• Title/Summary/Keyword: Attack Model

Search Result 1,005, Processing Time 0.037 seconds

A Combination of Signature-based IDS and Machine Learning-based IDS using Alpha-cut and Beta pick (Alpha-cut과 Beta-pick를 이용한 시그너쳐 기반 침입탐지 시스템과 기계학습 기반 침입탐지 시스템의 결합)

  • Weon, Ill-Young;Song, Doo-Heon;Lee, Chang-Hoon
    • The KIPS Transactions:PartC
    • /
    • v.12C no.4 s.100
    • /
    • pp.609-616
    • /
    • 2005
  • Signature-based Intrusion Detection has many false positive and many difficulties to detect new and changed attacks. Alpha-cut is introduced which reduces false positive with a combination of signature-based IDS and machine learning-based IDS in prior paper [1]. This research is a study of a succession of Alpha-cut, and we introduce Beta-rick in which attacks can be detected but cannot be detected in single signature-based detection. Alpha-cut is a way of increasing detection accuracy for the signature based IDS, Beta-pick is a way which decreases the case of treating attack as normality. For Alpha-cut and Beta-pick we use XIBL as a learning algorithm and also show the difference of result of Sd.5. To describe the value of proposed method we apply Alpha-cut and Beta-pick to signature-based IDS and show the decrease of false alarms.

Korea's Rural Development Characteristics and the Implications to Vietnam (한국의 농촌개발 경험이 베트남에 주는 시사점)

  • Im, Sang Bong
    • Journal of Korean Society of Rural Planning
    • /
    • v.22 no.3
    • /
    • pp.71-80
    • /
    • 2016
  • Korea is becoming a model country for the developing countries' agricultural and rural development. Drawing implications for Vietnam from Korea's experiences can help make development strategies and policies for other developing countries including North Korea as well as for Vietnam itself. Vietnam is facing an inefficiency in agricultural production and the gap between urban and rural growth has been widening. Farm sizes per household are small and farmlands are scattered. Diversification in rural industry is very restricted. To attack these problems, investment is urgently needed for rural infrastructure building as well as agricultural structure adjustment. In the process of rural development, there have been also encountered such problems as financial procurement, community's spontaneous participation, manpower development for adjusting to industrial structural change. Korea's experiences may be helpful for establishing rural development strategies and policies in Vietnam. Benchmark scopes can go beyond Saemaul Undong in 1970s. Korea's pre- and post-Saemaul Undong era as well as the Saemaul Undong era can be referred. In the wake of globalization, Vietnam has not only experienced compressed rapid economic growth but also encountered policy tasks to eradicate poverty, to realize self-reliance and income increase, and to lessen urban-rural development gap, at the same time. Korea's experiences show that priority needs to be put on the establishment of national and rural development strategies based on Vietnam-specific conditions, utilization of village's resources including community tradition and social capital, fund raising for rural development, farmland development and mobilization, production and living infrastructure building, technology transfer for farmers and vocational training for new job seekers.

Beach Deformation Mechanisms in Haeundae Beach (해운대(海雲臺) 해수욕장(海水浴場)의 해빈변형기구(海濱變形機構))

  • Lee, Jong Sup;Park, II Heum;Kim, Cha Kyum
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.14 no.3
    • /
    • pp.595-605
    • /
    • 1994
  • The field observations. data analyses and numerical experiments are performed to investigate the short and long term beach deformation mechanisms in Haeundae beach. The schematic diagrams of deposition and erosion mechanism due to the attack of typhoons are described from the analysis on the beach widths and profiles. The short term beach deformation depends strongly on the characteristics of incident waves and wave-induced currents. The main incident wave and the calibration parameters of the shoreline change model are determined using the beach width data. Beacause the main incident wave approaches obliquly from the SE direction, the net westward longshore sediment transport occurs. Therefore the unbalance of longshore sediment budget in the east of the beach where the sediment source dose not exist causes a beach erosion. On the other hand, the deposited sand in the west is lost offshore by the storm wave action.

  • PDF

Radition Effect on Colony Formation of HeLa.S3(SC) Cell Line (HeLa.S3(SC) 세포계의 집락형성에 미치는 방사선의 효과)

  • Shin, Sei-One;Kim, Sung-Kyu;Kim, Myung-Se
    • Journal of Yeungnam Medical Science
    • /
    • v.10 no.1
    • /
    • pp.212-217
    • /
    • 1993
  • Since discovery of X-rays, radiotherapy has evolved into one of the most scientific branches of medicine and has established its role as the primary line or the secondary line of attack, after surgery, in the treatment of malignant cancers. Nowadays its importance is illustrated by the fact that as many as 70 per cent of all pastients with cancer will receive radiation therapy at sometime during their disease process. Biologic effects of X-rays began to be apparant soon after the discovery by Roentgen in 1895. In clinical radiotherapy, the biologic endpoint of most importance is loss of cellular reproductive ability or clonogenicity. One of the commonest ways to assess cell survival is to use an in vitro plating assay. We analyzed radiation effect on colony formation of HaLa.S3(SC) cell line and obtained results are as follows: The plating efficiency is 0.464. The shape of cell survival curve is similar to multi-target plus single hit component model. Estimated values of Do, Dq, and extrapolation number are 150 cGy, 80 cGy and 1.7 respectively. We reported these experimental data with review of literature.

  • PDF

Security Enhanced Authentication Protocol in LTE With Preserving User Location Privacy (LTE에서 사용자 위치 정보 보호를 위한 보안 향상 인증 프로토콜)

  • Hahn, Changhee;Kwon, Hyunsoo;Hur, Junbeom
    • Journal of KIISE
    • /
    • v.41 no.9
    • /
    • pp.715-727
    • /
    • 2014
  • The number of subscribers in 4th generation mobile system has been increased rapidly. Along with that, preserving subscribers' privacy has become a hot issue. To prevent users' location from being revealed publicly is important more than ever. In this paper, we first show that the privacy-related problem exists in user authentication procedure in 4th generation mobile system, especially LTE. Then, we suggest an attack model which allows an adversary to trace a user, i.e. he has an ability to determine whether the user is in his observation area. Such collecting subscribers' location by an unauthorized third party may yield severe privacy problem. To keep users' privacy intact, we propose a modified authentication protocol in LTE. Our scheme has low computational overhead and strong secrecy so that both the security and efficiency are achieved. Finally, we prove that our scheme is secure by using the automatic verification tool ProVerif.

The Authentication Model which Utilized Tokenless OTP (Tokenless OTP를 활용한 인증 모델)

  • Kim, Ki-Hwan;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.205-214
    • /
    • 2006
  • Is need Remote Access through internet for business of Ubiquitous Computing age, and apply OTP for confidentiality about inputed ID and Password, network security of integrity. Current OTP must be possessing hardware or Token, and there is limitation in security. Install a Snooping tool to OTP network in this treatise, and because using Cain, enforce ARP Cache Poisoning attack and confirm limitation by Snooping about user password. Wish to propose new system that can apply Tokenless OTP by new security way, and secure confidentiality and integrity. Do test for access control inflecting Tokenless OTP at Remote Access from outside. and could worm and do interface control with certification system in hundred. Even if encounter hacking at certification process, thing that connection is impossible without pin number that only user knows confirmed. Because becoming defense about outward flow and misuse and hacking of password when apply this result Tokenless OTP, solidify security, and evaluated by security system that heighten safety.

  • PDF

Identification of Expanding the Usability of the Water Resources in Hwacheon Dam System Due to the Flood Surcharging Effects of Peace Dam (평화의 댐 흥수지체 효과에 따른 화천댐 계통 이수 능력의 증대에 대한 검정)

  • Yu, Ju-Hwan;Park, Chang-Geun;Jo, Hyo-Seop
    • Journal of Korea Water Resources Association
    • /
    • v.34 no.6
    • /
    • pp.617-625
    • /
    • 2001
  • Peace dam constructed against the water attack had stopped in the first step, linked with Hwacheon dam through bypass tunnels and had an effect of flood surcharging in its pocket on Hwacheon dam downstream. To study the utility of Peace dam, the flood control effects of Peace dam and the restricted water level (RWL) in Hwacheon dam were reviewed and identified with operating Hwacheon dam system. Analysing the results the ideas of expanding the usability of the water resources in Hwacheon dam system were suggested. To do that, the criteria and the model of reservoir operation were established frist and the optimization of the operation have done. Based on the results the performance of the optimization was evaluated as an reference coefficient with relative value of the registered data to the optimized. And examining several alternatives for the RWL in Hwacheon reservoir operation made more feasible RWL suggested. And its economic benefit was also reckoned.

  • PDF

The Extension and Validation of OpenFOAM Algorithm for Rotor Inflow Analysis using Actuator Disk Model (Actuator Disk 모델 기반의 로터 유입류 해석을 위한 OpenFOAM 알고리즘 확장)

  • Kim, Tae-Woo;Oh, Se-Jong;Yee, Kwan-Jung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.39 no.12
    • /
    • pp.1087-1096
    • /
    • 2011
  • The purpose of current study is to develop and verify the newly developed solver for analyzing rotor flow using the open-source code. The algorithm of standard solver, OpenFOAM, is improved to analyze the rotor inflow with and without fuselage. For the calculation of the rotor thrust, the virtual blade method based on the blade element method is employed. The inflow velocities on the rotor disk used to specify the effective angle of attack, have been included in the solver. The results of the current rotor inflow analysis are verified by comparing with other experimental and numerical results. It was confirmed that the modified solver provides satisfactory results for rotor-fuselage interaction problem.

A Study on Attitude toward In-flight Internet Usage (기내인터넷 이용자의 이용속성에 관한 연구)

  • Park, Kwang-Sik;Kim, Hyae-Yeon;Son, Won-Mog
    • Korean Business Review
    • /
    • v.19 no.1
    • /
    • pp.35-51
    • /
    • 2006
  • Airline industry which is depressed owing to terror attack on September 11 and Iraq War in early 21 century through high fuel cost and continuous recession in the second half of 90's is gradually recovering from the year of 2004. So demand of airline industry is rising step by step and investment of airlines toward customer service is also going up. Recently some mega carriers in head customer service in-flight internet service. In addition, so do domestic airlines and others ant to be backward. Many Study on usage attitude toward internet have been argued continuously as a result of everyday life using internet. Although there were survey for the revenue perspective of the firm, study on the side of the consumer is so rare. This study used the model of DEA -conjoint what users of the in-flight internet service now attitude and preference important factors to use. As a result, factors chosen are method to charge, service speed of internet, quality of contents provided and ease of approach toward information. This study presents airlines supplying in-flight internet service now to differentiation strategy for each segment.

  • PDF

Formation of DNA-protein Cross-links Mediated by C1'-oxidized Abasic Lesion in Mouse Embryonic Fibroblast Cell-free Extracts

  • Sung, Jung-Suk;Park, In-Kook
    • Animal cells and systems
    • /
    • v.9 no.2
    • /
    • pp.79-85
    • /
    • 2005
  • Oxidized abasic residues arise as a major class of DNA damage by a variety of agents involving free radical attack and oxidation of deoxyribose sugar components. 2-deoxyribonolactone (dL) is a C1'-oxidized abasic lesion implicated in DNA strand scission, mutagenesis, and covalent DNA-protein cross-link (DPC). We show here that mammalian cell-free extract give rise to stable DPC formation that is specifically mediated by dL residue. When a duplex DNA containing dL at the site-specific position was incubated with cell-free extracts of Po ${\beta}-proficient$ and -deficient mouse embryonic fibroblast cells, the formation of major dL-mediated DPC was dependent on the presence of DNA polymerase (Pol) ${\beta}$. Formation of dL-specific DPC was also observed with histones and FEN1 nuclease, although the reactivity in forming dL-mediated DPC was significantly higher with Pol ${\beta}$ than with histones or FEN1. DNA repair assay with a defined DPC revealed that the dL lesion once cross-linked with Pol ${\beta}$ was resistant to nucleotide excision repair activity of cell-free extract. Analysis of nucleotide excision repair utilizing a model DNA substrate containing a (6-4) photoproduct suggested that excision process for DPC was inhibited because of DNA single-strand incision at 5' of the lesion. Consequently DPC mediated by dL lesion may not be readily repaired by DNA excision repair pathway but instead function as unusual DNA damage causing a prolonged DNA strand break and trapping of the major base excision repair enzyme.