• Title/Summary/Keyword: Port Scan

Search Result 53, Processing Time 0.02 seconds

An Improved Detection System for the Network Vulnerability Scan Attacks (네트워크 취약점 검색공격에 대한 개선된 탐지시스템)

  • You, Il-Sun;Cho, Kyung-San
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.543-550
    • /
    • 2001
  • In this paper, an improved detection system for the network vulnerability scan attacks is proposed. The proposed system improves the methodology for detecting the network vulnerability scan attacks and provides a global detection and response capability that can counter attacks occurring across an entire network enterprize. Through the simulation, we show that the proposed system can detect vulnerable port attacks, coordinated attacks, slow scans and slow coordinated attacks. We also show our system can achieve more global and hierarchical response to attacks through the correlation between server and agents than a stand-alone system can make.

  • PDF

Application of Side Scan Sonar to Disposed Material Analysis at the Bottom of Coastal Water and River (해저 및 하저 폐기물의 분석을 위한 양방향음파탐사기의 적용)

  • 안도경;이중우
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2002.11a
    • /
    • pp.147-153
    • /
    • 2002
  • Due to the growth of population and industrial development at the coastal cities, there has been much increase in necessity to effective control of the wastes into the coastal water and river. The amount of disposal at those waters has been increased rapidly and it is necessary for us to track of it in order to keep the water clean. The investigation and research related to the water quality in this region have been conducted continuously but the systematic survey of the disposed wastes at the bottom was neglected and/or minor. In this study we surveyed the status of disposed waste distribution at the bottom coastal water and river from the scanned images. The intensity of sound received by the side scan sonar tow vehicle from the sea floor provides information as to the general distribution and characteristics of the superficial wastes. The port and starboard side scanned images produced from a transducer borne on a tow fish connected by tow cable to a tug boat have the area with width of 22m∼112m, and band of 44m∼224m. All data are displayed in real-time on a high-resolution color display (1280 ${\times}$ 1024 pixels) together with position information by DGPS. From the field measurement and analysis of the recorded images, we could draw the location and distribution of bottom disposals. Furthermore, we made a database system which might be fundamental for planning the waste reception and process control system.

  • PDF

Phased Array Antenna Using Active Device

  • Seo, Chul-Hun
    • KIEE International Transactions on Electrophysics and Applications
    • /
    • v.4C no.6
    • /
    • pp.306-309
    • /
    • 2004
  • This paper presents a new active antenna consisting of a microstrip patch for the passive radiator, a mixer for frequency conversion, a voltage controlled oscillator (VCO) and a phase detector for phase control. The microwave signal frequency has been converted into intermediate frequency (IF) on the antenna elements by the mixer. The active antenna consists of two ports, the IF port has a transmitted IF signal via power combined to the baseband and the dc control port is under the control of the phase-detector. The input voltage of the VCO is controlled by the phase detector. The scan range of the array is determined by the phase detector and the VCO and is obtained between 30$^{\circ}$ and - 30$^{\circ}$

Implementation of Real Time Scan Detector System against Attacks of Applying on Port Scanning Techniques (Port Scanning 기법 기반의 공격을 탐지하기 위한 실시간 스캔 탐지 시스템 구현)

  • 송중석;권용진
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04a
    • /
    • pp.380-382
    • /
    • 2003
  • 현재 네트워크 보안 취약점을 자동으로 검색해주는 다양한 도구들이 인터넷에 공개되어 있어 이러한 도구들을 이용한 취약점 정보수집 및 네트워크 검색공격으로 비롯된 해킹사고가 크게 증가하고 있다. 이와 같은 검색 공격에 대한 탐지 시스템은 "False-Positive(실제 공격이 아닌데 공격이라고 탐지)"와 "False-Negative(실제 공격인데 공격이 아니라고 탐지)"를 줄이는 것이 중요하다. 그러나 현재 공개되어 있는 실시간 스캔 탐지 시스템은 오탐율이 높을 분만 아니라 다양한 스캔 기법에 대해서 탐지를 할 수 없는 것이 사실이다. 본 논문에서는 다양한 포트스캐닝 기법기반의 공격에 대해서 탐지 가능하고 오탐율을 최소화한 실시간 스캔 탐지 시스템을 구현한다.실시간 스캔 탐지 시스템을 구현한다.

  • PDF

The Implementation of Data Logging System by Using VME Modules based on Real Time Linux (RT-Linux를 OS로 하는 VME시스템을 이용한 Data Logging System 구현)

  • Hwang, Seok-Kyun;Koo, Kyung-Mo;Joo, Moon-G.;Lee, Jin-S.
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.709-712
    • /
    • 2003
  • In this research, we port the RT-Linux to MVME 5100 board which is driven by VxWorks or Vertex until now. And, we developed the data logging modules by using the RT-Linux. This module gathers two different scan timing data from plant and sends this data to the host controller with real time.

  • PDF

Development of Gate Operation System Based on Image Processing (영상처리에 기반한 게이트 운영시스템 개발)

  • 강대성;유영달
    • Journal of Korean Port Research
    • /
    • v.13 no.2
    • /
    • pp.303-312
    • /
    • 1999
  • The automated gate operating system is developed in this paper that controls the information of container at gate in the ACT. This system can be divided into three parts and consists of container identifier recognition car plate recognition container deformation perception. We linked each system and organized efficient gate operating system. To recognize container identifier the preprocess using LSPRD(Line Scan Proper Region Detection)is performed and the identifier is recognized by using neural network MBP When car plate is recognized only car image is extracted by using color information of car and hough transform. In the port of container deformation perception firstly background is removed by using moving window. Secondly edge is detected from the image removed characters on the surface of container deformation perception firstly background is removed by using moving window. Secondly edge is detected from the image removed characters on the surface of container. Thirdly edge is fitted into line segment so that container deformation is perceived. As a results of the experiment with this algorithm superior rate of identifier recognition is shown and the car plate recognition system and container deformation perception that are applied in real-time are developed.

  • PDF

An active intrusion-confronting method using fake session and Honeypot (거짓 세션과 허니팟을 이용한 능동적 침입 대응 기법)

  • 이명섭;신경철;박창현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7C
    • /
    • pp.971-984
    • /
    • 2004
  • In the coming age of information warfare, information security patterns need to be changed such as to the active approach using offensive security mechanisms rather than traditional passive approach just protecting the intrusions. In an active security environment, it is essential that, when detecting an intrusion, the immediate confrontation such as analysing the intrusion situation in realtime, protecting information from the attacks, and even tracing the intruder. This paper presents an active intrusion-confronting system using a fake session and a honeypot. Through the fake session, the attacks like Dos(Denial of Service) and port scan can be intercepted. By monitoring honeypot system, in which the intruders are migrated from the protected system and an intrusion rule manager is being activated, new intrusion rules are created and activated for confronting the next intrusions.

Radiotherapy Treatment Planning with Computed Tomography in Malignant Tumors of the Chest-Comparison of various techniques (흉부악성종양(胸部惡性腫瘍)의 방사선치료계획(放射線治療計劃)에 있어서 전산화단층촬영(電算花斷層撮影)의 이용(利用)에 관한 연구(硏究))

  • Lee, Joo Hyuk;Koh, Kyoung Hwan;Ha, Sung Whan;Han, Man Chung
    • Radiation Oncology Journal
    • /
    • v.1 no.1
    • /
    • pp.55-60
    • /
    • 1983
  • To evaluate the usefulness of computed tomography (CT) in radiotherapy treatment planning in malignant tumors of thoracic cage, the computer generated dose distributions were compared between plans based on conventional studies and those based on CT scan. 22 cases of thoracic malignancies, 15 lung cancers and 7 esophageal cancers, diagnosed and treated in Department of Therapeutic Radiology of Seoul National University Hospital from September, 1982 to April, 1983, were analyzed. In lung cancers, dose distribution in plans using AP, PA parallel opposing ports with posterior spinal cord block and in plans using box technique both based on conventional studies were compared with dose distribution using AP, PA and two oblique ports based on CT scan. In esophageal cancers, dose distribution in plans based on conventional studies and those based on CT scans, both using 3 port technique were compared. The results are as follows: 1. Parallel opposing field technique were inadequate in all cases of lung cancers, as portion of primary tumor in 13 of 15 cases and portion of mediastinum in all were out of high dose volume. 2. Box technique was inadequate in 5 of 15 lung cancers as portion of primary tumor was not covered and in every case the irradiated normal lung volume was quite large. 3. Plans based on CT scan were superior to those based on conventional studies as tumor was demarcated better with CT and so complete coverage of tumor and preservation of more normal lung volume could be made. 4. In 1 case of lung cancer, tumor localization was nearly impossible with conventional studies, but after CT scan tumor was more clearly defined and localized. 5. In 1 of 7 esophageal cancers, the radiation volume should be increased for marginal coverage after CT scan. 6. Depth dose correction for tissue inhomogeneity is possible with CT, and exact tumor dose can be calculated. As a result radiotherapy treatment planning based on CT scan has a pteat advantage over that based on conventional studies.

  • PDF

A Electron-Transfer Study on Self-Assembled Viologen Monolayer In different Electrolytes Using Electrochemical Process (전기화학법을 이용한 전해질 변화에 따른 Viologen 자기조립박막의 전하이동 특성 연구)

  • Lee, Dong-Yun;Park, Sang-Hyun;Shin, Hoon-Kyu;Park, Jae-Chul;Chang, Jeong-Soo;Kwon, Young-Soo
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2004.07b
    • /
    • pp.878-881
    • /
    • 2004
  • When it converted solar energy or light energy into chemical energy, it studied the electric charge transfer property of the viologen which is used widely as the electron acceptor for the electric charge delivery mediation of the devices. It was formed monolayer in QCM by self-assembled viologen. The absorbed quantities of viologen's electron through peak current and to analyze the electron transfer property of viologen in redox reaction made experiments in cyclic voltammetry among the electrochemical process. It studied the electron transfer relation of viologen from changing the anion in 0.1M NaCl and $NaClO_4$ electrolyte and the interrelation between scan rate and peak current when scan rate increased twice.

  • PDF

Scan Modeling and Performance Analysis for Extensive Terminal Information Identification (광범위한 단말 정보 식별을 위한 스캔 모델링 및 성능 분석)

  • Im, Sun-young;Shin, Seung-hun;Roh, Byeong-hee;Lee, Jung-tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.4
    • /
    • pp.785-790
    • /
    • 2017
  • Network scanning tools typically use port scans to steal information from network terminals and identify vulnerabilities. In particular, Shodan and Censys use a network scanning tool to gather a wide range of terminal information, store it in their database and provide it to the users. In order to prevent such information gathering, it is required to know the scanning methods of Shodan and Censys. However, the scanning model used by Shodan and Censys is not known exactly. Therefore, this paper estimates scanning models of Shodan and Censys and analyzes the performance of each models.