To directly investigate the dynamic nanoscale phenomenon on the surface being processed in wet conditions such as precision polishing, and cleaning in semiconductor industrial, an optical method for visualization and ...
详细信息
To directly investigate the dynamic nanoscale phenomenon on the surface being processed in wet conditions such as precision polishing, and cleaning in semiconductor industrial, an optical method for visualization and ...
To directly investigate the dynamic nanoscale phenomenon on the surface being processed in wet conditions such as precision polishing, and cleaning in semiconductor industrial, an optical method for visualization and observation of each sub-100 nm sized particle that is moving on an interface such as a silica glass surface by applying an evanescent field have been proposing. Subsequently, we developed an experimental apparatus equipped with an optical microscopy system for verifying the moving particle observation method in a laboratory scale. This article introduces some experimentally direct observation results of duplicated wet processes.
Increasing of Java Scripts of malware requires automatic malware detection systems in these days. Our research takes note of the appearence probability and the state transition probability of first order Markov source...
详细信息
Increasing of Java Scripts of malware requires automatic malware detection systems in these days. Our research takes note of the appearence probability and the state transition probability of first order Markov source for both of malware Java Script and other Java Script. The preexperiments found statistical significance. We propose the malware detection method using Mahalanobis-distance with the probability variable of the appearance probability of characters and the probability variable of state transition probability of first order Markov source. As the results of experiments, the method of combining two probability variables proved the effectiveness compared to the method using single probability variable.
To defend DoS (Denial of Service) Attacks, an access filtering mechanism is adopted in the end servers or the IDS (Intrusion Detection System). The difficulty to define the filtering rules lies where normal and anomal...
详细信息
ISBN:
(纸本)9781424435692
To defend DoS (Denial of Service) Attacks, an access filtering mechanism is adopted in the end servers or the IDS (Intrusion Detection System). The difficulty to define the filtering rules lies where normal and anomaly packets have to be distinguished in incoming packets. The purpose of our research is to explore the earl), detective method for anomaly accesses based on statistic analysis. In this paper we defined the chi-square method, and then analyze the all amount of incoming packets to our College focusing on the source IP address using chi-square method. As the results, we were able to extract the following features. Firstly, the number of packets was the more suitable scale of the window in the chi-square method than the time scale. Secondly, the setting of the window size with 500 packets and 2 bins made the detection of the DoS attacks within. 10 minutes for DNS packets possible. Finally, we verified that the DoS attacks from the same source IP address was detected using the chi-square method.
To defend DoS (denial of service) attacks, an access filtering mechanism is adopted in the end servers or the IDS (intrusion detection system). The difficulty to define the filtering rules lies where normal and anomal...
详细信息
ISBN:
(纸本)9781424435692
To defend DoS (denial of service) attacks, an access filtering mechanism is adopted in the end servers or the IDS (intrusion detection system). The difficulty to define the filtering rules lies where normal and anomaly packets have to be distinguished in incoming packets. The purpose of our research is to explore the early detective method for anomaly accesses based on statistic analysis. In this paper, we defined the chi-square method, and then analyze the all amount of incoming packets to our College focusing on the source IP address using chi-square method. As the results, we were able to extract the following features. Firstly, the number of packets was the more suitable scale of the window in the chi-square method than the time scale. Secondly, the setting of the window size with 500 packets and 2 bins made the detection of the DoS attacks within 10 minutes for DNS packets possible. Finally, we verified that the DoS attacks from the same source IP address was detected using the chi-square method.
To defend DoS (denial of service) Attacks, the access filtering mechanism is adopted on the end servers or the IDS (intrusion detection system). The difficulty to define the filtering rules comes from the hardness to ...
详细信息
To defend DoS (denial of service) Attacks, the access filtering mechanism is adopted on the end servers or the IDS (intrusion detection system). The difficulty to define the filtering rules comes from the hardness to identify normal and anomaly packets from the incoming packets. In this paper, we analyze the amount of incoming packet to our college and extract characters of IP packets classified by the source and destination IP addresses and destination port numbers. We can clearly identify the countries and providers of denial packets and extract the characters of crawls of search engines.
暂无评论