• Title/Summary/Keyword: IP Protection

Search Result 139, Processing Time 0.023 seconds

Analysis of Threat Information Priorities for Effective Security Monitoring & Control (효과적인 보안관제를 위한 위협정보 우선순위 도출)

  • Kang, DaYeon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.26 no.5
    • /
    • pp.69-77
    • /
    • 2021
  • This study aims to identify security-based threat information for an organization. This is because protecting the threat for IT systems plays an important role for an corporate's intangible assets. Security monitoring systems determine and consequently respond threats by analyzing them in a real time situation, focusing on events and logs generated by security protection programs. The security monitoring task derives priority by dividing threat information into reputation information and analysis information. Reputation information consisted of Hash, URL, IP, and Domain, while, analysis information consisted of E-mail, CMD-Line, CVE, and attack trend information. As a result, the priority of reputation information was relatively high, and it is meaningful to increase accuracy and responsiveness to the threat information.

Cardioprotective Effect of Calcium Preconditioning and Its Relation to Protein Kinase C in Isolated Perfused Rabbit Heart (적출관류 토끼 심장에서 칼슘 전처치에 의한 심근보호 효과와 Protein Kinase C와의 관계)

  • 김용한;손동섭;조대윤;양기민;김호덕
    • Journal of Chest Surgery
    • /
    • v.32 no.7
    • /
    • pp.603-612
    • /
    • 1999
  • Background : It has been documented that brief repetitive periods of ischemia and reperfusion (ischemic preconditioning, IP) enhances the recovery of post-ischemic contractile function and reduces infarct size after a longer period of ischemia. Many mechanisms have been proposed to explain this process. Recent studies have suggested that transient increase in the intracellular calcium may have triggered the activation of protein kinase C(PKC); however, there are still many controversies. Accordingly, the author performed the present study to test the hypothesis that preconditioning with high concentration of calcium before sustained subsequent ischemia(calcium preconditioning) mimics IP by PKC activation. Material and Method : The isolated hearts from the New Zealand White rabbits(1.5∼2.0 kg body weight) Method: The isolated hearts from the New Zealand White rabbits(1.5∼2.0 kg body weight) were perfused with Tyrode solution by Langendorff technique. After stabilization of baseline hemodynamics, the hearts were subjected to 45-minute global ischemia followed by a 120-minute reperfusion with IP(IP group, n=13) or without IP(ischemic control, n=10). IP was induced by single episode of 5-minute global ischemia and 10-minute reperfusion. In the Ca2+ preconditioned group, perfusate containing 10(n=10) or 20 mM(n=11) CaCl2 was perfused for 10 minutes after 5-minute ischemia followed by a 45-minute global ischemia and a 120-minute reperfusion. Baseline PKC was measured after 50-minute perfusion without any treatment(n=5). Left ventricular function including developed pressure(LVDP), dP/dt, heart rate, left ventricular end-diastolic pressure(LVEDP) and coronary flow(CF) was measured. Myo car ial cytosolic and membrane PKC activities were measured by 32P-${\gamma}$-ATP incorporation into PKC-specific pepetide. The infarct size was determined using the TTC (tetrazolium salt) staining and planimetry. Data were analyzed using one-way analysis of variance(ANOVA) variance(ANOVA) and Tukey's post-hoc test. Result: IP increased the functional recovery including LVDP, dP/dt and CF(p<0.05) and lowered the ascending range of LVEDP(p<0.05); it also reduced the infarct size from 38% to 20%(p<0.05). In both of the Ca2+ preconditioned group, functional recovery was not significantly different in comparison with the ischemic control, however, the infarct size was reduced to 19∼23%(p<0.05). In comparison with the baseline(7.31 0.31 nmol/g tissue), the activities of the cytosolic PKC tended to decrease in both the IP and Ca2+ preconditioned groups, particularly in the 10 mM Ca2+ preconditioned group(4.19 0.39 nmol/g tissue, p<0.01); the activity of membrane PKC was significantly increased in both IP and 10 mM Ca2+ preconditioned group (p<0.05; 1.84 0.21, 4.00 0.14, and 4.02 0.70 nmol/g tissue in the baseline, IP, and 10 mM Ca2+ preconditioned group, respectively). However, the activity of both PKC fractions were not significantly different between the baseline and the ischemic control. Conclusion: These results indicate that in isolated Langendorff-perfused rabbit heart model, calcium preconditioning with high concentration of calcium does not improve post-ischemic functional recovery. However, it does have an effect of limiting(reducing) the infart size by ischemic preconditioning, and this cardioprotective effect, at least in part, may have resulted from the activation of PKC by calcium which acts as a messenger(or trigger) to activate membrane PKC.

  • PDF

An Authorization Method for Presence Service in VoIP Service (프레즌스 서비스 제공을 위한 XCAP 권한관리 기법 연구)

  • Lee, Tai-Jin;Kim, Hyung-Jong
    • Convergence Security Journal
    • /
    • v.8 no.1
    • /
    • pp.79-90
    • /
    • 2008
  • Services over SIP protocol are anticipated to be commonly used services in our usual life. Especially, presence is a new feature in SIP-based services and actually entities' presence information has close relationship with privacy of them. Also, the XCAP-based authorization is accepted as a highly probable method to protect privacy of entities in SIP-based services. However, there is no proposed presence service model except IM service and it's hard to find the reference model that shows a way how we can apply XCAP-based authorization method into presence service. In this paper, we proposed new presence service model which is applicable to the VoIP service. We suggested presence service model which is making use of XCAP-based authorization to get protection of privacy in a organized way and the suggested model's each messaging steps were reviewed using concrete examples. Contributions of this work is in the suggestion of privacy-aware presence service using XCAP-based authorization and its verification of its each messaging step.

  • PDF

Providing Fairness in Diffserv Architecture using Buffer Management Method (차등서비스 구조에서 버퍼관리기법을 이용한 공평성 제공)

  • 김중규
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2003.05a
    • /
    • pp.8-13
    • /
    • 2003
  • Historically, IP-based internets have been able to provide a simple best-effort delivery service to all applications they carry. Best effort treats all packets equally, with no service level, packet loss, and delay. But the needs of users have changed. The want to use the new real-time, multimedia, and multicasting applications. Thus, there is a strong need to be able to support a variety of traffic with a variety of quality-of-service requirements. The DiffServ architecture, proposed by the Internet Engineering Task Force(IETF), has become the most viable solution for provising QoS over IP networks. The DiffServ architecture does not specify any handling method between AF out-profile packets and BE packets. This paper propose a mechanism for supporting inter class fairness in the DiffServ architecture. Ⅰ proposed a modified Weighted Round Robin method to protect the BE traffic from AF out-profile packets in the core routers. The proposed technique is evaluated through simulation. Simulation results indicate that the proposed method provides better protection not only for BE packets from AF out-profile packets, but also for the AF in-profile packets in congested networks.

  • PDF

Reliable Methods of Interoperability between Packet Transport Networks and IP Networks (고신뢰성을 보장하는 패킷전달망-IP망 상호연동 방법)

  • Lee, Kwang-Koog;Lee, Hosong;Lee, Youngwuk;Jeong, Kitae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.10
    • /
    • pp.34-40
    • /
    • 2014
  • With the economical data service delivery, the packet transport network (PTN) technologies have emerged as an important player in the next-generation transport networks. As the PTN continues to make such considerable progress, it is being challenged by network providers who need rapid and reliable recovery capabilities to guarantee the availability of their services. This paper introduces several fault detection mechanisms for a client signal failure in packet transport networks and proposes a reliable transmission method of IP flows from routers using the combination of Ethernet services. Based on the first fault detection methods, client signal fault is detected within tens or hundreds of milliseconds. It enables the client network devices to perform their own recovery processes within one second. The second mechanism enables failed Ethernet services to be bypassed via other Ethernet services over disjoint paths, so as to contribute on reducing packet loss of IP traffic.

Ischemic Preconditioning and Its Relation to Glycogen Depletion (허혈성 전처치와 당원 결핍과의 관계)

  • 장대영;김대중;원경준;조대윤;손동섭;양기민;라봉진;김호덕
    • Journal of Chest Surgery
    • /
    • v.33 no.7
    • /
    • pp.531-540
    • /
    • 2000
  • Baclgrpimd; Recent studies have suggested that the cardioprotective effect of ischemic preconditioning(IP) is closely related to glycogen depletion and attenuation of intracellular acidosis. In the present study, the authors tested this hypothesis by perfusion isolated rabbit hearts with glucose(G) is closely related to glycogen depletion and attenuation of intracellular acidosis. In the present study, the authors tested this hypothesis by perfusion isolated rabbit hearts with glucose(G)-free perfusate. Material and Method; Hearts isolated from New Zealand white rabbits(1.5~2.0 kg body weight) were perfused with Tyrode solution by Langendorff technique. After stabilization of baseline hemodynamics, the hearts were subjected to 45 min global ischemia followed by 120 min reperfusion with IP(IP group, n=13) or without IP(ischemic control group, n=10). IP was induced by single episode of 5 min global ischemia and 10 min reperfusion. In the G-free preconditioned group(n=12), G depletion was induced by perfusionwith G-free Tyrode solution for 5 min and then perfused with G-containing Tyrode solution for 10 min; and 45 min ischemia and 120 min reperfusion. Left ventricular functionincluding developed pressure(LVDP), dP/dt, heart rate, left ventricular end-distolic pressure(LVEDP) and coronary flow (CF) were measured. Myocardial cytosolic and membrane PKC activities were measured by 32P-${\gamma}$-ATP incorporation into PKC-specific peptide and PKC isozymes were analyzed by Western blot with monoclonal antibodies. Infarct size was determined by staining with TTC(tetrazolium salt) and planimetry. Data were analyzed by one-way analysis of variance (ANOVA) and Turkey's post-hoc test. Result ; In comparison with the ischemic control group, IP significantly enhanced functional recovery of the left ventricle; in contrast, functional significantly enhanced functional recovery of the left ventricle; in contrast, functional recovery were not significantly different between the G-free preconditioned and the ischemic control groups. However, the infarct size was significantly reduced by IP or G-free preconditioning(39$\pm$2.7% in the ischemic control, 19$\pm$1.2% in the IP, and 15$\pm$3.9% in the G-free preconditioned, p<0.05). Membrane PKC activities were increased significantly after IP (119%), IP and 45 min ischemia(145%), G-free [recpmdotopmomg (150%), and G-free preconditioning and 45 min ischemia(127%); expression of membrane PKC isozymes, $\alpha$ and $\varepsilon$, tended to be increased after IP or G-free preconditioning. Conclusion; These results suggest that in isolated Langendorff-perfused rabbit heart model, G-free preconditioning (induced by single episode of 5 min G depletion and 10 min repletion) colud not improve post-ischemic contractile dysfunction(after 45-minute global ischemia); however, it has an infarct size-limiting effect.

  • PDF

Design of the Copyright Protection for ePub e-Book System using Certification Information (인증 정보를 이용한 전자책 ePub의 저작권 보호 시스템 설계)

  • Jang, Seung-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.9
    • /
    • pp.2197-2204
    • /
    • 2015
  • In recent times, the high-tech society has become the most important issue by IT technology and publication network. Today such flows have also been the case in the e-book field. Today's electronic publication is changing day by day. But there are some problems according to the prevalence of e-book. E-book is similar to p-book(paper-book). There is a limit to have perfect feeling of a texture of p-book. In order to purchase an e-book, people use online. People having malicious intent could copy and distribute it illegally. It leads to cyber abuses. This paper aims at the copyright protection of e-book ePub writers. The proposed e-book copyright protection system is designed using e-book production Sigil environment and C program environment. This system uses client-server communication through e-book ePub as authentication information. It discerns whether to permit or not for a client to read the e-book using authentication information. Authentication information includes ID, password, IP address, limited time of authentication information, GUID(Globally Unique Identifier). If authentication information about e-book meets requirements, people can use it. But if not, it blocks people's approach by quitting program.

Enhanced Certificate with User's Privacy Protection Methods (프라이버시 보호 기능이 추가된 인증서 프로화일에 관한 연구)

  • Yang Hyung kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.4C
    • /
    • pp.290-295
    • /
    • 2005
  • When a Certification Authority (CA) issues X.509 public-key certificate to bind a public key to a user, the user is specified through one or more subject name in the 'subject' field and the 'subjectAltName' extension field of a certificate. The 'subject' field or the 'subjectAltName' extension field may contain a hierarchically structured distinguished name, an electronic mail address, If address, or other name forms that correspond to the subject. In this paper, we present the requirements for certificate holder's privacy protection and propose the methods to protect the user's privacy information contained in the 'subject' field or the 'subjectAltName' extension field of a public-key certificat

An Efficient Technique to Protect AES Secret Key from Scan Test Channel Attacks

  • Song, Jae-Hoon;Jung, Tae-Jin;Jung, Ji-Hun;Park, Sung-Ju
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.12 no.3
    • /
    • pp.286-292
    • /
    • 2012
  • Scan techniques are almost mandatorily adopted in designing current System-on-a-Chip (SoC) to enhance testability, but inadvertently secret keys can be stolen through the scan test channels of crypto SoCs. An efficient scan design technique is proposed in this paper to protect the secret key of an Advanced Encryption Standard (AES) core embedded in an SoC. A new instruction is added to IEEE 1149.1 boundary scan to use a fake key instead of user key, in which the fake key is chosen with meticulous care to improve the testability as well. Our approach can be implemented as user defined logic with conventional boundary scan design, hence no modification is necessary to any crypto IP core. Conformance to the IEEE 1149.1 standards is completely preserved while yielding better performance of area, power, and fault coverage with highly robust protection of the secret user key.

A New Key Protection Technique of AES Core against Scan-based Side Channel Attack (스캔 기반 사이드 채널 공격에 대한 새로운 AES 코아 키 보호 기술)

  • Song, Jae-Hoon;Jung, Tae-Jin;Park, Sung-Ju
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.1
    • /
    • pp.33-39
    • /
    • 2009
  • This paper presents a new secure scan design technique to protect secret key from scan-based side channel attack for an Advanced Encryption Standard(AES) core embedded on an System-on-a-Chip(SoC). Our proposed secure scan design technique can be applied to crypto IF core which is optimized for applications without the IP core modification. The IEEE1149.1 standard is kept, and low area and power consumption overheads and high fault coverage can be achieved compared to the existing methods.