摘要:
The present invention relates to a gene controlling the flowering time of plants, and a method for manipulating the flowering time of plants using the gene. More particularly, the present invention relates to a LOV1 gene controlling the flowering time of plants, which is isolated from Arabidopsis thaliana, and also to a method for either delaying the flowering time of plants by overexpressing the LOV1 gene in the plants, or inducing the early flowering of the plants by repressing the expression of the LOV1 gene in the plants.
摘要:
The invention relates to root-specific expansin gene to regulating root growth and obstacle-touching stress resistance in the plant, and more particularly to a root growth regulating gene, GmEXP1, isolated from soybean (Glycine max), an expansin polypeptide encoded by the gene and a method for enhancing root growth of plants by overexpression of the gene in the plants.
摘要:
An apparatus and method for providing traceback connection using a connection redirection technique are provided. A packet blocking unit blocks an attack packet transmitted to the system and a first response packet output from the system in response to the attack packet, if a system attack sensing signal is received. A response packet generation unit generates a second response packet into which a watermark is inserted, in response to the attack packet, and transmits the second response packet to a system corresponding to the source address of the attack packet. A path traceback unit receives a detection packet containing transmission path information of the second response packet from a system existing on a transmission path of the second response packet, and based on the received detection packet, traces back the transmission path of the second response packet and identifies the location of the attacker system. According to the apparatus and method, even when an attacker attacks a predetermined system via a plurality of systems, the actual location of the attacker system can be traced back fast and accurately and damage of the victim system can be minimized.
摘要:
A method and apparatus for evaluating the security of a subscriber network are provided. In the method and apparatus for evaluating the security of a subscriber network, pieces of information regarding a plurality of security functions provided by each of a plurality of network security devices connected to a network are collected, and the security functions are classified according to their types, purposes of use, and priority levels. Scores are given to the security functions using weights with reference to the classification results, and a security level for the network is determined by summing the scores of the security functions. Therefore, it is possible to objectively evaluate how secure a network is against cyber attacks launched internally or externally upon the network. In addition, it is possible to evaluate security functions provided by network security devices in a network in advance and enhance the performance of the security functions based on the evaluation results.
摘要:
A device for an Internet-worm treatment and a system patch using a movable storage unit is provided. The device includes: the movable storage unit for storing an integral program and integrity verification information; a program initializing unit for confirming an integrity of the Internet-worm treatment and system patch program by using the integrity verification information; a system control unit for cutting off a performance of the Internet worm malfunctioning the computer system, in case where the integrity is verified by the program initializing unit; a server unit for storing recent patch information and Internet-worm information; a treatment-information acquiring unit for acquiring the recent patch information and Internet-worm information, which is not applied to the infected computer system, from the server unit; and a system restoring unit for receiving the recent patch information and Internet-worm information from the treatment-information acquiring unit and applying the received information to the program, to perform the Internet-worm treatment and the system patch for the computer system.
摘要:
A network simulation apparatus and method for analyzing abnormal network traffic are provided. The network simulation apparatus includes: a traffic information collection unit, which collects traffic information in real time from a network; a simulator, which performs a simulation operation in a virtual network topology environment according to a predetermined scenario, the virtual network topology environment generating virtual traffic including a normal virtual packet modeled based on a normal traffic environment and an abnormal virtual packet modeled based on an abnormal traffic environment with a network traffic attack launched thereupon based on the collected real-time traffic information; and an interface unit, which provides the simulation operation results to a user. Accordingly, it is possible to effectively detect, analyze, and deal with abnormal network traffic that has occurred in a network to be managed.