• 제목/요약/키워드: Drop attack

검색결과 54건 처리시간 0.026초

저대역 DDoS 공격 대응 시스템 (Respond System for Low-Level DDoS Attack)

  • 이형수;박재표
    • 한국산학기술학회논문지
    • /
    • 제17권10호
    • /
    • pp.732-742
    • /
    • 2016
  • 본 논문에서는 향후에도 지속적으로 발생 가능성이 높은 저대역 DDoS 공격에 대비하여 TLF(Time Limit Factor)를 적용한 솔루션을 기존의 고대역 DDoS 방어 시스템에 추가함으로써 고대역의 DDoS 공격과 더불어 저대역 DDoS 공격에 대해서 방어 할 수 있도록 하였다. 저대역 DDoS 공격은 정상적인 서비스 연결을 가장하여 연결된 세션을 지속적으로 점유함으로써 정상적인 사용자들의 서비스 요청에 대한 장애를 유발시킨다는 점에 착안하여 각 세션별 일정시간 동안의 통신량을 체크하여 비정상적인 경우 저대역 DDoS 공격으로 간주하여 해당 세션을 종료시키는 방법이다. 그러나, 정상적인 연결 상태에서도 네트워크의 일시적인 장애들로 인해 통신에 장애를 가져오는 경우 저대역 DDoS 공격으로 오탐하여 서비스를 차단할 수 있다는 점 때문에 저대역 DDoS 공격으로 탐지되었다 할지라도 관련 정보에 대해 Blacklist를 통한 Drop이 아닌 일정 시간동안만 Blocking 후 다시 재 접속이 가능하도록 하였다. 고대역 DDoS 방어시스템을 이용하여 저대역 DDoS 공격에 대한 테스트를 진행한 결과 고대역 DDoS 방어시스템은 저대역 DDoS 공격으로 단순 연결된 세션들에 대해 정상적인 통신으로 인지하여 세션에 대한 차단이 불가하였으며 이로 인해 저대역 DDoS 공격을 받은 시스템은 리소스 고갈로 서비스 불가 현상이 발생하였다. 본 논문에서 제안한 TLF 알고리즘을 고대역 DDoS 방어시스템에 적용하게되면 고대역 및 저대역 DDoS에 대한 방어가 가능할 뿐만 아니라, 서비스를 제공하는 시스템에 모듈형태로 추가 적용을 할 경우 저대역 DDoS 공격에 대한 대처가 가능하다.

The Outcome of Corpus Callosotomy for Intractable Epilepsy : 10 Years Experience of Corpus Callosotomy

  • Seo, Jeong-Suk;Lee, Jong-Ju;Lee, Jung-Kyo;Kang, Jung-Gu;Lee, Sang-Am;Ko, Tae-Sung
    • Journal of Korean Neurosurgical Society
    • /
    • 제39권1호
    • /
    • pp.16-19
    • /
    • 2006
  • Objective : The purpose of this study is to evaluate the effect of the corpus callosotomy and to elucidate possible prognostic factors. Methods : The cases of 39 patients who underwent corpus callosotomy were reviewed retrospectively. Clinical outcomes were analyzed using Engel's classification, with consideration of various presurgical conditions and the extent of the callosal resection during follow-up more than one year. Results : Satisfactory outcome [Engel's class I, II] was obtained in 20 patients [51%] of 39 patients. In 36 cases with drop attack seizures, the class I, II outcomes were 22 patients [61%]. When the patients were grouped according to the extent of callosal resection, the class I, II outcomes were 50% of the patients with anterior 1/2 or 2/3, 50% of those with anterior 4/5 callosotomy, and 57% of those with total callosotomy, respectively. The mean follow-up period was 34 months [24 to 58 months]. Conclusion : Although it is not statistically significant, the patients who had underwent total callosotomy show better outcomes than those with partial callosotomy. Corpus callosotomy is efficacious in controlling medically intractable epilepsy in appropriately selected patients.

한 벽면에 V형 리브가 있는 2면 확대 사각채널의 열전달 (Heat Transfer in a Two Wall Divergent Rectangular Channel with V-Shaped Ribs on One Wall)

  • 이명성;안수환
    • 동력기계공학회지
    • /
    • 제19권5호
    • /
    • pp.32-37
    • /
    • 2015
  • The present study is to investigates the convective heat transfer characteristics and pressure drop inside the rib-roughened cooling passage of gas turbine blades. The divergent rectangular channel is fabricated with V-shaped ribs on one wall only and the inlet hydraulic diameter to outlet hydraulic diameter ratio($D_{ho}/D_{hi}$) of 1.49 is used. The current investigation has covered a Reynolds number (Re) range of 22,000~75,000, relative roughness height ($e/D_h$) of 0.1~0.2, and rib angle of attack (a) of $30^{\circ}$, $45^{\circ}$, and $60^{\circ}$ for a fixed relative pitch of 10. Results show that the Nusselt numbers are the greatest in the $60^{\circ}$-angled ribs; however, the total friction factors are the highest in the $30^{\circ}$-angled ribs.

A Case of Pial Arteriovenous Fistula with Giant Venous Aneurysm and Multiple Varices Treated with Coil Embolization

  • Oh, Hyuk-Jin;Yoon, Seok-Mann;Kim, Sung-Ho;Shim, Jai-Joon
    • Journal of Korean Neurosurgical Society
    • /
    • 제50권3호
    • /
    • pp.248-251
    • /
    • 2011
  • Intracranial pial arteriovenous fistulas (AVFs) are rare vascular lesions of the brain. These lesions consist of one or more arterial connection to a single venous channel without true intervening nidus. A 24-year-old woman visited to our hospital because of headache, vomiting, dizziness and memory disturbance that persisted for three days. She complained several times of drop attack because of sudden weakness on both leg. Cerebral angiograms demonstrated a giant venous aneurysm on right frontal lobe beyond the genu of corpus callosum, multiple varices on both frontal lobes fed by azygos anterior cerebral artery, and markedly dilated draining vein into superior sagittal sinus, suggesting single channel pial AVF with multiple varices. Transarterial coil embolization of giant aneurysm and fistulous portion resulted in complete disappearance of pial AVF without complication.

선택적 전달 공격 탐지 기법에서의 감시 노드 수 제어기법 (Control Method for the number of check-point nodes in detection scheme for selective forwarding attacks)

  • 이상진;조대호
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 한국정보통신설비학회 2009년도 정보통신설비 학술대회
    • /
    • pp.387-390
    • /
    • 2009
  • Wireless Sensor Network (WSN) can easily compromised from attackers because it has the limited resource and deployed in exposed environments. When the sensitive packets are occurred such as enemy's movement or fire alarm, attackers can selectively drop them using a compromised node. It brings the isolation between the basestation and the sensor fields. To detect selective forwarding attack, Xiao, Yu and Gao proposed checkpoint-based multi-hop acknowledgement scheme (CHEMAS). The check-point nodes are used to detect the area which generating selective forwarding attacks. However, CHEMAS has static probability of selecting check-point nodes. It cannot achieve the flexibility to coordinate between the detection ability and the energy consumption. In this paper, we propose the control method for the number fo check-point nodes. Through the control method, we can achieve the flexibility which can provide the sufficient detection ability while conserving the energy consumption.

  • PDF

A Numerical Study on Cavitation Suppression Using Local Cooling

  • Zhang, Yuan-Yuan;Sun, Xiao-Jing;Huang, Dian-Gui
    • International Journal of Fluid Machinery and Systems
    • /
    • 제3권4호
    • /
    • pp.292-300
    • /
    • 2010
  • This study strives to develop an effective strategy to inhibit cavitation inception on hydrofoils by using local cooling technique. By setting up a temperature boundary condition and cooling a small area on the upper surface of a hydrofoil, the fluid temperature around the cooling surface will be decreased and thereby the corresponding liquid saturation pressure will drop below the lowest absolute pressure within the flow field. Hence, cavitation can never occur. In this paper, a NACA0015 hydrofoil at $4^{\circ}$ angle of attack was numerically investigated to verify the effectiveness of the proposed technique. The CFD results indicate that the cooling temperature and the cooling surface roughness are the critical factors affecting the success of such technique used for cavitation suppression.

프레임에 기반한 키를 이용한 동영상 워터마킹 (Video Watermarking Algorithm using the Frame-dependent Key)

  • 안일영;박성한
    • 방송공학회논문지
    • /
    • 제8권4호
    • /
    • pp.501-504
    • /
    • 2003
  • 본 논문에서는 프레임간 움직임 차를 이용한 워터마킹 방법을 제안한다. 이를 위하여 프레임차의 최대치를 양자화한 값을 계산하여 워터마크 삽입과 검출시에 사용되는 키값을 구한다. 실험 결과, 이 방법은 전체 프레임 중에서 l~3% 정도의 프레임에서 워터마크 삽입시에 계산한 키 값과 워터마크 검출시에 계산한 키 값이 ${\pm}1$ 정도의 오차가 발생하는데 이것은 검출된 워터마크의 BER(bit error rate)에 따라 키값을 다시 정하여 워터마크를 검출하면 해결됨을 알 수 있다. 본 논문에서 제안하는 방법은 각각의 프레임에 다른 워터마크 키를 사용하므로 프레임 삭제와 평균화 공격(averaging attack)에 강함을 보인다.

동적 여과 프로토콜 적용 센서 네트워크에서의 퍼지 기반 보안 경계 값 결정 기법 (A Threshold Determining Method for the Dynamic Filtering in Wireless Sensor Networks Using Fuzzy System)

  • 이상진;이해영;조대호
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 한국정보통신설비학회 2008년도 정보통신설비 학술대회
    • /
    • pp.197-200
    • /
    • 2008
  • In most sensor networks, nodes can be easily compromised by adversaries due to hostile environments. Adversaries may use compromised nodes to inject false reports into the sensor networks. Such false report attacks will cause false alarms that can waste real-world response effort, and draining the finite amount of energy resource in the battery-powered network. A dynamic enroute scheme proposed by Yu and Guan can detect and drop such false reports during the forwarding phase. In this scheme, choosing a threshold value is very important, as it trades off between security power and energy consumption. In this paper, we propose a threshold determining method which uses the fuzzy rule-based system. The base station periodically determines a threshold value though the fuzzy rule-based system. The number of cluster nodes, the value of the key dissemination limit, and the remaining energy of nodes are used to determine the threshold value.

  • PDF

두 가지 축구 골킥 동작의 운동역학적 비교 분석 (Biomechanical Comparative Analysis of Two Goal-kick Motion in Soccer)

  • 진영완;신제민
    • 한국운동역학회지
    • /
    • 제15권1호
    • /
    • pp.29-44
    • /
    • 2005
  • The purpose of this study is to reveal the effects of two different kicks, the drop kick and the punt kick, into the kicking motion, through the kinetic comparative analysis of the kicking motion, which is conducted when one kicks a soccer goal. To grasp kinetic changing factors, which is performed by individual's each body segment, I connected kicking motions, which were analyzed by a two dimension co-ordination, into the personal computer to concrete the digits of it and smoothed by 10Hz. Using the smoothed data, I found a needed kinematical data by inputting an analytical program into the computer. The result of comparative analysis of two kicking motions can be summarized as below. 1. There was not a big difference between the time of the loading phase and the time of the swing phase, which can affect the exact impact and the angle of balls aviation direction. 2. The two kicks were not affected the timing and the velocity of the kicking leg's segment. 3. In the goal kick motion, the maximum velocity timing of the kicking leg's lower segment showed the following orders: the thigh(-0.06sec), the lower leg(-0.05sec), the foot(-0.018sec) in the drop kick, and the thigh(-0.06sec), the lower leg(-0.05sec), the foot(-0.015sec) in the punt kick. It showed that whipping motion increases the velocity of the foot at the time of impact. 4. At the time of impact, there was not a significant difference in the supporting leg's knee and ankle. When one does the punt kick, the subject spreads out his hip joint more at the time of impact. 5. When the impact performed, kicking leg's every segment was similar. Because the height of the ball is higher in the punt kick than in the drop kick, the subject has to stretch the knees more when he kicks a ball, so there is a significant affect on the angle and the distance of the ball's flying. 6. When one performs the drop kick, the stride is 0.02m shorter than the punt kick, and the ratio of height of the drop kick is 0.05 smaller than the punt kick. This difference greatly affects the center of the ball, the supporting leg's location, and the location of the center of gravity with the center of the ball at the time of impact. 7. Right before the moment of the impact, the center of gravity was located from the center of the ball, the height of the drop kick was 0.67m ratio of height was 0.37, and the height of the punt kick was 0.65m ratio of height was 0.36. The drop kick was located more to the back 0.21m ratio of height was 0.12, the punt kick was located more to the back 0.28m ratio of height was 0.16. 8. There was not a significant difference in the absolute angle of incidence and the maximum distance, but the absolute velocity of incidence showed a significant difference. This difference is caused from that whether players have the time to perform of not; the drop kick is used when the players have time to perform, and punt kick is used when the players launch a shifting attack. 9. The surface reaction force of the supporting leg had some relation with the approaching angle. Vertical reaction force (Fz) showed some differences in the two movements(p<0.05). The maximum force of the right and left surface reaction force (Fx) didn't have much differences (p<0.05), but it showed the tendency that the maximum force occurs before the peak force of the front and back surface (Fy) occurs.

Survivability Analysis of MANET Routing Protocols under DOS Attacks

  • Abbas, Sohail;Haqdad, Muhammad;Khan, Muhammad Zahid;Rehman, Haseeb Ur;Khan, Ajab;Khan, Atta ur Rehman
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권9호
    • /
    • pp.3639-3662
    • /
    • 2020
  • The network capability to accomplish its functions in a timely fashion under failures and attacks is known as survivability. Ad hoc routing protocols have been studied and extended to various domains, such as Intelligent Transport Systems (ITSs), Unmanned Aerial Vehicles (UAVs), underwater acoustic networks, and Internet of Things (IoT) focusing on different aspects, such as security, QoS, energy. The existing solutions proposed in this domain incur substantial overhead and eventually become burden on the network, especially when there are fewer attacks or no attack at all. There is a need that the effectiveness of these routing protocols be analyzed in the presence of Denial of Service (DoS) attacks without any intrusion detection or prevention system. This will enable us to establish and identify the inherently stable routing protocols that are capable to survive longer in the presence of these attacks. This work presents a DoS attack case study to perform theoretical analysis of survivability on node and network level in the presence of DoS attacks. We evaluate the performance of reactive and proactive routing protocols and analyse their survivability. For experimentation, we use NS-2 simulator without detection or prevention capabilities. Results show that proactive protocols perform better in terms of throughput, overhead and packet drop.