• Title/Summary/Keyword: DoS Attack

Search Result 336, Processing Time 0.031 seconds

Security Characteristics of D-MAC in Convergence Network Environment (융합망 환경에서 D-MAC의 보안 특성)

  • Hong, Jinkeun
    • Journal of Digital Convergence
    • /
    • v.12 no.12
    • /
    • pp.323-328
    • /
    • 2014
  • D-MAC protocol is used convergence network, which is designed to connect wireless link between things. This protocol is supported to local data exchange and aggregation among neighbor nodes, and distributed control packet from sink to sensor node. In this paper, we analysis about efficiency of power consumption according to whether or not security authentication of D-MAC in convergence network. If authentication scheme is applied to MAC communication, it is related to power consumption of preamble whether or not with and without authentication process. It is reduced to energy consumption against denial attack of service, when it is applied to authentication. Future work will take the effort to deal with security authentication scheme.

A Study on Material Transportation Capability Analysis Method in NK using Scenario-based Simulation (시나리오 기반 시뮬레이션을 활용한 북한지역 반격 시 물자수송 능력 분석방법 연구)

  • Choi, Byung Kwon;Jeong, Suk Jae
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.2
    • /
    • pp.279-288
    • /
    • 2017
  • The Material Transportation Capability Analysis Method in North Korea includes adversary's activities such as destruction of bridge which is one kind of choke points in the road network and surprise attack against resupply march unit. Also, the amount of damage on choke points in the road network and repair time depending on repair unit commitment must be reflected. In this study, a scenario encompassing plausible resupply transportation circumstances while counterattacking into NK will be established. Then, based on such scenario, a simulation model will be established and the result of simulation will be compared to the results of numeric example which has been used in the ROK Army. We demonstrate, through a certain Corps operation area, that the Scenario-based Simulation Model results predict the performance of resupply operation very well. Therefore, it makes sustainment planners and commanders do activities which is suitable for battlefield and should be used in the real situation. It is also a stochastic model.

Development of a Screening System for Plant Defense-Inducing Agent using Transgenic Tobacco Plant with PR-1a Promoter and GUS Gene

  • Oh, Sang-Keun;Lee, Seon-Woo;Kwon, Suk-Yoon;Choi, Do-Il
    • The Plant Pathology Journal
    • /
    • v.21 no.3
    • /
    • pp.288-292
    • /
    • 2005
  • Pathogenesis-related protein-1a (PR-1a) is strongly induced in tobacco plants by pathogen attack, exogenous salicylic acid (SA) application and by other developmental processes. In order to develop a rapid screening system for the selection of plant defense-inducing compounds originated from various sources, we have transformed tobacco Samsun NN plants with a chimeric construct consisting of GUS $(\beta-glucuronidase)$. In the $T_1$ generation, three transgenic lines having stable GUS expression were selected for further promoter analysis. Using GUS histochemical assay, we observed strong GUS induction driven by PR-1a promoter in PR1a-GUS transgenic tobacco leaves in response to the exogenous application of SA or benzol (1,2,3) thiadiazole-7-carbothioic acid S-methyl ester (BTH), a SA­derivative compound. In addition, GUS expression was maintained locally or systemically in PR1a-GUS transgenic line $\#5\;T_2$ generation) until after 3 days when they were treated with same chemicals. Our results suggested that the PR1a-GUS reporter gene system in tobacco plants may be applicable for the large-scale screening of defense-inducing substances.

Fuzzy Inference-based Quantitative Estimation of Environmental Affecting Factor For Performance-based Durability Design of RC Structure Exposed to Salt Attack Environment (염해 환경에 노출된 RC 구조물의 내구성능설계를 위한 퍼지 추론 기반 환경영향지수의 산정)

  • Do Jeong Yun;Song Hun;Soh Seung Young;Soh Yang Seob
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2005.05b
    • /
    • pp.237-240
    • /
    • 2005
  • As a part of the effort for improving the durability design based on a set of the deem-to-satisfy specifications, it is important and primary to quantitatively identify the environmental impact to a target reinforced concrete structure. In this work, an effort is made to quantitatively calculate the environmental affecting factor with using a fuzzy inference that it indicates the severity of environmental impact to the exposed reinforced concrete structure or member. This system is composed of input region, output region and rule base. For developing the fuzzy inference system surface chloride concentration{chloride), cyclic degree of wet and dry(CWD), relative humidity(RH) and temperature (TEMP) were selected as the input parameter to environmental affecting factor(EAF) of output parameter. The Rules in inference engine are generated from the engineering knowledge and intuition based on some international code of practises as well as various researcher's experimental data. The devised fuzzy inference system was verified comparing the inferred value with the investigation data, and proved to be validated. Thus it is anticipated that this system for quantifying EAF is certain to be considered into the starting point to develop the performance-based durability design considering the service life of structure.

  • PDF

A Study on the VoIP Security vulnerability over MANET (MANET 기반 VoIP의 보안 취약성 연구)

  • Yoon, Tong-Il;Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.431-433
    • /
    • 2010
  • VoIP is a communication technique can be used anywhere you can find wifi signal and it costs much lower than conventional mobile service. However, security of VoIP is not as robust as former, the converse could be easily intercepted and attacked especially in MANETs which the attackers access easier than in wired networks. Sercurity of VoIP system in MANETs is an important issue nowadays. In this paper, a typical attack method of VoIP systems in MANETs is described and we implement how to prevent it.

  • PDF

An Efficient Authentication Scheme for Multicast Packet using Recovery Layer (복구 계층을 이용한 멀티캐스트 패킷 인증)

  • 홍기훈;정수환
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.63-73
    • /
    • 2004
  • This paper proposes an efficient authentication scheme for multicast packet using recovery layer to provide source authentication. The problems of the existing schemes are as follows : TESLA requires time synchronization between the sender and the receiver, md hash-based schemes have high communication overheads due to additional hash values and require many buffers and delay for verification on receivers. Our main focus is reducing the buffer size, communication and computation burden of the receiver. The proposed scheme in this paper is highly robust to packet loss using the recovery layer based on XOR operation. It also provides low communication overhead, low verification cost, non-repudiation of the origin, immediate verification and robustness against DoS attack on the receiver.

An Enhanced Forward Security on JK-RFID Authentication Protocol (JK-RFID 인증 프로토콜에 대한 개선된 전방향 안전성)

  • Jeon, Dong-Ho;Choi, Seoung-Un;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.161-168
    • /
    • 2011
  • In 2009, Jeon et al proposed the lightweight strong authentication and strong privacy protocol, where the tag requrires only simple bitwise operations and random number generator. JK-RFID authentication protocol provides strong security: eavesdropping, replay, spoofing, Location tracking, DoS attack and forward security. Nevertheless, this paper points out the vulnerability of the forward security and improve the process of key updating. As a result, proposes an enhanced JK-RFID authentication protocol providing forward security and verify its satisfaction. In addition, a security and an efficiency of the proposed scheme analyze. Since partial adjustments of the key updating operation in JK-RFID authentication protocol, our protocol improve the forward security.

Kinetics and Mechanism of the Hydrolysis of N-(p-Nitrophenyl)-benzohydrazonyl Azide Derivatives (N-(p-니트로페닐)-벤조히드라조닐아지드 유도체의 가수분해 반응메카니즘과 그의 반응속도론적 연구)

  • Nack-Do Sung;Ki-Sung Kwon;Tae-Rin Kim
    • Journal of the Korean Chemical Society
    • /
    • v.22 no.3
    • /
    • pp.150-157
    • /
    • 1978
  • The rate constants for the hydrolysis of the derivatives of N-(p-nitrophenyl)-benzohydrazonyl azide (p-$CH_3,\;p-CH_3O,\;p-NO_2$, p-Cl, p-Br) have been determined by UV spectrophotometry in 50% dioxane-water at $25^{\cicr}C$ and a rate equation which can be applied over wide pH range was obtained. Below pH 5, the rate of hydrolysis of hydrazonyl azides is accelerated by electron-donating group ($\rho$ = -0.47), whereas at the pH values greater than 7, the $\rho$-value is 0.68. The effect of salt, solvent, substituent and azide ion on the rate of hydrolysis are rationalized in terms of $S_N1$ and $S_N2$ mechanism; below pH 5, the hydrolysis proceed through $S_N1$, however, above pH 7, the hydrolysis is started by the attack of hydroxide ion and in the range of pH 5∼7, these two reactions occur competitively.

  • PDF

Vulnerability Defense of On-Zeroboard using CSRF Attack (CSRF 공격기법에 대한 제로보드상의 취약점 방어)

  • Kim, Do-Won;Bae, Su-Yeon;An, Beongku
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.57-61
    • /
    • 2014
  • Zeroboard is a public bulletin board that can support PHP and MySQL. It has been used by many people because it is easy to use, but there is no more updates after Zeroboard4. So, there is a problem that its administrator will have nothing to do about it if zeroboard has a vulnerability. In this paper, we will discuss about CSRF(Cross Site request Forgery) which is developed and expanded by XSS(Cross Site Scripting). Also, we will find CSRF attacks and suggest an alternative method using VM-ware. The main features and contributions of the proposed method are as follows. First, make an environment construction using VM-ware and other tools. Second, analyze and prepare vulnerabilities using Proxy server. Performance evaluation will be conducted by applying possible countermeasure.

Design and Implementation of CAl Title for Learning Basics of AC Electricity (공업계 고등학교 전기이론 교과의 교류의 기본성질 단원에 관한 CAI 교재 설계 및 구현)

  • Kim, Jong-Seong;Kwon, Myoung-Ha
    • The Journal of Korean Association of Computer Education
    • /
    • v.4 no.1
    • /
    • pp.127-134
    • /
    • 2001
  • Many teachers at vocational high schools have had difficulties overcoming the gap between what students know and what students have to achieve in many topics. Mathematics is toughest of all, since most of textbooks in electronics are assuming student's basic knowledge in math. Considering that many students with very low achievements are entering vocational high schools, reality is far from such assumption. Inevitably, we have to face two difficult questions; do we have enough time to teach these kids all the math that they need in two years? If not, what alternatives we should adopt? We just do not have enough time and therefore find out a way to cope with harsh reality. According to our preliminary study, we suggest that multimedia-based CAI may be the best way to attack this problem. From hardware point of view, fortunately, many of vocational high schools are reasonably equipped for multimedia-based education. However there have been hardly any effort to develop courseware for vocational education in Korea. In this paper, a CAI title for learning basic characteristics of alternating current has been designed and implemented. The developed multimedia-based CAI title has been applied with respect to first grade students at local vocational high schools. A survey after classes shows that CAI could help student feel much comfortable with Basic Electricity course and grasp physical understanding much easily. Accordingly we conclude that classes adopting CAI would be of great help to put education in vocational high schools on the right track.

  • PDF