• Title/Summary/Keyword: Detection Mechanism

Search Result 855, Processing Time 0.034 seconds

An Analysis on Channel Sensing Overhead in IEEE 802.22 Cognitive Radio Networks (IEEE 802.22 인지 라디오 네트워크에서 채널 센싱 오버헤드 분석)

  • Park, Keun-Mo;Kim, Chong-Kwon
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.3
    • /
    • pp.249-253
    • /
    • 2010
  • Resource of wireless frequency bandwidth is gradually going to be deficient due to explosive increase of traffic and saturated non-licensed frequency band such as ISM. In the contrary, many licensed frequency bands are revealed to be low in utilization by several measurement based researches. To alleviate this inefficiency, a concept of cognitive radio is suggested. Cognitive radio lets non-licensed user exploit the licensed frequency band as long as non-licensed user does not interfere licensed user and as a result, it is possible to harness wireless frequency more efficiently. IEEE 802.22 is the first standard network with cognitive radio technology and it employs Two-Stage channel sensing mechanism to accomplish both enough licensed user protection and efficient channel utilization. In this paper, we analyze the overhead of Two-Stage channel sensing mechanism and identify the influence of channel sensing time to the overhead.

A Secure Agent Communication Mechanism for Intruder Tracing System (침입자 추적 시스템의 에이전트 통신 보안을 위한 메커니즘)

  • 최진우;황선태;우종우;정주영;최대식
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.6
    • /
    • pp.654-662
    • /
    • 2002
  • As the Internet technology becomes a major information infrastructure, an emerging problem is the tremendous increase of malicious computer intrusions. The present Intrusion Detection System (IDS) serves a useful purpose for detecting such intrusions, but the current situation requires more active response mechanism other than simple detection. This paper describes a multi-agent based tracing system against the intruders when the system is attacked. The focus of the study lies on the secure communication mechanism for the agent message communication. We have extended parameters on the KQML protocol, and apt)lied the public key encryption approach, The limitation might be the requirements of two-way authentication for every communication through the broker agent. This model ma)r not improve the efficiency, but it provides a concrete secure communication. Also this is one important factor to protect the agent and the tracing server during the tracing process.

A Strong Address Generation and Verification Scheme using Hash Functions in the IPv6 Environments (IPv6 환경에서 해쉬 함수 기반 강건한 주소 생성 및 검증 기법)

  • Gyeong, Gye-Hyeon;Ko, Kwang-Sun;Eom, Young-Ik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.115-119
    • /
    • 2007
  • The IPv6 protocol provides the method to automatically generate an address of a node without additional operations of administrators, Before the generated address is used, the duplicate address detection (DAD) mechanism is required in order to verify the address. However, during the process of verification of the address, it is possible for a malicious node to send a message with the address which is identical with the generated address, so the address can be considered as previously used one; although the node properly generates an address, the address cannot be used. In this paper, we present a strong scheme to perform the DAD mechanism based on hash functions in IPv6 networks. Using this scheme, many nodes, which frequently join or separate from wireless networks in public domains like airports, terminals, and conference rooms, can effectively generate and verify an address more than the secure neighbor discovery (SEND) mechanism.

Signal Detection for Adverse Events of Finasteride Using Korea Adverse Event Reporting System (KAERS) Database (의약품이상사례보고시스템 데이터베이스를 이용한 피나스테리드의 약물유해반응 실마리 정보 탐색)

  • Baek, Ji-Won;Yang, Bo Ram;Choi, Subin;Shin, Kwang-Hee
    • Korean Journal of Clinical Pharmacy
    • /
    • v.31 no.4
    • /
    • pp.324-331
    • /
    • 2021
  • To investigate signals of adverse drug reactions of finasteride by using the Korea Adverse Events Reporting System (KAERS) database. This pharmacovigilance was based on the database of the drug-related adverse reactions reported spontaneously to the KAERS from 2013 to 2017. This study was conducted by disproportionality analysis. Data mining analysis was performed to detect signals of finasteride. The signal was defined by three criteria as proportional reporting ratio (PRR), reporting odds ratio (ROR), and information component (IC). The signals of finasteride were compared with those of the other drugs; dutasteride (similar mechanism of action), minoxidil (different mechanism but similar indications for alopecia), silodosin (different mechanism but similar indications for BPH). It was examined whether the detected signals exist in drug labels in Korea. The total number of adverse event-drug pairs was reported 2,665,429 from 2013 to 2017, of which 1,426 were associated with finasteride. The number of investigated signals of finasteride was 42. The signals that did not include in the drug label were 29 signals, including mouth dry, hypotension, dysuria etc. The signal of finasteride was similar to that of dutasteride and silodosin but was different to that of minoxidil. Early detection of signals through pharmacovigilance is important to patient safety. We investigated 29 signals of finasteride that do not exist in drug labels in Korea. Further pharmacoepidemiological studies should be needed to evaluate the signal causality with finasteride.

Analysis of Cyber Incident Artifact Data Enrichment Mechanism for SIEM (SIEM 기반 사이버 침해사고 대응을 위한 데이터 보완 메커니즘 비교 분석)

  • Lee, Hyung-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.5
    • /
    • pp.1-9
    • /
    • 2022
  • As various services are linked to IoT(Internet of Things) and portable communication terminals, cyber attacks that exploit security vulnerabilities of the devices are rapidly increasing. In particular, cyber attacks targeting heterogeneous devices in large-scale network environments through advanced persistent threat (APT) attacks are on the rise. Therefore, in order to improve the effectiveness of the response system in the event of a breach, it is necessary to apply a data enrichment mechanism for the collected artifact data to improve threat analysis and detection performance. Therefore, in this study, by analyzing the data supplementation common elements performed in the existing incident management framework for the artifacts collected for the analysis of intrusion accidents, characteristic elements applicable to the actual system were derived, and based on this, an improved accident analysis framework The prototype structure was presented and the suitability of the derived data supplementary extension elements was verified. Through this, it is expected to improve the detection performance when analyzing cyber incidents targeting artifacts collected from heterogeneous devices.

Cryptography Module Detection and Identification Mechanism on Malicious Ransomware Software (악성 랜섬웨어 SW에 사용된 암호화 모듈에 대한 탐지 및 식별 메커니즘)

  • Hyung-Woo Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.1
    • /
    • pp.1-7
    • /
    • 2023
  • Cases in which personal terminals or servers are infected by ransomware are rapidly increasing. Ransomware uses a self-developed encryption module or combines existing symmetric key/public key encryption modules to illegally encrypt files stored in the victim system using a key known only to the attacker. Therefore, in order to decrypt it, it is necessary to know the value of the key used, and since the process of finding the decryption key takes a lot of time, financial costs are eventually paid. At this time, most of the ransomware malware is included in a hidden form in binary files, so when the program is executed, the user is infected with the malicious code without even knowing it. Therefore, in order to respond to ransomware attacks in the form of binary files, it is necessary to identify the encryption module used. Therefore, in this study, we developed a mechanism that can detect and identify by reverse analyzing the encryption module applied to the malicious code hidden in the binary file.

Wave propagation simulation and its wavelet package analysis for debonding detection of circular CFST members

  • Xu, Bin;Chen, Hongbing;Xia, Song
    • Smart Structures and Systems
    • /
    • v.19 no.2
    • /
    • pp.181-194
    • /
    • 2017
  • In order to investigate the interface debonding defects detection mechanism between steel tube and concrete core of concrete-filled steel tubes (CFSTs), multi-physical fields coupling finite element models constituted of a surface mounted Piezoceramic Lead Zirconate Titanate (PZT) actuator, an embedded PZT sensor and a circular cross section of CFST column are established. The stress wave initiation and propagation induced by the PZT actuator under sinusoidal and sweep frequency excitations are simulated with a two dimensional (2D) plain strain analysis and the difference of stress wave fields close to the interface debonding defect and within the cross section of the CFST members without and with debonding defects are compared in time domain. The linearity and stability of the embedded PZT response under sinusoidal signals with different frequencies and amplitudes are validated. The relationship between the amplitudes of stress wave and the measurement distances in a healthy CFST cross section is also studied. Meanwhile, the responses of PZT sensor under both sinusoidal and sweep frequency excitations are compared and the influence of debonding defect depth and length on the output voltage is also illustrated. The results show the output voltage signal amplitude and head wave arriving time are affected significantly by debonding defects. Moreover, the measurement of PZT sensor is sensitive to the initiation of interface debonding defects. Furthermore, wavelet packet analysis on the voltage signal under sweep frequency excitations is carried out and a normalized wavelet packet energy index (NWPEI) is defined to identify the interfacial debonding. The value of NWPEI attenuates with the increase in the dimension of debonding defects. The results help understand the debonding defects detection mechanism for circular CFST members with PZT technique.

A research on detection techniques of Proxy DLL malware disguised as a Windows library : Focus on the case of Winnti (윈도우즈 라이브러리로 위장한 Proxy DLL 악성코드 탐지기법에 대한 연구 : Winnti 사례를 중심으로)

  • Koo, JunSeok;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1385-1397
    • /
    • 2015
  • The Proxy DLL is a mechanism using a normal characteristics of Windows. Specific malware is executed via this mechanism after intrusion into a system which is targeted. If a intrusion of malware is successful, malware should be executed at least once. For execution, malware is disguised as a Windows Library. The malware of Winnti group is a good case for this. Winnti is a group of Chinese hacking groups identified by research in the fall of 2011 at Kaspersky Lab. Winnti group activities was negatively over the years to target the online video game industry, in this process by making a number of malware infected the online gaming company. In this paper, we perform research on detection techniques of Proxy DLL malware which is disguised as a Windows library through Winnti group case. The experiments that are undertaken to target real malware of Winnti show reliability of detection techniques.

An Effective Malware Detection Mechanism in Android Environment (안드로이드 환경에서의 효과적인 악성코드 탐지 메커니즘)

  • Kim, Eui Tak;Ryu, Keun Ho
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.4
    • /
    • pp.305-313
    • /
    • 2018
  • With the explosive growth of smart phones and efficiency, the Android of an open mobile operating system is gradually increasing in the use and the availability. Android systems has proven its availability and stability in the mobile devices, the home appliances's operating systems, the IoT products, and the mechatronics. However, as the usability increases, the malicious code based on Android also increases exponentially. Unlike ordinary PCs, if malicious codes are infiltrated into mobile products, mobile devices can not be used as a lock and can be leaked a large number of personal contacts, and can be lead to unnecessary billing, and can be cause a huge loss of financial services. Therefore, we proposed a method to detect and delete malicious files in real time in order to solve this problem. In this paper, we also designed a method to detect and delete malicious codes in a more effective manner through the process of installing Android-based applications and signature-based malicious code detection method. The method we proposed and designed can effectively detect malicious code in a limited resource environment, such as mobile environments.

Significance of Viable but Nonculturable Escherichia coli: Induction, Detection, and Control

  • Ding, Tian;Suo, Yuanjie;Xiang, Qisen;Zhao, Xihong;Chen, Shiguo;Ye, Xingqian;Liu, Donghong
    • Journal of Microbiology and Biotechnology
    • /
    • v.27 no.3
    • /
    • pp.417-428
    • /
    • 2017
  • Diseases caused by foodborne or waterborne pathogens are emerging. Many pathogens can enter into the viable but nonculturable (VBNC) state, which is a survival strategy when exposed to harsh environmental stresses. Pathogens in the VBNC state have the ability to evade conventional microbiological detection methods, posing a significant and potential health risk. Therefore, controlling VBNC bacteria in food processing and the environment is of great importance. As the typical one of the gram-negatives, Escherichia coli (E. coli) is a widespread foodborne and waterborne pathogenic bacterium and is able to enter into a VBNC state in extreme conditions (similar to the other gram-negative bacteria), including inducing factors and resuscitation stimulus. VBNC E. coli has the ability to recover both culturability and pathogenicity, which may bring potential health risk. This review describes the concrete factors (nonthermal treatment, chemical agents, and environmental factors) that induce E. coli into the VBNC state, the condition or stimulus required for resuscitation of VBNC E. coli, and the methods for detecting VBNC E. coli. Furthermore, the mechanism of genes and proteins involved in the VBNC E. coli is also discussed in this review.