• Title/Summary/Keyword: Attack tolerance

Search Result 33, Processing Time 0.029 seconds

A Development Technique for Application Software Based on Intrusion Tolerant Requirements (침입감내 요구사항을 수용한 응용 소프트웨어 개발)

  • Kim Chul Jin;Lee Sook Hee;Cho Eun Sook
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.2
    • /
    • pp.233-248
    • /
    • 2005
  • An intrusion tolerant technology has been introduced as a solution to prevent intrusion accident for unknown fragility or attack. However, a systematic modeling technique is not applied into a system design and development based on intrusion tolerant technology. Especially, elements such as availability, integrity, reliability, confidentiality, and so on are important requirements in intrusion tolerant system. Nevertheless, current most of UML-based modeling techniques pass over or don't provide design techniques reflecting those requirements. Therefore, we know these weaknesses and propose both profile and design technique reflecting and applying intrusion tolerant requirements systematically in the development of application software based on intrusion tolerance. We expect that proposed technique can extend not only current UML's limitations but also can improve the quality of application software based on intrusion tolerance.

  • PDF

A Vulnerability Analysis of Intrusion Tolerance System using Self-healing Mechanism (자가치유 메커니즘을 활용한 침입감내시스템의 취약성 분석)

  • Park, Bum-Joo;Park, Kie-Jin;Kim, Sung-Soo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.7
    • /
    • pp.333-340
    • /
    • 2005
  • One of the most important core technologies required for the design of the ITS (Intrusion Tolerance System) that performs continuously minimal essential services even when the network-based computer system is partially compromised because of the external or internal intrusions is the quantitative dependability analysis of the ITS. In this paper, we applied self-healing mechanism, the core technology of autonomic computing to secure the protection power of the ITS. We analyzed a state transition diagram of the ITS composed of a Primary server and a backup server utilizing two factors of self-healing mechanism (fault model and system response) and calculated the availability of ITS through simulation experiments and also performed studies on two cases of vulnerability attack.

A Study on Survivability of Node using Response Mechanism in Active Network Environment (액티브 네트워크 환경에서 대응 메커니즘을 이용한 노드 생존성에 관한 연구)

  • Yang, Jin-Seok;Lee, Ho-Jae;Chang, Beom-Hwan;Kim, Hyoun-Ku;Han, Young-Ju;Chung, Tai-Myoung
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.799-808
    • /
    • 2003
  • Existing security solutions such as Firewell and IDS (Intrusion Detection System) have a trouble in getting accurate detection rate about new attack and can not block interior attack. That is, existing securuty solutions have various shortcomings. Shortcomings of these security solutions can be supplemented with mechanism which guarantees an availability of systems. The mechanism which guarantees the survivability of node is various, we approachintrusion telerance using real time response mechanism. The monitoring code monitors related resources of system for survivability of vulnerable systm continuously. When realted resources exceed threshold, monitoring and response code is deployed to run. These mechanism guarantees the availability of system. We propose control mathod about resource monitoring. The monitoring code operates with this method. The response code may be resident in active node for availability or execute a job when a request is occurred. We suggest the node survivability mechanism that integrates the intrusion tolerance mechanism that complements the problems of existing security solutions. The mechanism takes asvantage of the automated service distribution supported by Active Network infrastructure instead of passive solutions. The mechanism takes advantage of the automated service distribution supported by Active Network infrastructure instead of passive system reconfiguration and patch.

Induced Systemic Tolerance to Multiple Stresses Including Biotic and Abiotic Factors by Rhizobacteria (근권미생물에 의한 식물의 생물·환경적 복합 스트레스 내성 유도)

  • Yoo, Sung-Je;Sang, Mee Kyung
    • Research in Plant Disease
    • /
    • v.23 no.2
    • /
    • pp.99-113
    • /
    • 2017
  • Recently, global warming and drastic climate change are the greatest threat to the world. The climate change can affect plant productivity by reducing plant adaptation to diverse environments including frequent high temperature; worsen drought condition and increased pathogen transmission and infection. Plants have to survive in this condition with a variety of biotic (pathogen/pest attack) and abiotic stress (salt, high/low temperature, drought). Plants can interact with beneficial microbes including plant growth-promoting rhizobacteria, which help plant mitigate biotic and abiotic stress. This overview presents that rhizobacteria plays an important role in induced systemic resistance (ISR) to biotic stress or induced systemic tolerance (IST) to abiotic stress condition; bacterial determinants related to ISR and/or IST. In addition, we describe effects of rhizobacteria on defense/tolerance related signal pathway in plants. We also review recent information including plant resistance or tolerance against multiple stresses ($biotic{\times}abiotic$). We desire that this review contribute to expand understanding and knowledge on the microbial application in a constantly varying agroecosystem, and suggest beneficial microbes as one of alternative environment-friendly application to alleviate multiple stresses.

Implementation of a Web Service Intrusion Tolerance System based on Diversity and Redundancy (다양성과 중복성을 이용한 웹 서비스 침입감내 시스템 구현)

  • 김성기;나용희;민병준
    • Proceedings of the IEEK Conference
    • /
    • 2003.07d
    • /
    • pp.1359-1362
    • /
    • 2003
  • The intrusions appears continuously by new unknown attacks exploiting vulnerabilities of systems or components but there are no perfect solutions to protect this unknown attacks. To overcome this problem, in this paper, we have proposed and implemented a Web service intrusion tolerant system that provides continuous Web services to the end users transparently even after the occurrence of an attack against the Web services, and prevents the disclosure of system's configuration data from server Our system has an N+l node architecture which is to minimize the number of redundant server nodes and to tolerate the intrusion effectively, and it also supports diversity in its design. Experimental result obtained on an implemented system show that our system can cope with intrusion such as DoS, file modification, confidentiality compromise of system properly.

  • PDF

Network System Survivability: A Framework of Transmission Control Protocol with Software Rejuvenation Methodology (네트워크 시스템 생존성 : 소프트웨어 재활기법을 이용한 TCP의 프레임워크)

  • Khin Mi Mi Aung;Park, Jong-Sou
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.07a
    • /
    • pp.121-125
    • /
    • 2003
  • In this paper, we propose a framework of Transmission Control Protocol with Software Rejuvenation methodology, which is applicable for network system survivability. This method is utilized to improve the survivability because it can limit the damage caused by successful attacks. The main objectives are to detect intrusions in real time, to characterize attacks, and to survive in face of attacks. To counter act the attacks' attempts or intrusions, we perform the Software Rejuvenation methods such as killing the intruders' processes in their tracks, halting abuse before it happens, shutting down unauthorized connection, and responding and restarting in real time. These slogans will really frustrate and deter the attacks, as the attacker can't make their progress. This is the way of survivability to maximize the deterrence against an attack in the target environment. We address a framework to model and analyze the critical intrusion tolerance problems ahead of intrusion detection on Transmission Control Protocol (TCP).

  • PDF

Studies on the Occurrence of Corn Sheath Blight Caused by Rhizoctonia solsni I. Influence of growth season and cultural environment on the occurrence of sheath blight disease. (담근먹이 옥수수의 잎집무늬마름병 발생에 관한 연구 I. 생육시기 및 재배환경과 잎집무늬 마름병 발생)

  • 이상범;김정갑;한민수;한흥전
    • Journal of The Korean Society of Grassland and Forage Science
    • /
    • v.9 no.3
    • /
    • pp.174-178
    • /
    • 1989
  • The investigation was carried out to identify the main pathogen infected with sheath blight in corn plant during 1986-1987. The main fungi of sheath blight isolated from corn plant was identified as Rhizoctonia sobni. Sheath blight in corn plant was first found in early July and infected extremely from late July to end August. Severe sheath blight disease was observed in Gyeongido (Yeoju and Suweon) and Jeonnam (Kwangju) area. The rate of attack was associatied with management and cultural environments of corn plant. Dense planting increased sheath blight, but application of cattle compost reduced the rate of infection. A positive correlation was found between infection rate of shealth blight and concentration of soluble carbohydrate in corn plant (r=0.96). The varieties of Jinjuok, Suweon 83, Suweon 87, Suweon 89, P.3055, P.3160, DK689 and XCG 51 showed remarkable tolerance to sheath blight disease.

  • PDF

Ad hoc Software Rejuvenation for Survivability

  • Khin Mi Mi Aung;Park, Jong-Sou
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.141-145
    • /
    • 2003
  • We propose the model of Software Rejuvenation methodology, which is applicable for survivability. Software rejuvenation is a proactive fault management technique and being used in fault tolerant systems as a cost effective technique for dealing with software faults. Survivability focuses on delivery of essential services and preservation of essential assets, even systems are penetrated and compromised. Thus, our objective is to detect the intrusions in a real time and survive in face of such attacks. As we deterrent against an attack in a system level, the Intrusion tolerance could be maximized at the target environment. We address the optimal time to execute ad hoc software rejuvenation and we compute it by using the semi Markov process. This is one way that could be really frustrated and deterred the attacks, as the attacker can't make their progress. This Software Rejuvenation method can be very effective under the assumption of unknown attacks. In this paper, we compute the optimum time to perform an ad hoc Software Rejuvenation through intrusions.

  • PDF

Construction of Glomerular Epithelial Cells Expressing Both Immune Tolerance and GFP Genes and Application to Cell Therapy by Cell Transplantation

  • Ohga, Masahiro;Ogura, Mariko;Matsumura, Mastoshi;Wang, Pi-Chao
    • Biotechnology and Bioprocess Engineering:BBE
    • /
    • v.7 no.5
    • /
    • pp.303-310
    • /
    • 2002
  • Cell therapy applied to wound healing or tissue regeneration presents a revolutionary realm to which principles of gene engineering and delivery may be applied. One promising application is the transplantation of cells into the wounded tissue to help the tissue repair. However, when cells are transplanted from in vitro to in vivo, immune rejection occurs due to the immune response triggered by the activation of T-cell, and the transplanted cells are destroyed by the attack of activated T-cell and lose their function. Immune suppressant such as FK506 is commonly used to suppress immune rejection during transplantation. However, such kind of immune suppressants not only suppresses immune rejection in the periphery of transplanted cells but also suppresses whole immune response system against pathogenic infection. In order to solve this problem, we developed a method to protect the desired cells from immune rejection without impairing whole immune system during cell transplantation. Previously, we reported the success of constructing glomerular epithelial cells for removal of immune complex, in which complement receptor of type 1 (CR1) was over-expressed on the membrane of renal glomerular epithelial cells and could bind immune complex of DNA/anti-DNA-antibody to remove immune complex through phagocy-tosis [1]. Attempting to apply the CR1-expressing cells to cell therapy and evade immune rejection during cell transplantation, we constructed three plasmids containing genes encoding a soluble fusion protein of cytolytic T lymphocyte associated antigen-4 (CTLA4Ig) and an enhanced green fluorescent protein (EGFP). The plasmids were transfected to the above-mentioned glomerular epithelial cells to express both genes simultaneously. Using the clone cells for cell transplantation showed that mice with autoimmune disease prolonged their life significantly as compared with the control mice, and two injections of the cells at the beginning of two weeks resulted in remarkable survivability, whereas it requires half a year and 50 administrations of proteins purified from the same amount of cells to achieve the same effect.

A digital Audio Watermarking Algorithm using 2D Barcode (2차원 바코드를 이용한 오디오 워터마킹 알고리즘)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.97-107
    • /
    • 2011
  • Nowadays there are a lot of issues about copyright infringement in the Internet world because the digital content on the network can be copied and delivered easily. Indeed the copied version has same quality with the original one. So, copyright owners and content provider want a powerful solution to protect their content. The popular one of the solutions was DRM (digital rights management) that is based on encryption technology and rights control. However, DRM-free service was launched after Steve Jobs who is CEO of Apple proposed a new music service paradigm without DRM, and the DRM is disappeared at the online music market. Even though the online music service decided to not equip the DRM solution, copyright owners and content providers are still searching a solution to protect their content. A solution to replace the DRM technology is digital audio watermarking technology which can embed copyright information into the music. In this paper, the author proposed a new audio watermarking algorithm with two approaches. First, the watermark information is generated by two dimensional barcode which has error correction code. So, the information can be recovered by itself if the errors fall into the range of the error tolerance. The other one is to use chirp sequence of CDMA (code division multiple access). These make the algorithm robust to the several malicious attacks. There are many 2D barcodes. Especially, QR code which is one of the matrix barcodes can express the information and the expression is freer than that of the other matrix barcodes. QR code has the square patterns with double at the three corners and these indicate the boundary of the symbol. This feature of the QR code is proper to express the watermark information. That is, because the QR code is 2D barcodes, nonlinear code and matrix code, it can be modulated to the spread spectrum and can be used for the watermarking algorithm. The proposed algorithm assigns the different spread spectrum sequences to the individual users respectively. In the case that the assigned code sequences are orthogonal, we can identify the watermark information of the individual user from an audio content. The algorithm used the Walsh code as an orthogonal code. The watermark information is rearranged to the 1D sequence from 2D barcode and modulated by the Walsh code. The modulated watermark information is embedded into the DCT (discrete cosine transform) domain of the original audio content. For the performance evaluation, I used 3 audio samples, "Amazing Grace", "Oh! Carol" and "Take me home country roads", The attacks for the robustness test were MP3 compression, echo attack, and sub woofer boost. The MP3 compression was performed by a tool of Cool Edit Pro 2.0. The specification of MP3 was CBR(Constant Bit Rate) 128kbps, 44,100Hz, and stereo. The echo attack had the echo with initial volume 70%, decay 75%, and delay 100msec. The sub woofer boost attack was a modification attack of low frequency part in the Fourier coefficients. The test results showed the proposed algorithm is robust to the attacks. In the MP3 attack, the strength of the watermark information is not affected, and then the watermark can be detected from all of the sample audios. In the sub woofer boost attack, the watermark was detected when the strength is 0.3. Also, in the case of echo attack, the watermark can be identified if the strength is greater and equal than 0.5.