• Title/Summary/Keyword: host-based

Search Result 1,634, Processing Time 0.028 seconds

A new record of epiphytic red alga Madagascaria erythrocladioides (Erythropeltidales, Rhodophyta) in Korea

  • Wen, Xianying;Lee, Ji Woong;Shim, Eunyoung;Kim, Gwang Hoon
    • Korean Journal of Environmental Biology
    • /
    • v.39 no.3
    • /
    • pp.383-389
    • /
    • 2021
  • The Erythropeltidales are a common group of small, mostly epiphytic, marine red algae. However, they are little known in Korea. Many of the described species of Erythropeltidales differ subtly in morphology, and often the morphological differences are due to the substrate or environmental changes. Integration of molecular data with standardized culture conditions has been recommended to account for these algae. A Madagascaria species was first collected from the western coast of Korea and was identified as Madagascaria erythrocladioides based on the morphological and molecular characteristics. Morphological characteristics conformed well with its original description, and the phylogenetic analysis based on rbcL sequence showed Korean M. erythrocladioides nests in the same clade with the original species described in Japan with a genetic distance of 0.0-0.1%. This species was isolated from a red alga, Pterocladiella capillacea, in laboratory culture. The thallus ontogeny and host preference were examined by a co-culture with 13 different species of algae. Results showed a relatively broad host preference in mono-spore attachment and epiphyte development of Madagascaria erythrocladioides. Mono-spores of M. erythrocladioides attached to most of the red algal hosts' surfaces but no crustose thalli developed on some of the algal hosts even after one month of co-culture.

Trends in 5G Small Cell and Application Technology (5G 스몰셀 기술 및 활용 기술 동향)

  • Kwon, D.S.;Na, J.H.
    • Electronics and Telecommunications Trends
    • /
    • v.37 no.2
    • /
    • pp.83-95
    • /
    • 2022
  • 5G goes beyond people to serve indoor and outdoor companies and industries, as well as campuses such as halls, industrial complexes, educational institutions, stadiums, dense urban areas, rural areas, and government institutions. Therefore, a new approach to small cells is needed. Accordingly, 3GPP and Small Cell Forum are researching 5G small cell architecture; 3GPP, Small Cell Forum, and 5G Alliance for Connected Industries and Automation are also researching private networks tailored to meet the specific requirements of various companies and local governments. In particular, in the UK, a small cell-based technology is required for realizing the Joint Operator Technical Specifications-Neutral Host In-Building specification to cost-effectively secure indoor coverage. Further, the research on the SON(Self-Organizing Network) technology for small cells in 5G, where commercialization has begun, is required. The 5G-based small cell structure, private network, and Neutral Host In-Building and SON reviewed in this study are at the initial research stages; therefore, additional research is needed to secure the competitiveness of the small cell technology in 5G and Beyond 5G.

Feasibility of BaO-ZnO-$B_2O_3$ based Glass as a Host to Employ Various Ceramic Fillers to be applied to Barrier Ribs in Plasma Display Panels

  • Kim, Sang-Gon;Shin, Hyun-Ho;Park, Jong-Sung;Hong, Kug-Sun;Kim, Hyung-Sun
    • Journal of Information Display
    • /
    • v.5 no.3
    • /
    • pp.25-29
    • /
    • 2004
  • Effects of additing various types of ceramic fillers to the BZB-based glass on the thermo-chemical stability, optical reflectance, and mechanical properties were investigated. The glass system demonstrated the feasibility to host various types of ceramic fillers to form micro-composites at the processing temperature suitable for PDP systems. The optical reflectance and mechanical strength of the filler-glass composites were improved as compared to the glass itself. These results demonstrate the feasibility of applying the Pb-free BZB-based glass system as a matrix for employing various types of crystalline ceramic fillers to be used as barrier rib materials in plasma display panels.

Design & Implementation of a Host Based Access Control System (호스트 기반 접근제어시스템의 설계 및 구현)

  • Kim, Jin-Chun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.1
    • /
    • pp.34-39
    • /
    • 2007
  • According to the active use of internet the need for security in various environment is being emphasized. Moreover with the broad use of Messenger on PC and P2P applications. the security and management of individual hosts on internet became very important issues. Therefore in this paper we propose the design and implementation of a host based access control system for the hosts on internet including window based PC which provides access control, information on packets, and record and monitoring of log files.

A Host-based Intrusion Detection Data Analysis Comparison (호스트 기반 침입 탐지 데이터 분석 비교)

  • Park, DaeKyeong;Shin, Dongkyoo;Shin, Dongil
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.05a
    • /
    • pp.490-493
    • /
    • 2020
  • 오늘날 정보통신 기술이 급격하게 발달하면서 IT 인프라에서 보안의 중요성이 높아졌고 동시에 APT(Advanced Persistent threat)처럼 고도화되고 다양한 형태의 공격이 증가하고 있다. 점점 더 고도화되는 공격을 조기에 방어하거나 예측하는 것은 매우 중요한 문제이며, NIDS(Network-based Intrusion Detection System) 관련 데이터 분석만으로는 빠르게 변형하는 공격을 방어하지 못하는 경우가 많이 보고되고 있다. 따라서 HIDS(Host-based Intrusion Detection System) 데이터 분석을 통해서 위와 같은 공격을 방어하는데 현재는 침입탐지 시스템에서 생성된 데이터가 주로 사용된다. 하지만 데이터가 많이 부족하여 과거에 생성된 DARPA(Defense Advanced Research Projects Agency) 침입 탐지 평가 데이터 세트인 KDD(Knowledge Discovery and Data Mining) 같은 데이터로 연구를 하고 있어 현대 컴퓨터 시스템 특정을 반영한 데이터의 비정상행위 탐지에 대한 연구가 많이 부족하다. 본 논문에서는 기존에 사용되었던 데이터 세트에서 결여된 스레드 정보, 메타 데이터 및 버퍼 데이터를 포함하고 있으면서 최근에 생성된 LID-DS(Leipzig Intrusion Detection-Data Set) 데이터를 이용한 분석 비교 연구를 통해 앞으로 호스트 기반 침입 탐지 데이터 시스템의 나아갈 새로운 연구 방향을 제시한다.

An Architecture Design of Distributed Internet Worm Detection System for Fast Response

  • Lim, Jung-Muk;Han, Young-Ju;Chung, Tai-Myoung
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.161-164
    • /
    • 2005
  • As the power of influence of the Internet grows steadily, attacks against the Internet can cause enormous monetary damages nowadays. A worm can not only replicate itself like a virus but also propagate itself across the Internet. So it infects vulnerable hosts in the Internet and then downgrades the overall performance of the Internet or makes the Internet not to work. To response this, worm detection and prevention technologies are developed. The worm detection technologies are classified into two categories, host based detection and network based detection. Host based detection methods are a method which checks the files that worms make, a method which checks the integrity of the file systems and so on. Network based detection methods are a misuse detection method which compares traffic payloads with worm signatures and anomaly detection methods which check inbound/outbound scan rates, ICMP host/port unreachable message rates, and TCP RST packet rates. However, single detection methods like the aforementioned can't response worms' attacks effectively because worms attack the Internet in the distributed fashion. In this paper, we propose a design of distributed worm detection system to overcome the inefficiency. Existing distributed network intrusion detection systems cooperate with each other only with their own information. Unlike this, in our proposed system, a worm detection system on a network in which worms select targets and a worm detection system on a network in which worms propagate themselves cooperate with each other with the direction-aware information in terms of worm's lifecycle. The direction-aware information includes the moving direction of worms and the service port attacked by worms. In this way, we can not only reduce false positive rate of the system but also prevent worms from propagating themselves across the Internet through dispersing the confirmed worm signature.

  • PDF

Effects of forestry host plants, rearing seasons and their interaction on cocoon productivity of tropical tasar silkworm, Antheraea mylitta in uttarakhand

  • Bhatia, N.K.;Yousuf, Mohd.
    • International Journal of Industrial Entomology and Biomaterials
    • /
    • v.30 no.2
    • /
    • pp.31-39
    • /
    • 2015
  • Antheraea mylitta Drury (Lepidoptera: Saturniidae) is a commercial silk producing forest insect of India, but it has never been experimented in Uttarakhand state in spite of the huge availability of its forestry host plants. This is the first study on A. mylitta in Uttarakhand. The goal of this study is to introduce forest based commercial rearing of A. mylitta, in tropical forest areas of Uttarakhand to reduce poverty among forest dependent people. In current study, we assessed the effect of seven forest tree species, rearing seasons, and their interactions on cocoon productivity of Daba (bivoltine) ecorace of A. mylitta in the New Forest of FRI, Dehra Dun during 2012 and 2013 and collected the data that was analysed by two-way completely randomized block factorial design. Post HOC Tukey's HSD test was carried out to compare the homogeneous pairs of means. We also carried out Evaluation Index analysis to rank the tested forestry host plants for better growth and development of A. mylitta under the climatic condition of Uttarakhand. Analysis of variance indicated that cocoon yield of A. mylitta differed significantly between rearing seasons (DF=1, F=88.24, p<0.05) and host plants (DF 6, F= 368.63, p<0.05); however, their interactions were found insignificant (DF=6, F=0.99, p>0.05). In first rearing season of July-August, there was higher cocoon yield than the second season of September-November. Results indicated that Terminalia alata fed larvae showed significantly higher cocoon yield (164.11 cocoons/300 larvae); followed by, T. tomentosa (148.89 cocoons), T. arjuna (140.00 cocoons) and Lagerstroemia speciosa (129.47 cocoons) fed larvae. Whereas, Lagerstroemia tomentosa fed larvae that was used by the first time in India, showed lowest cocoon yield (48.81 cocoons), followed by T. chebula (72.53 cocoons) fed larvae. Cocoon yield of T. tomentosa and T. arjuna fed larvae of A. mylitta did not differ significantly with each other.

Design and Implementation of DHCP Supporting Network Attack Prevention (네트워크 공격 방지를 지원하는 DHCP의 설계 및 구현에 관한 연구)

  • Yoo, Kwon-joeong;Kim, Eun-gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.4
    • /
    • pp.747-754
    • /
    • 2016
  • DHCP(Dynamic Host Configuration Protocol) is a protocol for efficiency and convenience of the IP address management. DHCP automatically assigns an IP address and configuration information needed to run the TCP/IP communication to individual host in the network. However, existing DHCP is vulnerable for network attack such as DHCP spoofing, release attack because there is no mutual authentication systems between server and client. To solve this problem, we have designed a new DHCP protocol supporting the following features: First, ECDH(Elliptic Curve Diffie-Hellman) is used to create session key and ECDSA(Elliptic Curve Digital Signature Algorithm) is used for mutual authentication between server and client. Also this protocol ensures integrity of message by adding a HMAC(Hash-based Message Authentication Code) on the message. And replay attacks can be prevented by using a Nonce. As a result, The receiver can prevent the network attack by discarding the received message from unauthorized host.

A study Addictive Buying on Fashion item in TV Home-Shopping; Focused on Materialism, Show host, Credit card (패션제품 TV 홈쇼핑 중독에 관한 연구: 물질주의, 쇼호스트, 신용카드를 중심으로)

  • Lee, Seung-Hee;Kim, Chae-Yeon
    • Journal of the Korean Home Economics Association
    • /
    • v.45 no.2
    • /
    • pp.63-75
    • /
    • 2007
  • The purpose sof this study was to examine consumer's addictive buying through the TV home shopping, focused on materialism, show host and credit card use consumer. Two hundred four female consumers who had purchased fashion items in TV home shopping had participated for this study. For data analysis, descriptive statistics, factor analysis, t-test, and multiple regression were used for the study with SPSS 12.0 program. The result were as follows. First, the addictive buying group was 13.2% among respondents while non-addictive buying group was 86.8%. Second, materialism was classified into 3 factors: happiness, success and possessiveness. Show host was classified into 3 factors such as visual presentation, image and communication skill. Credit card was classified into 3 factors: sales promotion, late payment and method payment. Results of multiple regression revealed that happiness and possessiveness from materialism, credit card late payment, and show host communication skill were significantly related to addictive buying. Based on these results, this study would provide fashion marketing strategies for reasonable and reasonable consuming culture, since addictive buying has been not only individual problem but also social problem. Based on these results, this study would provide fashion marketing strategies for reasonable and reasonable consuming culture, since addictive buying has been not only individual problem but also social problem.

Access Control using Secured Container-based Virtualization (보안 컨테이너 가상화 기반 접근 제어)

  • Jeong, Dong-hwa;Lee, Sunggyu;Shin, Youngsang;Park, Hyuncheol
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.330-334
    • /
    • 2017
  • Container-based virtualization reduces performance overhead compared with other virtualization technologies and guarantees an isolation of each virtual execution environment. So, it is being studied to block access to host resources or container resources for sandboxing in restricted system resource like embedded devices. However, because security threats which are caused by security vulnerabilities of the host OS or the security issues of the host environment exist, the needs of the technology to prevent an illegal accesses and unauthorized behaviors by malware has to be increased. In this paper, we define additional access permissions to access a virtual execution environment newly and control them in kernel space to protect attacks from illegal access and unauthorized behaviors by malware and suggest the Container Access Control to control them. Also, we suggest a way to block a loading of unauthenticated kernel driver to disable the Container Access Control running in host OS by malware. We implement and verify proposed technologies on Linux Kernel.

  • PDF