• Title/Summary/Keyword: 다중 인증

Search Result 303, Processing Time 0.034 seconds

Classification of Tor network traffic using CNN (CNN을 활용한 Tor 네트워크 트래픽 분류)

  • Lim, Hyeong Seok;Lee, Soo Jin
    • Convergence Security Journal
    • /
    • v.21 no.3
    • /
    • pp.31-38
    • /
    • 2021
  • Tor, known as Onion Router, guarantees strong anonymity. For this reason, Tor is actively used not only for criminal activities but also for hacking attempts such as rapid port scan and the ex-filtration of stolen credentials. Therefore, fast and accurate detection of Tor traffic is critical to prevent the crime attempts in advance and secure the organization's information system. This paper proposes a novel classification model that can detect Tor traffic and classify the traffic types based on CNN(Convolutional Neural Network). We use UNB Tor 2016 Dataset to evaluate the performance of our model. The experimental results show that the accuracy is 99.98% and 97.27% in binary classification and multiclass classification respectively.

Mobile 3D Content Watermarking Scheme Based on Anonymous Buyer-Seller Watermarking Protocol (익명 Buyer-Seller 워터마킹 프로토콜 기반의 모바일 3D 콘텐츠 워터마킹 기법)

  • Seung, Teak-Young;Lee, Suk-Hwan;Park, Seung-Seop;Kwon, Ki-Ryong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1539-1542
    • /
    • 2009
  • 최근 모바일 단말 기술과 정보통신 기술의 급격한 발달로 국내외 이동통신사들은 새로운 킬러 콘텐츠로 주목받고 있는 모바일 3D 게임을 앞 다투어 제작 및 서비스하고 있다. 모바일 3D 게임의 경우, 용량 증가로 인한 데이터 통신비 부담을 줄이기 위하여 PC 다운로드 S/W을 통한 다운로드 방법이 제공되면서 불법 복제 우려에 대한 관심이 높아지고 있다. 현재 불법 복제 방지와 관련하여 GVM/GNEX 인증 모듈이 적용되고 있으나, 모바일 3D 콘텐츠에 대한 저작권 보호 기술 및 워터마킹 기술을 적용함으로써 콘텐츠 접근제어 및 불법배포 추적을 동시에 달성할 수 있다. 따라서 본 논문에서는 모바일 3D 콘텐츠의 저작권 보호를 위하여 익명 Buyer-Seller 워터마킹 프로토콜 상에서 3D 콘텐츠 내의 공간영역 및 암호화 영역 내에 다중 워터마크를 삽입하는 방법을 제안한다. 성능평가를 위한 비가시성 및 강인성 실험을 통하여 본 제안 기법의 콘텐츠 접근제어가 가능하며 비가시성, 강인성 면에서 우수함을 확인하였다.

Aircraft Digital Fly-By-Wire System Technology Development Trend (항공기 디지털 전자식 비행제어 시스템 기술 개발 동향)

  • Seong-Byeong Chae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.3
    • /
    • pp.509-520
    • /
    • 2023
  • In this paper, the structure and the characteristics of the Fly-By-Wire system applied to the civil aircraft was described. The development trend of the redundant method of the flight control system, data communication system, control surface actuation system and the control laws implemented by the Fly-By-Wire system of the civil aircraft are discussed. The Fly-By-Wire system was first applied to the fighter and its inherent advantages lead to the advent of the Fly-By-Wire civil aircraft. Recently even the small jet aircraft shows the trend of adopting the Fly-By-Wire system. In the future, most of the aircraft are expected to be the Fly-By-Wire type.

Malicious Node Detection Method using Secure Path in Wireless Ad Hoc Network (무선 애드-혹(Ad-Hoc) 네트워크에서의 보안 경로를 이용한 악의적인 노드 탐지)

  • Cha, Hyun-jong;Han, In-sung;Ryou, Hwang-bin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.1198-1201
    • /
    • 2007
  • 무선 Ad-Hoc 네트워크는 노드의 참여와 이탈이 자유롭고 토폴로지의 변화가 많아 악의적인 노드에 의해 데이터의 무결성 및 기밀성 문제와 같은 보안 위협에 노출되어 있다. 또한 악의적인 노드의 참여로 잘못된 라우팅 정보의 삽입을 통해 네트워크 분할이나 잘못된 정보전달 제공으로 노드의 통신장애를 유발할 수 있다. 그러나 현재 이와 같은 무선 Ad-Hoc 네트워크에서의 악의적인 노드를 발견하고 대응할 수 있는 연구가 부족하며, 기존의 악의적인 노드 탐지 기술들[11][12][13][14]은 정상적인 노드임에도 불구하고 거짓으로 신고했을 경우 인증절차 없이 경로를 재탐색하여 최적의 경로를 변경시킴으로서 정상적인 전송환경을 구축하지 못하는 문제점이 있다. 본 논문에서는 다중경로 기반의 보안경로 탐색기술[8]을 이용해 보안경로에 존재하는 중간노드들 사이에서 악의적인 노드를 발견한고, 검증된 최단경로를 통해 데이터전송을 하는 기법을 제안하고자 한다. 제안한 기법을 적용함으로써 노드에 대한 신고가 있을 때 확인과정을 거쳐 불필요하게 경로를 재탐색하는 과정을 줄일 수 있다.

Development of a 4S Multiple Media Switching Server and an Information Exchange System (4S 다중매체 스위칭 서버와 육해상 정보교환 시스템 개발)

  • Mun, Seong-Mi;Jang, Won-Seok;Son, Joo Yong;Yang, Gyu-Sik
    • Journal of Navigation and Port Research
    • /
    • v.37 no.3
    • /
    • pp.275-281
    • /
    • 2013
  • Ship Standard Network was submitted as a common subject of e-navigation by 81th IMO MSC 2005. This agenda was given an official status with strategy planning of e-navigation for Ship Standard Network after approval of WG program of 81th MSC 2006. Nowadays approximately 400 heterogeneous navigation and communication equipments are working on ships at sea. Standardization of ship network is to support exchanging various data efficiently. Among them, 4S network is defined as a wireless communication network between ship to ship and ship to shore which provides unceasing communication channel ship to shore. It has been expected to trigger various services and applications based on 4S network. However, no technologies and products has been appeared at fields yet. but now there's not specific technologies and developing products. In this paper, We developed a 4S multiple media switching server and a ship-land information exchange system to overcome the heterogeneity and provide efficient communication environments.. The performance of the implemented system was verified by TTA(Telecommunications Technology Association) V&V(Verification and Validation).

Pairwise Key Agreement Protocols Using Randomness Re-use Technique (난수 재사용 기법을 이용한 다중 키 교환 프로토콜)

  • Jeong, Ik-Rae;Lee, Dong-Hoon
    • The KIPS Transactions:PartC
    • /
    • v.12C no.7 s.103
    • /
    • pp.949-958
    • /
    • 2005
  • In the paper we study key agreement schemes when a party needs to establish a session key with each of several parties, thus having multiple session keys. This situation can be represented by a graph, tailed a key graph, where a vertex represents a party and an edge represents a relation between two parties sharing a session key. graphs to establish all session keys corresponding to all edges in a key graph simultaneously in a single session. A key agreement protocol of a key graph is a natural extension of a two-party key agreement protocol. We propose a new key exchange model for key graphs which is an extension of a two-party key exchange model. using the so-called randomness re-use technique which re-uses random values to make session keys for different sessions, we suggest two efficient key agreement protocols for key graphs based on the decisional Diffie-Hellman assumption, and prove their securities in the key exchange model of key graphs. Our first scheme requires only a single round and provides key independence. Our second scheme requires two rounds and provides forward secrecy. Both are proven secure In the standard model. The suggested protocols are the first pairwise key agreement protocols and more efficient than a simple scheme which uses a two-party key exchange for each necessary key. Suppose that a user makes a session key with n other users, respectively. The simple scheme's computational cost and the length of the transmitted messages are increased by a factor of n. The suggested protocols's computational cost also depends on n, but the length of the transmitted messages are constant.

Estimation of sediment deposition rate in collapsed reservoirs(wetlands) using empirical formulas and multiple regression models (경험공식 및 다중회귀모형을 이용한 붕괴 저수지(습지) 비퇴사량 추정)

  • Kim, Donghyun;Lee, Haneul;Bae, Younghye;Joo, Hongjun;Kim, Deokhwan;Kim, Hung Soo
    • Journal of Wetlands Research
    • /
    • v.23 no.4
    • /
    • pp.287-295
    • /
    • 2021
  • As facilities such as dam reservoir wetlands and agricultural irrigation reservoir wetlands are built, sedimentation occurs over time through erosion, sedimentation transport, and sediment deposition. Sedimentation issues are very important for the maintenance of reservoir wetlands because long-term sedimentation of sediments affects flood and drought control functions. However, research on resignation has been estimated mainly by empirical formulas due to the lack of available data. The purpose of this study was to calculate and compare the sediment deposition rate by developing a multiple regression model along with actual data and empirical formulas. In addition, it was attempted to identify potential causes of collapse by applying it to 64 reservoir wetlands that suffered flood damage due to the long rainy season in 2020 due to reservoir wetland sedimentation and aging. For the target reservoir, 10 locations including the GaGog reservoir located in Miryang city, Gyeongsangnam province in South Korea, where there is actual survey information, were selected. A multiple regression model was developed in consideration of physical and climatic characteristics, and a total of four empirical formulas and sediment deposition rate were calculated. Using this, the error of the sediment deposition rate was compared. As a result of calculating the sediment deposition rate using the multiple regression model, the error was the lowest from 0.21(m3km2/yr) to 2.13(m3km2/yr). Therefore, based on the sediment deposition rate estimated by the multi-regression model, the change in the available capacity of reservoir wetlands was analyzed, and the effective storage capacity was found to have decreased from 0.21(%) to 16.56(%). In addition, the sediment deposition rate of the reservoir where the overflow damage occurred was relatively higher than that of the reservoir where the piping damage occurred. In other words, accumulating sediment deposition rate at the bottom of the reservoir would result in a lack of acceptable effective water capacity and reduced reservoir flood and drought control capabilities, resulting in reservoir collapse damage.

A Protection System of Medical Information using Multiple Authentication (다중 인증 기술을 이용한 의료정보 보호시스템)

  • Kim, Jin-Mook;Hong, Seong-Sik
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.3-8
    • /
    • 2014
  • Recently, A utilization request of the U-Healthcare services are increasing rapidly. This is because the increase in smartphone users and ubiquitous computing technology was developed. Furthermore, the demand for access to and use of medical information systems is growing rapidly with a smartphone. This system have the advantage such as they can access from anywhere and anytime in the healthcare information system using their smartphone quickly and easily. But this system have various problems that are a privacy issue, the location disclosure issue, and the potential infringement of personal information. this problems are arise very explosive. Therefore, we propose a secure information security system that can solve the security problems in healthcare information systems for healthcare workers using smartphone. Our proposed system, doctors record, store, modify and manage patient medical information and this system would be safer than the existing healthcare information systems. The proposed system allows the doctor to perform further authentication by transmitting using SMS to GOTP message when they accessing medical information systems. So our proposed system can support to more secure system that can protect user individual information stealing and modify attack by two-factor authentication scheme. And this system can support confidentiality, integrity, location information blocking, personal information steal prevent using cryptography algorithm that is easy and fast.

The Factors Influencing Understanding on Patient Safety Culture in General Hospital Employees (일 지역 종합병원 종사자들의 환자 안전문화 인식에 미치는 요인)

  • Jung, Sang-Jin;Ryu, So Yeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.10
    • /
    • pp.281-289
    • /
    • 2017
  • This study was conducted to evaluate understanding of patient safety culture and the factors that influence this understanding among general hospital employees. To collect data, this study surveyed 343 employees of five general hospitals that were located in G metropolitan city and were authorized through medical institute certification. The data were collected from March 12 to April 21, 2017. For the data collected, a t-test, variance analysis, post-hoc analysis, and multiple regression analysis were conducted. The analyses revealed that the scores of understanding of patient safety culture were $3.27{\pm}.27$ with a perfect score of 5. Analysis of differences in understanding of patient safety culture revealed significant differences according to hospital service career, present department service career, professional career, and work units. Factors that influence understanding of patient safety culture were more than 11 year- hospital service career, 6 and 10 service years, and ward employees. Overall, the results of this study suggest that employees should receive education to improve understanding of patient safety culture and measures to change the understanding should be developed.

On the Optimal Selection of Wireless Access in Interoperating Heterogeneous Wireless Networks (3G/WLAN/휴대인터넷 연동상황을 고려한 사용자의 최적 무선접속서비스 선택방법에 대한 연구)

  • Cho Geun-Ho;Choe Jin-Woo;Jun Sung-Ik;Kim Young-Sae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.5B
    • /
    • pp.456-477
    • /
    • 2006
  • Due to advances in wireless communication technology and increasing demand for various types of wireless access, cellular, WLAN, and portable internet(such as WiBro and IEEE 802.16) systems are likely to be integrated into a unified wireless access system. This expectation premises the availability of multi-mode handsets and cooperative interworking of heterogenous wireless access networks allied by roaming contracts. Under such environments, a user may lie in the situation where more than one wireless accesses are available at his/her location, and he/she will want to choose the 'best' access among them. In this paper, we define the 'best' access(es) as the access(es) that charges minimum cost while fulfilling the required QoS of wireless access, and address the problem of choosing the optimal set of accesses theoretically by introducing a graph representation of service environment. Two optimal selection algorithms are proposed, which individually consider cases where single or multiple wireless access can be supported by multi-mode handsets.