• Title/Summary/Keyword: Instrusion

Search Result 8, Processing Time 0.022 seconds

A Genetic Algorithm-Based Intrusion Detection System

  • Lee, Han H.;Lee, Duk;Kim, Hee S.;Park, Jong U.
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2000.04a
    • /
    • pp.343-346
    • /
    • 2000
  • In this paper, a novel approach to intruder detection is introduced. The approach, based on the genetic algorithms, improved detection rate of the host systems which has traditionally relied on known intruder patterns and host addresses. Rather than making judgments on whether the access is instrusion or not, the systems can continuously monitor systems with categorized security level. With the categorization, when the intruder attempts repeatedly to access the systems, the security level is incrementally escalated. In the simulation of a simple intrusion, it was shown that the current approach improves robustness of the security systems by enhancing detection and flexibility. The evolutionary approach to intruder detection enhances adaptability of the system.

  • PDF

A study on the mechanical properties of Bi-(Pb)-Sr-Ca-Cu-O superconductor tape (Bi-(Pb)-Sr-Ca-O 초전도 선재의 기계적 특성에 관한 연구)

  • 김중석;지봉기;김정호;박형상;임준형;주진호;나완수
    • Proceedings of the Korea Institute of Applied Superconductivity and Cryogenics Conference
    • /
    • 2000.02a
    • /
    • pp.6-8
    • /
    • 2000
  • The critical current density, Jc, of superconductor tape significantly depends on microstructural evolution during mechanical deformation. In this study, we fabricated Bi-2223 superconductor tape by PIT technique, and investigated mechanical properties of mono- and 61-filamentary tapes and their joined tapes. The strength of mono-filament tape was higher than those of 61-filament tape was higher than those of 61-filament tape, respectively. On the other hand, elongation of mono-filament tape, respectively. On the other hand, elongation of mono-filament tape was lower than 61 filament tape. The joined tapes shows lower strength and irreversible strain than those of unjoined tapes. The reduced strength and irreversible strain for joined tape is probably related to the induced damages such as irregular interface and Ag-instrusion in the transition region which acts as a stress concentration.

  • PDF

Design and Implementation of the Intrusion Detection Data Web-based Management System on Heterogeneous Environments (이기종간 침입탐지 정보에 대한 웹기반 관리 시스템 설계)

  • Kim, Eun-Soo;Kim, Seok-Hun;Song, Jung-Gil
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.65-74
    • /
    • 2005
  • The hacking accident is increasing repidly according to development of latest computer network and the method becomes various. But, to correspond to hacking, it is lot of difficulties to cope gear and security element between product because most radiant mercuries apply technology between individual digenomic species and It is real condition that great setup, equipment, manpower disturbance are enlarged to apply this. Designed and embody Site-Based executive system that can integrate security element about IDS information between digenomic species to solve these problem and correspond efficiently from hacking.

  • PDF

Ash-Flow Tuffs of the Chisulryoung Volcanic Formation and Associated Welded Tuff Instrusion, Weolseong District, Southern Korea (월성(月城) 남부(南部) 치술령 지역(地域)의 화산암(火山岩))

  • Park, Ki Hwa;Kim, Seon Eok
    • Economic and Environmental Geology
    • /
    • v.18 no.2
    • /
    • pp.125-134
    • /
    • 1985
  • The Chisulryoung Volcanic Formation comprises a thick sequence of pyroclastic flow deposits. Six members are distinguished, each representing separate flow units, comprising weakly to intensely welded acidic tuffs. A stock of welded acidic tuff, 1 km in diameter, intrudes hornblende granodiorite and sediments of Late Cretaceous age and the lower part of the Chisulryoung Volcanic Tuff Formation and may represent the vent through which the upper flows of the Chisulryoug Volcanic Formation were erupted.

  • PDF

Nursing Considerations on Korean Shamanism (한국적 샤머니즘의 간호학적 고찰)

  • Kim, Ae-Ri
    • The Korean Nurse
    • /
    • v.33 no.4
    • /
    • pp.86-98
    • /
    • 1994
  • We have examined the development and conceptual definition of shamanism and divination through significant characteristics of various illnesses. However, the terrminology has been inconsistent and its real conceptual meaning is not well defined. Divination is a historically dominant religious practice which represents the core of Korean folk culture. Despite prevalent prejudice toward its primitive nature, we cannot deny its profound relationship to our unconscious, especially our reliance on its religious role whenever we face crisis or conflict. It is therefore appropriate to use the term divination in this context. Shamanism originated as humanity's oldest mode of communication with divine - a religion, The shaman is not a sorceress but a priestess, a healer, a spritual guide, a leader, a mystic, traditionally having a different significance from that of the contemporary diviner or "shaman". The traditional concept of illness has been profoundly altered to serve new functions: while the shamanistic view is based upon spiritual abduction, divination on the other hand invokes concepts of spiritual invasion phenomena such as spirit intrusion, taboo violations, soul loss, object instrusion, deviations from the appropriate spiritual path besiegement, and curess or predestination (the idea that the sufferer is born with his fate), We should therefore try to understand divination from a more holistic point of view, rather than attempting to fit it into the standrd medical illness. We must recognize divination as a phenomenon within our culture, since most people have a mixed conception of illness arising from a combination of divinational and modem concepts, Since divination's humanistic approach is ingrained in our people, to irresponsibly ignore the spiritual aspects of treatment would exert a negative influence on our culture, Especially now, while attraction is focused on Korean culture and its influence on every aspect of our livies, it is important for nurses to expand our horizons in order to create a way of nursing more suitable to Korean culture. Increased importance is now being given to the opinions of patients themselves about their own illness and health, so nurses should seek to understand how patients accept their illness and what particular kinds of help they expect to receive. Consequently, an understanding of traditional divinations will enable us to utilize these characteristics on the job in order to enhance nursing care.

  • PDF

The Design and Implementation of Network Intrusion Detection System Hardware on FPGA (FPGA 기반 네트워크 침입탐지 시스템 하드웨어 설계 및 구현)

  • Kim, Taek-Hun;Yun, Sang-Kyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.4
    • /
    • pp.11-18
    • /
    • 2012
  • Deep packet inspection which perform pattern matching to search for malicious patterns in the packet is most computationally intensive task. Hardware-based pattern matching is required for real-time packet inspection in high-speed network. In this paper, we have designed and implemented network intrusion detection hardware as a Microblaze-based SoC using Virtex-6 FPGA, which capture the network input packet, perform hardware-based pattern matching for patterns in the Snort rule, and provide the matching result to the software. We verify the operation of the implemented system using traffic generator and real network traffic. The implemented hardware can be used in network intrusion detection system operated in wire-speed.

Implementation of Ontology-based Service by Exploiting Massive Crime Investigation Records: Focusing on Intrusion Theft (대규모 범죄 수사기록을 활용한 온톨로지 기반 서비스 구현 - 침입 절도 범죄 분야를 중심으로 -)

  • Ko, Gun-Woo;Kim, Seon-Wu;Park, Sung-Jin;No, Yoon-Joo;Choi, Sung-Pil
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.53 no.1
    • /
    • pp.57-81
    • /
    • 2019
  • An ontology is a complex structure dictionary that defines the relationship between terms and terms related to specific knowledge in a particular field. There have been attempts to construct various ontologies in Korea and abroad, but there has not been a case in which a large scale crime investigation record is constructed as an ontology and a service is implemented through the ontology. Therefore, this paper describes the process of constructing an ontology based on information extracted from instrusion theft field of unstructured data, a crime investigation document, and implementing an ontology-based search service and a crime spot recommendation service. In order to understand the performance of the search service, we have tested Top-K accuracy measurement, which is one of the accuracy measurement methods for event search, and obtained a maximum accuracy of 93.52% for the experimental data set. In addition, we have obtained a suitable clue field combination for the entire experimental data set, and we can calibrate the field location information in the database with the performance of F1-measure 76.19% Respectively.

X-tree Diff: An Efficient Change Detection Algorithm for Tree-structured Data (X-tree Diff: 트리 기반 데이터를 위한 효율적인 변화 탐지 알고리즘)

  • Lee, Suk-Kyoon;Kim, Dong-Ah
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.683-694
    • /
    • 2003
  • We present X-tree Diff, a change detection algorithm for tree-structured data. Our work is motivated by need to monitor massive volume of web documents and detect suspicious changes, called defacement attack on web sites. From this context, our algorithm should be very efficient in speed and use of memory space. X-tree Diff uses a special ordered labeled tree, X-tree, to represent XML/HTML documents. X-tree nodes have a special field, tMD, which stores a 128-bit hash value representing the structure and data of subtrees, so match identical subtrees form the old and new versions. During this process, X-tree Diff uses the Rule of Delaying Ambiguous Matchings, implying that it perform exact matching where a node in the old version has one-to one corrspondence with the corresponding node in the new, by delaying all the others. It drastically reduces the possibility of wrong matchings. X-tree Diff propagates such exact matchings upwards in Step 2, and obtain more matchings downwsards from roots in Step 3. In step 4, nodes to ve inserted or deleted are decided, We aldo show thst X-tree Diff runs on O(n), woere n is the number of noses in X-trees, in worst case as well as in average case, This result is even better than that of BULD Diff algorithm, which is O(n log(n)) in worst case, We experimented X-tree Diff on reat data, which are about 11,000 home pages from about 20 wev sites, instead of synthetic documets manipulated for experimented for ex[erimentation. Currently, X-treeDiff algorithm is being used in a commeercial hacking detection system, called the WIDS(Web-Document Intrusion Detection System), which is to find changes occured in registered websites, and report suspicious changes to users.