• Title/Summary/Keyword: Attack group

Search Result 362, Processing Time 0.03 seconds

Research on Countermeasure of SQL Injection Attack (SQL Injection 공격을 효율적으로 방어하는 대응책 연구)

  • Hong, Sunghyuck
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.10
    • /
    • pp.21-26
    • /
    • 2019
  • At present, it is indispensable to utilize data as an information society. Therefore, the database is used to manage large amounts of data. In real life, most of the data in a database is the personal information of a group of members. Because personal information is sensitive data, the role of the database administrator who manages personal information is important. However, there is a growing number of attacks on databases to use this personal information in a malicious way. SQL Injection is one of the most known and old hacking techniques. SQL Injection attacks are known as an easy technique, but countermeasures are easy, but a lot of efforts are made to avoid SQL attacks on web pages that require a lot of logins, but some sites are still vulnerable to SQL attacks. Therefore, this study suggests effective defense measures through analysis of SQL hacking technology cases and contributes to preventing web hacking and providing a secure information communication environment.

The Conversion method from ID-based Encryption to ID-based Dynamic Threshold Encryption (ID기반 암호시스템을 이용하여 ID기반 동적 임계 암호시스템으로 변환하는 방법)

  • Kim, Mi-Lyoung;Kim, Hyo-Seung;Son, Young-Dong;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.733-744
    • /
    • 2012
  • Dynamic threshold public-key encryption provides dynamic setting of the group of all users, receivers and the threshold value. Over recent years, there are many studies on the construction of scheme, called ID-based dynamic threshold encryption, which combines the ID-based encryption with dynamic threshold encryption. In this paper, we analyze the ID-based dynamic threshold encryption proposed by Xing and Xu in 2011, and show that their scheme has a structural problem. We propose a conversion method from ID-based encryption which uses the bilinear map to ID-based dynamic threshold encryption. Additionally, we prove this converted scheme has CPA security under the full model.

Application of the Recursive Contract Net Protocol for the Threshold Value Determination in Wireless Sensor Networks (무선 센서 네트워크에서 경계값 결정을 위한 재귀적 계약망 프로토콜의 적용)

  • Seo, Hee-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.4
    • /
    • pp.41-49
    • /
    • 2009
  • In ubiquitous sensor networks, sensor nodes can be compromised by an adversary since they are deployed in hostile environments. False sensing reports can be injected into the network through these compromised nodes, which may cause not only false alarms but also the depletion of limited energy resource in the network. In the security solutions for the filtering of false reports, the choice of a security threshold value which determines the security level is important. In the existing adaptive solutions, a newly determined threshold value is broadcasted to the whole nodes, so that extra energy resource may be consumed unnecessarily. In this paper, we propose an application of the recursive contract net protocol to determine the threshold value which can provide both energy efficiency and sufficient security level. To manage the network more efficiently, the network is hierarchically grouped, and the contract net protocol is applied to each group. Through the protocol, the threshold value determined by the base station using a fuzzy logic is applied only where the security attack occurs on.

Clinical Study for YMG-1, 2's Effects on Learning and Memory Abilities (육미지황탕가감방-1, 2가 학습과 기억능력에 미치는 영향에 관한 임상연구)

  • Park Eun Hye;Chung Myung Suk;Park Chang Bum;Chi Sang Eun;Lee Young Hyurk;Bae Hyun Su;Shin Min Kyu;Kim Hyun taek;Hong Moo Chang
    • Journal of Physiology & Pathology in Korean Medicine
    • /
    • v.16 no.5
    • /
    • pp.976-988
    • /
    • 2002
  • The aim of this study was to examine the memory and attention enhancement effect of YMG-1 and YMG-2, which are modified herbal extracts from Yukmijihwang-tang (YMJ). YMJ, composing six herbal medicine, has been used for restoring the normal functions of the body to consolidate the constitution, nourishing and invigorating the kidney functions for hundreds years in Asian countries. A series of studies reported that YMJ and its components enhance memory retention, protects neuronal cell from reactive oxygen attack and boost immune activities. Recently the microarray analysis suggested that YMG-1 protects neurodegeneration through modulating various neuron specific genes. A total of 55 subjects were divided into three groups according to the treatment of YMG-1 (n=20), YMG-2 (n=20) and control (C; n=15) groups. Before treatments, all of subjects were subjected to the assessments on neuropsychological tests of K-WAIS test, Rey-Kim memory test, and psychophysiological test of Event-Related Potential (ERP) during auditory oddball task and repeated word recognition task. They were repeatedly assessed with the same methods after drug treatment for 6 weeks. Although no significant effect of drug was found in Rey-Kim memory test, a significant interaction (P = .010, P < 0.05) between YMG-2 and C groups was identified in the scores digit span and block design, which are the subscales of K-WAIS. The very similar but marginal interaction (P = .064) between YMG-1 and C groups was found too. In ERP analysis, only YMG-1 group showed decreasing tendency of P300 latency during oddball task while the others tended to increase, and it caused significant interaction between session and group (p= .004). This result implies the enhancement of cognitive function in due to consideration of relationship between P300 latency and the speed of information processing. However, no evidence which could demonstrate the significant drug effect was found in neither amplitude or latency. These results come together suggest that YMG-1, 2 may enhance the attention, resulting in enhancement of memory processing. For elucidating detailed mechanism of YMG on learning and memory, the further studies are necessary.

Electrodeposition onto the Surface of Carbon Fiber and its Application to Composites(I) - Electrodeposition of MVEMA and EMA (탄소섬유 표면에의 고분자 전착과 복합재료 물성(I) - MVEMA와 EMA의 전착 -)

  • Kim, Minyoung;Kim, Jihong;Kim, Wonho;Kim, Booung;Hwang, Byungsun;Choi, Youngsun
    • Applied Chemistry for Engineering
    • /
    • v.9 no.6
    • /
    • pp.894-900
    • /
    • 1998
  • An interphase between carbon fiber and epoxy matrix was introduced to increase impact strength of carbon fiber reinforced composites (CFRC) without sacrificing the interlaminar shear strength. Flexible polymers, I. e., MVEMA (poly(methyl vinyl ether-co-maleic anhydride)) and EMA(poly(ethylene-co-maleic anhydride)), which have reactive functional groups were considered as interphase materials. Weight hain of MVEMA and EMA onto the surface of carbon fibers was evaluated by changing the parameters of electrodeposition process. Electrodeposition mechanism of polymers which have anhydride functional group was identified by IR spectroscopy, that is, the generation of $RCOO^-$ functional group by the attack of hydroxide anion in the basic solution was observed. The weight gain was increased by increasing concentration of polymers, current density, and electrodeposition time. However the excess generation of oxygen gas decreased the weight gain by removing the deposited polymers. Washing in the running water easily removed the deposited polymers which are on the fiber surface without bonding, as a results, only 0.5 wt% of deposited polymers are remained.

  • PDF

Study on the Realities in Seoul Subway Crimes: Criminal Psychology (서울지하철 범죄 실태에 대한 범죄심리학적 연구)

  • Rim, Sang-Gon
    • Korean Security Journal
    • /
    • no.7
    • /
    • pp.233-285
    • /
    • 2004
  • ‘Defined legally as a violation of law' (Sutherland, E. H. Principles of Criminology, Lippincott, Chicago, 1939) Crime within the group is essentially and primarily antisocial in that the criminal who is welfare of his group acts instead against it and breaks the principles of social solidarity not merely by not doing what these principles prescribe, but by doing something exactly opposites. Any program set up to attack crime and delinquent behavior at their sources. A program of his nature needs the constant and comprehensive collaboration of psychiatrists, social works, educations, lawmakers, and public officials, since crime is a social problem and it should be treated as such. Some crime preventives which should be mentioned are as follows, (1) The insurance that every child will be decently born and that his home life be socially and economically adequate; without socially mature parents the chid is handicapped at the start; thus parental education, integrated with the public school system, should be developed now. (2) A more meaningful educational program which would emphasize ideals of citizenship, moral integrity, and respect for the law and the police. (3) A periodic check made for potential delinquents throughout the public schools and treatment provided if possible; and if not, proper segregation in institutions. (4) Careful attention paid to press, movies, and radio so that crime may no longer appear to be glamorous. This can be done by women's clubs, civic bodies, and other educational groups exerting pressure on the movie syndicates and broadcasting companies to free their productions of the tawdry and lurid characteristics of crime and criminals. Aggression associated with the phallic stage of development, The child ordinarily comprehends sexual intercourse as an aggressive and sadistic act on the part of the male, and specifically on the part of the penis. Evidence that the penis is phantasied as a weapon of violence and destruction come from unconscious productions of normal adults. Limerick, for instance, often refer to the penis as square, or too large, etc., so that intercourse is dangerous and painful for the partner, This may wall be a projection of the male's own fear of coitus. A certain portion of the death-instinct always remains within the person; it is called 'primal sadism' and according to Freud is identical with masochism. 'After the chief part of it(the death instinct) has been directed outwards towards objects, there remains as a residuum within the organism the true erotogenic masochism, which on the one hand becomes a component of the libido and on the other still has the subject itself for a object.' Criminalism, compulsive-neurotic frequent repetition of criminal acts in a compulsive manner. Like most symptoms of the compulsive-neurotic, such antisocial act are closely rated to feelings of hostility and aggression, often against the father. Because these acts are symptomatic, they afford only temporary relief and are therefore repeated. One patient with compulsive-neurotic criminalism was apprehended after breaking into hardware store and stealing money. He later confessed to many similar incidents over the preceding two years. At the same time it was apparent that he stole only for the sake of stealing. He did not need the money he thus obtained and had no special plans for using it.

  • PDF

Comparative Epidemiologic Survey of Measles in Two Primary Schools (2000년 영덕군 홍역 유행시 유행 차이에 따른 2개 초등학교 일부 학생에 대한 역학 조사)

  • Park, Sue-Kyung;Kim, Jee-Hee;Lee, Joo-Yeon;Na, Byoung-Kuk;Kim, Woo-Joo;Cheong, Hae-Kwan
    • Journal of Preventive Medicine and Public Health
    • /
    • v.34 no.2
    • /
    • pp.131-140
    • /
    • 2001
  • Objectives : During March-May, 2000, a measles outbreak occurred at Youngduk, Korea. This county is divided into two areas with different historical and socioeconomic background. The outbreak occurred in one of these areas. We conducted a comparative epidemiologic study on the two areas in order to evaluate the factors related to the epidemic. Materials and Methods : We selected two groups, grades 3 and 5 in a primary schools in each area. We investigated outbreak-related factors using parent-questionnaires, the vaccination history from the student's health record and the records concerning the recent measles-outbreak from the local health center. Serologic test on measles-IgG and -IgM antibody was done. Results : The infection rate was 31.5% for the epidemic area and 3.7% for non-the epidemic area according to clinical or serological criteria (p<0.001). No difference was seen in the measles vaccination rate, residence at the time of vaccination or past measles infection history between the two areas. In the epidemic area, the attack rate for the 4-6 year-old MMR booster group(20.5%) was higher than the non-booster group(32.4%), but was not found significantly. Vaccine efficacy was 29.6% in the epidemic area and 87.0% in the non-epidemic area (p<0.001). The IgG level and positive rate were significantly different between the two areas (median 10727 IU/ml, 98.9% in epidemic area; median 346 IU/ml, 85.9% in the non-epidemic area, p<0.001). However, the IgG level and positive rate between the measles-cases and non-cases were not significantly different. Conclusions : This outbreak took place in mostly vaccinated children. These results suggest that a reduction of herd immunity for immunity failure after vaccination may be one of the feasible factors related to the outbreak pattern in the two areas. The results of the IgG level and positive rate suggest that re-establishment of a normal value for IgG level and of a qualitative method for IgG are needed.

  • PDF

Studies on the Semicarbazone Formation of Mono substituted Benzaldehydes (일치환 Bezaldehyde 의 Semicarbazone 생성 반응에 관한 연구)

  • Kim, Yong-In;Kim, Chang-Mean
    • Journal of the Korean Applied Science and Technology
    • /
    • v.7 no.1
    • /
    • pp.93-105
    • /
    • 1990
  • Semicarbazone formation of nine monosubstituted benzaldehydes was studied kinetically in 20% methanol buffer solution at 15, 25, 35, and $45^{circ}C$. The rate of p-nitrobenzaldehyde semicarbazone formation is 2.7 times as fast as that of benzaldehyde, while p-hvdroxybenzaldehyde is 3.6 times as slow as that of benzaldehyde. Activation energies for p-chlorobenzaldehyde, benzaldehyde, p-methylbenzaldehyde, p-methoxybenzaldshyde, p-hydroxybenzaldehyde, and p-dimethylaminobenzaldehyde semicarbazone formation are calculated as 5.80, 6.19, 6.57, 7.06, 8.03, and 6.46 kcal/mol respectively. It is concluded from the effect of ionic strength that the reaction is affected by not ions but neutral molecules involving hydrogen bonding between oxygen atom of carbonyl group and hydrogen atom of acid-catalyst, and concerted attack of the necleophilic reagent, free base on carbonyl compound. Also, the effect of solvent composition is small in 20% and 50% methanol (and ethanol) aqueous solutions. The ${\rho}-{\sigma}$ plots for the rates of semicarbazone formation at pH 7.1 show a linear ${\rho}-{\sigma}$ relationship (${\rho}=0.14l$, in contrast to that at pH 2.75 and pH 5.4 corresponding to ${\rho}-{\sigma}$ correlations reparted by Jencks. The rate of semicarbazone formation at pH 5.4 show a relationship which is convex upward, resulting in a break in the curve but at pH 2.75, slight difference from a linear relationship. As a result of studying citric acid catalysis, second-order rate constants increase linearly with citric acid concentration and show a 2 times increase as the catalyst concentration is varied from 0.025 to 0.1 mol/1 at pH 2,9, but slight increase at pH 5.3. The rate-determining step is addition below pH 5 but is dehydration between pH 5 and 7. Conclusively, the rate-determining step of the reaction changes from dehydration to addition in respect to hydrogen ion activity near pH 5. The ortho: para rate ratio of the hydroxybenzaldehydes for semicarbazone formation is about 17 at $15^{\circ}C$. It is concluded that the results constitute strong evidence in favor of greater stabilization of p- than o-hydroxybenzaldehyde by substituent which donate electrons by resonance and is due to hydrogen bonding between the carbon-bound hydrogen of the-CHO group and the oxygen atom of the substituent.

A Study on Using EAV (MERIDIAN) by Analysis of Cerebrovascular Disease Risk Factors (뇌혈관질환 위험요인과의 분석을 통한 EAV(MERIDIAN)활용에 관한 연구)

  • Kim, Young-Eun;Kim, Il-Wha;Moon, A-Ji;Kim, Nam-Kwen;Lee, Seung-Geun;Lee, Key-Sang
    • The Journal of Korean Medicine
    • /
    • v.31 no.5
    • /
    • pp.136-145
    • /
    • 2010
  • Objectives: Electroacupuncture according to Voll (EAV) has been used to quantify the skin's electrical resistance and conductance over acupuncture points that, based on traditional Chinese medicine, represent the state of health or disease of the organ or tissue. However, it doesn't have enough objective data yet, so the purpose of this study was to aid in the use of EAV in analysis of cerebrovascular disease risk factors. Methods: This study researched the clinical statistics of 216 cases: cerebrovascular attack (CVA) group 43, control group 173. We measured control meridian points (CMP) on hands and feet and the cardio ankle vascular index (CAVI) which represents atherosclerosis severity, and sex, age, hypertension, diabetes, dyslipidemia, and obesity. The data were then analyzed by t-test, chi-square test and logistic regression. Results: Between the CVA and control groups, there were not statistically significant differences in CMP. However, logistic regression analysis of the presence of CVA, mean of CMP heart and lung, sex, age, DBP (diastolic blood pressure), and HDL (high density lipoprotein) cholesterol showed that the risk of CVA was 1.1 times increased with CMP heart (p=0.002), in men was 4.12 times higher than in women (p=0.001), 1.09 times higher with age (p=0.000), 1.04 times higher with DBP (p=0.045), while was lower by 0.924 times with CMP lung (p=0.005) and 0.957 times with HDL cholesterol (p=0.006). Conclusion: Although there were not clear evidence or mechanisms about EAV, this study showed that if we study EAV further, we may be able to apply EAV as an objective instrument of oriental medicine in cerebrovascular disease.

An Enhanced System of Group Key Management Based on MIPUF in IoT (IoT 환경의 MIPUF 기반 그룹키 관리 시스템 개선)

  • Tak, Geum Ji;Jeong, Ik Rae;Byun, Jin Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1243-1257
    • /
    • 2019
  • With the emergence of the IoT environment, various smart devices provide consumers with the convenience and various services. However, as security threats such as invasion of privacy have been reported, the importance of security issues in the IoT environment has emerged, and in particular, the security problem of key management has been discussed, and the PUF has been discussed as a countermeasure. In relation to the key management problem, a protocol using MIPUF has been proposed for the security problem of the group key management system. The system can be applied to lightweight IoT environments and the safety of the PUF ensures the safety of the entire system. However, in some processes, it shows vulnerabilities in terms of safety and efficiency of operation. This paper improves the existing protocol by adding authentication for members, ensuring data independence, reducing unnecessary operations, and increasing the efficiency of database searches. Safety analysis is performed for a specific attack and efficiency analysis results are presented by comparing the computational quantities. Through this, this paper shows that the reliability of data can be improved and our proposed method is lighter than existing protocol.