• Title/Summary/Keyword: Anomaly Traffic

Search Result 86, Processing Time 0.019 seconds

Clinical Experiences of Open Heart Surgery - A Report of 126 Case - (개심술 126례의 임상적 고찰)

  • 이종국
    • Journal of Chest Surgery
    • /
    • v.22 no.6
    • /
    • pp.1025-1035
    • /
    • 1989
  • Since we first performed open heart surgery on December 30, 1986, 126 cases were operated on up to August 31, 1989. Among the 126 cases, 65 cases were congenital heart disease of which 63 were acyanotic disease, and 61 cases were acquired heart disease, most of which were valvular heart disease. The age distribution of congenital heart disease was from 1 years 2 months to 48 years, and males had a slightly higher incidence. The age of acquired heart disease was from a minimum of 15 years to a maximum of 68 years, and the male to female ratio was 1;1.5. Midsternotomy was performed in all cases, and the aortic cannula was inserted through ascending aorta and the venous cannula inserted into the SVC and IVC through the right atrium. Vent was inserted through the right superior pulmonary vein. Cardioplegia solution was used in all cases; it was composed of sodium bicarbonate 3.5 ampule, KCL 14 mEq, 2% lidocaine 2.5 ml, 20 % albumin 50 ml and heparin 1000 units mixed to 950 ml with Hartman solution, and was made to 4oC and infused 10 ml per Kg every 20 minutes. The congenital heart disease had a variety of VSD in 32 cases, ASD 23 cases, PS 6 cases, PDA 2 cases, and one case each of Ebsteins anomaly and tricuspid atresia. The operations performed for acquired heart disease were 4 cases of OMC, 33 cases of MVR, and 5 cases of AVR, and 1 case of AVR with CABG. DVR was perfomed in 13 cases, and triple valve replacement was done in 1 case. Other than these, excision of LA myxoma was 2 cases, and repair of traumatic VSD and removal of a pulmonary embolism were one case each. The surgical mortality was 5 cases[4%], all of which occurred in valve replacement cases. Follow-up study revealed 2 late deaths. One died after a traffic accident and one died due to sepsis after he had received a gastrectomy for ulcer bleeding. The remaining patients were in good condition.

  • PDF

Detecting Jamming Attacks in MANET (MANET에서의 전파방해 공격 탐지)

  • Shrestha, Rakesh;Lee, Sang-Duk;Choi, Dong-You;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.3
    • /
    • pp.482-488
    • /
    • 2009
  • Mobile Ad-hoc Networks provide communication without a centralized infrastructure, which makes them suitable for communication in disaster areas or when quick deployment is needed. On the other hand, they are susceptible to malicious exploitation and have to face different challenges at different layers due to its open Ad-hoc network structure which lacks previous security measures. Denial of service (DoS) attack is one that interferes with the radio transmission channel causing a jamming attack. In this kind of attack, an attacker emits a signal that interrupts the energy of the packets causing many errors in the packet currently being transmitted. In harsh environments where there is constant traffic, a jamming attack causes serious problems; therefore measures to prevent these types of attacks are required. The objective of this paper is to carry out the simulation of the jamming attack on the nodes and determine the DoS attacks in OPNET so as to obtain better results. We have used effective anomaly detection system to detect the malicious behaviour of the jammer node and analyzed the results that deny channel access by jamming in the mobile Ad-hoc networks.

An Anomalous Event Detection System based on Information Theory (엔트로피 기반의 이상징후 탐지 시스템)

  • Han, Chan-Kyu;Choi, Hyoung-Kee
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.3
    • /
    • pp.173-183
    • /
    • 2009
  • We present a real-time monitoring system for detecting anomalous network events using the entropy. The entropy accounts for the effects of disorder in the system. When an abnormal factor arises to agitate the current system the entropy must show an abrupt change. In this paper we deliberately model the Internet to measure the entropy. Packets flowing between these two networks may incur to sustain the current value. In the proposed system we keep track of the value of entropy in time to pinpoint the sudden changes in the value. The time-series data of entropy are transformed into the two-dimensional domains to help visually inspect the activities on the network. We examine the system using network traffic traces containing notorious worms and DoS attacks on the testbed. Furthermore, we compare our proposed system of time series forecasting method, such as EWMA, holt-winters, and PCA in terms of sensitive. The result suggests that our approach be able to detect anomalies with the fairly high accuracy. Our contributions are two folds: (1) highly sensitive detection of anomalies and (2) visualization of network activities to alert anomalies.

Intrusion Detection Methodology for SCADA system environment based on traffic self-similarity property (트래픽 자기 유사성(Self-similarity)에 기반한 SCADA 시스템 환경에서의 침입탐지방법론)

  • Koh, Pauline;Choi, Hwa-Jae;Kim, Se-Ryoung;Kwon, Hyuk-Min;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.267-281
    • /
    • 2012
  • SCADA system is a computer system that monitors and controls the national infrastructure or industrial process including transportation facilities, water treatment and distribution, electrical power transmission and distribution, and gas pipelines. The SCADA system has been operated in a closed network, but it changes to open network as information and communication technology is developed rapidly. As the way of connecting with outside user extends, the possibility of exploitation of vulnerability of SCADA system gets high. The methodology to protect the possible huge damage caused by malicious user should be developed. In this paper, we proposed anomaly detection based intrusion detection methodology by estimating self-similarity of SCADA system.

Network Forensics and Intrusion Detection in MQTT-Based Smart Homes

  • Lama AlNabulsi;Sireen AlGhamdi;Ghala AlMuhawis;Ghada AlSaif;Fouz AlKhaldi;Maryam AlDossary;Hussian AlAttas;Abdullah AlMuhaideb
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.95-102
    • /
    • 2023
  • The emergence of Internet of Things (IoT) into our daily lives has grown rapidly. It's been integrated to our homes, cars, and cities, increasing the intelligence of devices involved in communications. Enormous amount of data is exchanged over smart devices through the internet, which raises security concerns in regards of privacy evasion. This paper is focused on the forensics and intrusion detection on one of the most common protocols in IoT environments, especially smart home environments, which is the Message Queuing Telemetry Transport (MQTT) protocol. The paper covers general IoT infrastructure, MQTT protocol and attacks conducted on it, and multiple network forensics frameworks in smart homes. Furthermore, a machine learning model is developed and tested to detect several types of attacks in an IoT network. A forensics tool (MQTTracker) is proposed to contribute to the investigation of MQTT protocol in order to provide a safer technological future in the warmth of people's homes. The MQTT-IOT-IDS2020 dataset is used to train the machine learning model. In addition, different attack detection algorithms are compared to ensure the suitable algorithm is chosen to perform accurate classification of attacks within MQTT traffic.

Research on BGP dataset analysis and CyCOP visualization methods (BGP 데이터셋 분석 및 CyCOP 가시화 방안 연구)

  • Jae-yeong Jeong;Kook-jin Kim;Han-sol Park;Ji-soo Jang;Dong-il Shin;Dong-kyoo Shin
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.177-188
    • /
    • 2024
  • As technology evolves, Internet usage continues to grow, resulting in a geometric increase in network traffic and communication volumes. The network path selection process, which is one of the core elements of the Internet, is becoming more complex and advanced as a result, and it is important to effectively manage and analyze it, and there is a need for a representation and visualization method that can be intuitively understood. To this end, this study designs a framework that analyzes network data using BGP, a network path selection method, and applies it to the cyber common operating picture for situational awareness. After that, we analyze the visualization elements required to visualize the information and conduct an experiment to implement a simple visualization. Based on the data collected and preprocessed in the experiment, the visualization screens implemented help commanders or security personnel to effectively understand the network situation and take command and control.