• Title/Summary/Keyword: White-list

Search Result 63, Processing Time 0.023 seconds

SPIT Prevention Framework using Expanded White List (확장 화이트리스트 기법을 이용한 SPIT 대응 프레임워크)

  • Bae, Kwang-Yong;Chae, Kang-Suk;Kim, Young-Beom
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.2
    • /
    • pp.95-102
    • /
    • 2010
  • This paper proposes a SPIT(Spam over IP Telephony) prevention framework which is using expanded white-list in real-time VoIP environment. The existing schemes are vulnerable to attack from spammers since they can continue to transfer SPIT upon changing their ID. And existing frameworks have experienced the time delay and overload as session initiates due to real-time operation. To solve these problems, the proposed scheme expands the scope of white lists by forming social networks using the white list, but it is to decide quickly whether pass a caller ID without searching the entire database. The proposed framework takes the three-stage architecture and the fast scoring system. The proposed framework minimize user's inconvenience and time delay for initiation of session, therefore, it is proper for real-time VoIP environment.

A Study of an Anomalous Event Detection using White-List on Control Networks (제어망에서 화이트 리스트 기법을 이용한 이상 징후 탐지에 관한 연구)

  • Lee, DongHwi;Choi, KyongHo
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.77-84
    • /
    • 2012
  • The control network has been operated in a closed. But it changes to open to external for business convenience and cooperation with several organizations. As the way of connecting with user extends, the risk of control network gets high. Thus, in this paper, proposed the technique of an anomalous event detection using white-list for control network security and minimizing the cyber threats. The proposed method can be collected and cataloged of only normal data from traffic of internal network, control network and field devices. Through way to check the this situation, we can separate normal and abnormal behavior.

Threats according to the Type of Software Updates and White-List Construction Scheme for Advanced Security (소프트웨어 업데이트 유형별 위협요소와 안전성 강화를 위한 화이트리스트 구성 방안)

  • Lee, Daesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.6
    • /
    • pp.1369-1374
    • /
    • 2014
  • In case of APT attacks, the update server is being used as a means of dissemination, the update program is running malicious code or data in applications such as anti-virus signature is vulnerable to manipulation, SW Update threat identification and prevention measures are urgently required. This paper presents a natiional and international SW update structure, update process exploits and response measures to examine, Through the extraction/analysis of a domestic famous SW update log, we are willing to select the necessary component of the normal program update to identify a white list.

Scaleable, Cost Effective Display Manufacturing Technology Based on White OLED

  • Buntaine, James R.;Rajeswaran, G.
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.327-331
    • /
    • 2007
  • The AMOLED industry must compete with AMLCD displays by standardizing around scaleable technology platforms that deliver display-performance and manufacturing-cost goals. Kodak White OLED device rchitectures have the potential to achieve the best performance and cost tradeoffs. Here we describe the building blocks necessary for delivering effective AMOLED mass production technologies.

  • PDF

Research on Malicious code hidden website detection method through WhiteList-based Malicious code Behavior Analysis (WhiteList 기반의 악성코드 행위분석을 통한 악성코드 은닉 웹사이트 탐지 방안 연구)

  • Ha, Jung-Woo;Kim, Huy-Kang;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.61-75
    • /
    • 2011
  • Recently, there is significant increasing of massive attacks, which try to infect PCs that visit websites containing pre-implanted malicious code. When visiting the websites, these hidden malicious codes can gain monetary profit or can send various cyber attacks such as BOTNET for DDoS attacks, personal information theft and, etc. Also, this kind of malicious activities is continuously increasing, and their evasion techniques become professional and intellectual. So far, the current signature-based detection to detect websites, which contain malicious codes has a limitation to prevent internet users from being exposed to malicious codes. Since, it is impossible to detect with only blacklist when an attacker changes the string in the malicious codes proactively. In this paper, we propose a novel approach that can detect unknown malicious code, which is not well detected by a signature-based detection. Our method can detect new malicious codes even though the codes' signatures are not in the pattern database of Anti-Virus program. Moreover, our method can overcome various obfuscation techniques such as the frequent change of the included redirection URL in the malicious codes. Finally, we confirm that our proposed system shows better detection performance rather than MC-Finder, which adopts pattern matching, Google's crawling based malware site detection, and McAfee.

A security problem and its solution in Ipsec (IPsec의 보안상 문제점과 해결방안)

  • Kim, Jung-Hyun;Won, You-Jip;Im, Eul-Gyu
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.37-38
    • /
    • 2006
  • In this paper, we describe a security problem of IPsec. And we propose a solution for this problem. The problem is a fragility of IPsec Gateway which is used in tunnel mode. The role of IPsec Gateway is encrypting or decrypting IPsec packets. Because of the role of IPsec Gateway, IPsec Gateway suffers overhead for decrypting numerous packets. Adversaries can easily attack IPsec Gateway using a DDoS attack. To solve this problem, we propose the "Priority based Random Packet Drop" method. In this method, the white list which is a list of normal users is created. After that, according to the frequency of uses, the method marks priorities of random drops to the white list. If anomalous traffic appeared, this method will drop many packets which consist of anomalous traffic. In simple experiment, we show our solution is proper to defend IPsec Gateway. For this experiment, we use empirical backbone traffic which includes DoS attacks.

  • PDF

WhiteList-based DNP3 Intrusion Detection System for SCADA (SCADA 환경에서의 WhiteList 기반의 DNP3 Protocol 침입 탐지)

  • Kim, Myung-Jong;Kwon, Sung-Moon;Jo, Woo-Yeon;Shon, Tae-Shik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.228-231
    • /
    • 2016
  • 현재 한 번의 공격으로 많은 피해를 줄 수 있는 국가기반시설 위주의 제어시스템은 사이버 공격의 대상으로 가장 적합하다고 할 수 있다. 이에 대비해 제어시스템에서 주로 사용되는 DNP3는 한정적이고 반복된 트래픽을 주고받아 화이트리스트 기반 보안 기법이 사이버 공격으로부터 효과적으로 시스템을 보호할 수 있다. 본 논문에서는 제어시스템에 알려져 있는 취약점에 대해서 소개하고, 화이트리스트 보안 기법을 적용하고 규칙을 정의하여 이상 징후를 탐지하였다.

WhiteList-based Enterprise IT Resource Security Control System (화이트리스트 기반 전사적 IT자원 보안 관제 시스템)

  • Park, Sung-Sik;Ko, Mi-eun;Park, Young B.
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.461-464
    • /
    • 2016
  • 기업 사용자의 PC를 노리는 알려지지 않은 지능형 위협으로 전사적 IT자원 보안 문제가 대두하고 있다. 지정된 프로그램만 동작하게 하는 화이트리스트 보안 기술로 알려지지 않은 지능형 위협에 대응이 가능하다. 따라서 화이트리스트 기반 전사적 IT자원 보안 관제가 필요하다. 본 논문에서는 WhiteList 기반의 실시간 프로세스 분석을 통해 기업 사용자 PC 내에 허가되지 않은 프로그램을 관제할 수 있는 방법을 제시 하였고, 화이트리스트 기반 전사적 IT자원 보안 관제 시스템을 구현하였다.

Annotated List of the Korean Triphoridae (Gastropoda), with a New Record of Mastonia rubra

  • Lee, Yucheol;Shin, Youngheon;Park, Jina;Park, Joong-Ki
    • Animal Systematics, Evolution and Diversity
    • /
    • v.34 no.3
    • /
    • pp.168-173
    • /
    • 2018
  • The family Triphoridae Gray, 1847 is a group of marine microgastropods characterized by sinistral (left-coiled) shells except for the subfamily Metaciinae, which has dextral shell coiling. We report a new record of Mastonia rubra (Hinds, 1843) collected from the intertidal zone from Jeju Island, Korea and revise species list for Korean Triphoridae species. Mastonia rubra is distinguished from Inforis fusiformis(Kosuge, 1961) by the purple color of the first and second whorls of the teleoconch, whereas they are light colored and nearly white corresponding whorls in I. fusiformis. Including this new record, the Korean Triphoridae comprises 20 species from 15 genera.

Conservation of Ceramic-Ware to be Exhibited at Yongsan New National Museum at Its Opening - Restoration of Blue-and-white porcelain jar with phoenix design and Celadon peahen-shaped water dropper - (용산 국립중앙박물관 개관 전시 대상 도자기의 보존 - 청화백자운봉문대호(靑畵白磁雲鳳文大壺)·청자공작수주(靑磁孔雀水注) -)

  • Hwang, Hyunsung;Lee, Haesoon
    • Conservation Science in Museum
    • /
    • v.5
    • /
    • pp.5-15
    • /
    • 2004
  • The Fine Art Department has sent a list of ceramic ware to the Conservation Science Laboratory of the National Museum of Korea for conservation treatment. The listed ceramic ware will be newly displayed in the ceramic ware gallery of Yongsan Museum after it is opened. Based on the list, Conservation Science Laboratory has been taking special measures to conservation the ceramic ware since 2002. This paper attempts to introduce the process of restoring the Blue-and-white porcelain Jar with phoenix Design (Jubsoo 631) and Celadon peahen-shaped water dropper (Duksoo 5202).