• Title/Summary/Keyword: Anomaly Intrusion

Search Result 153, Processing Time 0.028 seconds

Detecting anomaly packet based on neural network (신경회로망을 이용한 비정상적인 패킷탐지)

  • 이장헌;김성옥
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.5
    • /
    • pp.105-117
    • /
    • 2001
  • As we live in the 21st century, so called the "Information Age", network has become a basic establishment. However, we have found the different face that it also has been used as a tool of a unauthorized outflow and destruction of information. In recent years, beginner could easily get a hacking and weakness reference tools from internet. The menace of the situation has increased; the intellectual diverse offensive technique has become increasingly dangerous. The purpose of the thesis is to detect a abnormal packet for networking offense. In order to detect the packet, it gathers the packets and create inspection information that tells abnormality by using probability of special quality, then decision of intrusion is made by using a neural network.l network.

Geomagnetic Field Distribution in the Korean Peninsula by Spherical Harmonic Analysis (구면조화해석(球面調和解析)에 의(依)한 한반도내(韓半島內)의 지구자기장(地球磁氣場)의 분포(分布)에 관(關)한 연구(硏究))

  • Min, Kyung Duck;Lee, Sunhee
    • Economic and Environmental Geology
    • /
    • v.12 no.2
    • /
    • pp.95-104
    • /
    • 1979
  • The position of any point on the earth's surface can be. represented in the spherical coordinates by surface spherical harmonics. Since geomagnetic field is a function of position on the earth, it can be also expressed by spherical harmonic analysis as spherical harmonics of trigonometric series of $a_m({\theta})$ cos $m{\phi}$ and $b_m({\theta})$ sin $m{\phi}$. Coefficients of surface spherical harmonics, $a_m({\theta})$ and $b_m({\theta})$, can be drawn from the components of the geomagnetic field, declination and inclination, and vice versa. In this paper, components of geomagnetic field, declination and inclination in the Korean peninsula are obtained by spherical harmonic analysis using the Gauss coefficients calculated from the world-wide magnetic charts of 1960. These components correspond to the values of normal geomagnetic field having no disturbances of subsurface mass, structure, and so on. The vertical and total components offer the zero level for the interpretation of geomagnetic data obtained by magnetic measurement in the Korean peninsula. Using this zero level, magnetic anomaly map is obtained from the data of airborne magnetic. prospecting carried out during 1958 to 1960. The conclusions of this study are as follows; (1) The intensity of horizontal component of normal geomagnetic field in Korean peninsula ranges from $2{\times}10^4$ gammas to $2.45{\times}10^4$ gammas. It decreases about 500 with the increment of $1^{\circ}$ in latitude. Along the same. latitude, it increases 250 gammas with the increment of $1^{\circ}$ in longitude. (2) Intensity of vertical component ranges from $3.85{\times}10^4$ gammas to $5.15{\times}10^4$ gammas. It increases. about 1000 gammas with the increment of $1^{\circ}$ in latitude. Along the same latitude, it decreases. 150~240 gammas with the increment of $1^{\circ}$ in longitude. Decreasing rate is considerably larger in higher latitude than in lower latitude. (3) Total intensity ranges from $4.55{\times}10^4$ gammas to $5.15{\times}10^4$ gammas. It increases 600~700 gammas with the increament of $1^{\circ}$ in latitude. Along the same latitude, it decreases 10~90 gammas. with the increment of $1^{\circ}$ in longitude. Decreasing rate is considerably larger in higher latitude as the case of vertical component. (4) The declination ranges from $-3.8^{\circ}$ to $-11.5^{\circ}$. It increases $0.6^{\circ}$ with the increment of $1^{\circ}$ in latitude. Along the same latutude, it increases $0.6^{\circ}$ with the increment of l O in longitude. Unlike the cases of vertical and total component, the rate of change is considerably larger in lower latitude than in higher latitude. (5) The inclination ranges from $57.8^{\circ}$ to $66.8^{\circ}$. It increases about $1^{\circ}$ with 'the increment of $1^{\circ}$ in latitude Along the same latitude, it dereases $0.4^{\circ}$ with the increment of $1^{\circ}$ in longitude. (6) The Boundaries of 5 anomaly zones classified on the basis of the trend and shape of anomaly curves correspond to the geologic boundaries. (7) The trend of anomaly curves in each anomaly zone is closely related to the geologic structure developed in the corresponding zone. That is, it relates to the fault in the 3rd zone, the intrusion. of granite in the 1st and 5th zones, and mountains in the 2nd and 4th zones.

  • PDF

A Study of Three-dimensional Magnetization Vector Inversion (MVI) Modeling Using Bathymetry Data and Magnetic Data of TA (Tofua Arc) 12 Seamount in Tonga Arc, Southwestern Pacific (남서태평양 통가열도 TA (Tofua Arc) 12 해저산의 해저지형과 자력자료를 이용한 3차원 자화벡터역산 모델 연구)

  • Choi, Soon Young;Kim, Chang Hwan;Park, Chan Hong;Kim, Hyung Rae
    • Geophysics and Geophysical Exploration
    • /
    • v.23 no.1
    • /
    • pp.22-37
    • /
    • 2020
  • We analyze the comprehensive three-dimensional (3D) magnetic structure characteristics from the seafloor to the deep layer of the Tofua Arc (TA) 12 seamount in the Tonga Arc, Southwestern Pacific, using bathymetric and geomagnetic data, and magnetization vector inversion (MVI) results. The seafloor features surrounding TA 12 highlight a NW-SE-oriented elliptical caldera at the summit of the seamount, two small cones in the depressed area. A large-scale sea valley is present on the western flank of the seamount, extending from these caldera cones to the southwestern base of the seamount. TA 12 seamount exhibits a low magnetic anomaly in the caldera depression, whereas a high magnetic anomaly is observed surrounding the low magnetic anomaly across the caldera summit. It is therefore presumed that there may be a strong magnetic material distribution or magma intrusion in the caldera. The 3D MVI results show that the high anomaly zones are mainly present in the surrounding slopes of the seamount from the seafloor to the -3,000 m (below the seafloor) level, with the magnetic susceptibility intensity increasing as the seafloor level increases at the caldera depression. However, small high anomaly zones are present across the study area near the seafloor level. Therefore, we expect that the magma ascent in TA 12 seamount migrated from the flanks to the depression area. Furthermore, we assume that the complex magnetic distribution near the seafloor is due to the remnant magnetization.

Design and Implementation of a Web Application Firewall with Multi-layered Web Filter (다중 계층 웹 필터를 사용하는 웹 애플리케이션 방화벽의 설계 및 구현)

  • Jang, Sung-Min;Won, Yoo-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.157-167
    • /
    • 2009
  • Recently, the leakage of confidential information and personal information is taking place on the Internet more frequently than ever before. Most of such online security incidents are caused by attacks on vulnerabilities in web applications developed carelessly. It is impossible to detect an attack on a web application with existing firewalls and intrusion detection systems. Besides, the signature-based detection has a limited capability in detecting new threats. Therefore, many researches concerning the method to detect attacks on web applications are employing anomaly-based detection methods that use the web traffic analysis. Much research about anomaly-based detection through the normal web traffic analysis focus on three problems - the method to accurately analyze given web traffic, system performance needed for inspecting application payload of the packet required to detect attack on application layer and the maintenance and costs of lots of network security devices newly installed. The UTM(Unified Threat Management) system, a suggested solution for the problem, had a goal of resolving all of security problems at a time, but is not being widely used due to its low efficiency and high costs. Besides, the web filter that performs one of the functions of the UTM system, can not adequately detect a variety of recent sophisticated attacks on web applications. In order to resolve such problems, studies are being carried out on the web application firewall to introduce a new network security system. As such studies focus on speeding up packet processing by depending on high-priced hardware, the costs to deploy a web application firewall are rising. In addition, the current anomaly-based detection technologies that do not take into account the characteristics of the web application is causing lots of false positives and false negatives. In order to reduce false positives and false negatives, this study suggested a realtime anomaly detection method based on the analysis of the length of parameter value contained in the web client's request. In addition, it designed and suggested a WAF(Web Application Firewall) that can be applied to a low-priced system or legacy system to process application data without the help of an exclusive hardware. Furthermore, it suggested a method to resolve sluggish performance attributed to copying packets into application area for application data processing, Consequently, this study provide to deploy an effective web application firewall at a low cost at the moment when the deployment of an additional security system was considered burdened due to lots of network security systems currently used.

Stratification Variation of Summer and Winter in the South Sea of Korea (한국 남해의 여름과 겨울철 성층 변동)

  • Lee, Chung-Il;Koo, Do-Hyung;Yun, Jong-Hwui;Kim, Dong-Sun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.13 no.2 s.29
    • /
    • pp.119-125
    • /
    • 2007
  • In order to illustrate the variation cf stratification and to know the effects of the temperature and the salinity on the stratification in the South Sea of Korea, the stratification parameter defined as potential energy anomaly (PEA, $V(J/m^3)$) introduced by Simpson and Hunter (1974) was used. The oceanographic data were obtained in August 1999 and February 2000 by National Fisheries Research and Development Institute (NFRDI). V in August is generally high in offshore and low in near shore. However, in February, V in the near shore is higher than that cf the offshore due to the vertical temperature gradient between surface and bottom layer caused by the expansion of South Korean Coastal Waters (SKCW). In summer, the increase of the atmospheric heating acts on the stratification as the buoyancy forcing. In most cases, the effect cf the temperature on the stratification is stronger than that of the salinity. The temperature effect is predominantly due to the extent of the intrusion of Tsushima Warm Current into the study area. However, at stations where V is high the effect of the salinity is also significant. In winter, V is very low due to the decrease cf the buoyancy forcing, but some stations show the relatively high V due to the expansion of SKCW and salinity in winter unlike that in summer makes the stratification weak.

  • PDF

Reinforcement Mining Method for Anomaly Detection and Misuse Detection using Post-processing and Training Method (이상탐지(Anomaly Detection) 및 오용탐지(Misuse Detection) 분석의 정확도 향상을 위한 개선된 데이터마이닝 방법 연구)

  • Choi Yun-Jeong;Park Seung-Soo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06b
    • /
    • pp.238-240
    • /
    • 2006
  • 네트워크상에서 발생하는 다양한 형태의 대량의 데이터를 정확하고 효율적으로 분석하기 위해 설계되고 있는 마이닝 시스템들은 목표지향적으로 훈련데이터들을 어떻게 구축하여 다룰 것인지에 대한 문제보다는 대부분 얼마나 많은 데이터 마이닝 기법을 지원하고 이를 적용할 수 있는지 등의 기법에 초점을 두고 있다. 따라서, 점점 더 에이전트화, 분산화, 자동화 및 은닉화 되는 최근의 보안공격기법을 정확하게 탐지하기 위한 방법은 미흡한 실정이다. 본 연구에서는 유비쿼터스 환경 내에서 발생 가능한 문제 중 복잡하고 지능화된 침입패턴의 탐지를 위해 데이터 마이닝 기법과 결함허용방법을 이용하는 개선된 학습알고리즘과 후처리 방법에 의한 RTPID(Refinement Training and Post-processing for Intrusion Detection)시스템을 제안한다. 본 논문에서의 RTPID 시스템은 active learning과 post-processing을 이용하여, 네트워크 내에서 발생 가능한 침입형태들을 정확하고 효율적으로 다루어 분석하고 있다. 이는 기법에만 초점을 맞춘 기존의 데이터마이닝 분석을 개선하고 있으며, 특히 제안된 분석 프로세스를 진행하는 동안 능동학습방법의 장점을 수용하여 학습효과는 높이며 비용을 감소시킬 수 있는 자가학습방법(self learning)방법의 효과를 기대할 수 있다. 이는 관리자의 개입을 최소화하는 학습방법이면서 동시에 False Positive와 False Negative 의 오류를 매우 효율적으로 개선하는 방법으로 기대된다. 본 논문의 제안방법은 분석도구나 시스템에 의존하지 않기 때문에, 유사한 문제를 안고 있는 여러 분야의 네트웍 환경에 적용될 수 있다.더욱 높은성능을 가짐을 알 수 있다.의 각 노드의 전력이 위험할 때 에러 패킷을 발생하는 기법을 추가하였다. NS-2 시뮬레이터를 이용하여 실험을 한 결과, 제안한 기법이 AOMDV에 비해 경로 탐색 횟수가 최대 36.57% 까지 감소되었음을 알 수 있었다.의 작용보다 더 강력함을 시사하고 있다.TEX>로 최고값을 나타내었으며 그 후 감소하여 담금 10일에는 $1.61{\sim}2.34%$였다. 시험구간에는 KKR, SKR이 비교적 높은 값을 나타내었다. 무기질 함량은 발효기간이 경과할수록 증하였고 Ca는 $2.95{\sim}36.76$, Cu는 $0.01{\sim}0.14$, Fe는 $0.71{\sim}3.23$, K는 $110.89{\sim}517.33$, Mg는 $34.78{\sim}122.40$, Mn은 $0.56{\sim}5.98$, Na는 $0.19{\sim}14.36$, Zn은 $0.90{\sim}5.71ppm$을 나타내었으며, 시험구별로 보면 WNR, BNR구가 Na만 제외한 다른 무기성분 함량이 가장 높았다.O to reduce I/O cost by reusing data already present in the memory of other nodes. Finally, chunking and on-line compression mechanisms are included in both models. We demonstrate that we can obtain significantly high-performanc

  • PDF

Analysis of a Structure of the Kunsan Basin in Yellow Sea Using Gravity and Magnetic Data (중자력 자료를 이용한 황해 군산분지의 지질 구조 해석)

  • Park, Gye-Soon;Choi, Jong-Keun;Koo, June-Mo;Kwon, Byung-Doo
    • Journal of the Korean earth science society
    • /
    • v.30 no.1
    • /
    • pp.49-57
    • /
    • 2009
  • We studied a structure of the Kunsan basin in the Yellow Sea using ship-borne magnetic data and altimetry satellite-derived gravity data provided from the Scripps institution of oceanography in 2006. The gravity data was analyzed via power spectrum analysis and gravity inversion, and the magnetic data via analytic signal technique, pseudo-gravity transformation, and its inversion. The results showed that the depth of bedrock tended to increase as we approached the center of the South Central Sag in Kunsan basin and that the maximum and minimum of its depth were estimated to be about 6-8 km and 2 km, respectively. Inaddition, the observed high anomaly of gravity and magnetism was attributed to the intrusion of igneous rock of higher density than the surrounding basement rock in the center of South Central Sag, which was consistent with the interpretation of seismic data obtained in the same region.

A Statistic-based Response System against DDoS Using Legitimated IP Table (검증된 IP 테이블을 사용한 통계 기반 DDoS 대응 시스템)

  • Park, Pilyong;Hong, Choong-Seon;Choi, Sanghyun
    • The KIPS Transactions:PartC
    • /
    • v.12C no.6 s.102
    • /
    • pp.827-838
    • /
    • 2005
  • DDoS (Distributed Denial of Service) attack is a critical threat to current Internet. To solve the detection and response of DDoS attack on BcN, we have investigated detection algorithms of DDoS and Implemented anomaly detection modules. Recently too many technologies of the detection and prevention have developed, but it is difficult that the IDS distinguishes normal traffic from the DDoS attack Therefore, when the DDoS attack is detected by the IDS, the firewall just discards all over-bounded traffic for a victim or absolutely decreases the threshold of the router. That is just only a method for preventing the DDoS attack. This paper proposed the mechanism of response for the legitimated clients to be protected Then, we have designed and implemented the statistic based system that has the automated detection and response functionality against DDoS on Linux Zebra router environment.

Stratification Variation of Summer and Winter in the South Waters of Korea (한국남해의 여름과 겨울철 성층변동)

  • Lee, Chung-Il;Koo, Do-Hyung;Yun, Jong-Hwui
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2007.05a
    • /
    • pp.43-50
    • /
    • 2007
  • In order to calculate the strength and to. see the variation af the stratification in the Southern Waters af Korea, the stratification parameter defined as potential energy anomaly (PEA, $V(J/m^3)$) introduced by Simpson and Hunter (1974) was used The data used in this paper were observed in August 1999 and February 2000 by National Fisheries Research and Development Institute (NFRDI). Also to know the effects af the temperature and the salinity an the stratification respectively, averaged temperature and salinity were used in the process af calculation the parameter. V is generally high in the offshore. However, in February, V in the onshore is higher than that of the offshore due to the vertical temperature gradient caused by the expansion of South Korean Coastal Waters (SKCW). In the summer, the increase af the atmospheric heating, the temperature inversion phenomenon act an the stratification as the buoyancy forcing. In most cases, the effects of the temperature on the stratification is stronger than that of the salinity. The temperature effect is predominantly due to the extent af the intrusion of Tsushima Warm Current into the study area. However, at stations where V is high the effect af the salinity is also significant. In the winter, V is very low due to the decrease of the buoyancy forcing, but same stations show the relatively high V due to the expansion of SKCW and Tsushima Warm Current.

  • PDF

Efficient Masquerade Detection Based on SVM (SVM 기반의 효율적인 신분위장기법 탐지)

  • 김한성;권영희;차성덕
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.5
    • /
    • pp.91-104
    • /
    • 2003
  • A masquerader is someone who pretends to be another user while invading the target user's accounts, directories, or files. The masquerade attack is the most serious computer misuse. Because, in most cases, after securing the other's password, the masquerader enters the computer system. The system such as IDS could not detect or response to the masquerader. The masquerade detection is the effort to find the masquerader automatically. This system will detect the activities of a masquerader by determining that user's activities violate a profile developed for that user with his audit data. From 1988, there are many efforts on this topic, but the success of the offers was limited and the performance was unsatisfactory. In this report we propose efficient masquerade detection system using SVM which create the user profile.