• Title/Summary/Keyword: Supply Attack

Search Result 53, Processing Time 0.021 seconds

The Study of Forecasting Game Usage Hours Using Time Series Analysis (시계열 분석을 이용한 게임 접속시간 예측 연구)

  • Kang, Kie-Ho;Kim, Pyeoung-Kee
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.5
    • /
    • pp.63-69
    • /
    • 2010
  • Forecasting game usages hours can supply good information resolving intensive server access and ensuring stable game service. In this paper, we applied various time series analysis methods to forecast game usage hours in 2009 on famous "Ion" and "Sudden Attack" games. According to the experiment, the seasonal variation method showed better performance forecasting actual usage hours.

Transmission Performance of Application Service Traffic on MANET with IDS (IDS가 있는 MANET에서 응용 서비스 트래픽의 전송 성능)

  • Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.584-587
    • /
    • 2012
  • MANET, which can be constructed with only terminal devices, has structural advantages of ease installation and operation, also has environmental change of rapid supply of smart phone, it's usage can be extended to application area likes as emergency communication, leasure, exploration and investigations. But, as one characteristic of MANET, no use of communicaton infrastructure caused disadvantage of weakness for information intrusion which is frequently occurred, nowadays. In this paper, the effects of IDS(Intrusion Detection System), one of defence tools for information intrusion, is analyzed for transmission performance. Blackhole attack is assumed as a type of intrusion, MANET defence with IDS from intrusions. Computer simulation based on NS-2 used for performance measurement. In this paper, performance measurement is done for application service to analyze application level effects of IDS. VoIP service is used as application service.

  • PDF

Adaptive Intrusion Detection Algorithm based on Artificial Immune System (인공 면역계를 기반으로 하는 적응형 침입탐지 알고리즘)

  • Sim, Kwee-Bo;Yang, Jae-Won
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.13 no.2
    • /
    • pp.169-174
    • /
    • 2003
  • The trial and success of malicious cyber attacks has been increased rapidly with spreading of Internet and the activation of a internet shopping mall and the supply of an online, or an offline internet, so it is expected to make a problem more and more. The goal of intrusion detection is to identify unauthorized use, misuse, and abuse of computer systems by both system insiders and external penetrators in real time. In fact, the general security system based on Internet couldn't cope with the attack properly, if ever. other regular systems have depended on common vaccine softwares to cope with the attack. But in this paper, we will use the positive selection and negative selection mechanism of T-cell, which is the biologically distributed autonomous system, to develop the self/nonself recognition algorithm and AIS (Artificial Immune System) that is easy to be concrete on the artificial system. For making it come true, we will apply AIS to the network environment, which is a computer security system.

A Study of Technical Countermeasure System for the Smishing Detection and Prevention Based on the Android Platform (안드로이드 플랫폼 기반에서 스미싱 탐지 및 차단을 위한 기술적 대응체계 연구)

  • Seo, Gil-Won;Moon, Il-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.6
    • /
    • pp.569-575
    • /
    • 2014
  • Since 2009 the number of users of smart phones and tablet PC is growing exponentially. In particular Apple's iOS and Google's Android OS are the heart of this remarkable growth, most of smart phone and tablet PC are designed to operate based on these two OS. Such increasing use of smart devices has led to changes in the social environment that allows, without the constraints of time and place. However, such development does not supply only ease to do something, even compared to past, financial fraud and information leakage are easier than before by variety of new types of attack for example phishing, pharming, smishing and qshing. So according to this paper, analyzes for smishing attack, propose a countermeasure system of the technical way and proved its higher performance compare to the existing method.

Epidemiologic Investigation on an Outbreak of Salmonellosis in Yeongcheon-si, 2004 (2004년 영천시 D 초등학교에서 집단 발생한 살모넬라증)

  • Min, Young-Sun;Lee, Hwan-Seok;Lim, Hyun-Sul
    • Journal of Preventive Medicine and Public Health
    • /
    • v.38 no.4
    • /
    • pp.457-464
    • /
    • 2005
  • Objectives : An outbreak of salmonellosis occurred among the student s and staff of D primary school in Yeongcheon-si, 2004. This investigation was carried out to prevent any recurrence of this outbreak and to study the infection source and transmission of the salmonellosis. Methods : The authors conducted a questionnaire survey among 1,205 students and staff members from D primary school about the ingestion of the school lunch and drinking water, and the manifestation of their symptoms. The author examined rectal swabs, the tap water and microorganism cultures, and we also investigated the dining facility and water supply facility. Results : The diarrheal cases were defined as the confirmed cases or the persons who had diarrhea more than one time with symptoms such as fever, vomiting and tenesmus. The diarrheal attack rate was 28.0%. Ingestion of fried bean curd with egg had a significantly high association with the diarrheal attack rate (p<0.05), and the relative risk of the fried bean curd with egg was 10.68 (95% CI=3.88-29.41), as was determined by logistic regression analysis. The bacterial counts in the tap water of the food preparation room and toilet (first floor) exceeded the maximum permissible counts. S. Enteritidis bacteria were only cultured from the fried bean curd with egg of all the supplied foods on September 3, 2004. Conclusions : The major cause of salmonellosis was presumed to be the contaminated bean curd via contaminated tap water due to a water leak of a school water pipe. This contaminated bean curd was under prepared, which allowed the S. Enteritidis to survive and multiply prior to its ingestion.

Intrusion Detection System of Network Based on Biological Immune System (생체 면역계를 이용한 네트워크 침입탐지 시스템)

  • Sim, Kwee-Bo;Yang, Jae-Won;Lee, Dong-Wook;Seo, Dong-Il;Choi, Yang-Seo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.12 no.5
    • /
    • pp.411-416
    • /
    • 2002
  • Recently, the trial and success of malicious cyber attacks has been increased rapidly with spreading of Internet and the activation of a internet shopping mall and the supply of an online internet, so it is expected to make a problem more and more. Currently, the general security system based on Internet couldn't cope with the attack properly, if ever, other regular systems have depended on common softwares to cope with the attack. In this paper, we propose the positive selection mechanism and negative selection mechanism of T-cell, which is the biological distributed autonomous system, to develop the self/non-self recognition algorithm, the anomalous behavior detection algorithm, and AIS (Artificial Immune System) that is easy to be concrete on the artificial system. The proposed algorithm can cope with new intrusion as well as existing one to intrusion detection system in the network environment.

An Analysis of Cyber Attacks and Response Cases Related to COVID-19 (코로나19 관련 사이버 공격 및 대응현황 분석)

  • Lee, Yongpil;Lee, Dong-Geun
    • Journal of Information Technology Services
    • /
    • v.20 no.5
    • /
    • pp.119-136
    • /
    • 2021
  • Since the global spread of COVID-19, social distancing and untact service implementation have spread rapidly. With the transition to a non-face-to-face environment such as telework and remote classes, cyber security threats have increased, and a lot of cyber compromises have also occurred. In this study, cyber-attacks and response cases related to COVID-19 are summarized in four aspects: cyber fraud, cyber-attacks on companies related to COVID-19 and healthcare sector, cyber-attacks on untact services such as telework, and preparation of untact services security for post-covid 19. After the outbreak of the COVID-19 pandemic, related events such as vaccination information and payment of national disaster aid continued to be used as bait for smishing and phishing. In the aspect of cyber-attacks on companies related to COVID-19 and healthcare sector, we can see that the damage was rapidly increasing as state-supported hackers attack those companies to obtain research results related to the COVID-19, and hackers chose medical institutions as targets with an efficient ransomware attack approach by changing 'spray and pray' strategy to 'big-game hunting'. Companies using untact services such as telework are experiencing cyber breaches due to insufficient security settings, non-installation of security patches, and vulnerabilities in systems constituting untact services such as VPN. In response to these cyber incidents, as a case of cyber fraud countermeasures, security notices to preventing cyber fraud damage to the public was announced, and security guidelines and ransomware countermeasures were provided to organizations related to COVID-19 and medical institutions. In addition, for companies that use and provide untact services, security vulnerability finding and system development environment security inspection service were provided by Government funding programs. We also looked at the differences in the role of the government and the target of security notices between domestic and overseas response cases. Lastly, considering the development of untact services by industry in preparation for post-COVID-19, supply chain security, cloud security, development security, and IoT security were suggested as common security reinforcement measures.

The Development of Electromagnetic pulse Protection Capability in the Main System of a Tank Battalion (전차대대 주요체계의 EMP 방호능력 발전방안에 관한 연구)

  • Choi, Hokab;Han, Jaeduk;Son, Sangwoo;Kim, Sungkon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.40 no.6
    • /
    • pp.623-631
    • /
    • 2020
  • An electromagnetic pulse (EMP) attack on a nuclear weapon or the airlift of an electronic bomb affects weapons systems, information devices, wired and wireless communication equipment, and power supply equipment. It can lead to confusion on the battlefield. The current standards for EMP protection when applied to the military are centered on fixed and mobile facilities and equipment. It is, however, important to study EMP protection for a single tactical unit centered on the weapon system. In this study, EMP protection standards were established for command and control, maneuvering and firepower systems vulnerable to EMPs, focusing on battle tanks with mobility, firepower, and shock force. Also, specific development plans for EMP protection capabilities are proposed, including the shielding and blocking of EMPs. Through the study, the Korean government intends to ensure a unit's command and control under an EMP attack as well as preserve the viability of a unit's personnel and guarantee the conditions for the execution of a mission.

Cold Boot Attack on Encrypted Containers for Forensic Investigations

  • Twum, Frimpong;Lagoh, Emmanuel Mawuli;Missah, Yaw;Ussiph, Najim;Ahene, Emmanuel
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.9
    • /
    • pp.3068-3086
    • /
    • 2022
  • Digital Forensics is gaining popularity in adjudication of criminal cases as use of electronic gadgets in committing crime has risen. Traditional approach to collecting digital evidence falls short when the disk is encrypted. Encryption keys are often stored in RAM when computer is running. An approach to acquire forensic data from RAM when the computer is shut down is proposed. The approach requires that the investigator immediately cools the RAM and transplant it into a host computer provisioned with a tool developed based on cold boot concept to acquire the RAM image. Observation of data obtained from the acquired image compared to the data loaded into memory shows the RAM chips exhibit some level of remanence which allows their content to persist after shutdown which is contrary to accepted knowledge that RAM loses its content immediately there is power cut. Results from experimental setups conducted with three different RAM chips labeled System A, B and C showed at a reduced temperature of -25C, the content suffered decay of 2.125% in 240 seconds, 0.975% in 120 seconds and 1.225% in 300 seconds respectively. Whereas at operating temperature of 25℃, there was decay of 82.33% in 60 seconds, 80.31% in 60 seconds and 95.27% in 120 seconds respectively. The content of RAM suffered significant decay within two minutes without power supply at operating temperature while at a reduced temperature less than 5% decay was observed. The findings show data can be recovered for forensic evidence even if the culprit shuts down the computer.

An Oriental Medical Study on the Anorexia An Emphasis on the Etiology and Pathology of the Anorexia (식욕부진(食慾不振)에 대(對)한 한의학적(韓醫學的) 고찰(考察) - 병인병리(病因病理)를 중심(中心)으로 -)

  • Choi, Su-Deock;Won, Jin-Hee
    • The Journal of Korean Medicine
    • /
    • v.19 no.2
    • /
    • pp.194-210
    • /
    • 1998
  • The main purpose of this work is the study on the etiology and pathology of the anorexia in oriental and western medicine. An appetite is stimulated by the need of supply of nutrition for life and the physical desire of hunger which appeared as the alternative of taste. In this paper, I investigated the anatomical and the physiological function system, the Piwei functional system and meridian distribution, and the differentiation of the disease according to the Zangfu(internal organs) in association with the anorexia. And conclusion could be summarized as follows : 1. The tongue, one of the Piwei functional system(脾胃機能系), is connected with Pi(脾), Xin(心), Gan(肝) and Shen(腎) meridian. Especially Pi and Xin meridian have the close relations with taste. 2. The appetite has the close relations with Piwei. The appetite and digestion is influenced by the function of smoothing and regulating and bloodflow of Ki(肝主疏泄), warming the Shen to activate the function of Pi(腎主溫養), cleansing the inspired air and keeping the Ki flowing downward(肺主肅降). 3. The cause of anorexia is the insufficiency of Ki of Piwei(脾胃氣虛), the attack of Wei by hyperactive Gan Ki(脾氣犯胃), the insufficiency of Wei Yin(胃陰不足), the declination of the fire from the vital gate(命門火衰) and the retention or stagnancy of undigested food (飮食停滯). Especially, the main cause of anorexia is the insufficiency of Ki of the Piwei(脾胃氣虛). 4. Recently the attack of Wei by hyperactive Gan Ki(脾氣犯胃) is raised by the main cause of anorexia. 5. The mental function of anorexia, which is induced by the unbalance of Pi, is directly associated with Xin(心) and Xin meridia(心經). 6. The goal of the treatment of the anorexia is dependent on the recovery of the weakness of the Pi. And for this goal, the disorders of the other organs is also treated. 7. In the point of the anatomy and physiology, the main cause of anorexia is the loss of function of the autonomic nerve system and the vagus nerve.

  • PDF