• Title/Summary/Keyword: Defense mechanism

Search Result 577, Processing Time 0.024 seconds

Mechanisms of Protection of the Rights and Interests of Entrepreneurs in Russia

  • Turanin, Vladislav Yurievich;Kistenev, Vitaliy Valentinovich;Posokhova, Yana Vitalievna;Kisteneva, Olga Alekseevna
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.291-293
    • /
    • 2022
  • The implementation of the legal mechanism to protect the rights and interests of entrepreneurs in Russia has its unique features. When the rights and interests of a businessman are threatened with infringement, specific legal remedies may be applied, by means of which the violated rights and interests are restored and, thereby, the opportunity to resume entrepreneurial activity is created. The paper explores extrajudicial ways to protect the rights and interests of entrepreneurs in Russia. The study analyzes the forms of self-help, arbitral tribunal, resolution of applications and complaints by executive authorities, the notariate, and work with the business ombudsman and civil society institutions.

A Client-based DDoS Attack Defense Mechanism through User Authentication (사용자 인증을 통한 클라이언트 기반 DDoS 공격 대응 매커니즘)

  • Jeong, Jongkap;Lee, Heejo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.782-785
    • /
    • 2011
  • 최근의 분산 서비스 거부(DDoS) 공격 방법은 점점 더 자동화, 다양화되고 있으며, 단순한 개별 기업에 대한 공격에서부터 국가간의 사이버전쟁으로까지 그 영역이 확대되고 있다. DDoS 공격은 이미 2000 년도 이전부터 발생해온 오래된 공격이고, 이를 방어하기 위한 다양한 DDoS 공격 방어 시스템을 구축하고 있음에도 불구하고 아직까지 이를 효과적으로 차단하지 못하고 있다. 이는 그간 DDoS 공격 방어 시스템이 공격이 시작되었을 때 개개의 공격 패턴을 탐지하고 차단하는 방법으로 발전해 왔기 때문이다. 따라서 좀 더 효과적인 DDoS 공격 대응을 위해 공격 트래픽이 발송되기 전에 클라이언트에서부터 공격에 대응하는 방안이 필요하다. 이에 본 논문에서는 사용자 인증을 통하여 등록된 사용자임을 검증하고, 클라이언트와 인증장비간의 인증을 통해 인증된 사용자의 트래픽만 허용하는 매커니즘을 제안한다.

Enhancing E-commerce Security: A Comprehensive Approach to Real-Time Fraud Detection

  • Sara Alqethami;Badriah Almutanni;Walla Aleidarousr
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.1-10
    • /
    • 2024
  • In the era of big data, the growth of e-commerce transactions brings forth both opportunities and risks, including the threat of data theft and fraud. To address these challenges, an automated real-time fraud detection system leveraging machine learning was developed. Four algorithms (Decision Tree, Naïve Bayes, XGBoost, and Neural Network) underwent comparison using a dataset from a clothing website that encompassed both legitimate and fraudulent transactions. The dataset exhibited an imbalance, with 9.3% representing fraud and 90.07% legitimate transactions. Performance evaluation metrics, including Recall, Precision, F1 Score, and AUC ROC, were employed to assess the effectiveness of each algorithm. XGBoost emerged as the top-performing model, achieving an impressive accuracy score of 95.85%. The proposed system proves to be a robust defense mechanism against fraudulent activities in e-commerce, thereby enhancing security and instilling trust in online transactions.

Original Antigenic Sin Response to RNA Viruses and Antiviral Immunity

  • Mee Sook Park;Jin Il Kim;Sehee Park;Ilseob Lee;Man-Seong Park
    • IMMUNE NETWORK
    • /
    • v.16 no.5
    • /
    • pp.261-270
    • /
    • 2016
  • The human immune system has evolved to fight against foreign pathogens. It plays a central role in the body's defense mechanism. However, the immune memory geared to fight off a previously recognized pathogen, tends to remember an original form of the pathogen when a variant form subsequently invades. This has been termed 'original antigenic sin'. This adverse immunological effect can alter vaccine effectiveness and sometimes cause enhanced pathogenicity or additional inflammatory responses, according to the type of pathogen and the circumstances of infection. Here we aim to give a simplified conceptual understanding of virus infection and original antigenic sin by comparing and contrasting the two examples of recurring infections such as influenza and dengue viruses in humans.

Regulation of Th2 Cell Immunity by Dendritic Cells

  • Hyeongjin Na;Minkyoung Cho;Yeonseok Chung
    • IMMUNE NETWORK
    • /
    • v.16 no.1
    • /
    • pp.1-12
    • /
    • 2016
  • Th2 cell immunity is required for host defense against helminths, but it is detrimental in allergic diseases in humans. Unlike Th1 cell and Th17 cell subsets, the mechanism by which dendritic cells modulate Th2 cell responses has been obscure, in part because of the inability of dendritic cells to provide IL-4, which is indispensable for Th2 cell lineage commitment. In this regard, immune cells other than dendritic cells, such as basophils and innate lymphoid cells, have been suggested as Th2 cell inducers. More recently, multiple independent researchers have shown that specialized subsets of dendritic cells mediate Th2 cell responses. This review will discuss the current understanding related to the regulation of Th2 cell responses by dendritic cells and other immune cells.

Host-Pathogen Dialogues in Autophagy, Apoptosis, and Necrosis during Mycobacterial Infection

  • Jin Kyung Kim;Prashanta Silwal;Eun-Kyeong Jo
    • IMMUNE NETWORK
    • /
    • v.20 no.5
    • /
    • pp.37.1-37.15
    • /
    • 2020
  • Mycobacterium tuberculosis (Mtb) is an etiologic pathogen of human tuberculosis (TB), a serious infectious disease with high morbidity and mortality. In addition, the threat of drug resistance in anti-TB therapy is of global concern. Despite this, it remains urgent to research for understanding the molecular nature of dynamic interactions between host and pathogens during TB infection. While Mtb evasion from phagolysosomal acidification is a well-known virulence mechanism, the molecular events to promote intracellular parasitism remains elusive. To combat intracellular Mtb infection, several defensive processes, including autophagy and apoptosis, are activated. In addition, Mtb-ingested phagocytes trigger inflammation, and undergo necrotic cell death, potentially harmful responses in case of uncontrolled pathological condition. In this review, we focus on Mtb evasion from phagosomal acidification, and Mtb interaction with host autophagy, apoptosis, and necrosis. Elucidation of the molecular dialogue will shed light on Mtb pathogenesis, host defense, and development of new paradigms of therapeutics.

A Study on Defense Technique Against Use-After-Free Attacks Using MTE (MTE 를 활용한 사용 후 해제 공격 방어기법 연구)

  • Yunseong Hwang;Junseung You;Yunheung Paek
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.279-282
    • /
    • 2024
  • The Use-after-free (UAF) bug is a long-standing temporal memory safety issue. To prevent UAF attacks, two commonly used approaches are lock-and-key and pointer nullification. Recently, ARM architecture supports the Memory Tagging Extension (MTE) that implemented a lock-and-key mechanism using a 4-bit tag during memory access. Previous research proposed a virtual address tagging scheme utilizing MTE to prevent UAF attacks. In this paper, we aimed to measure a simplified version of the previously proposed virtual address tagging scheme on real machines supporting MTE by implementing a simple module and conducting experiments.

Design Development Test of Crashworthiness Device for Landing Gear (착륙장치 내추락 장치 설계개발시험)

  • Shin, Jeong-Woo;Kim, Tae-Uk;Hwang, In-Hee;Jo, Jeong-Jun;Lee, Jeong-Sun;Park, Chong-Yeong
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.34 no.1
    • /
    • pp.111-116
    • /
    • 2010
  • To improve occupants' safety in an emergency, crashworthy design is necessary to rotorcraft design and development. Especially, landing gear has the important role for crashworthy design because landing gear absorbs relatively large energy for the crash landing. In addition, military specifications require failure of landing gear shall not increase danger to any occupants by penetration of the airframe. To meet the specification requirements, crashworthiness device like failure mechanism should be prepared so that landing gear is collapsed safely and doesn't penetrate the airframe. In this study, design and design development test of the failure mechanism which is necessary for the rotorcraft landing gear was performed. First, collapse scenario was determined for the landing gear not to penetrate the airframe. Then, the failure pin which is the most important part of the failure mechanism was designed with 2 strength range in order to meet design criteria. Finally, design of the failure mechanism was verified successfully by design development test.

Analysis of Compressive Deformation Behaviors of Aluminum Alloy Using a Split Hopkinson Pressure Bar Test with an Acoustic Emission Technique (SHPB 시험과 음향방출법을 이용한 알루미늄 합금의 압축 변형거동 분석)

  • Kim, Jong-Tak;Woo, Sung-Choong;Sakong, Jae;Kim, Jin-Young;Kim, Tae-Won
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.37 no.7
    • /
    • pp.891-897
    • /
    • 2013
  • In this study, the compressive deformation behaviors of aluminum alloy under high strain rates were investigated by means of a SHPB test. An acoustic emission (AE) technique was also employed to monitor the signals detected from the deformation during the entire impact by using an AE sensor connected to the specimen with a waveguide in real time. AE signals were analyzed in terms of AE amplitude, AE energy and peak frequency. The impacted specimen surface and side area were observed after the test to identify the particular features in the AE signal corresponding to the specific types of damage mechanisms. As the strain increased, the AE amplitude and AE energy increased whereas the AE peak frequency decreased. It was elucidated that each AE signal was closely associated with the specific damage mechanism in the material.

Enhanced Method for Preventing Malware by Detecting of Injection Site (악성코드 인젝션 사이트 탐지를 통한 방어효율 향상방안)

  • Baek, Jaejong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.7
    • /
    • pp.1290-1295
    • /
    • 2016
  • Recently, as mobile internet usage has been increasing rapidly, malware attacks through user's web browsers has been spreading in a way of social engineering or drive-by downloading. Existing defense mechanism against drive-by download attack mainly focused on final download sites and distribution paths. However, detection and prevention of injection sites to inject malicious code into the comprised websites have not been fully investigated. In this paper, for the purpose of improving defense mechanisms against these malware downloads attacks, we focus on detecting the injection site which is the key source of malware downloads spreading. As a result, in addition to the current URL blacklist techniques, we proposed the enhanced method which adds features of detecting the injection site to prevent the malware spreading. We empirically show that the proposed method can effectively minimize malware infections by blocking the source of the infection spreading, compared to other approaches of the URL blacklisting that directly uses the drive-by browser exploits.