /
    • pp.3563-3570
    • /
    • 2010
  • MAC protocol has been studied for reducing energy consumption in wireless sensor networks. The overhearing and idle In the existing asynchronous MAC Protocol will occur due to unnecessary energy consumption. In this paper, to solve these problems, the Preamble to change the structure of the destination address, the Preamble of the end times, the data including the length of the Preamble and Data Overhearing reduce the length of the Check Interval Data generated according to the presence of the Dynamic Value dynamically adjustable by changing the DPL (Dynamic Preamble Length)-MAC protocol was proposed. Moreover, the existing asynchronous MAC protocol of wireless sensor networks and DPL-MAC protocol proposed in this paper to simulate the energy consumption and latency were assessed in terms of comparative analysis.

Treatment of Occult Bronchial Foreign Body with 30-Year Retention - A case report - (30년간 잠복한 기관지 내 이물의 치험 - 1예 보고 -)

  • Choi, Jae-Sung;Kim, Eung-Joong
    • Journal of Chest Surgery
    • /
    • v.41 no.5
    • /
    • pp.667-670
    • /
    • 2008
  • Occult bronchial foreign bodies are rare in adults, whereas tracheobronchial aspiration of foreign bodies occurs commonly in children. Treatment guidelines, according to the severity of the bronchial or lung parenchymal damage and the duration of foreign body retention, have not been established. A 40-year-old man with chronic cough, sputum production, and fever was transferred for treatment of right middle and lower lobe collapse and obstructive pneumonitis as evidenced by imaging studies. He had aspirated the cap of a felt-tipped pen 30 years before presentation, which was unrevealed until his medical history was carefully reviewed during this episode. The patient was treated with right middle-lower bilobectomy because fiberoptic bronchoscopic removal of the foreign body failed. This case added important information to our body of knowledge concerning the various clinical features of occult bronchial foreign bodies.

A new method for automatic areal feature matching based on shape similarity using CRITIC method (CRITIC 방법을 이용한 형상유사도 기반의 면 객체 자동매칭 방법)

  • Kim, Ji-Young;Huh, Yong;Kim, Doe-Sung;Yu, Ki-Yun
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.29 no.2
    • /
    • pp.113-121
    • /
    • 2011
  • In this paper, we proposed the method automatically to match areal feature based on similarity using spatial information. For this, we extracted candidate matching pairs intersected between two different spatial datasets, and then measured a shape similarity, which is calculated by an weight sum method of each matching criterion automatically derived from CRITIC method. In this time, matching pairs were selected when similarity is more than a threshold determined by outliers detection of adjusted boxplot from training data. After applying this method to two distinct spatial datasets: a digital topographic map and street-name address base map, we conformed that buildings were matched, that shape is similar and a large area is overlaid in visual evaluation, and F-Measure is highly 0.932 in statistical evaluation.

A Study on the Description Elements of the Book Colophon in Korea (우리나라의 도서 판권기 기술서지 요소 고찰)

  • Lee, Myoung-Gyu
    • Journal of Korean Library and Information Science Society
    • /
    • v.41 no.1
    • /
    • pp.211-231
    • /
    • 2010
  • Colophon means an element to describe bibliographic information of the concerned books on the specific space like a back of title page or the last page of a book, and is used as a useful information source when cataloging in a library. Imprint means an element to describe publication information to a title page or verso of a title page of a book. In addition, institutionally required elements to describe on a book are an author, a publisher, a date of publication, a publishing company, ISBN, and a price when printing publications. The bibliographic elements to describe on colophon are a title, an author, a place of publication, a publisher, the date of publication, a place of printing, a printer, the date of printing, edition, impression, the address and contact point of a publisher, a price, ISBN, a copyright, CIP, and the profile of an author, etc. The necessary bibliographic elements according to the development of publishing technology and changes of publishing environments are additionally described in this colophon.

  • PDF

TTL based Advanced Packet Marking Mechanism for Wireless Traffic Classification and IP Traceback on IEEE 802.1x Access Point (IEEE 802.1x AP에서의 TTL 기반 패킷 마킹 기법을 이용한 무선 트래픽 분류 및 IP 역추적 기법)

  • Lee, Hyung-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.1
    • /
    • pp.103-115
    • /
    • 2007
  • The vulnerability issue on IEEE 802.1x wireless LAN has been permits the malicious attack such as Auth/Deauth flooding more serious rather than we expected. Attacker can generate huge volume of malicious traffic as the same methods on existing wired network. The objective of wireless IP Traceback is to determine the real attack sources, as well as the full path taken by the wireless attack packets. Existing IP Traceback methods can be categorized as proactive or reactive tracing. But, these existing schemes did not provide enhanced performance against DoS attack on wireless traffic. In this paper, we propose a 'TTL based advanced Packet Marking' mechanism for wireless IP Packet Traceback with wireless Classification function. Proposed mechanism can detect and control DoS traffic on AP and can generate marked packet for reconstructing on the real path from the non-spoofed wireless attack source, by which we can construct secure wireless network based on AP with enhance traceback performance.

Efficient Hierarchical Mobility Management Scheme for Mobile Content Centric Networking (이동 컨텐츠 중심 네트워크에서의 효율적인 계층적 이동성 관리 방안)

  • Lee, Jihoon;Lee, Juyong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.2
    • /
    • pp.37-41
    • /
    • 2018
  • As individuals generate and share various content anytime and anywhere, new networking architectures, such as content-centric networking (CCN) using the content name as a packet identifier, have been in the spotlight recently. However, the current CCN hardly takes into account node mobility problems, especially the mobility of content sources. The movement of content sources causes long delivery latency and long service disruptions. To solve that, the tunneling-based redirection scheme was proposed. However, the tunneling-based scheme requires a location-update procedure whenever the network changes, which creates many control messages and causes long latency. So, this paper presents hierarchical mobility management of mobile CCN to reduce the number of control messages and handoff latency. Performance evaluation shows that the proposed scheme can provide low control overhead, which results in network scalability.

Analysis of constraints about using for e-learning in Sports Class (전공체육 강의에서 e-러닝 활용의 제약 분석)

  • Choi, sung-hun
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.410-414
    • /
    • 2009
  • The purpose of this study was to analyze the constraints about using for e-learning in sports class. These class were leisure studies, swimming, soccer, tennis class as a core requirement and address of homepage was http://sunghun.ulsan.ac.kr. The research methods were deep interview, observation, and description of instructor. The results were as follows. First, constraints of students in e-learning were low skill of computer, problem of sharing information, lack of interaction. Second, constraints of instructor in e-learning were confusing of term, lack of recognition, lack of time and skill, considering of co-instructor, and burden of e-learning. Third, structural constraints in e-learning were administrative constraints and technical constraints.

  • PDF

A Study on Literature Based Philanthropic Education for Elementary School Students to Strengthen Their Democratic Citizenship (민주시민의식 함양을 위한 초등학생 문학 활용 나눔 교육 방안 연구)

  • Lim, Seong-Gwan
    • Journal of Korean Library and Information Science Society
    • /
    • v.46 no.1
    • /
    • pp.241-269
    • /
    • 2015
  • This study started from an understanding that a true welfare society requires voluntary 'sharing' of citizens in addition to the state's legal and institutional security and that to make the culture of sharing find a firm ground in our society, 'Philanthropic Education' is needed from the childhood. This study examined three issues; first suggested the need of philanthropic education and learning methods. secondly, to find out the present situations of sharing in Korea, the study looked into sharing cultures and philanthropic education in other countries. thirdly, the study explored ways of philanthropic education for elementary school students of Korea in literature based program methods. The structure of the program was designed as structured experimental group program. And the content of this program is composed of concepts, objects, process, institutions regarding philanthropy, and finally practical behavior of it. This study implies that discussions in taking root and revitalizing the philanthropic education to encourage prosocial behaviors of children by more efforts of family, community and school.