• Title/Summary/Keyword: ShellCode

Search Result 153, Processing Time 0.027 seconds

Detecting ShellCode Using Entropy (엔트로피를 이용한 ShellCode 탐지 방법)

  • Kim, Woosuk;Kang, Sunghoon;Kim, Kyungshin;Kim, Seungjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.3
    • /
    • pp.87-96
    • /
    • 2014
  • Hackers try to achieve their purpose in a variety of ways, such as operating own website and hacking a website. Hackers seize a large amount of private information after they have made a zombie PC by using malicious code to upload the website and it would be used another hacking. Almost detection technique is the use Snort rule. When unknown code and the patterns in IDS/IPS devices are matching on network, it detects unknown code as malicious code. However, if unknown code is not matching, unknown code would be normal and it would attack system. Hackers try to find patterns and make shellcode to avoid patterns. So, new method is needed to detect that kinds of shellcode. In this paper, we proposed a noble method to detect the shellcode by using Shannon's information entropy.

A Design of Inter-Working System between Secure Coding Tools and Web Shell Detection Tools for Secure Web Server Environments (안전한 웹 서버 환경을 위한 시큐어코딩 도구, 웹쉘 탐지도구 간의 상호연동 시스템 설계)

  • Kim, Bumryong;Choi, Keunchang;Kim, Joonho;Suk, Sangkee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.4
    • /
    • pp.81-87
    • /
    • 2015
  • Recently, with the development of the ICT environment, the use of the software is growing rapidly. And the number of the web server software used with a variety of users is also growing. However, There are also various damage cases increased due to a software security vulnerability as software usage is increasing. Especially web shell hacking which abuses software vulnerabilities accounts for a very high percentage. These web server environment damage can induce primary damage such like homepage modification for malware spreading and secondary damage such like privacy. Source code weaknesses checking system is needed during software development stage and operation stage in real-time to prevent software vulnerabilities. Also the system which can detect and determine web shell from checked code in real time is needed. Therefore, in this paper, we propose the system improving security for web server by detecting web shell attacks which are invisible to existing detection method such as Firewall, IDS/IPS, Web Firewall, Anti-Virus, etc. while satisfying existing secure coding guidelines from development stage to operation stage.

The Optimum Design of Reinforced Concrete Cylindrical Shell Tanks (철근콘크리트 원통 SHELL TANK 에 관한 최적설계)

  • Choi, Yeal;Kang, Moon-Myung;Pulmano, Victor. A.
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 1992.10a
    • /
    • pp.61-66
    • /
    • 1992
  • The present paper deals with the optimum design of reinforced concrete cylindrical shell tanks in according to ACI 318-89 code. The purpose of this investigation is to find the optimum values of the steel ratio and the effective thickness of reinforced concrete cylindrical shell tanks. The analysts is carried out using a simple computer programming, SMAP(segmented matrix analysis package). The optimization is carried out using GINO programming. Optimum results for cylindrical shell tanks with uniform, stepwise and piecewise linealy varying thicknesses are presented.

  • PDF

A Hierarchical Contact Searching Algorithm in Sheet Forming Analysis (박판성형공정해석에서의 계층적 접촉탐색 알고리즘 적용)

  • 김용환
    • Proceedings of the Korean Society for Technology of Plasticity Conference
    • /
    • 1999.03b
    • /
    • pp.22-25
    • /
    • 1999
  • A dynamic explicit finite element code for simulating sheet forming processes has been developed The code utilises the discrete Kirchhoff shell element and contact force is treated by a conventional penalty method. In order to reduce the computational cost a new and robust contact searching algorithm has been developed and implemented into the code. in the method a hierarchical structure of tool segments called a tree structure is built for each tool at the initial stage of the analysis Tree is built in a way to divide a trunk to 8 sub-trunk 2 in each direction until the lowest level of the tree(leaf) contains exactly one segment of the tool. In order to have a well-balanced tree each box on each sub level contains one eighth of the segments. Then at each time step contact line from a node comes out of the surface of the tool. Simulation of various sheet forming processes were performed to verify the validity of the developed code with main focus on he usefulness of the developed contact searching algorithm.

  • PDF

A study on the pressure drop characteristics of plate and shell heat exchangers (Plate and Shell 열교환기의 압력강하 특성에 관한 연구)

  • Seo, Moo-Kyo;Kim, Young-Soo
    • Proceedings of the KSME Conference
    • /
    • 2000.04b
    • /
    • pp.25-30
    • /
    • 2000
  • Plate and shell heat exchanger(P&SHE) has been applied to the refrigeration and air conditioning systems as evaporators or condensers fur their high efficiency and compactness. The purpose of this study is to analyze the characteristics of pressure drop in plate and shell heat exchanger. An experiment for single phase (low pressure drop in plate and shell heat exchanger was performed. Also numerical work was conducted using the FLUENT code for $ {\kappa}-{\varepsilon}$ model. The dependence of friction factor on geometrical Parameters was numerically investigated. The study examines the internal flow and the pressure distribution in the channel of plate and shell heat exchanger. The results of CFD analysis compared with experimental data, and the difference of frictor factor in plate side and shell side are 10% and 12%, respectively. Therefore, the CFD analysis model is effectively predict the performance of plate and shell heat exchanger.

  • PDF

Performance of a Shell-and-Tube Heat Exchanger with Spiral Baffle Plates

  • Son, Yeong-Seok;Sin, Ji-Yeong
    • Journal of Mechanical Science and Technology
    • /
    • v.15 no.11
    • /
    • pp.1555-1562
    • /
    • 2001
  • In a conventional shell-and-tube heat exchanger, fluid contacts with tubes flowing up and down in a shell, therefore there is a defect in the heat transfer with tubes due to the stagnation portions . Fins are attached to the tubes in order to increase heat transfer efficiency, but there exists a limit. Therefore, it is necessary to improve heat exchanger performance by changing the fluid flow in the shell. In this study, a highly efficient shell-and-tube heat exchanger with spiral baffle plates is simulated three-dimensionally using a commercial thermal-fluid analysis code, CFX4.2. In this type of heat exchanger, fluid contacts with tubes flowing rotationally in the shell. It could improve heat exchanger performance considerably because stagnation portions in the shell could be removed. It is proved that the shell-and-tube heat exchanger with spiral baffle plates is superior to the conventional heat exchanger in terms of heat transfer.

  • PDF

Analysis of Vibration and Radiated Noise of Circular Cylindrical Shell in the Air Using Spectral Finite Element Method and Boundary Element Method (스펙트럴유한요소법과 경계요소법을 이용한 셸의 공기 중 진동 및 방사소음 해석)

  • Lee, Yung-Koo;Hong, Suk-Yoon;Song, Jee-Hun
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.19 no.11
    • /
    • pp.1192-1201
    • /
    • 2009
  • Analysis of the vibration characteristic for cylindrical shell is more complex than plates since the coupling effects are considered on three dimensions. Based on Love's equation, spectral finite element method(SFEM) is introduced to predict frequency response function of finite circular cylindrical shell in the air with simply supported - free boundary condition without simplifying the equation of motion. And for the radiated noise analysis of cylindrical shell, indirect boundary element method(BEM) is applied using out-of-plane displacements as an input from structural vibration analysis. Comparisons of the structural vibration results by the spectral finite element method and commercial code, NASTRAN(FEM based) are carried out. Likewise, for verification of radiated noise analysis results, commercial code, SYSNOISE(BEM based) are used.

Study on defense countermeasures against Webshell attacks of the Industrial Information System (산업정보시스템의 웹쉘공격에 대한 방어 대응책 연구)

  • Hong, Sunghyuck
    • Journal of Industrial Convergence
    • /
    • v.16 no.4
    • /
    • pp.47-52
    • /
    • 2018
  • WebShell is a web script file created by a hacker to remotely commands to a web server. The hacker can bypass the security system using the web shell, access the system, control the system such as file modification, copying and deletion, install malicious code in the web source code, attack the user's PC, And so on. There are many types of WebShell attack, but we study about attacks on PHP and JSP based web server which are used as representative ones. And we propose the method of web page management, method of development, and several other methods. By using these countermeasures, it is possible to effectively prevent damage caused by WebShell attacks.

A Data Hiding Scheme Based on Turtle-shell for AMBTC Compressed Images

  • Lee, Chin-Feng;Chang, Chin-Chen;Li, Guan-Long
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.6
    • /
    • pp.2554-2575
    • /
    • 2020
  • Data hiding technology hides secret information into the carrier, so that when the carrier is transmitted over network, it will not attract any malicious attention. Using data compression, it is possible to reduce the data size into a small compressed code, which can effectively reduce the time when transmitting compressed code on the network. In this paper, the main objective is to effectively combine these two technologies. We designed a data hiding scheme based on two techniques which are turtle-shell information hiding scheme and absolute moment block truncation coding. The experimental results showed that the proposed scheme provided higher embedding capacity and better image quality than other hiding schemes which were based on absolute moment block truncation coding.

Damage prediction of RC containment shell under impact and blast loading

  • Pandey, A.K.
    • Structural Engineering and Mechanics
    • /
    • v.36 no.6
    • /
    • pp.729-744
    • /
    • 2010
  • There is world wide concern for safety of nuclear power installations after the terrorist attack on World Trade Center in 2001 and several other civilian structures in the last decade. The nuclear containment structure in many countries is a double shell structure (outer shell a RCC and inner a prestressed concrete). The outer reinforced concrete shell protects the inner shell and is designed for external loading like impact and blast. A comparative study of non-linear response of reinforced concrete nuclear containment cylindrical shell subjected to impact of an aircraft (Phantom) and explosion of different amounts of blast charges have been presented here. A material model which takes into account the strain rate sensitivity in dynamic loading situations, plastic and visco-plastic behavior in three dimensional stress state and cracking in tension has been developed earlier and implemented into a finite element code which has been validated with published literature. The analysis has been made using the developed software. Significant conclusions have been drawn for dissimilarity in response (deflections, stresses, cracks etc.) of the shell for impact and blast loading.