• Title/Summary/Keyword: Attack prevention

Search Result 272, Processing Time 0.032 seconds

Implementation of the ZigBee-based Homenetwork security system using neighbor detection and ACL (이웃탐지와 ACL을 이용한 ZigBee 기반의 홈네트워크 보안 시스템 구현)

  • Park, Hyun-Moon;Park, Soo-Hyun;Seo, Hae-Moon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.1
    • /
    • pp.35-45
    • /
    • 2009
  • In an open environment such as Home Network, ZigBee Cluster comprising a plurality of Ato-cells is required to provide intense security over the movement of collected, measured data. Against this setting, various security issues are currently under discussion concerning master key control policies, Access Control List (ACL), and device sources, which all involve authentication between ZigBee devices. A variety of authentication methods including Hash Chain Method, token-key method, and public key infrastructure, have been previously studied, and some of them have been reflected in standard methods. In this context, this paper aims to explore whether a new method for searching for neighboring devices in order to detect device replications and Sybil attacks can be applied and extended to the field of security. The neighbor detection applied method is a method of authentication in which ACL information of new devices and that of neighbor devices are included and compared, using information on peripheral devices. Accordingly, this new method is designed to implement detection of malicious device attacks such as Sybil attacks and device replications as well as prevention of hacking. In addition, in reference to ITU-T SG17 and ZigBee Pro, the home network equipment, configured to classify the labels and rules into four categories including user's access rights, time, date, and day, is implemented. In closing, the results demonstrates that the proposed method performs significantly well compared to other existing methods in detecting malicious devices in terms of success rate and time taken.

The Risk Factors of Recurrent Ischemic Stroke (허혈성 뇌졸중의 재발과 연관된 위험인자)

  • Jung, Cheol;Kim, Wook-Nyneon;Kim, Min-Jeung;Choi, Soek-Mum;Eur, Kyung-Yoon;Park, Mee-Young;Hah, Jeng-Sang;Byun, Yeung-Ju
    • Journal of Yeungnam Medical Science
    • /
    • v.10 no.2
    • /
    • pp.423-431
    • /
    • 1993
  • To eveluate the risk factors which are related to recurrence of ischemic stroke, we selected subjects who were admitted to YNUH due to recurrent stroke and compared their risk factors with non-recurred group who suffered from single ischemic stroke. In the subjects, 55 of them are men and 22 were women and in the non-recurred groups, 84 of them were men and 40 were women, Subject's age ranged from 29 to 85 years(Mean 62, 5years), and non-recurred group's age ranged from 27 to 90 years(Mean 60, 7years), Peak incidence of ischemic stroke is in the 7th decade in both groups. Age and sex are not, statistically significant for recurrence of ischemic stroke. The patient's history of diabetes mellitus, myocardial infarction, atrial fibrillation, transient attack and type or site of ischemic stroke had no significant effect statistically on the recurrent ischemic stroke. However, when the patient had previous history of hypertension or systolic blood pressure more than 160mmHg and diastolic more than 95mmHg, there was substantial difference(P<0.05) between the two group in the recurrence of ischemic stroke. According to the above results, hypertension is most likely significant risk factor of the recurrence of ischemic stroke within 2years after initial one. Therefore, adequate treatment of the hypertension is important for the prevention of ischemic stroke. Further study is required for searching other risk factors.

  • PDF

The Necessity of A Cognitive-scientific Analysis on A Security threat Act - The Foundation for A Establishment of The Scientific Preventive Social-security Countermeasure - (경호위해행위에 대한 인지과학적 분석의 필요성 고찰 - 과학적 예방적 사회안전 대책 수립을 위한 기초 -)

  • Kim, Doo-Hyun;Son, Ji-Young
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.33-51
    • /
    • 2008
  • According to dictionary, the meaning of protection is "guard and protect" that means protecting the Protectee's safety in case of sudden attack or various accident and Security means all protecting activity including Protectee and place where he is in or will be as comprehensively meaning of safe. As you see in the definition, Protection and security is the act to protect or will to protect from a security-threat act. A security-threat act can be discussed in the range of the concept of a criminal act in Criminal Law. A security-threat act is based on criminal act in Criminal Law, we are going to review such a security-threat act in a point of view in a sphere of learning in today's remarkable a brain-neuro science and cognitive science based on cognitive psychology, and to use an analysis on such a security-threat act to make a foundation for a establishment of the scientific preventive social security countermeasure. To do so, First of all we are going to review a security-threat act based on criminal act in Criminal Law in a point of protection police logic view. Next, we are going to introduce how cognitive science understand about act of man before we analyse a threat act as one of an act of man in cognitive science point of view. Finally, we are going to discuss the need of cognitive scientific analyse in order to establish the Scientific Preventive Social-security Countermeasure at the same time we are going to analyse a threat act in a cognitive scientific view.

  • PDF

'Study on Oui-Ga-Sil( 胃家實 )' (위가실(胃家實)에 관(關)한 연구(硏究))

  • Han, Gyu-Eon;Ryu, Bong-Ha;Park, Dong-Won;Ryu, Gi-Won;Jang, In-Gyu
    • The Journal of Internal Korean Medicine
    • /
    • v.10 no.1
    • /
    • pp.65-80
    • /
    • 1989
  • About Oui-Ga-Sil(胃家實) in order to considerate the contents recorded in Nai-Gyung Sang-Han-Lon and latter literature, definition, etiopathology, syndrome, differential diagnosis, therapy, Prognosis and prevention were classified. And the results were as follows: 1. Oui-Ga(胃家)was a term which indicated the whole digestive system such as stomach, small intestine, large intestine, rectum and anus. Sil(實)could be defined as the peculiar concept pertaining to the acute and last stage which was invaded to inside bowels because of abundance with evil influence. 2. Eliology of Oui-Ga-Sil was abunt gastric fever originally, injured mucus because of mistreatment, the invasion to inside of outside evil influence through meridian. Pathology was the opening and shutting appearance of gastric abundance with intestinal emptiness, and intestinal abundance with gastric emptiness, Oui-Ga-Sil could be occurred because of gastric abundant dryness and splenic humidifying capacity decrease. 3. Symptom of Oui-Ga-Sil was classified as for the sunlight outside syndrome and the inside abundant syndrome. The sunlight outside syndrome was body fever, sweating, no chilling, on the contrary hatred of fever. The chief complaint of inside abundant syndrome was daily fever, talking in delirium, hand and foot sweating, abdominal distention, difficult defection and those could be pertained to sunlight bowel syndrome. 4. Diagnostic views of Oui-Ga-Sil were that pulse was descending abundant large strong and smooth quick, a coated tongue was yellow, deep yellow, old yellow, thick, scorching dry rough or gray black. On abdominal diagnosis, pressing by hand, patient was conscious of pain, excessive pain, rejection against press, impossible press or intermittent abdominal pain and bowel cutting pain without press. 5. Differential diagnosis was that the sunlight of Nai-Gyung-Fever-Theory was outside desease making meridian the prime object, Baik-Ho-Tang syndrome was making figureless abundant fever the pivotal point. And important differential standard of splenic shrink syndrome was that a daily fever, an irritation with fever were not occurred. 6. Theory of Oui-Ga-Sil was that Seng-Gi-Tang classes had been used in attacking downward or making balance, and moxibustion on Jung-Wan, honey boiling induction theory had been also used. Attacking downward therapy was invigorating method to preserve mucus, and if mucus had been exausted with complicating emptiness prognosis had been appeared badly. 7. Preventing from Oui-Ga-Sil diet by rule, fitness to cold and warmth may be needed to prevent outside evil influence attack and inside evil influence occurrence. Prudence with being very busy, fatigue, wine and woman may be also needed not to be an injury to splanic and gastric spirit.

  • PDF

A Study on the Threat of Biological Terrorism in modern society (현대사회의 환경변화에 따른 Bio-Terror의 위협요인 연구)

  • Kang, young-sook;Kim, Tae-hwan
    • Journal of the Society of Disaster Information
    • /
    • v.1 no.1
    • /
    • pp.3-26
    • /
    • 2005
  • In recent years, there is growing concern about the potential use of biological agents in war or acts of terrorism accompanied an increased realization that rapid preparedness and response are needed to prevent or treat the human damage that can be caused by these agents. The threat is indeed serious, and the potential for devastating numbers of casualties is high. The use of agents as weapons, even on a small scale, has the potential for huge social and economic disruption and massive diversion of regional and national resources to combat the threat, to treat primary disease, and to clean up environmental contamination. Biological weapons are one of weapons of mass destruction (or mass casualty weapons, to be precise. since they do not damage non-living entities) that are based on bacteria, viruses, rickettsia, fungi or toxins produced by these organisms. Biological weapons are known to be easy and cheap to produce and can be used to selectively target humans, animals, or plants. Theses agents can cause large numbers of casualties with minimal logistical requirements (in wide area). The spread of disease cannot be controlled until there is awareness of the signs of infection followed by identification of agents; and if the organism is easily spread from person to person, as in the case of smallpox, the number of casualties could run into the tens of thousands. Biological weapons could be used covertly, there can be a lot of different deployment scenarios. A lot of different agents could be used in biological weapons. And, there are a lot of different techniques to manufacture biological weapons. Terrorist acts that make use of Biological Agents differ in a number of ways from those involving chemicals. The distinction between terrorist and military use of Biological Weapon is increasingly problematic. The stealthy qualities of biological weapons further complicate the distinction between terrorism and war. In reality, all biological attacks are likely to require an integrated response involving both military and civilian communities. The basic considerations when public health agencies establish national defence plan against bioterrorism must be 1) arraying various laws and regulations to meet the realistic needs, 2)education for public health personnels and support of concerned academic society, 3)information collection and cooperative project with other countries, 4)Detection and surveillance(Early detection is essential for ensuring a prompt response to biological or chemical attack, including the provision of prophylactic medicines, chemical antidotes, or vaccines) and 5) Response(A comprehensive public health response to a biological or chemical terrorist event involves epidemiologic investigation, medical treatment and prophylaxis for affacted persons, and the initiation of disease prevention or environmental decontamination measures). The purpose of this paper is providing basic material of preparedness and response for biological terrorism in modern society.

  • PDF

EFFECTS OF AMYLASE ON THE DEMINERALIZATION IN HYDROXYAPATITE (Amylase가 Hydroxyapatite 탈회에 미치는 영향)

  • Lee, In-Hwan;Seo, Jeong-Taeg;Choi, Byung-Jai;Lee, Jong-Gap
    • Journal of the korean academy of Pediatric Dentistry
    • /
    • v.25 no.2
    • /
    • pp.335-351
    • /
    • 1998
  • Salivary proteins which are produced in the saliary acinar cells have been known to be involved in the Calcium and phosphate metabolism. The acquired pellicle resulting from such metabolism is considered as a secondary defence membrane against tooth caries. In this respect, some proteins included in saliva probably play an important role in the prevention of demineralization in enamel. On the other hand, fluoride has long been known to prevent the demineralization of enamel by the inhibition of the growth of Streptococcus mutans(S. mutans) and by the chemical reaction with calcium and phosphate, Therefore, I have examined the roles of amylase and albumin in the demineralization of enamel and compared these preteins with fluoride in terms of anticariogenic effect. 1. The demineralization caused by S. mutans occurred slowly and progressively for the first 60 min, then the rate of demineralization was accelerated afterwards. 2. pH decreased continuously during the entire period of each experiment. 3. The demineralization was significantly inhibited by the preteatment of amylase and fluoride but albumin had little effect on it. 4. An addition of 0.1 mM lactic acid (final concentration 0.1 ${\mu}M$) caused a rapid increase in calcium concentration reaching a maximum within 10 min. 5. pH decreased rapidly by the addition of 0.1 mM lactic acid and reached a minimum within a few seconds followed by an increase in pH. pH reaced a plateu with 10 min. 6. Fluoride, amylase and albumin played little role in the 0.1 mM lactic acid-induced demineralization. 7. A slow infusion of 0.1 M lactic acid at a rate of 5 ${\mu}l/min$ caused a slower increase in calcium concentration compared with the bolus addition of lactic acid. 8. Fluoride had an inhibitory effect on the calcium release caused by slow infusion of lactic acid while amylase and albumin had no effect on it. These results suggest that fluoride inhibits demineralization by protecting the HA from the acid attack whereas amylase has a direct effect on S. mutans to prevent demineralization.

  • PDF

A Study on the Eco-Friendly Durable Pre-Painting for Concrete Structure (콘크리트 구조물의 친환경 내구성 도장에 관한 기초 연구)

  • Jo, Byung Wan;Choi, Ji Sun;Lee, Seong Won
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.17 no.2
    • /
    • pp.110-116
    • /
    • 2013
  • A concrete structure has become bigger and higher because of development of construction technology and a change in construction environment. Also it tends to focus on repairing, reinforcement and exterior in harmony with environment for structure maintenance and performance improvement. The research is about eco friendly durable painting applicable to concrete structure using civil and architecture. it purpose to improve external beauties and durable problems due to flexibility by variation of temperature, adhesion of exterior wall, crack and delamination in existing organic and mineral painting. For those problems, we made a eco friendly pre-paint that is made with preliminary treatment mixture as a highly enriched waterproof agent and adhesive increasing agent in preprocessing mixture. Then we performed an experiment on durability of prevention neutralization of concrete, durability abrasion, hiding power, adhesion, temperature resistance and resistance to chemical attack. The result of an experiment shows that hiding power is over 0.96 in standard test, durability abrasion test got higher value 1mg than water paint 75mg and tensile strength is 6 times higher than standard waterproof specification.

Robust DNA Watermarking based on Coding DNA Sequence (부호 영역 DNA 시퀀스 기반 강인한 DNA 워터마킹)

  • Lee, Suk-Hwan;Kwon, Seong-Geun;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.2
    • /
    • pp.123-133
    • /
    • 2012
  • This paper discuss about DNA watermarking using coding DNA sequence (CDS) for the authentication, the privacy protection, or the prevention of illegal copy and mutation of DNA sequence and propose a DNA watermarking scheme with the mutation robustness and the animo acid preservation. The proposed scheme selects a number of codons at the regular singularity in coding regions for the embedding target and embeds the watermark for watermarked codons and original codons to be transcribed to the same amino acids. DNA base sequence is the string of 4 characters, {A,G,C,T} ({A,G,C,U} in RNA). We design the codon coding table suitable to watermarking signal processing and transform the codon sequence to integer numerical sequence by this table and re-transform this sequence to floating numerical sequence of circular angle. A codon consists of a consecutive of three bases and 64 codons are transcribed to one from 20 amino acids. We substitute the angle of selected codon to one among the angle range with the same animo acid, which is determined by the watermark bit and the angle difference of adjacent codons. From in silico experiment by using HEXA and ANG sequences, we verified that the proposed scheme is more robust to silent and missense mutations than the conventional scheme and preserve the amino acids of the watermarked codons.

Evaluation on the Basic Properties of Phosphate Modified Portland Cement Paste for Potential Application of Geologic CO2 Sequestration (이산화탄소 지중 격리용 인산염 혼입 시멘트 페이스트에 관한 기초물성 평가)

  • Yoon, Ju-Han;Kim, Seong-Geun;Kim, Ji-Hyun;Lee, Jae-Yong;Chung, Chul-Woo
    • Journal of the Korea Institute of Building Construction
    • /
    • v.17 no.3
    • /
    • pp.253-260
    • /
    • 2017
  • As global warming became a worldwide issue, a significant effort has been made on the development of technology related to $CO_2$ capture and storage. Geologic sequestration of $CO_2$ is one of those technologies for safe disposal of $CO_2$. Geologic sequestration stores $CO_2$ in the form of supercritical fluid into the underground site surrounded by solid rock, and concrete is used for prevention of $CO_2$ leakage into the atmosphere. In such case, concrete may experience severe damage by attack of supercritical $CO_2$, and especially in contact with underground water, very aggressive form of carbonation can occur. In this work, to prevent such deterioration in concrete, calcium phosphates were added to the portland cement to produce hydroxyapatite, one of the most stable mineral in the world. Temperature rise, viscosity, set and stiffening, and strength development of cement paste incorporating three different types of calcium phosphates were investigated. According to the results, it was found that the addition of calcium phosphate increased apparent viscosity, but decreased maximum temperature rise and 28 day compressive strength. It was found that monocalcium phosphate was found to be inappropriate for portland cement based material. Applicability of dicalcium and tricalcium phosphates for portland cement needs to be evaluated with further investigation, including the long term compressive strength development.

A Study on Collection and Analysis Method of Malicious URLs Based on Darknet Traffic for Advanced Security Monitoring and Response (효율적인 보안관제 수행을 위한 다크넷 트래픽 기반 악성 URL 수집 및 분석방법 연구)

  • Kim, Kyu-Il;Choi, Sang-So;Park, Hark-Soo;Ko, Sang-Jun;Song, Jung-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1185-1195
    • /
    • 2014
  • Domestic and international CERTs are carrying out security monitoring and response services based on security devices for intrusion incident prevention and damage minimization of the organizations. However, the security monitoring and response service has a fatal limitation in that it is unable to detect unknown attacks that are not matched to the predefined signatures. In recent, many approaches have adopted the darknet technique in order to overcome the limitation. Since the darknet means a set of unused IP addresses, no real systems connected to the darknet. Thus, all the incoming traffic to the darknet can be regarded as attack activities. In this paper, we present a collection and analysis method of malicious URLs based on darkent traffic for advanced security monitoring and response service. The proposed method prepared 8,192 darknet space and extracted all of URLs from the darknet traffic, and carried out in-depth analysis for the extracted URLs. The analysis results can contribute to the emergence response of large-scale cyber threats and it is able to improve the performance of the security monitoring and response if we apply the malicious URLs into the security devices, DNS sinkhole service, etc.