• Title/Summary/Keyword: Lightweight network

Search Result 281, Processing Time 0.025 seconds

Traffic Flooding Attack Detection on SNMP MIB Using SVM (SVM을 이용한 SNMP MIB에서의 트래픽 폭주 공격 탐지)

  • Yu, Jae-Hak;Park, Jun-Sang;Lee, Han-Sung;Kim, Myung-Sup;Park, Dai-Hee
    • The KIPS Transactions:PartC
    • /
    • v.15C no.5
    • /
    • pp.351-358
    • /
    • 2008
  • Recently, as network flooding attacks such as DoS/DDoS and Internet Worm have posed devastating threats to network services, rapid detection and proper response mechanisms are the major concern for secure and reliable network services. However, most of the current Intrusion Detection Systems(IDSs) focus on detail analysis of packet data, which results in late detection and a high system burden to cope with high-speed network environment. In this paper we propose a lightweight and fast detection mechanism for traffic flooding attacks. Firstly, we use SNMP MIB statistical data gathered from SNMP agents, instead of raw packet data from network links. Secondly, we use a machine learning approach based on a Support Vector Machine(SVM) for attack classification. Using MIB and SVM, we achieved fast detection with high accuracy, the minimization of the system burden, and extendibility for system deployment. The proposed mechanism is constructed in a hierarchical structure, which first distinguishes attack traffic from normal traffic and then determines the type of attacks in detail. Using MIB data sets collected from real experiments involving a DDoS attack, we validate the possibility of our approaches. It is shown that network attacks are detected with high efficiency, and classified with low false alarms.

HFN-Based Right Management for IoT Health Data Sharing (IoT 헬스 데이터 공유를 위한 HFN 기반 권한 관리)

  • Kim, Mi-sun;Park, Yongsuk;Seo, Jae-Hyun
    • Smart Media Journal
    • /
    • v.10 no.1
    • /
    • pp.88-98
    • /
    • 2021
  • As blockchain technology has emerged as a security issue for IoT, technology which integrates block chain into IoT is being studied. In this paper is a research concerning token-based IoT service access control technology for data sharing, which propose a possessor focused data sharing technic by using the permissioned blockchain. To share IoT health data, a Hyperledger Fabric Network consisting of three organizations was designed to provide a way to share data by applying different access control policies centered on device owners for different services. In the proposed system, the device owner issues access control tokens with different security levels applied to the participants in the organization, and the token issue information is shared through the distributed ledger of the HFN. In IoT, it is possible to lightweight the access control processing of IoT devices by granting tokens to service requesters who request access to data. Furthmore, by sharing token issuance information among network participants using HFN, the integrity of the token is guaranteed and all network participants can trust the token. The device owners can trust that their data is being used within their authorized rights, and control the collection and use of data.

Design of Multi-Level Abnormal Detection System Suitable for Time-Series Data (시계열 데이터에 적합한 다단계 비정상 탐지 시스템 설계)

  • Chae, Moon-Chang;Lim, Hyeok;Kang, Namhi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.1-7
    • /
    • 2016
  • As new information and communication technologies evolve, security threats are also becoming increasingly intelligent and advanced. In this paper, we analyze the time series data continuously entered through a series of periods from the network device or lightweight IoT (Internet of Things) devices by using the statistical technique and propose a system to detect abnormal behaviors of the device or abnormality based on the analysis results. The proposed system performs the first level abnormal detection by using previously entered data set, thereafter performs the second level anomaly detection according to the trust bound configured by using stored time series data based on time attribute or group attribute. Multi-level analysis is able to improve reliability and to reduce false positives as well through a variety of decision data set.

Dielectric/Magnetic Nanowires Synthesized by the Electrospinning Method for Use as High Frequency Electromagnetic Wave Absorber

  • Jwa, Yong-Ho
    • Proceedings of the Materials Research Society of Korea Conference
    • /
    • 2009.11a
    • /
    • pp.14-14
    • /
    • 2009
  • High frequency electromagnetic(EM) waves are increasingly being applied in industries because of saturationat lower frequency bands as a result of huge demand. However, electromagneticinterference (EMI) has become a serious problem, and as a result, highfrequency EM absorbers are now being extensively studied. Also, recentdevelopments in absorber technology have focused on producing absorbers thatare thin, flexible, and strong. Hence, one-dimension ferrous nano-materials area potential research field, because of their interesting electronic andmagnetic properties. Commercially, EM wave absorbing products are made ofcomposites, which blend the insulating polymer with magnetic fillers. Inparticular, the shape of the magnetic fillers, such flaky, acicular, or fibrousmagnetic metal particles, rather than spherical, is essential for synthesizingthin and lightweight EM wave absorbers with higher permeability. High aspectratio materials exhibit a higher permeability value and therefore betterabsorption of the EM wave, because of electromagnetic anisotropy. Nanowires areusually fabricated by drawing, template synthesis, phase separation, selfassembly, and electrospinning with a thermal treatment and reduction process.Producing nanowires by the electrospinning method involves a conventionalsol-gel process that is simple, unique, and cost-effective. In thispresentation, Magnetic nanowire and dielectric materials coated magneticnanowire with a high aspect ratio were successfully synthesized by theelectrospinning process with heat treatment and reduction. In addition toestimating the EM wave absorption ability of the synthesized magnetic anddielectric materials coated magnetic nanowire with a network analyzer, weinvestigated the possibility of using these nanowires as high-frequency EM waveabsorbers. Furthermore, a wide variety of topics will be discussed such as thetransparent conducting nanowire and semiconducting nanowire/tube with theelectrospinning process.

  • PDF

The Model and Experiment for Heat Transfer Characteristics of Nanoporous Silica Aerogel

  • Mingliang, Zheng
    • Korean Journal of Materials Research
    • /
    • v.30 no.4
    • /
    • pp.155-159
    • /
    • 2020
  • Nanoporous silica aerogel insulation material is both lightweight and efficient; it has important value in the fields of aerospace, petrochemicals, electric metallurgy, shipbuilding, precision instruments, and so on. A theoretical calculation model and experimental measurement of equivalent thermal conductivity for nanoporous silica aerogel insulation material are introduced in this paper. The heat transfer characteristics and thermal insulation principle of aerogel nano are analyzed. The methods of SiO2 aerogel production are compared. The pressure range of SiO2 aerogel is 1Pa-atmospheric pressure; the temperature range is room temperature-900K. The pore diameter range of particle SiO2 aerogel is about 5 to 100 nm, and the average pore diameter range of about 20 ~ 40 nm. These results show that experimental measurements are in good agreement with theoretical calculation values. For nanoporous silica aerogel insulation material, the heat transfer calculation method suitable for nanotechnology can precisely calculate the equivalent thermal conductivity of aerogel nano insulation materials. The network structure is the reason why the thermal conductivity of the aerogel is very low. Heat transfer of materials is mainly realized by convection, radiation, and heat transfer. Therefore, the thermal conductivity of the heat transfer path in aerogel can be reduced by nanotechnology.

LoGos: Internet-Explorer-Based Malicious Webpage Detection

  • Kim, Sungjin;Kim, Sungkyu;Kim, Dohoon
    • ETRI Journal
    • /
    • v.39 no.3
    • /
    • pp.406-416
    • /
    • 2017
  • Malware propagated via the World Wide Web is one of the most dangerous tools in the realm of cyber-attacks. Its methodologies are effective, relatively easy to use, and are developing constantly in an unexpected manner. As a result, rapidly detecting malware propagation websites from a myriad of webpages is a difficult task. In this paper, we present LoGos, an automated high-interaction dynamic analyzer optimized for a browser-based Windows virtual machine environment. LoGos utilizes Internet Explorer injection and API hooks, and scrutinizes malicious behaviors such as new network connections, unused open ports, registry modifications, and file creation. Based on the obtained results, LoGos can determine the maliciousness level. This model forms a very lightweight system. Thus, it is approximately 10 to 18 times faster than systems proposed in previous work. In addition, it provides high detection rates that are equal to those of state-of-the-art tools. LoGos is a closed tool that can detect an extensive array of malicious webpages. We prove the efficiency and effectiveness of the tool by analyzing almost 0.36 M domains and 3.2 M webpages on a daily basis.

Cavitation Condition Monitoring of Butterfly Valve Using Support Vector Machine (SVM을 이용한 버터플라이 밸브의 캐비테이션 상태감시)

  • 황원우;고명환;양보석
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.14 no.2
    • /
    • pp.119-127
    • /
    • 2004
  • Butterfly valves are popularly used in service in the industrial and water works pipeline systems with large diameter because of its lightweight, simple structure and the rapidity of its manipulation. Sometimes cavitation can occur. resulting in noise, vibration and rapid deterioration of the valve trim, and do not allow further operation. Thus, the monitoring of cavitation is of economic interest and is very importance in industry. This paper proposes a condition monitoring scheme using statistical feature evaluation and support vector machine (SVM) to detect the cavitation conditions of butterfly valve which used as a flow control valve at the pumping stations. The stationary features of vibration signals are extracted from statistical moments. The SVMs are trained, and then classify normal and cavitation conditions of control valves. The SVMs with the reorganized feature vectors can distinguish the class of the untrained and untested data. The classification validity of this method is examined by various signals that are acquired from butterfly valves in the pumping stations and compared the classification success rate with those of self-organizing feature map neural network.

A Fast and Secure Method to Preserve Anonymity in Electronic Voting (전자투표에서 익명성 보장을 위한 빠르고 안전한 방식)

  • Yang, Hyung-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.245-251
    • /
    • 2014
  • Mix network plays a key role in electronic voting to preserve anonymity and lots of mixnet schemes have been proposed so far. However, they requires complex and costly zero-knowledge proofs to provide their correct mixing operations. In 2010, Seb$\acute{e}$ et al. proposed an efficient and lightweight mixnet scheme based on a cryptographic secure hash function instead of zero-knowledge proofs. In this paper, we present a more efficient and faster mixnet scheme than Seb$\acute{e}$ et al.'s scheme under the same assumption. Also, our scheme is secure.

Differential Fault Analysis on Lightweight Block Cipher LBlock (경량 블록 암호 LBlock에 대한 차분 오류 공격)

  • Jeong, Ki-Tae;Lee, Chang-Hoon
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.5
    • /
    • pp.871-878
    • /
    • 2012
  • LBlock is a 64-bit ultra-light block cipher suitable for the constrained environments such as wireless sensor network environments. In this paper, we propose a differential fault analysis on LBlock. Based on a random nibble fault model, our attack can recover the secret key of LBlock by using the exhaustive search of $2^{25}$ and five random nibble fault injection on average. It can be simulated on a general PC within a few seconds. This result is superior to known differential fault analytic result on LBlock.

Lightweight IP Traceback Mechanism (경량화된 IP 역추적 메커니즘)

  • Heo, Joon;Hong, Choong-Seon;Lee, Ho-Jae
    • The KIPS Transactions:PartC
    • /
    • v.14C no.1 s.111
    • /
    • pp.17-26
    • /
    • 2007
  • A serious problem to fight attacks through network is that attackers use incorrect or spoofed IP addresses in attack packets. Due to the stateless nature of the internet structure, it is a difficult problem to determine the source of these spoofed IP packets. While many IP traceback techniques have been proposed, they all have shortcomings that limit their usability in practice. In this paper we propose new IP marking techniques to solve the IP traceback problem. We have measured the performance of this mechanism and at the same time meeting the efficient marking for traceback and low system overhead.