• Title/Summary/Keyword: Tracking Mechanisms

Search Result 63, Processing Time 0.029 seconds

Analysis of Threat Model and Requirements in Network-based Moving Target Defense

  • Kang, Koo-Hong;Park, Tae-Keun;Moon, Dae-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.10
    • /
    • pp.83-92
    • /
    • 2017
  • Reconnaissance is performed gathering information from a series of scanning probes where the objective is to identify attributes of target hosts. Network reconnaissance of IP addresses and ports is prerequisite to various cyber attacks. In order to increase the attacker's workload and to break the attack kill chain, a few proactive techniques based on the network-based moving target defense (NMTD) paradigm, referred to as IP address mutation/randomization, have been presented. However, there are no commercial or trial systems deployed in real networks. In this paper, we propose a threat model and the request for requirements for developing NMTD techniques. For this purpose, we first examine the challenging problems in the NMTD mechanisms that were proposed for the legacy TCP/IP network. Secondly, we present a threat model in terms of attacker's intelligence, the intended information scope, and the attacker's location. Lastly, we provide seven basic requirements to develop an NMTD mechanism for the legacy TCP/IP network: 1) end-host address mutation, 2) post tracking, 3) address mutation unit, 4) service transparency, 5) name and address access, 6) adaptive defense, and 7) controller operation. We believe that this paper gives some insight into how to design and implement a new NMTD mechanism that would be deployable in real network.

Congestion Detection for QoS-enabled Wireless Networks and its Potential Applications

  • Ramneek, Ramneek;Hosein, Patrick;Choi, Wonjun;Seok, Woojin
    • Journal of Communications and Networks
    • /
    • v.18 no.3
    • /
    • pp.513-522
    • /
    • 2016
  • We propose a mechanism for monitoring load in quality of service (QoS)-enabled wireless networks and show how it can be used for network management as well as for dynamic pricing. Mobile network traffic, especially video, has grown exponentially over the last few years and it is anticipated that this trend will continue into the future. Driving factors include the availability of new affordable, smart devices, such as smart-phones and tablets, together with the expectation of high quality user experience for video as one would obtain at home. Although new technologies such as long term evolution (LTE) are expected to help satisfy this demand, the fact is that several other mechanisms will be needed to manage overload and congestion in the network. Therefore, the efficient management of the expected huge data traffic demands is critical if operators are to maintain acceptable service quality while making a profit. In the current work, we address this issue by first investigating how the network load can be accurately monitored and then we show how this load metric can then be used to provide creative pricing plans. In addition, we describe its applications to features like traffic offloading and user satisfaction tracking.

A Study on An Enhancement Scheme of Privacy and Anonymity through Convergence of Security Mechanisms in Blockchain Environments (블록체인 환경에서 보안 기법들의 융합을 통한 프라이버시 및 익명성 강화 기법에 대한 연구)

  • Kang, Yong-Hyeog
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.11
    • /
    • pp.75-81
    • /
    • 2018
  • Anonymity and privacy issues are becoming important as all transactions in the blockchain are open to users. Public blockchains appear to guarantee anonymity by using public-key addresses on behalf of users, but they can weaken anonymity by tracking with various analytic techniques based on transaction graph. In this paper, we propose a scheme to protect anonymity and privacy by converging various security techniques such as k-anonymity, mixing, blind signature, multi-phase processing, random selection, and zero-knowledge proof techniques with incentive mechanism and contributor participation. Through performance analysis, our proposed scheme shows that it is difficult to invade privacy and anonymity through collusion attacks if the number of contributors is larger than that of conspirators.

Diffusion-based determination of protein homodimerization on reconstituted membrane surfaces

  • Jepson, Tyler A.;Chung, Jean K.
    • BMB Reports
    • /
    • v.54 no.3
    • /
    • pp.157-163
    • /
    • 2021
  • The transient interactions between cellular components, particularly on membrane surfaces, are critical in the proper function of many biochemical reactions. For example, many signaling pathways involve dimerization, oligomerization, or other types of clustering of signaling proteins as a key step in the signaling cascade. However, it is often experimentally challenging to directly observe and characterize the molecular mechanisms such interactions-the greatest difficulty lies in the fact that living cells have an unknown number of background processes that may or may not participate in the molecular process of interest, and as a consequence, it is usually impossible to definitively correlate an observation to a well-defined cellular mechanism. One of the experimental methods that can quantitatively capture these interactions is through membrane reconstitution, whereby a lipid bilayer is fabricated to mimic the membrane environment, and the biological components of interest are systematically introduced, without unknown background processes. This configuration allows the extensive use of fluorescence techniques, particularly fluorescence fluctuation spectroscopy and single-molecule fluorescence microscopy. In this review, we describe how the equilibrium diffusion of two proteins, K-Ras4B and the PH domain of Bruton's tyrosine kinase (Btk), on fluid lipid membranes can be used to determine the kinetics of homodimerization reactions.

Resistive Switching Properties of N and F co-doped ZnO

  • Kim, Minjae;Kang, Kyung-Mun;Wang, Yue;Chabungbam, Akendra Singh;Kim, Dong-eun;Kim, Hyung Nam;Park, Hyung-Ho
    • Journal of the Microelectronics and Packaging Society
    • /
    • v.29 no.2
    • /
    • pp.53-58
    • /
    • 2022
  • One of the most promising emerging technologies for the next generation of nonvolatile memory devices based on resistive switching (RS) is the resistive random-access memory mechanism. To date, RS effects have been found in many transition metal oxides. However, no clear evidence has been reported that ZnO-based resistive transition mechanisms could be associated with strong correlation effects. Here, we investigated N, F-co-doped ZnO (NFZO), which shows bipolar RS. Conducting micro spectroscopic studies on exposed surfaces helps tracking the behavioral change in systematic electronic structural changes during low and high resistance condition of the material. The significant difference in electronic conductivity was observed to attribute to the field-induced oxygen vacancy that causes the metal-insulator Mott transition on the surface. In this study, we showed the strong correlation effects that can be explored and incorporated in the field of multifunctional oxide electrons devices.

A Study on the Analysis of Fire Mechanisms in Electronic Products due to Failure and Malfunction of Thermostats Through Fire Cases and Reproduction Experiments (화재사례 및 재현실험을 통한 온도조절장치 고장 및 오동작으로 인한 전자제품 화재 메커니즘 분석)

  • Jeong-il Lee;Jong-Hwa Im
    • Journal of the Korea Safety Management & Science
    • /
    • v.26 no.1
    • /
    • pp.31-38
    • /
    • 2024
  • In this paper, as there are many cases of fires occurring due to the failure or inoperability of the thermostat of electronic products, the purpose is to test and analyze the risks and probabilities through fire cases and reproduction experiments, and suggest countermeasures. Among electronic products, water purifiers are composed of a refrigerant system with a compressor to make cold water, a heating device to make hot water, and an electric device used as an energy source. Due to the nature of the water purifier manufacturing, these devices are subject to a lot of moisture and dust. etc. exist in large quantities and use electrical energy, so there is a possibility of fire due to short circuit in the wire, electrical abnormal overheating (tracking phenomenon) in the thermostat, electronic board, starting relay, etc., and overheating of the heating device (Band Heater). there is. Therefore, in order to prevent fires from these devices, a system to remove foreign substances inside the water purifier is necessary, the use of heat-resistant (fire-resistant) wires for electrical devices is essential, and the use of non-combustible materials (semi-combustible materials) for each part is necessary to prevent fire. The risk must be eliminated through prevention and combustion expansion prevention devices.

Wavelet Transform-based Face Detection for Real-time Applications (실시간 응용을 위한 웨이블릿 변환 기반의 얼굴 검출)

  • 송해진;고병철;변혜란
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.9
    • /
    • pp.829-842
    • /
    • 2003
  • In this Paper, we propose the new face detection and tracking method based on template matching for real-time applications such as, teleconference, telecommunication, front stage of surveillance system using face recognition, and video-phone applications. Since the main purpose of paper is to track a face regardless of various environments, we use template-based face tracking method. To generate robust face templates, we apply wavelet transform to the average face image and extract three types of wavelet template from transformed low-resolution average face. However template matching is generally sensitive to the change of illumination conditions, we apply Min-max normalization with histogram equalization according to the variation of intensity. Tracking method is also applied to reduce the computation time and predict precise face candidate region. Finally, facial components are also detected and from the relative distance of two eyes, we estimate the size of facial ellipse.

Localization Algorithm in Wireless Sensor Networks using the Acceleration sensor (가속도 센서를 이용한 무선 센서 네트워크하에서의 위치 인식 알고리즘)

  • Hong, Sung-Hwa;Jung, Suk-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.4
    • /
    • pp.1294-1300
    • /
    • 2010
  • In an environment where all nodes move, the sensor node receives anchor node's position information within communication radius and modifies the received anchor node's position information by one's traveled distance and direction in saving in one's memory, where if there at least 3, one's position is determined by performing localization through trilateration. The proposed localization mechanisms have been simulated in the Matlab. In an environment where certain distance is maintained and nodes move towards the same direction, the probability for the sensor node to meet at least 3 anchor nodes with absolute coordinates within 1 hub range is remote. Even if the sensor node has estimated its position with at least 3 beacon information, the angle ${\theta}$ error of accelerator and digital compass will continuously apply by the passage of time in enlarging the error tolerance and its estimated position not being relied. Dead reckoning technology is used as a supplementary position tracking navigation technology in places where GPS doesn't operate, where one's position can be estimated by knowing the distance and direction the node has traveled with acceleration sensor and digital compass. The localization algorithm to be explained is a localization technique that uses Dead reckoning where all nodes are loaded with omnidirectional antenna, and assumes that one's traveling distance and direction can be known with accelerator and digital compass. The simulation results show that our scheme performed better than other mechanisms (e.g. MCL, DV-distance).

A Context-Aware System for Reliable RFID-based Logistics Management (RFID 기반 물류관리의 신뢰성 향상을 위한 상황인지 시스템 개발)

  • Jin, Hee-Ju;Kim, Hoontae;Lee, Yong-Han
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.2
    • /
    • pp.223-240
    • /
    • 2013
  • RFID(Radio Frequency Identification) is use of an RFID tag applied to object for the purpose of identification and tracking using radio waves. Recently, it is being actively researched and introduced in logistics and manufacturing. RFID portals in supply chains are meant to identify all the tags within a given interrogation zone. Hence the hardware and software mechanisms for RFID tag identification mostly focus on successful read of multiple tags simultaneously. Such mechanisms, however, are inefficient for determining moving direction of tags, sequence of consecutive tags, and validity of the tag reads from the viewpoint of workflow. These types of problems usually cause many difficulties in RFID portal implementation in manufacturing environment, there by having RFID-system developers waste a considerable amount of time. In this research, we designated an RFID portal system with SDO(Sequence, Direction, and Object-flow)-perception capability by using fundamental data supplied by ordinary RFID readers. Using our work, RFID system developers can save a great amount of time building RFID data-capturing applications in manufacturing environment.

Evaluation of Quantitative Effectiveness of MR-DTI Analysis with and without Functional MRI (기능적 자기공명영상 사용유무에 따른 확산텐서영상 분석의 유효성 평가)

  • Lee, Dong-Hoon;Park, Ji-Won;Hong, Cheol-Pyo
    • The Journal of Korean Physical Therapy
    • /
    • v.25 no.5
    • /
    • pp.260-265
    • /
    • 2013
  • Purpose: This study was conducted in order to evaluate the quantitative effectiveness of region of interest (ROI) setting in MR-DTI analysis with and without fMRI activation results. Methods: Ten right-handed normal volunteers participated in this study. DTI and fMRI datasets for each subject were obtained using a 1.5T MRI system. For neural fiber tracking, ROIs were drawn using two methods: The drawing points were located in the fMRI activation areas or areas randomly selected by users. In this study, the neural fiber tract targeted the corticospinal tract (CST) Quantitative analyses were performed and compared. The pixel numbers passing through the fiber tract in the individual brain volume were counted. The ratios between the ROI pixel numbers and the extracted fiber pixel numbers, and the ratios between the fiber pixel numbers and the whole-brain pixel numbers were also calculated. Results: According to our results, extracted CST fiber tract in which the ROI was drawn with fMRI activation areas showed higher distribution than drawing the ROI by users' hands. In addition, the quantitatively measured values represented higher pixel distribution: The counted average pixel numbers were 4553.8 and 1943.3. The average ratios of the ROI areas were 33.87 and 22.52. The average percentages of the individual whole-brain volume numbers were 2.06 and 0.87. Conclusion: Results of this study appear to indicate that use of this method can allow for more objectives and significant for study of the recovery of neural fiber mechanisms and brain rehabilitation.