• Title/Summary/Keyword: IDS

Search Result 740, Processing Time 0.034 seconds

Strategic Approaches to Integrated Delivery System(IDS): Vertical Integration and Strategic Alliance (통합의료시스템(Integrated Delivery System, IDS)의 전략적 접근: 수직적 통합과 전략적 제휴)

  • Suh, Won S.
    • Korea Journal of Hospital Management
    • /
    • no.spc
    • /
    • pp.39-50
    • /
    • 2016
  • This paper discusses the strategic concepts applied to integrated delivery system(IDS). IDS is rooted in vertical integration(VI) and strategic alliance(SA), but only few knows about the theoretical backbone of the IDS. The paper explains how VI and SA applies to IDS, then provides cases of IDS rooted in strategic concepts; Kaiser Permanante Model, Mayo Clinic Model, and ACO(Accountable Care Organizations). Finally the paper provides the implication of IDS on Korean healthcare delivery system.

IDs Assignment of Hybrid Method for Efficient and Secure USN (Ubiquitous Sensor Networks) (효율적인 안전한 유비쿼터스 센서 네트워크를 위한 하이브리드 방식의 아이디 할당)

  • Sung, Soon-Hwa
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.15-25
    • /
    • 2008
  • Due to the differences between a mobile ad-hoc network and a sensor network, the pre-existing autoconfiguration for a mobile ad-hoc network cannot be simply applied to a sensor network. But. a mechanism is still necessary to assign locally unique addresses to sensor nodes efficiently. This paper proposes a hybrid IDs assignment scheme of local area sensor networks. The IDs assignment scheme of hybrid method combines a proactive IDs assignment with a reactive IDs assignment scheme. The proposed scheme considers efficient communication using reactive IDs assignment, and security for potential attacks using zone-based self-organized clustering with Byzantine Agreement in sensor networks. Thus, this paper has solved the shortage of security due to minimizing network traffic and the problem of repairing the network from the effects of an aberrant node in sensor networks.

  • PDF

C4ISR Systems IDS Performance Enhancing Method (C4ISR 체계 IDS의 성능 향상 방안)

  • Choi, Junesung;Kook, Kwangho
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.57-69
    • /
    • 2012
  • C4ISR system is an important tool for military operational command and control. Therefore, it is frequently exposed to the cyber-terror attempt to paralyze the military command and control system. Generally, the information system uses IDS and firewall as major security computing tools. C4ISR system also uses them as major measures for the information protection. But the usefulness of IDS is reduced due to the frequent false-positives and false-negatives if the behavioral patterns are modified or new behavioral patterns appear. This paper presents new IDS structure which can create modified attack patterns and unexpected attack patterns automatically during IDS probing process. The proposed IDS structure is expected to enhance the information protection capability of the C4ISR system by reducing false-positives and false-negatives through the creation and verification of new attack patterns.

IDS Evasion Detection System with Packet Reassemble Funtion (패킷 재조립 기능을 가진 IDS 우회공격 탐지 시스템)

  • Youk Sang-Jo;Park Myung-Ho;Lee Geuk
    • Journal of Digital Contents Society
    • /
    • v.4 no.1
    • /
    • pp.101-113
    • /
    • 2003
  • IDS(Intrusion Detection System) evasion is a technology which uses vulnerability of IDS in order not to be detected by IDS. In this paper, at first, we classify IDS evasion technology. Second, we propose detection model of IDS evasion technology. Finally, we design and implement IDS evasion detection system with packet reassemble function.

  • PDF

A Design and Implementation of Detection System against Evasional Attack to IDS (IDS 우회공격 탐지 시스템 설계 및 구현)

  • Gil, Min-Wook;Cha, Jun-Nam;Lee, Geuk
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.165-177
    • /
    • 2002
  • IDS(Intrusion Detection System) evasion is a technology which uses vulnerability of IDS in order not to be detected by IDS. In this paper, at first, we classify IDS evasion technology. Second, we propose detection model of IDS evasion technology. Finally, we design and implement detection system of IDS evasion.

  • PDF

The Effects of IDS(Indongsoyeom-bang) Treatment on the Hematological and Cytopathological Alterations in Non-Bacterial Prostatitis Rat Model (인동소염방(忍冬消炎方)이 만성 비세균성 전립선염 Rat 모델에서 혈액 및 세포조직의 변화에 미치는 영향)

  • Lee, Jong-Bin;Hwang, Seock-Yeon;Cho, Chung-Sik
    • Journal of Haehwa Medicine
    • /
    • v.20 no.1
    • /
    • pp.91-104
    • /
    • 2011
  • Background : Although chronic non-bacterial prostatitis is increasing, it is hard to treat effectively. In western medicine, antimicrobials drug, ${\alpha}$-adreno-ceptor antagonists, anti-inflammatory drugs, tricyclic antidepressants and anticholinergic agents are used commonly, but chronic prostatitis/chronic pelvic pain syndromes is confusing and frustrating for urologist. IDS(Indongsoyeom-bang) is used in treatment of chronic prostatitis/chronic pelvic pain syndromes. And it is reported that GLS(Gleditsiae spina) and TOF(Toosendan fructus) components of IDS have significant effect on protection of the glandular epithelial cells. Objective : In this study was conducted to investigate the therapeutic effects and action machanism of IDS in the rat model of non-bacterial prostatitis induced by castration and testosterone treatment. Methods : We observed six experimental objects of normal group, control group, testosterone group, and IDS 50 mg/kg, 200mg/kg, 400mg/kg group. Rats were treated with 17 ${\beta}$-estradiol after castration for induction of experimental non-bacterial prostatitis, which is similar to human chronic prostatitis in histophatological profiles. IDS and testosterone were administered as an experimental specimen and a positive control, respectively. The prostates were evaluated by histological parameters including the epithelial score and epithelio-stromal ratio for glandular damage. Also, the prostates were observed by Hematological alterations of WBC, RBC, hemoglobin and platelet. Results : While prostates of control rats revealed severe acinar gland atrophy and stromal proliferation, the rats treated with IDS-50 showed a diminished range of the tissue damage. Epithelial score was improved in IDS than that of the control. The epithelio-stromal ratio was lower in IDS when compared to that of the control. Also, the examination of bloods were not observed hematological change. Conclusion : These finding suggests that IDS may protects the glandular epithelial cells. We concluded that IDS could be a useful remedy agent for treating chronic non-bacterial prostatitis.

Design and Implementation of Advanced Web Log Preprocess Algorithm for Rule based Web IDS (룰 기반 웹 IDS 시스템을 위한 효율적인 웹 로그 전처리 기법 설계 및 구현)

  • Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.9 no.5
    • /
    • pp.23-34
    • /
    • 2008
  • The number of web service user is increasing steadily as web-based service is offered in various form. But, web service has a vulnerability such as SQL Injection, Parameter Injection and DoS attack. Therefore, it is required for us to develop Web IDS system and additionally to offer Rule-base intrusion detection/response mechanism against those attacks. However, existing Web IDS system didn't correspond properly on recent web attack mechanism because they didn't including suitable pre-processing procedure on huge web log data. Therfore, we propose an efficient web log pre-processing mechanism for enhancing rule based detection and improving the performance of web IDS base attack response system. Proposed algorithm provides both a field unit parsing and a duplicated string elimination procedure on web log data. And it is also possible for us to construct improved web IDS system.

  • PDF

Security Simulation with Collaboration of Intrusion Detection System and Firewall (침입 탐지 시스템과 침입 차단 시스템의 연동을 통한 보안 시뮬레이션)

  • 서희석;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.10 no.1
    • /
    • pp.83-92
    • /
    • 2001
  • For the prevention of the network intrusion from damaging the system, both IDS (Intrusion Detection System) and Firewall are frequently applied. The collaboration of IDS and Firewall efficiently protects the network because of making up for the weak points in the each demerit. A model has been constructed based on the DEVS (Discrete Event system Specification) formalism for the simulation of the system that consists of IDS and Firewall. With this model we can simulation whether the intrusion detection, which is a core function of IDS, is effectively done under various different conditions. As intrusions become more sophisticated, it is beyond the scope of any one IDS to deal with them. Thus we placed multiple IDS agents in the network where the information helpful for detecting the intrusions is shared among these agents to cope effectively with attackers. If an agent detects intrusions, it transfers attacker's information to a Firewall. Using this mechanism attacker's packets detected by IDS can be prevented from damaging the network.

  • PDF

Development of IDS Program for Tuning Power System Controllers (전력시스템 제어기 튜닝을 위한 IDS 프로그램 개발)

  • Kim, D.J.;Kim, J.S.;Moon, Y.H.
    • Proceedings of the KIEE Conference
    • /
    • 2003.11a
    • /
    • pp.38-40
    • /
    • 2003
  • This paper describes the integrated dynamic stability(IDS) program for tuning the power system controllers, such as PSS, AVR and so on. IDS consists of three modules; power flow module, PWRLF, to calculate large scale power system load flow solutions, IDS/PSS module to calculate eigenvalues and frequency response in the range of frequency from 0.2Hz to 2Hz, and IDS/NEA module to calculate eigenvalues in the range of frequency from 5.0Hz to 55Hz. In addition, IDS provides graphic user interface(GUI) in order to let the user handle and analyze the input data and the results of calculation with convenience.

  • PDF

Optimizing Intrusion Detection Pattern Model for Improving Network-based IDS Detection Efficiency

  • Kim, Jai-Myong;Lee, Kyu-Ho;Kim, Jong-Seob;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.1 no.1
    • /
    • pp.37-45
    • /
    • 2001
  • In this paper, separated and optimized pattern database model is proposed. In order to improve efficiency of Network-based IDS, pattern database is classified by proper basis. Classification basis is decided by the specific Intrusions validity on specific target. Using this model, IDS searches only valid patterns in pattern database on each captured packets. In result, IDS can reduce system resources for searching pattern database. So, IDS can analyze more packets on the network. In this paper, proper classification basis is proposed and pattern database classified by that basis is formed. And its performance is verified by experimental results.

  • PDF