• Title/Summary/Keyword: Network Scan

Search Result 138, Processing Time 0.024 seconds

A Method for Quantifying the Risk of Network Port Scan (네트워크 포트스캔의 위험에 대한 정량화 방법)

  • Park, Seongchul;Kim, Juntae
    • Journal of the Korea Society for Simulation
    • /
    • v.21 no.4
    • /
    • pp.91-102
    • /
    • 2012
  • Network port scan attack is the method for finding ports opening in a local network. Most existing IDSs(intrusion detection system) record the number of packets sent to a system per unit time. If port scan count from a source IP address is higher than certain threshold, it is regarded as a port scan attack. The degree of risk about source IP address performing network port scan attack depends on attack count recorded by IDS. However, the measurement of risk based on the attack count may reduce port scan detection rates due to the increased false negative for slow port scan. This paper proposes a method of summarizing 4 types of information to differentiate network port scan attack more precisely and comprehensively. To integrate the riskiness, we present a risk index that quantifies the risk of port scan attack by using PCA. The proposed detection method using risk index shows superior performance than Snort for the detection of network port scan.

Determination of Process Parameters in Stereolithography using Neural Network (신경망을 이용한 광조형 작업변수 결정)

  • Lee, Eun-Deok;Sim, Jae-Hyeong;Baek, In-Hwan
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.19 no.10
    • /
    • pp.147-155
    • /
    • 2002
  • In the stereolithography process, the accuracy of product depends on laser power, scan speed, scan width, scan pattern, layer thickness, resin characteristics and so on. Therefore, appropriate process parameters are required for an accurate prototype. This paper presents a method to determine the key process parameters, i.e., laser scan speed, hatching space, and layer thickness based on scan length, scan area, and layer slope. In order to determine these parameters, three neural networks are employed to represent operator’s experience and knowledge. Optimum values on scan speed, hatching space and layer thickness are recommended to improve the surface roughness and build time on the developed SLA machine.

Power Efficient Network Scanning Algorithm Based on IEEE 802.11k-Measurement Pilot (IEEE 802.11k-Measurement Pilot을 활용한 저전력 네트워크 스캐닝 알고리즘)

  • Lee, Hyung Kyu;Kim, Hwangnam;Kim, Hyunsoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.6
    • /
    • pp.482-489
    • /
    • 2014
  • This paper suggests the new network scanning algorithm that makes use of measurement pilot of IEEE 802.11k. The purpose of suggesting this algorithm is to improve the existing network scanning schemes. After introducing new algorithm, this paper shows the difference of time property and energy property between former scanning schemes and new scheme with simulation results. Passive scan has a merit of low-power consumption but it takes too long time to fulfill whole scanning. On the contrary, an advantage of active scan is speed but it consumes more battery power than passive scan. By using measurement pilot's smaller interval than beacon interval, the suggested algorithm can consume less power than active scan does, and also make shorter scanning delay than passive scan does.

Determination of Process Parameters in Stereo lithography Using Neural Network

  • Lee, Eun-Dok;Sim, Jae-Hyung;Kweon, Hyeog-Jun;Paik, In-Hwan
    • Journal of Mechanical Science and Technology
    • /
    • v.18 no.3
    • /
    • pp.443-452
    • /
    • 2004
  • For stereo lithography process, accuracy of prototypes is related to laser power, scan speed, scan width, scan pattern, layer thickness, resin characteristics and etc. An accurate prototype is obtained by using appropriate process parameters. In order to determine these parameters, the stereolithography (SLA) machine using neural network was developed and efficiency of the developed SLA machine was compared with that of the traditional SLA. Optimum values for scan speed, hatching spacing and layer thickness improved the surface roughness and build time for the developed SLA.

Low Power Testing in NoC(Network-on-Chip) using test pattern reconfiguration (테스트 패턴 재구성을 이용한 NoC(Network-on-Chip)의 저전력 테스트)

  • Jung, Jun-Mo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.2
    • /
    • pp.201-206
    • /
    • 2007
  • In this paper, we propose the efficient low power test methodology of NoC(Network-on chip) for the test of core-based systems that use this platform. To reduce the power consumption of transferring data through router channel, the scan vectors are partitioned into flits by channel width. The don't cares in unspecified scan vectors are mapped to binary values to minimize the switching rate between flits. Experimental results for full-scanned versions of ISCAS 89 benchmark circuits show that the proposed method leads to about 35% reduction in test power.

  • PDF

Implementation and Design of Port Scan Detecting System Detecting Abnormal Connection Attempts (비정상 연결시도를 탐지한 포트 스캔 탐지 시스템의 설계 및 구현)

  • Ra, Yong-Hwan;Cheon, Eun-Hong
    • Convergence Security Journal
    • /
    • v.7 no.1
    • /
    • pp.63-75
    • /
    • 2007
  • Most of computer systems to be connected to network have been exposed to some network attacks and became to targets of system attack. System managers have established the IDS to prevent the system attacks over network. The previous IDS have decided intrusions detecting the requested connection packets more than critical values in order to detect attacks. This techniques have False Positive possibilities and have difficulties to detect the slow scan increasing the time between sending scan probes and the coordinated scan originating from multiple hosts. We propose the port scan detection rules detecting the RST/ACK flag packets to request some abnormal connections and design the data structures capturing some of packets. This proposed system is decreased a False Positive possibility and can detect the slow scan, because a few data can be maintained for long times. This system can also detect the coordinated scan effectively detecting the RST/ACK flag packets to be occurred the target system.

  • PDF

An Improved Detection System for the Network Vulnerability Scan Attacks (네트워크 취약점 검색공격에 대한 개선된 탐지시스템)

  • You, Il-Sun;Cho, Kyung-San
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.543-550
    • /
    • 2001
  • In this paper, an improved detection system for the network vulnerability scan attacks is proposed. The proposed system improves the methodology for detecting the network vulnerability scan attacks and provides a global detection and response capability that can counter attacks occurring across an entire network enterprize. Through the simulation, we show that the proposed system can detect vulnerable port attacks, coordinated attacks, slow scans and slow coordinated attacks. We also show our system can achieve more global and hierarchical response to attacks through the correlation between server and agents than a stand-alone system can make.

  • PDF

A Secure Communication Framework for the Detection System of Network Vulnerability Scan Attacks (네트워크 취약점 검색공격 탐지 시스템을 위한 안전한 통신 프레임워크 설계)

  • You, Il-Sun;Kim, Jong-Eun;Cho, Kyung-San
    • The KIPS Transactions:PartC
    • /
    • v.10C no.1
    • /
    • pp.1-10
    • /
    • 2003
  • In this paper, we propose a secure communication framework for interaction and information sharing between a server and agents in DS-NVSA(Detection System of Network Vulnerability Scan Attacks) proposed in〔1〕. For the scalability and interoperability with other detection systems, we design the proposed IDMEF and IAP that have been drafted by IDWG. We adapt IDMEF and IAP to the proposed framework and provide SKTLS(Symmetric Key based Transport Layer Security Protocol) for the network environment that cannot afford to support public-key infrastructure. Our framework provides the reusability of heterogeneous intrusion detection systems and enables the scope of intrusion detection to be extended. Also it can be used as a framework for ESM(Enterprise Security Management) system.

Performance testing of a FastScan whole body counter using an artificial neural network

  • Cho, Moonhyung;Weon, Yuho;Jung, Taekmin
    • Nuclear Engineering and Technology
    • /
    • v.54 no.8
    • /
    • pp.3043-3050
    • /
    • 2022
  • In Korea, all nuclear power plants (NPPs) participate in annual performance tests including in vivo measurements using the FastScan, a stand type whole body counter (WBC), manufactured by Canberra. In 2018, all Korean NPPs satisfied the testing criterion, the root mean square error (RMSE) ≤ 0.25, for the whole body configuration, but three NPPs which participated in an additional lung configuration test in the fission and activation product category did not meet the criterion. Due to the low resolution of the FastScan NaI(Tl) detectors, the conventional peak analysis (PA) method of the FastScan did not show sufficient performance to meet the criterion in the presence of interfering radioisotopes (RIs), 134Cs and 137Cs. In this study, we developed an artificial neural network (ANN) to improve the performance of the FastScan in the lung configuration. All of the RMSE values derived by the ANN satisfied the criterion, even though the photopeaks of 134Cs and 137Cs interfered with those of the analytes or the analyte photopeaks were located in a low-energy region below 300 keV. Since the ANN performed better than the PA method, it would be expected to be a promising approach to improve the accuracy and precision of in vivo FastScan measurement for the lung configuration.

The application of convolutional neural networks for automatic detection of underwater object in side scan sonar images (사이드 스캔 소나 영상에서 수중물체 자동 탐지를 위한 컨볼루션 신경망 기법 적용)

  • Kim, Jungmoon;Choi, Jee Woong;Kwon, Hyuckjong;Oh, Raegeun;Son, Su-Uk
    • The Journal of the Acoustical Society of Korea
    • /
    • v.37 no.2
    • /
    • pp.118-128
    • /
    • 2018
  • In this paper, we have studied how to search an underwater object by learning the image generated by the side scan sonar in the convolution neural network. In the method of human side analysis of the side scan image or the image, the convolution neural network algorithm can enhance the efficiency of the analysis. The image data of the side scan sonar used in the experiment is the public data of NSWC (Naval Surface Warfare Center) and consists of four kinds of synthetic underwater objects. The convolutional neural network algorithm is based on Faster R-CNN (Region based Convolutional Neural Networks) learning based on region of interest and the details of the neural network are self-organized to fit the data we have. The results of the study were compared with a precision-recall curve, and we investigated the applicability of underwater object detection in convolution neural networks by examining the effect of change of region of interest assigned to sonar image data on detection performance.