• Title/Summary/Keyword: Defense mechanism

Search Result 572, Processing Time 0.03 seconds

Study of Damage in Germanium Optical Window Irradiated by a Near-infrared Continuous Wave Laser (근적외선 연속발진 레이저 조사에 의한 게르마늄 광학창 손상 연구)

  • Lee, Kwang Hyun;Shin, Wan-Soon;Kang, Eung-Cheol
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.1
    • /
    • pp.82-89
    • /
    • 2014
  • The damage in germanium (Ge) optical window irradiated by a near-infrared continuous wave (CW) laser was studied. Laser-induced heating and melting process were surveyed, and the specific laser power and the irradiance time to melt were estimated by numerical simulation. The experiments were also carried out to investigate the macro and micro structure change on Ge window. Results showed that the surface deformation was formed by melting and resolidification process, the damaged surface had a polycrystalline phase, and the transmittance as an optical performance factor in mid-infrared region was decreased. We confirmed that an abnormal polycrystalline phase and surface deformation effect such as hillock formation and roughness increase reduced the transmittance of Ge window and were the damage mechanism of CW laser induced damage on Ge window.

The Design of Anti-DDoS System using Defense on Depth (다단계 방어기법을 활용한 DDoS 방어시스템 설계)

  • Seo, Jin-Won;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.679-689
    • /
    • 2012
  • There were clear differences between the DDoS attack on 7th July 2009 and the rest of them prior to the attack. Despite It had emitted relatively small sized packets per infected PC, the attack was very successful making use of HTTP Flooding attack by aggregating small sized packets from the well sized zombie network. As the objective of the attack is not causing permanent damage to the target system but temporal service disruption, one should ensure the availability of the target server by deploying effective defense strategy. In this paper, a novel HTTP based DDoS defense mechanism is introduced with capacity based defense-in-depth strategy.

Isolation of Defense-Related Genes from Nicotiana glutinosa Infected by Tobacco Mosaic Virus Using a Modified Differential Screening

  • Park, Kyung-Soon;Suh, Mi-Chung;Cheong, Jong-Joo;Park, Doil
    • The Plant Pathology Journal
    • /
    • v.15 no.5
    • /
    • pp.295-301
    • /
    • 1999
  • Many of plant defense responses are consequence of transcriptional activation of related genes. We have developed a modified differential screening procedure to isolate tobacco genes that are involved in the defense responses against TMV infection. A cDNA library was constructed from Nicotiana glutinosa leaves infected by TMV under temperature shift conditions. Each of plasmid DNA in the library was hybridized on a set of slot blots to a pool of cDNA probes prepared from either TMV-infected or mock-treated tobacco leaves. Among 900 plasmid DNAs, 81 clones exhibiting significantly enhanced or reduced level of hybridization to either probe were selected for nucleotide sequencing. The clones were listed into 61 genes considering redundancy between the sequences. The genes were identified to be defense-related genes including PR-genes and genes involved in primary or secondary metabolisms. This results supports the implication that plant defense process entails a major shift in total cellular metabolisms rather than activation of a limited number of defense-related genes. Expression patterns of a number of defense-related genes. Expression patterns of a number of selected genes were examined in northern blot analyses. It is notable that the clone 630 of unknown function exhibits expression pattern similar to those of previously known PR-genes. Experiments to elucidate the roles in defense mechanism of a couple of genes newly identified in this study are in progress.

  • PDF

Network Defense Mechanism Based on Isolated Networks (격리 네트워크를 활용한 네트워크 방어 기법)

  • Jung, Yongbum;Park, Minho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.9
    • /
    • pp.1103-1107
    • /
    • 2016
  • Network assets have been protected from malware infection by checking the integrity of mobile devices through network access control systems, vaccines, or mobile device management. However, most of existing systems apply a uniform security policy to all users, and allow even infected mobile devices to log into the network inside for completion of the integrity checking, which makes it possible that the infected devices behave maliciously inside the network. Therefore, this paper proposes a network defense mechanism based on isolated networks. In the proposed mechanism, every mobile device go through the integrity check system implemented in an isolated network, and can get the network access only if it has been validated successfully.

Plant development and defense signal network research

  • Paek, Kyung-Hee
    • Proceedings of the Korean Society of Plant Biotechnology Conference
    • /
    • 2005.11a
    • /
    • pp.81-83
    • /
    • 2005
  • The Plant Signaling Network Research Center (SigNet) is a government-funded (by Korea's Ministry of Science and Technology (MOST)/ Korea Science and Engineering Foundation (KOSEF)) research center established at the School of Life Sciences and Biotechnology of Korea University in 2003. The SigNet conducts plant biological studies, especially in the field of developmental and defense biology. The research purpose of SigNet is dissection and analysis of plant development and defense signaling network through multiscientific approaches. Knowledge acquired from SigNet research scientists will provide new integrated view of understanding and potential application of plant development and defense mechanism. The other important mission of the SigNet is nurturing Center of Excellence for future outstanding research scientists of Korea. The SigNet will continue to expend every effort to achieve the goals for the future. Through passionate research endeavor of each laboratory and partnerships within inside and outside laboratories, we will continue to develop world-leading plant research group and to educate new generations of innovative researchers. As the SigNet looks toward the future, the SigNet will try to achieve its mission of research, education and service to the community. And the defense response research of our lab will be presented at later part.

  • PDF

Scaling Inter-domain Routing System via Path Exploration Aggregation

  • Wang, Xiaoqiang;Zhu, Peidong;Lu, Xicheng;Chen, Kan;Cao, Huayang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.3
    • /
    • pp.490-508
    • /
    • 2013
  • One of the most important scalability issues facing the current Internet is the rapidly increasing rate of BGP updates (BGP churn), to which route flap and path exploration are the two major contributors. Current countermeasures would either cause severe reachability loss or delay BGP convergence, and are becoming less attractive for the rising concern about routing convergence as the prevalence of Internet-based real time applications. Based on the observation that highly active prefixes usually repeatedly explore very few as-paths during path exploration, we propose a router-level mechanism, Path Exploration Aggregation (PEA), to scale BGP without either causing prefix unreachable or slowing routing convergence. PEA performs aggregation on the transient paths explored by a highly active prefix, and propagates the aggregated path instead to reduce the updates caused by as-path changes. Moreover, in order to avoid the use of unstable routes, PEA purposely prolongs the aggregated path via as-path prepending to make it less preferred in the perspective of downstream routers. With the BGP traces obtained from RouteViews and RIPE-RIS projects, PEA can reduce BGP updates by up to 63.1%, shorten path exploration duration by up to 53.3%, and accelerate the convergence 7.39 seconds on average per routing event.

PRI: A Practical Reputation-based Incentive Scheme for Delay Tolerant Networks

  • Zhang, Xi;Wang, Xiaofei;Liu, Anna;Zhang, Quan;Tang, Chaojing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.4
    • /
    • pp.973-988
    • /
    • 2012
  • Delay tolerant networks (DTNs) characterized by the lack of guaranteed end-to-end paths exploit opportunistic data forwarding mechanism, which depends on the hypothesis that nodes are willing to store, carry, and forward the in-transit messages in an opportunistic way. However, this hypothesis might easily be violated by the presence of selfish nodes constrained with energy, bandwidth, and processing power. To address this problem, we propose a practical reputation-based incentive scheme, named PRI, to stimulate honest forwarding and discipline selfish behavior. A novel concept of successful forwarding credential and an observation protocol are presented to cope with the detection of nodes' behavior, and a reputation model is proposed to determine egoistic individuals. The simulation results demonstrate the effectiveness and practicality of our proposal.