• Title/Summary/Keyword: Tree Protect

Search Result 90, Processing Time 0.019 seconds

Security Structure for Protection of Emergency Medical Information System (응급의료정보시스템의 보호를 위한 보안 구조)

  • Shin, Sang Yeol;Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.2
    • /
    • pp.59-65
    • /
    • 2012
  • Emergency medical information center performs role of medical direction about disease consult and pre-hospital emergency handling scheme work to people. Emergency medical information system plays a major role to be decreased mortality and disability of emergency patient by providing information of medical institution especially when emergency patient has appeared. But, various attacks as a hacking have been happened in Emergency medical information system recently. In this paper, we proposed security structure which can protect the system securely by detecting attacks from outside effectively. Intrusion detection was performed using rule based detection technique according to protocol for every packet to detect attack and intrusion was reported to control center if intrusion was detected also. Intrusion detection was performed again using decision tree for packet which intrusion detection was not done. We experimented effectiveness using attacks as TCP-SYN, UDP flooding and ICMP flooding for proposed security structure in this paper.

Authenticated IGMP for Controlling Access to Multicast Distribution Tree (멀티캐스트 분배트리 접근제어를 위한 Authenticated IGMP)

  • Park, Chang-Seop;Kang, Hyun-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.3-17
    • /
    • 2007
  • Receiver access control scheme is proposed to protect multicast distribution tree from DoS(Denial-of Service) attack induced by unauthorized use of IGMP(Internet group management protocol), by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP(Content Provider), NSP(Network Service Provider), and group members.

Age and life history of an old black pine (Pinus thunbergii Parl.) tree at Cave Temple on Mt. Sanbangsan, Jeju Island, Korea, died due to pine wilt disease in 2013

  • Kim, Eun-Shik;Lee, So-Hee;Kim, Joon-Bum;Kim, Chan-Soo;Yoon, Bong-Taek;Lee, Sung-Hoon;Lim, Wontaek;Kim, Hyojung;Choi, Junghwan;Han, Hyerim
    • Journal of Ecology and Environment
    • /
    • v.38 no.1
    • /
    • pp.85-93
    • /
    • 2015
  • In 2013, the epidemics of pine wilt disease caused by the pine wood nematodes (Bursaphelenchus xylophilus) resulted in damages to the forests of black pine (Pinus thunbergii Parl.) trees in Jeju Island, Korea. Among the affected trees, an old black pine tree at Cave Temple on Mt. Sanbangsan was included and died due to the prevalence of pine wilt disease. The tree was on Mt. Sanbangsan, which was designated as a National Scenic Place with the Number 77 and was believed to be more than 400 years old in age. By examining the disc of the tree stem obtained from the height of 2 m, we counted the tree rings from 4 different directions and cross-dated the readings by comparing the records of drought simulated from the BROOK Model. Our analysis indicates that the tree seems to have grown since late 1860s. Contrary to the belief of the general public, we can conclude that the age of the tree was estimated to be at maximum 150 years, which means that it was not the same old tree as was shown in the painting of the Tam-Ra-Sun-Ryeok-Do (an old painting book for the Inspection Tour of Jeju Island) published in 1702. Discussion was extended to the life history of the tree in growth and leaning and the measures to protect the tree species from the damages of the pine wilt disease caused by pine wood nematodes.

A Security Scheme of Mobile Agent using QCRT from Colluded Truncation Attacks (공모된 체인 절단 공격으로부터 QCRT를 이용한 이동 에이전트의 보호 기법)

  • Jung, Chang-Ryul;Kim, Kwang-Oh;Song, Jin-Kook;Lee, Sung-Keun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.2
    • /
    • pp.382-388
    • /
    • 2011
  • This paper proposes a mechanism that guarantees secured performance against DDoS attack to protect data from free-roaming agent. Also, as it makes up QCRT(query chain relationship tree) structure which is an enhanced chain relation of existing chain relations that improves extension, It also finds malicious elements. The proposed mechanism extends chain relationship of agent as well by checking chain relation structure as a structure according to the route of agent. For it complements existing weakness with single-side chain relation extension, it guarantees secure performance against DDoS and truncation attacks from mobile agent.

Age and Radial Growth Patterns of a Lace-bark Pine (Pinus bungeana), the Natural Monument NO. 4 of Korea (천연기념물 제4호 통의동 백송의 나이와 직경생장 유형)

  • 김은식
    • The Korean Journal of Ecology
    • /
    • v.26 no.1
    • /
    • pp.34-38
    • /
    • 2003
  • An analysis of tree ring series of a lace-bark pine (Pinus bungeana Zuccarini) was carried out to find out the exact age of the tree, to describe life history of the tree affected by the change of past environmental factors, and to explain the relationships between the growth fluctuation of the tree and the change of environmental factors of the past. This study explicitly showed that the tree was about 300 years old in 1992 and that the previous estimate of the age to be about 630 years old has no ground to be justified. This was also ascertained by the close correspondence of the tree growth fluctuation to the fluctuation of soil moisture related environmental factors for the last 80 years in Seoul. Although it is clear that the tree suffered from slow growth for about 30 years initiating from the 1910s, it is not sure whether the soil moisture deficits or droughts during the years of 1910-1913 played a major role in causing the decline of the trees afterwards. Discussion was further extended for defining active roles for the Cultural Properties Administration of Korea in management and research to effectively protect the Old and Big Trees under the category of Natural Monument of Korea.

An Improved Privacy Preserving Construction for Data Integrity Verification in Cloud Storage

  • Xia, Yingjie;Xia, Fubiao;Liu, Xuejiao;Sun, Xin;Liu, Yuncai;Ge, Yi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.10
    • /
    • pp.3607-3623
    • /
    • 2014
  • The increasing demand in promoting cloud computing in either business or other areas requires more security of a cloud storage system. Traditional cloud storage systems fail to protect data integrity information (DII), when the interactive messages between the client and the data storage server are sniffed. To protect DII and support public verifiability, we propose a data integrity verification scheme by deploying a designated confirmer signature DCS as a building block. The DCS scheme strikes the balance between public verifiable signatures and zero-knowledge proofs which can address disputes between the cloud storage server and any user, whoever acting as a malicious player during the two-round verification. In addition, our verification scheme remains blockless and stateless, which is important in conducting a secure and efficient cryptosystem. We perform security analysis and performance evaluation on our scheme, and compared with the existing schemes, the results show that our scheme is more secure and efficient.

Human Normalization Approach based on Disease Comparative Prediction Model between Covid-19 and Influenza

  • Janghwan Kim;Min-Yong Jung;Da-Yun Lee;Na-Hyeon Cho;Jo-A Jin;R. Young-Chul Kim
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.32-42
    • /
    • 2023
  • There are serious problems worldwide, such as a pandemic due to an unprecedented infection caused by COVID-19. On previous approaches, they invented medical vaccines and preemptive testing tools for medical engineering. However, it is difficult to access poor medical systems and medical institutions due to disparities between countries and regions. In advanced nations, the damage was even greater due to high medical and examination costs because they did not go to the hospital. Therefore, from a software engineering-based perspective, we propose a learning model for determining coronavirus infection through symptom data-based software prediction models and tools. After a comparative analysis of various models (decision tree, Naive Bayes, KNN, multi-perceptron neural network), we decide to choose an appropriate decision tree model. Due to a lack of data, additional survey data and overseas symptom data are applied and built into the judgment model. To protect from thiswe also adapt human normalization approach with traditional Korean medicin approach. We expect to be possible to determine coronavirus, flu, allergy, and cold without medical examination and diagnosis tools through data collection and analysis by applying decision trees.

A Study on Analysis Method of Fire path for Shipping Chemical (선박적재 화학물의 화재사고 경로 분석기법에 관한 고찰)

  • Kang, Yu-Mi;Yang, Hyeongsun;Park, Deuk-Jin;Yim, Jeong-Bin
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2019.11a
    • /
    • pp.267-267
    • /
    • 2019
  • The purpose of this study is to understand the risk of chemical product, Styrene Monomer(SM), shipped in a vessel. SM is harmful chemical product which can make injury, explosion and/or fire in a vessel. The understand of SM risk is very important to protect seafarer's body and vessel safety. This research can be expected that the understanding of SM risk by a seafarer's to prevent accidents by SM explosion/fire. In this study we used event tree analysis method using chemical reaction cased by explosion. As a result, we founded various chemical reaction and visualization for explosion path.

  • PDF

Machine Learning Based Hybrid Approach to Detect Intrusion in Cyber Communication

  • Neha Pathak;Bobby Sharma
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.190-194
    • /
    • 2023
  • By looking the importance of communication, data delivery and access in various sectors including governmental, business and individual for any kind of data, it becomes mandatory to identify faults and flaws during cyber communication. To protect personal, governmental and business data from being misused from numerous advanced attacks, there is the need of cyber security. The information security provides massive protection to both the host machine as well as network. The learning methods are used for analyzing as well as preventing various attacks. Machine learning is one of the branch of Artificial Intelligence that plays a potential learning techniques to detect the cyber-attacks. In the proposed methodology, the Decision Tree (DT) which is also a kind of supervised learning model, is combined with the different cross-validation method to determine the accuracy and the execution time to identify the cyber-attacks from a very recent dataset of different network attack activities of network traffic in the UNSW-NB15 dataset. It is a hybrid method in which different types of attributes including Gini Index and Entropy of DT model has been implemented separately to identify the most accurate procedure to detect intrusion with respect to the execution time. The different DT methodologies including DT using Gini Index, DT using train-split method and DT using information entropy along with their respective subdivision such as using K-Fold validation, using Stratified K-Fold validation are implemented.

Re-anonymization Technique for Dynamic Data Using Decision Tree Based Machine Learning (결정트리 기반의 기계학습을 이용한 동적 데이터에 대한 재익명화기법)

  • Kim, Young Ki;Hong, Choong Seon
    • Journal of KIISE
    • /
    • v.44 no.1
    • /
    • pp.21-26
    • /
    • 2017
  • In recent years, new technologies such as Internet of Things, Cloud Computing and Big Data are being widely used. And the type and amount of data is dramatically increasing. This makes security an important issue. In terms of leakage of sensitive personal information. In order to protect confidential information, a method called anonymization is used to remove personal identification elements or to substitute the data to some symbols before distributing and sharing the data. However, the existing method performs anonymization by generalizing the level of quasi-identifier hierarchical. It requires a higher level of generalization in case where k-anonymity is not satisfied since records in data table are either added or removed. Loss of information is inevitable from the process, which is one of the factors hindering the utility of data. In this paper, we propose a novel anonymization technique using decision tree based machine learning to improve the utility of data by minimizing the loss of information.