• Title/Summary/Keyword: Defense mechanism

Search Result 572, Processing Time 0.026 seconds

Determination Method of TTL for Improving Energy Efficiency of Wormhole Attack Defense Mechanism in WSN (무선 센서 네트워크에서 웜홀 공격 방어기법의 에너지 효율향상을 위한 TTL 결정 기법)

  • Lee, Sun-Ho;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.4
    • /
    • pp.149-155
    • /
    • 2009
  • Attacks in wireless sensor networks (WSN), are similar to the attacks in ad-hoc networks because there are deployed on a wireless environment. However existing security mechanism cannot apply to WSN, because it has limited resource and hostile environment. One of the typical attack in WSN is setting up wrong route that using wormhole. To overcome this threat, Ji-Hoon Yun et al. proposed WODEM (WOrmhole attack DEfense Mechanism) which can detect and counter with wormhole. In this scheme, it can detect and counter with wormhole attacks by comparing hop count and initial TTL (Time To Live) which is pre-defined. The selection of a initial TTL is important since it can provide a tradeoff between detection ability ratio and energy consumption. In this paper, we proposed a fuzzy rule-based system for TTL determination that can conserve energy, while it provides sufficient detection ratio in wormhole attack.

A Comparison Study of Ego Defense Mechanisms between Conduct Adolescents and Normal Adolescents (품행장애 청소년과 정상 청소년의 자아방어기제에 관한 비교 연구)

  • Song, Jae-Ho;Jhin, Hea-Kyung;Kim, Bong-Seog
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.20 no.3
    • /
    • pp.140-145
    • /
    • 2009
  • Objectives : This study explored the differences in their ego defense mechanisms between adolescents with conduct disorder and normal adolescents. Methods : Subjects were 35 adolescents with conduct disorder and 44 normal adolescents. The Ewha Defense Mechanism Test (EDMT), consisting of 200 items and 20 scales, was administered, to examine the defense mechanisms of both groups of adolescents. Results : Normal adolescents presented statistically significantly higher scores on the reaction formation, controlling, suppression, anticipation, dissociation, and distortion scales than did adolescents with conduct disorder. Zn addition, adolescents with conduct disorder used neurotic defense mechanisms of both neurotic and mature levels less frequently than normal adolescents did. Factor analysis revealed that, normal adolescents had higher scores on ego-expansive factor scales and behavior control factor scales thanadolescents with conduct disorder did. Conclusion : The results suggest adolescents with conduct disorder use mature and ego-expansive defense mechanisms less frequently than do normal adolescents.

  • PDF

Conditions for manipulation of object with multiple contacts by intelligent Jig system

  • Yashima, Masahito;Kimura, Hiroshi
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1995.10a
    • /
    • pp.522-525
    • /
    • 1995
  • A manipulation of a multiple contacted object by a Rotational Base and Single-jointed Finger mechanism(RBSF mechanism) is discussed. The manipulation is characterized by multiple contacts on an object and large motions of the object with sliding contacts. The kinematics and dynamics allowing sliding at multiple contacts are explored. The conditions for manipulation of an object at multiple contacts by the RBSF mechanism, which cannot exert arbitrary contact forces because it has a fewer number of joints than is required for active control, is presented.

  • PDF

Design and Development of Shaker for Acceleration test of Gimbal (김발의 가속도 시험용 Shaker의 설계 및 개발)

  • Yoon, Jae-Youn
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.18 no.1
    • /
    • pp.147-153
    • /
    • 2001
  • This paper proposes a shaker system design for acceleration test of gimbal. Main reason of shaker system design is to give acceleration to the gimbal, which is moving and tracking the target on the tracking test equipment. The shaker system is mounted on the tracking test equipment. It uses the scotch yoke mechanism to have the constant movement in return. The Scotch yoke mechanism changes the rotational movement of constant velocity to simple harmonic motion.

  • PDF

A study of Subjects and Mechanism in Febrile Paroxysm - Focussed on the "Discourse on Hak(瘧)"Chapter of "Huangdineijing(黃帝內經).Suwen(素問)"- (학질(瘧疾) 발작(發作)의 주체와 기전에 대한 고찰(考察) -"소문(素問).학론(瘧論)"을 중심으로-)

  • Kang, Hyo-Jin;Jeong, Chang-Hyun;Jang, Woo-Chang;Lyu, Jeong-Ah;Baik, You-Sang
    • Journal of Korean Medical classics
    • /
    • v.25 no.3
    • /
    • pp.117-126
    • /
    • 2012
  • Objective : I would like to determine the main factors, in other words, the subjects that are responsible for febrile paroxysm and how they interact at the time of onset, based on the "Discourse on Hak(瘧)" chapter of "Huangdi Neijing(黃帝內經)". Methods : First, the pathological mechanism of the paroxysm was examined as described in the text. Then the subjects in question were analyzed based on the contents of the text. Result : 1. Febrile paroxysm happens when the three factors coincide at the Fengfu(風府). The three elements are as follows: first defense qi(衛氣), second latent qi(伏邪) and third, external pathogen(新邪). 2. Fengfu(風府) is not a specific point, but a region which external pathogen(新邪) passes through during which the defense qi is deficient. Conclusion : Febrile paroxysm is not caused by either an internal pathogen or an external pathogen, but the interaction between the three elements of the internal and external pathogens and the condition of defense qi. Moreover, the site, Fengfu(風府), which the disease is manifested is not a specific point but a more general region where the pathogenic qi has invaded while defense qi has weakened.

Forecasting the Diffusion of Participating Countries with the Introduction of the "International Defense Industry Cooperation Program of Korea" (한국형 국제국방산업협력제도 도입시 방산협력국가 수요확산 예측 연구)

  • Nam, Myoung-Yul;Kang, Seok-Joong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.9
    • /
    • pp.1234-1243
    • /
    • 2021
  • This study intends to provide a forecast of the diffusion of countries participating in a newly proposed G to G mechanism named as the "International Defense Industry Cooperation Program of Korea", modeled after the U.S. Foreign Military Sales(FMS). For this purpose, the study analyses 40 years of statistical data of U.S. FMS customers to find two parameters, coefficient of innovation and imitation, which explain the diffusion in FMS customers. Furthermore, the study forecasts the diffusion in international participation to the proposed mechanism taking account of the differences in the level of government competitiveness and the strength of defense industrial base of Korea and the U.S. This study also provides recommendations for accelerating the desired outcomes under the new program. While Korea is likely to have relative advantages over 'imitators' in the international market, it will need to gain competitiveness in high-level capabilities going beyond the realm of medium-high level systems, and present attractive alternatives for offsets.

A Blockchain-enabled Multi-domain DDoS Collaborative Defense Mechanism

  • Huifen Feng;Ying Liu;Xincheng Yan;Na Zhou;Zhihong Jiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.3
    • /
    • pp.916-937
    • /
    • 2023
  • Most of the existing Distributed Denial-of-Service mitigation schemes in Software-Defined Networking are only implemented in the network domain managed by a single controller. In fact, the zombies for attackers to launch large-scale DDoS attacks are actually not in the same network domain. Therefore, abnormal traffic of DDoS attack will affect multiple paths and network domains. A single defense method is difficult to deal with large-scale DDoS attacks. The cooperative defense of multiple domains becomes an important means to effectively solve cross-domain DDoS attacks. We propose an efficient multi-domain DDoS cooperative defense mechanism by integrating blockchain and SDN architecture. It includes attack traceability, inter-domain information sharing and attack mitigation. In order to reduce the length of the marking path and shorten the traceability time, we propose an AS-level packet traceability method called ASPM. We propose an information sharing method across multiple domains based on blockchain and smart contract. It effectively solves the impact of DDoS illegal traffic on multiple domains. According to the traceability results, we designed a DDoS attack mitigation method by replacing the ACL list with the IP address black/gray list. The experimental results show that our ASPM traceability method requires less data packets, high traceability precision and low overhead. And blockchain-based inter-domain sharing scheme has low cost, high scalability and high security. Attack mitigation measures can prevent illegal data flow in a timely and efficient manner.

Platform of Hot Pepper Stress Genomics: Indentification of Stress Inducible Genes in Hot Pepper (Capsicum annuum L.) Using cDNA Microarray Analysis

  • Chung, Eun-Jo;Lee, Sanghyeob;Park, Doil
    • Proceedings of the Korean Society of Plant Pathology Conference
    • /
    • 2003.10a
    • /
    • pp.81.1-81
    • /
    • 2003
  • Although plants have evolved to possess various defense mechanisms from local biotic and abiotic stressors, most of yield loss is caused by theses stressors. Recent studies have revealed that several different stress responsive reactions are inter-networking. Therefore, the identification and dissection of stress responsive genes is an essential and first step towards understanding of the global defense mechanism in response to various stressors. For this purpose, we applied cDNA microarray analysis, because it has powerful ability to monitor the global gene expression in a specific situation. To date, more than 10,000 non-redundant genes were identified from seven different cDNA libraries and deposited in our EST database (http://plant.pdrs.re.kr/ks200201/pepper.html). For this study, we have built 5K cDNA microarray containing 4,685 unigene clones from three different cDNA libraries. Monitoring of gene expression profiles of hot pepper interactions with biotic stress, abiotic stresses and chemical treatments will be presented. Although this work shows expression profiling at the sub-genomic level, this could be a good starting point to understand the complexity of global defense mechanism in hot pepper.

  • PDF

MAP kinase kinase kinase as a positive defense regulator in rice-blast fungus interactions

  • Kim, Jung-A;Jung, Young-Ho;Lee, Joo-Hee;Jwa, Nam-Soo
    • Proceedings of the Korean Society of Plant Pathology Conference
    • /
    • 2004.10a
    • /
    • pp.48-52
    • /
    • 2004
  • We have found the role of rice mitogen-activated protein kinase kinase kinase (MAPKKK), OsEDR1, as controling hypersensitive response (HR) and increased disease resistance to rice blast fungus Magnaporthe grisea. Generation of transgenic rice plants through introduction of the over-expression construct of OsEDR1 using Agrobacterium-mediated transformation results in lesion mimic phenotype. Up-regulation of defense mechanism was detected through detection of increased transcription level of rice PBZ1 and PR1a. Inoculation of rice blast fungus on the lesion mimic transgenic lines displayed significantly increased resistance. The disease symptoms were arrested like HR responses which are commonly detected in the incompatible interactions. High accumulation of phenolic compounds around developing lesions was detected under UV light. There was variation among transgenic lines on the timing of lesion progression as well as the lesion numbers on the rice leaves. Transgenic lines with few lesions also show increased resistance as well as equal amount of grain yields compared to that of wild type rice cultivar Nipponbare. This is the first report of the MAPKKK as a positive regulator molecule on defense mechanism through inducing HR-like cell death lesion mimic phenotype. The application of OsEDR1 is highly expected for the development of resistant cultivars against rice pathogens.

  • PDF

Nrf2 Knockout Mice that Lack Control of Drug Metabolizing and Antioxidant Enzyme Genes - Animals Highly Sensitive to Xenobiotic Toxicity

  • Enomoto, Akiko;Itoh, Ken;Harada, Takanori;Yamamoto, Masayuki
    • Toxicological Research
    • /
    • v.17
    • /
    • pp.299-304
    • /
    • 2001
  • Xenobiotics and their reactive intermediates bind to cellular macromolecules and/or generate oxidative stress. which provoke deleterious effects on the cell function. Induction of xenobiotic-biotrans-forming enzymes and antioxidant molecules is an important defense mechanism against such insults. A group of genes involved in the defense mechanism. e.g. genes encoding glutathione S-transferases. NAD(P)H: quinone oxidoreductase, UDP-glucuronosyltransferase (UDP-GT) and ${\gamma}$-glutamylcysteine synthetase (GGCS). have a common regulatory sequence, Antioxidant or Electrophile Responsive Element (ARE/EpRE). Recently. Nrf2. discovered as a homologue of erythroid transcription factor p45 NF-E2, was shown to bind ARE/EpRE and induce the expression of these defense genes. Mice that lack Nrf2 show low basal levels of expression and/or impaired induction of these genes. which makes the animals highly sensitive to xenobiotic toxicity. Indeed. we show here that nrf2-deficient mice had a higher mortality than did the wild-type mice when exposed to acetaminophen (APAP). Detailed analyses of APAP hepatotoxicity in the nrf2 knockout mice indicate that a large amount of reactive APAP metabolites was generated in the livers due to the impaired basal expression of two detoxifying enzyme genes, UDP-GT (Ugt1a6) and GGCS. while the cytochrome P450 content was unchanged. Thus. the studies using the nrf2 knockout mice clearly demonstrate significance of the expression of Nrf2-regulated enzymes in protection against xenobiotic toxicity.

  • PDF