• Title/Summary/Keyword: 공격 모델

Search Result 857, Processing Time 0.027 seconds

A Mesh Watermarking Using Patch CEGI (패치 CEGI를 이용한 메쉬 워터마킹)

  • Lee Suk-Hwan;Kwon Ki-Ryong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.1
    • /
    • pp.67-78
    • /
    • 2005
  • We proposed a blind watermarking for 3D mesh model using the patch CEGIs. The CEGI is the 3D orientation histogram with complex weight whose magnitude is the mesh area and phase is the normal distance of the mesh from the designated origin. In the proposed algorithm we divide the 3D mesh model into the number of patch that determined adaptively to the shape of model and calculate the patch CEGIs. Some cells for embedding the watermark are selected according to the rank of their magnitudes in each of patches after calculating the respective magnitude distributions of CEGI for each patches of a mesh model. Each of the watermark bit is embedded into cells with the same rank in these patch CEGI. Based on the patch center point and the rank table as watermark key, watermark extraction and realignment process are performed without the original mesh. In the rotated model, we perform the realignment process using Euler angle before the watermark extracting. The results of experiment verify that the proposed algorithm is imperceptible and robust against geometrical attacks of cropping, affine transformation and vertex randomization as well as topological attacks of remeshing and mesh simplification.

A Design of Lightweight Mutual Authentication Based on Trust Model (신용모델 기반의 경량 상호인증 설계)

  • Kim Hong-Seop;Cho Jin-Ki;Lee Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.237-247
    • /
    • 2005
  • Ubiquitous Sensor Network(USN) is the very core of a technology for the Ubiquitous environments. There is the weakness from various security attacks such that tapping of sensor informations, flowing of abnormal packets, data modification and Denial of Service(DoS) etc. And it's required counterplan with them. Especially it's restricted by the capacity of battery and computing. By reasons of theses. positively, USN security technology needs the lightweighted design for the low electric energy and the minimum computing. In this paper, we propose lightweight USN mutual authentication methology based on trust model to solve above problems. The proposed authentication model can minimize the measure of computing because it authenticates the sensor nodes based on trust information represented by subjective logic model. So it can economize battery consumption and resultingly increse the lifetime of sensor nodes.

  • PDF

PRISM: A Preventive and Risk-reducing Integrated Security Management Model using Security Label (PRISM: 보안 레이블을 이용한 위험예방 통합보안관리 모델)

  • Kim, Dong-Soo;Kim, Tae-Kyung;Chung, Tai-Myoung
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.815-824
    • /
    • 2003
  • Many organizations operate security systems and manage them using the intergrated secutity management (ISM) dechnology to secyre their network environment effectively. But current ISM is passive and behaves post-event manner. To reduce cost and resource for managing security and to remove possbility of succeeding in attacks by intruder, the perventive security management technology is required. In this paper, we propose PRISM model that performs preventative security management with evaluating the security level of host or network and the sensitivity level of information asset from potential risks before security incidents occur. The PRISM can give concrete and effective security management in managing the current complex networks.

A Model for Self-Authentication Based on Decentralized Identifier (탈중앙화 신원증명에 기반한 본인 인증 모델)

  • Kim, Ho-Yoon;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.11
    • /
    • pp.66-74
    • /
    • 2021
  • With the development of the Internet, user authentication technology that proves me online is improving. Existing ID methods pose a threat of personal information leakage if the service provider manages personal information and security is weak, and the information subject is to the service provider. In this study, as online identification technology develops, we propose a DID-based self-authentication model to prevent the threat of leakage of personal information from a centralized format and strengthen sovereignty. The proposed model allows users to directly manage personal information and strengthen their sovereignty over information topics through VC issued by the issuing agency. As a research method, a self-authentication model that guarantees security and integrity is presented using a decentralized identifier method based on distributed ledger technology, and the security of the attack method is analyzed. Because it authenticates through DID Auth using public key encryption algorithms, it is safe from sniffing, man in the middle attack, and the proposed model can replace real identity card.

The Relationship between Rejection Sensitivity and Reactive Aggression in University Students: Mediating Effects of Self-Concept Clarity and Hostile Attribution Bias (대학생의 거부민감성과 반응적 공격성 간의 관계: 자기개념 명확성과 적대적 귀인편향의 매개효과)

  • Geonhee Lee ;Minkyu Rhee
    • Korean Journal of Culture and Social Issue
    • /
    • v.29 no.4
    • /
    • pp.477-496
    • /
    • 2023
  • The purpose of this study is to examine the relationship between rejection sensitivity and reactive aggression among college students, as well as to determine the mediating effects of self-concept clarity and hostile attribution bias on the relationship between rejection sensitivity and reactive aggression. A self-report questionnaire was conducted online for the purpose of gathering data from university students aged 18 years and older. A total of 250 participants were included in the analysis. SPSS 27.0 was used for data analysis to check the basic statistics of the variables, frequency analysis, reliability analysis, and correlation analysis. In addition, the model fit was checked using Amos 21.0, and the bootstrapping method verified the significance of the indirect effect. The results of this study are as follows. The results of this study are as follows. First, rejection sensitivity positively affects reactive aggression through self-concept clarity. Second, rejection sensitivity increases the hostile attribution bias, leading to an increase in reactive aggression. Third, rejection sensitivity positively influences reactive aggression in an indirect way by sequentially affecting self-concept clarity and hostile attribution bias. These findings have implications as they identify psychological factors that affect reactive aggression in college students. This suggests the importance of utilizing psychological interventions to address reactive aggression associated with social problems, such as crime, and provides a foundation for both treatment and prevention. Finally, implications for further research and limitations of this study are suggested.

Implementation of Hybrid P2P Secure Multicast (혼합 P2P 보안 멀티캐스트 구현)

  • 문정환;송기범;방극인;안성수;이준
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.11b
    • /
    • pp.766-769
    • /
    • 2003
  • 최근 수 년간 클라이언트/서버 모델에서 발생하는 문제인 서버 병목 현상, DoS(Denial of Service) 공격, 그리고 시스템의 확장성에 따르는 비용 증가 등의 문제를 해결하기 위한 방법으로 P2P(Peer-to-Peer)의 프로토콜 개선과 통신 모델 개선에 대해서 연구가 활발히 진행되고 있다. 본 논문에서는 기존의 멀티캐스트 프로토콜들을 살펴보고 제안하는 멀티캐스트 프로토콜인 GSAKMP(Group Secure Association Key Management Protocol )를 이용한 보안 멀티캐스트 환경을 구현 한다.

  • PDF

GPS를 적용한 이상금융거래탐지시스템 모델

  • Lee, Min-Gyu;Son, Hyo-Jeong;Seong, Baek-Min;Kim, Jong-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.219-221
    • /
    • 2015
  • 스마트폰의 확산으로 금융관련 결제는 어디서나 가능하게 되었기에 편리함이 증가하였다. 하지만, 위와 같은 편리함과 동시에 사용자의 단말이 해커의 공격에 취약하거나 분실할 경우 심각한 문제가 된다. 따라서, 위와 같은 부정행위가 있을 경우 이를 자동으로 탐지하는 시스템이 필요하다. 그러므로, 본 논문은 이러한 문제점을 고려하여 스마트폰을 이용한 금융업무를 처리할때 GPS정보를 적용한 이상금융거래탐지시스템(Fraud Detection System) 모델을 제안한다.

  • PDF

A Study on the Hierarchical Integrated Security Management System for the Large Scale Organization (대규모 조직에 적합한 계층적 구조의 통합보안관리시스템에 관한 연구)

  • 박준홍;남길현
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.348-352
    • /
    • 2001
  • 본 논문은 다양한 침입행위를 탐지하고 보안시스템의 효율적 관리를 보장하는 국방전산망과 같은 대규모 네트워크 환경에 적합한 계층적 구조의 통합보안관리시스템 모델에 대한 연구이다. 전산망 위협요소 및 공격유형에 따른 취약점을 분석하여 필요한 전산망 보호기술을 판단하고 침입차단/탐지시스템, 안티바이러스 시스템, 취약점분석 시스템 등의 보안시스템과 상호연동 모델을 분석하여, 도출된 요구사항을 기반으로 대규모 조직에 적합한 계층구조의 통합보안관리시스템의 구축 방안을 제시하였다.

  • PDF

A Study on Modeling Security Attributes of S/W System (S/W 시스템의 보안속성 모델링 사례연구)

  • 박범주;김성수
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.451-453
    • /
    • 2004
  • S/W 시스템의 보안속성에 대한 QoS 요구조건을 적용하기 위해서는 침입에 대한 객관적 모델 및 정량적 분석이 가능해야 한다. 즉, 특정 침입에 대응하는 보안기능의 존재여부를 중심으로 시스템의 성능을 평가하는 정성적 방식이 아닌 보안시스템의 분석적 모델에 의해 침입 형태별로 어떤 성능을 나타내는지를 수치적으로 제시할 필요가 있다. 본 논문에서는 Intrusion Tolerant System(이하 ITS라 함) 모델링에 대한 관련연구를 바탕으로 DoS 공격 등 침입양태별 모델링 사례를 시뮬레이션을 통해 분석하고 모델링의 방향을 제시하고자 한다.

  • PDF

Emergence-Based Security Model (창발 기반 보안 모델)

  • 고성범;임기영
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2000.05a
    • /
    • pp.158-161
    • /
    • 2000
  • 정의에 의해서, 창발의 개념은 보다 낮은 레벨의 하위 개념으로 환원될 수 없다. 따라서 해커의 입장에서 볼 때, 창발적 정보를 이면에서 훔치거나 공격하는 일은 구조적으로 어려운 일이다. 생명체는 대표적인 창발 시스템이며 생명체 패러다임으로 구축된 시스템은 보안의 관점에서 결정적인 유리함을 갖게 된다. 본 논문에서는 창발 이론에 기반한 생명체 모델 SAM을 제안한다. SAM은 몇 가지 중요한 생명현상을 가질 수 있다. 본 논문에서는 SAM을 이용한 정보 시스템이 갖는 보안상의 특성과 유용성을 분석한다.

  • PDF