• 제목/요약/키워드: worm

검색결과 942건 처리시간 0.029초

WORM(Write Once Read Many) 지원 네트워크 대용량 저장 장치를 위한 파일 시스템 (A network-attached WORM(Write Once Read Many) storage system)

  • 김문경;김선태;노재춘;박성순
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2008년도 하계종합학술대회
    • /
    • pp.1177-1178
    • /
    • 2008
  • This paper presents a network-attached WORM(Write Once Read Many) storage system whose purpose is to protect sensitive data that should not be accessed by accidental/intentional intrusion. In our storage system, the sensitive data would be marked and be stored into a specific WORM volume. Furthermore, with the associated WORM mark, the data whose WORM life cycle has been expired would automatically be moved to the general-purpose disk space, without interfering any other tasks, to save the WORM volume space. Our WORM storage system was integrated to the NAS product.

  • PDF

장구형 웜 나사의 절삭 엔드밀 공구 형상에 따른 치형 정밀도 분석 (Analysis of Tooth Profile Accuracy of Enveloping Worm Thread Depending on End Mill Tool Shape)

  • 강신준;김용환
    • 소성∙가공
    • /
    • 제28권4호
    • /
    • pp.183-189
    • /
    • 2019
  • Cylindrical worm reducers are generally used in various fields and forms throughout the industry, and demand is increasing due to their role as an integral part of the industry. Market trends require high-load, high-precision components, and small-sized reducers with large loads. When using a cylindrical worm reducer, a reducer designed with a reduced center distance while maintaining the same output torque results in gear wear. To overcome this difficulty, an enveloping worm gear reducer is introduced and studied. In this paper, three types of end mill tools are used to evaluate the tooth profile accuracy for each tool shape during machining of the tooth profile for a non-developed surface worm thread. The effect of the endmill shape on the accuracy of the tooth profile was analyzed by performing 3D modeling of the surrounding worm tooth profile based on the Hindley method. In this study, we analyzed tooth profile accuracy, tooth surface roughness, and tooth surface machining time, etc. Through the study, efficient machining conditions for the enveloping worm gears and the influence of parameters on the process were presented.

An Architecture Design of Distributed Internet Worm Detection System for Fast Response

  • Lim, Jung-Muk;Han, Young-Ju;Chung, Tai-Myoung
    • 한국정보기술응용학회:학술대회논문집
    • /
    • 한국정보기술응용학회 2005년도 6th 2005 International Conference on Computers, Communications and System
    • /
    • pp.161-164
    • /
    • 2005
  • As the power of influence of the Internet grows steadily, attacks against the Internet can cause enormous monetary damages nowadays. A worm can not only replicate itself like a virus but also propagate itself across the Internet. So it infects vulnerable hosts in the Internet and then downgrades the overall performance of the Internet or makes the Internet not to work. To response this, worm detection and prevention technologies are developed. The worm detection technologies are classified into two categories, host based detection and network based detection. Host based detection methods are a method which checks the files that worms make, a method which checks the integrity of the file systems and so on. Network based detection methods are a misuse detection method which compares traffic payloads with worm signatures and anomaly detection methods which check inbound/outbound scan rates, ICMP host/port unreachable message rates, and TCP RST packet rates. However, single detection methods like the aforementioned can't response worms' attacks effectively because worms attack the Internet in the distributed fashion. In this paper, we propose a design of distributed worm detection system to overcome the inefficiency. Existing distributed network intrusion detection systems cooperate with each other only with their own information. Unlike this, in our proposed system, a worm detection system on a network in which worms select targets and a worm detection system on a network in which worms propagate themselves cooperate with each other with the direction-aware information in terms of worm's lifecycle. The direction-aware information includes the moving direction of worms and the service port attacked by worms. In this way, we can not only reduce false positive rate of the system but also prevent worms from propagating themselves across the Internet through dispersing the confirmed worm signature.

  • PDF

Dynamic Control of Random Constant Spreading Worm using Depth Distribution Characteristics

  • No, Byung-Gyu;Park, Doo-Soon;Hong, Min;Lee, Hwa-Min;Park, Yoon-Sok
    • Journal of Information Processing Systems
    • /
    • 제5권1호
    • /
    • pp.33-40
    • /
    • 2009
  • Ever since the network-based malicious code commonly known as a 'worm' surfaced in the early part of the 1980's, its prevalence has grown more and more. The RCS (Random Constant Spreading) worm has become a dominant, malicious virus in recent computer networking circles. The worm retards the availability of an overall network by exhausting resources such as CPU capacity, network peripherals and transfer bandwidth, causing damage to an uninfected system as well as an infected system. The generation and spreading cycle of these worms progress rapidly. The existing studies to counter malicious code have studied the Microscopic Model for detecting worm generation based on some specific pattern or sign of attack, thus preventing its spread by countering the worm directly on detection. However, due to zero-day threat actualization, rapid spreading of the RCS worm and reduction of survival time, securing a security model to ensure the survivability of the network became an urgent problem that the existing solution-oriented security measures did not address. This paper analyzes the recently studied efficient dynamic network. Essentially, this paper suggests a model that dynamically controls the RCS worm using the characteristics of Power-Law and depth distribution of the delivery node, which is commonly seen in preferential growth networks. Moreover, we suggest a model that dynamically controls the spread of the worm using information about the depth distribution of delivery. We also verified via simulation that the load for each node was minimized at an optimal depth to effectively restrain the spread of the worm.

OutBound 트래픽을 이용한 인터넷 웜 탐지 및 대응 방안 연구 (A Study of Internet Worm Detection & Response Method Using Outbound Traffic)

  • 이상훈
    • 융합보안논문지
    • /
    • 제6권4호
    • /
    • pp.75-82
    • /
    • 2006
  • 인터넷 웜은 1.25 인터넷 대란의 경우에서도 알 수 있듯이 네트워크를 마비시키고, 정보를 유출하는 등 여러 가지 피해를 준다. 본 논문에서는 이를 예방하기 위하여 자신의 PC에서 인터넷 웜을 탐지하고 자동 대응을 수행할 수 있는 방안을 제시하였다. 인터넷 웜의 특징인 트래픽 기반 네트워크 스캐닝을 탐지하여 이에 대한 대응을 수행하며, 웜에 감염된 프로세스를 중단시키고, 해당 트래픽이 외부로 유출되는 것을 방지하며, 웜에 감염된 실행파일을 고립시키고 특정위치에 이동함으로써, 사후에 웜에 대한 조사를 원활히 수행할 수 있도록 구성하였다. 이런 방식은 알려지지 않은 웜의 탐지에도 유용하며, 이를 통해 안정적인 네트워크 운영이 가능할 것이다.

  • PDF

Counter Flow 방식의 랙 다이를 이용한 고정밀도 Worm 전조기술 개발 (Development of form rolling technology for high precision worm using the rack dies of counter flow type)

  • 고대철;박준모;김병민
    • 한국정밀공학회:학술대회논문집
    • /
    • 한국정밀공학회 2003년도 춘계학술대회 논문집
    • /
    • pp.1861-1864
    • /
    • 2003
  • The objective of this study is to suggest the form rolling technology to produce high precision worm. Rack dies and roll dies are usually used to roll parts with worm teeth. The form roiling processes of worm shaft used as automotive part using the rack dies of counter flow type and the roll dies are considered and simulated by the commercial finite element code, DEFORM-3D. It is also important to determine the initial blank diameter in form rolling because it affects the quality of thread. The calculation method of the initial blank diameter in form rolling is suggested and it is verified by FE-simulation. The experiments using rack dies and roll dies are performed under the same conditions as those of simulation. The results of simulation and experiment in this study show that the from rolling process of worm shaft using the rack dies is decidedly superior to that using rolling dies from the aspect of the surface roughness and the profile of worm.

  • PDF

WORM-HUNTER: A Worm Guard System using Software-defined Networking

  • Hu, Yixun;Zheng, Kangfeng;Wang, Xu;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권1호
    • /
    • pp.484-510
    • /
    • 2017
  • Network security is rapidly developing, but so are attack methods. Network worms are one of the most widely used attack methods and have are able to propagate quickly. As an active defense approach to network worms, the honeynet technique has long been limited by the closed architecture of traditional network devices. In this paper, we propose a closed loop defense system of worms based on a Software-Defined Networking (SDN) technology, called Worm-Hunter. The flexibility of SDN in network building is introduced to structure the network infrastructures of Worm-Hunter. By using well-designed flow tables, Worm-Hunter is able to easily deploy different honeynet systems with different network structures and dynamically. When anomalous traffic is detected by the analyzer in Worm-Hunter, it can be redirected into the honeynet and then safely analyzed. Throughout the process, attackers will not be aware that they are caught, and all of the attack behavior is recorded in the system for further analysis. Finally, we verify the system via experiments. The experiments show that Worm-Hunter is able to build multiple honeynet systems on one physical platform. Meanwhile, all of the honeynet systems with the same topology operate without interference.

인터넷 웜 확산 억제를 위한 거시적 관점의 프레임워크 (A Macroscopic Framework for Internet Worm Containments)

  • 김철민;강석인;이성욱;홍만표
    • 한국정보과학회논문지:컴퓨팅의 실제 및 레터
    • /
    • 제15권9호
    • /
    • pp.675-684
    • /
    • 2009
  • 인터넷 웜은 분산 서비스 거부 공격 등을 통해 트래픽 장애를 유발하므로 인터넷 인프라를 사용 불능으로 만들 수 있고, 침입 기능을 갖고 있어 중요 서버를 장악하여 개인의 정보를 유출시키는 등 치명적인 피해를 일으키고 있다. 그러나 이러한 인터넷 웜을 탐지하여 대응하는 기존의 기법은 웜의 지역화된 특징만을 이용하거나 이미 알려진 웜에만 대응 가능한 단점을 지니고 있다. 본 논문에서는 알려지지 않은 웜을 상대적으로 빠른 시점에 탐지하기 위해 웜의 거시적 행위 특성을 추출하여 탐지하는 기법을 제안 한다. 이를 위해 원의 거시적인 행위를 논리적으로 정의하고, IP 패킷 환경에서 호스트간 직접적으로 전파 되는 웜을 탐지하는 기법을 제시하며, 이 기법이 실제 적용 되었을 때 웜 확신의 억제 효과를 시뮬레이션을 통해 보인다. IP 패킷 환경은 응답 시간에 대해 민감하므로 제안된 기법이 구현되었을 때 요구하는 시간을 측정하여 제시하고, 이를 통해 상대적으로 큰 오버헤드 없이 제안된 기법이 구현될 수 있음을 보인다.

바이러스 쓰로틀링의 웜 탐지 효율 향상 알고리즘 (An Algorithm for Increasing Worm Detection Effetiveness in Virus Throttling)

  • 김장복;김상중;최선정;심재홍;정기현;최경희
    • 한국정보과학회논문지:정보통신
    • /
    • 제34권3호
    • /
    • pp.186-192
    • /
    • 2007
  • 인터넷 웜 조기 탐지 기법의 대표적인 기술 중 하나인 바이러스 쓰로틀링[5, 6]은 호스트에서 생성되는 접속 요청 패킷을 지연시킴으로써 인터넷 웜의 전파를 줄이는 방법이다. 그러나 기존 바이러스 쓰로틀링은 웜의 발생 시기를 판단하는데 있어서 지연된 접속 요청 패킷의 개수만을 이용한다. 이 때문에 낮은 비율로 웜 패킷을 생성시키는 인터넷웜의 경우에는 웜 탐지 시간이 느린 단점을 가지고 있다. 본 논문에서는 이러한 단점을 해결하기 위해서 지연 큐 길이의 가중치 평균(Weighted Average Queue Length)를 구하고, 그것의 성향을 반영하여 웜 탐지 시간을 단축하고자 한다. 뿐만 아니라 본 논문에서 제안한 알고리즘은 지연큐 변화 성향 반영으로 생길 수 있는 웜 탐지의 오판 가능성을 낮추도록 설계되었다. 그리고 실제 실험을 통해서 본 논문에서 제안한 알고리즘의 성능을 평가한다.

경량화 에이전트를 이용한 확장성 있는 분산 웜 탐지 및 방지 모델 (A Scalable Distributed Worm Detection and Prevention Model using Lightweight Agent)

  • 박연희;김종욱;이성욱;김철민;우즈만;홍만표
    • 한국정보과학회논문지:컴퓨팅의 실제 및 레터
    • /
    • 제14권5호
    • /
    • pp.517-521
    • /
    • 2008
  • 웜은 사람의 개입 없이 취약점이 존재하는 네트워크 서비스에 대한 공격을 시행하고 사용자가 원치 않는 패킷을 복사 및 전파하는 악성코드이다. 기존의 웜 탐지 기법은 주로 시그너쳐 기반의 방식이 주를 이루었으나 조기탐지의 한계로 인해 최근에는 웜 전파의 행동 특성을 감지하는 방식이 각광 받고 있다. 본 논문에서는 웜 행동 주기와 감염 체인으로 대표되는 웜의 행위적 특성을 탐지하고 대응할 수 있는 분산 웜 탐지 및 방지 방법을 제안하고, 제안된 탐지 및 방지 모델 적용 시 웜의 감염 속도가 감소되는 현상을 시뮬레이션을 통해 증명한다. 제안하는 웜 탐지모델은 규모가 큰 시그너쳐 데이타베이스가 필요하지 않을 뿐더러 컴퓨팅 파워가 비교적 적게 소요되므로, 개인용 컴퓨터 뿐 아니라 유비쿼터스와 모바일 환경과 같이 개별 기기가 낮은 컴퓨팅 파워를 가지는 상황에도 적합하다.