• Title/Summary/Keyword: Protect

Search Result 7,530, Processing Time 0.028 seconds

Utilizing OpenFlow and sFlow to Detect and Mitigate SYN Flooding Attack

  • Nugraha, Muhammad;Paramita, Isyana;Musa, Ardiansyah;Choi, Deokjai;Cho, Buseung
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.8
    • /
    • pp.988-994
    • /
    • 2014
  • Software Defined Network (SDN) is a new technology in computer network area which enables user to centralize control plane. The security issue is important in computer network to protect system from attackers. SYN flooding attack is one of Distributed Denial of Service attack methods which are popular to degrade availability of targeted service on Internet. There are many methods to protect system from attackers, i.e. firewall and IDS. Even though firewall is designed to protect network system, but it cannot mitigate DDoS attack well because it is not designed to do so. To improve performance of DDOS mitigation we utilize another mechanism by using SDN technology such as OpenFlow and sFlow. The methodology of sFlow to detect attacker is by capturing and sum cumulative traffic from each agent to send to sFlow collector to analyze. When sFlow collector detect some traffics as attacker, OpenFlow controller will modify the rule in OpenFlow table to mitigate attacks by blocking attack traffic. Hence, by combining sum cumulative traffic use sFlow and blocking traffic use OpenFlow we can detect and mitigate SYN flooding attack quickly and cheaply.

Behavior for Protecting Patient Medical Record of Physical Therapists (물리치료사의 환자 의료정보 보호 실천행위)

  • Lee, I.H.;Park, H.J.;Shin, A.M.;Son, C.S.;Kim, Y.N.
    • Journal of rehabilitation welfare engineering & assistive technology
    • /
    • v.3 no.1
    • /
    • pp.15-20
    • /
    • 2009
  • The purpose of this study was to investigate behavior to protect medical record among physical therapists(PTs). This study conducted a survey through the self-written questionnaires from 69 clinical PTs to understanding to protect patient' medical record. The result indicated that the behavior of PTs was not average 1, but the older PTs and healthier PTs, more protective patient's medical record(p<.01). The revision of PTs' behavior attitude and intention subjective was helpful to improve their behavior to protect patent's medical record.

  • PDF

A Study on Hidden Node Margin to Protect DTV Service in Korea (국내 DTV 서비스 보호를 위한 은닉 노드 마진 연구)

  • Kang, Kyu-Min;Cho, Sang-In;Jeong, Byung-Jang
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.22 no.12
    • /
    • pp.1165-1171
    • /
    • 2011
  • In this paper, we investigate hidden node problem to effectively utilize TV band devices(TVBDs) in the TV white space(TVWS), and also to protect digital television(DTV) service in Korea. Firstly, we classify the radio propagation environment into an urban area, a basin area, and a coastal area based on geographical characteristics. Thereafter, we measure and analyze local shape based hidden node attenuation at eight segmented positions in each geographic area. Because commercial buildings as well as residential and commercial buildings in Korea are located in closer proximity to each other than in other countries, hidden node margin should be more than 38 dB in order to safely protect DTV service in Korea.

Design of Efficient Hacking Prevention Systems Using a Smart Card (스마트카드 기반의 효율적인 해킹 방지 시스템 설계)

  • 황선태;박종선
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.2
    • /
    • pp.179-190
    • /
    • 2004
  • This paper describes the design of hacking prevention systems using a smart card. It consists of two parts, i.e., PC authentication and Keyboard-buffer hacking prevention. PC authentication function is a procedure to handle the access control to the target PC. The card's serial number is used for PIN(Personal Identification Number) and is converted into hash-code by SHA-1 hash-function to verify the valid users. The Keyboard-buffer hacking prevention function converts the scan codes into the encoded forms using RSA algorithm on the Java Card, and puts them into the keyboard-buffer to protect from illegal hacking. The encoded information in the buffer is again decoded by the RSA algorithm and displayed on the screen. in this paper, we use RSA_PKCS#1 algorithm for encoding and decoding. The reason using RSA technique instead of DES or Triple-DES is for the expansion to multi-functions in the future on PKI. Moreover, in the ubiquitous computing environment, this smart card security system can be used to protect the private information from the illegal attack in any computing device anywhere. Therefore, our security system can protect PC user's information more efficiently and guarantee a legal PC access authority against any illegal attack in a very convenient way.

  • PDF

Seismic Performance Evaluation of System to Protect the Occurrence of Weak-Story With Braced Frame (중심 가새 골조에 형성되는 연약층을 방지하기 위한 시스템의 내진 성능 평가)

  • Kim, Da-Young;Yoo, Jung-Han
    • Journal of Korean Association for Spatial Structures
    • /
    • v.19 no.4
    • /
    • pp.45-52
    • /
    • 2019
  • The purpose of the paper is to introduce a system that reduces the occurrence of weak-story in the event of earthquake. Weak-story concentrates deformation on the story and causes all member to collapse before the capacity of all member is reached. This paper introduces Strong-Back system (SB) to protect weak story. SB is a hybrid of zipper frame, tied eccentrically braced frame, and elastic truss system and it is divided into elastic and inelastic areas. Elastic areas prevent the generation of weak story by distributing energy, and inelastic areas dissipate energy through buckling or yielding. In this paper, the seismic performance is evaluated by comparing the four type braced frame with SB through push-over analysis. The four criteria are compared from the base shear, the ductility capacity, the column failure order, and the quantity of brace. As a result, SB proved to have sufficient performance to protect the weak-story.

The Effects of Surface Porfiles and Coatings on the Tribological Behaviors of the Surfaces of Piston Skirt (피스톤 스커트 표면의 트라이볼로지 거동에 미치는 표면형상과 코팅의 영향)

  • Cho, Dae-Hyun;Chung, Soon-Oh;Won, Young-Duck;Han, Man-Cheol;Lee, Young-Ze
    • Tribology and Lubricants
    • /
    • v.24 no.3
    • /
    • pp.122-128
    • /
    • 2008
  • To reduce the friction losses and the wear amounts in the piston assembly two methods were proposed. One is the modification of surface profile of the skirt part. The surface coating is another method to protect the sliding surfaces. To modify the profile of the skirt surfaces the surfaces were ground to have three different shapes of profiles. Also, several coatings, such as graphite, TiN, and $MoS_2$, and DLC, were used to protect the surfaces of the piston skirts. The specimens of the skirt and the cylinder bores were tested with the reciprocating wear tester. SAE 5W40 engine oil was used in boundary lubrication regime. Among several coatings the graphite and DLC coatings were very effective to reduce the friction forces. Especially, DLC film represented much better tribological performances than the others. The friction coefficient of the graphite coating was the lowest, but the graphite coating was not effective to protect the surfaces.

Content-based Video Retrieval for Illegal Copying Contents Detection using Hashing (Hashing을 이용한 불법 복제 콘텐츠 검출을 위한 내용 기반 영상 검색)

  • Son, Heusu;Byun, Sung-Woo;Lee, Soek-Pil
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.67 no.10
    • /
    • pp.1358-1363
    • /
    • 2018
  • As the usage of the Internet grows and digital media become more diversified, it has become much easier for digital contents to be distributed and shared. This makes easier to access the desired digital contents. On the other hand, there is an increasing need to protect the copyright of digital works. There are some prevalent ways to protect ownership, but they accompany several disadvantages. Among those ways, watermarking methods have the advantage of ensuring invisibility, but they also have a disadvantage that they are vulnerable to external attacks such as a noise and signal processing. In this paper, we propose the detecting method of illegal contents that is robust against external attacks to protect digital works. We extract HSV and LBP features from images and use Euclidian-based hashing techniques to shorten the searching time on high-dimensional and near-duplicate videos. According to the results, the proposed method showed higher detection rates than that of the Watermarking techniques in terms of the images with fabrications or deformations.

Fingerprint Template Protection using Fuzzy Vault

  • Moon Dae-Sung;Lee Sung-Ju;Jung Seung-Hwan;Chung Yong-Wha;Moon Ki-Young
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.123-132
    • /
    • 2006
  • Biometric-based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as the compromise of the data will be permanent. To protect the biometric data, we need to store it in a non-invertible transformed version. Thus, even if the transformed version is compromised, the actual biometric data remains safe. In this paper, we propose an approach to protect finger-print templates by using the idea of the fuzzy vault. Fuzzy vault is a recently developed cryptographic construct to secure critical data with the fingerprint data in a way that only the authorized user can access the secret by providing the valid fingerprint. We modify the fuzzy vault to protect fingerprint templates and to perform fingerprint verification with the protected template at the same time. This is challenging because the fingerprint verification is performed in the domain of the protected form. Based on the experimental results, we confirm that the proposed approach can perform the fingerprint verification with the protected template.

  • PDF

A Study on the Minimum Protection of Investor in International Contract (국제계약에서 투자가보호를 위한 최소보호요건에 관한 연구)

  • Kim, Jae Seong
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.58
    • /
    • pp.313-328
    • /
    • 2013
  • Today FTA extends over the world and Korea as a main member of international trade is no exception. In the past Korea, as the developing countries, has made endlessly effort to induce foreign investment from foreign enterprise and/or government to be a truly OECD countries today and made it. Korea's trade economy was reached 1 trillion dollars in 2012. Now we have to find a new way to produce, process, procure goods from foreign investment and also need to protect our profit and/or rights within foreign judicial territory. There are two method to protect foreign enterprise or government. First they rely on general principles in WTO or Bilateral Investment Treaty that the principle of equality, national treatment, and most-favored-nation treatment, you can create a predictable environment to protect foreign enterprise and/or government. Second they need to incorporate contractual clauses in their agreement such as stabilization clause, force majeure, arbitration, governing law or sovereign immunity. Of course there are many things left behind to consider I hope it will be helpful to those who prepare foreign investment contract.

  • PDF

Digital Watermarking of 2D Vector Map Data for the Accuracy and Topology of the Data (벡터 맵 데이터의 정확성과 위상을 고려한 디지털 워터마킹)

  • Kim, Junh-Yeop;Park, Soo-Hong
    • Spatial Information Research
    • /
    • v.17 no.1
    • /
    • pp.51-66
    • /
    • 2009
  • There have been concerned about the copyright as numerous data are digitalized because of the growth of performance of the computer and Internet. Digital watermarking is one of strong methods to protect copyright. We proposed a novel digital watermarking for vector map data. Although vector map data are used widely in GIS, there is little interest in copyright. The proposed method is to embed and extract watermarks using CRC principle. The experimental results show that this method can protect the copyright of the vector map by extracting embedded watermarks. Therefore, the proposed method can be utilized as the technique to protect vector map data.

  • PDF