• Title/Summary/Keyword: 보안문제

Search Result 3,066, Processing Time 0.036 seconds

Efficient countermeasures against e-terrorism (e-테러리즘의 효율적 통제방안)

  • Lee, Yoon-Ho;Kim, Dae-Kwon
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.271-289
    • /
    • 2009
  • In e-terrorism, terrorists use cyber spaces including the internet in order to strike terror into the heart of a nation. It is revealed that recently happening terror cases use cyber spaces as a strategic tool. This research aims to investigate efficient countermeasures against various types of terror attacks made by terrorists and their cyber networking, in order to contribute to the prevention of terrors from a modern standpoint. Based on the results of the investigation, relevant problems are suggested such that terrors are not cases happening in a specific country only because they take place in cyber spaces, that hacking incidents frequently happen in Korea which is used as a footstool by foreign hackers, and that Korea has poor professional security manpower and foundational facilities in comparison with other advanced countries. Answers to the problems include cultivating cyber information manpower to cope with e-terrorism, making an appropriate budget, setting up networks to integrate and systematize anti-e-terrorism organizations, and intensifying the collection of information of cyber attacks and the analysis of the information.

  • PDF

Design and Evaluation of an Anomaly Detection Method based on Cross-Feature Analysis using Rough Sets for MANETs (모바일 애드 혹 망을 위한 러프 집합을 사용한 교차 특징 분석 기반 비정상 행위 탐지 방법의 설계 및 평가)

  • Bae, Ihn-Han;Lee, Hwa-Ju
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.27-35
    • /
    • 2008
  • With the proliferation of wireless devices, mobile ad-hoc networking (MANETS) has become a very exciting and important technology. However, MANET is more vulnerable than wired networking. Existing security mechanisms designed for wired networks have to be redesigned in this new environment. In this paper, we discuss the problem of anomaly detection in MANET. The focus of our research is on techniques for automatically constructing anomaly detection models that are capable of detecting new or unseen attacks. We propose a new anomaly detection method for MANETs. The proposed method performs cross-feature analysis on the basis of Rough sets to capture the inter-feature correlation patterns in normal traffic. The performance of the proposed method is evaluated through a simulation. The results show that the performance of the proposed method is superior to the performance of Huang method that uses cross-feature based on the probability of feature attribute value. Accordingly, we know that the proposed method effectively detects anomalies.

  • PDF

Stateful Virtual Proxy Server for Attack Detection based on SIP Protocol State Monitoring Mechanism (SIP 프로토콜 상태정보 기반 공격 탐지 기능을 제공하는 가상 프록시 서버 설계 및 구현)

  • Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.37-48
    • /
    • 2008
  • VoIP service is a transmission of voice data using SIP protocol on IP based network, The SIP protocol has many advantages such as providing IP based voice communication and multimedia service with cheap communication cost and so on. Therefore the SIP protocol spread out very quickly. But, SIP protocol exposes new forms of vulnerabilities on malicious attacks such as Message Flooding attack and protocol parsing attack. And it also suffers threats from many existing vulnerabilities like on IP based protocol. In this paper, we propose a new Virtual Proxy Server system in front of the existed Proxy Server for anomaly detection of SIP attack and stateful management of SIP session with enhanced security. Based on stateful virtual proxy server, out solution shows promising SIP Message Flooding attack verification and detection performance with minimized latency on SIP packet transmission.

  • PDF

Implementation of a Service Oriented Architecture based on JXTA - an SOA framework involving users - (개인사용자를 포함하는 JXTA 기반의 Service Oriented Architecture 구현)

  • Kim, Tae-Ho;Cheon, Hyeon-Jae;Kim, Jun-Ryong;Lee, Hong-Chul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.4
    • /
    • pp.21-31
    • /
    • 2007
  • This Paper presents an SOA framework that enables smooth provision of service to ordinary users while also replacing the current B2B environment-oriented SOA framework. To that end, the proposed SOA will be reviewed for its concept, characteristics, and components. Key to its design is that it will be implemented using the prospective next-generation P2P platform known as JXTA. The proposed framework includes all the basic functions of other SOA frameworks, and will make Provision and use of services more easy compared with other frameworks. Under this service, data and applications controlling these data are provided in an enabling format, thereby addressing security problems. Another advantage of this proposed framework is that each peer is able to play all roles of a service provider, service client, and service registry.

  • PDF

Determination of Elastic Constants of Transversely Isotropic Rocks from a Single Test Specimen. (단일 시편을 이용한 평면 이방성 암석의 탄성계수 결정)

  • 장보안;나광희;장명환
    • Tunnel and Underground Space
    • /
    • v.11 no.1
    • /
    • pp.72-78
    • /
    • 2001
  • A method to determine elastic constants for transversely isotropic rock using a single uniaxial compression test was proposed by Kim(1995). However, some problems were found when this method was applied. We derived two different equations in determination of elastic constants using V$\sub$12/ and V$\sub$21/ and performed uniaxial compression tests for two specimens whose angles between transversely isotropic plane and horizontal plane are 30$^{\circ}C$ and 65$^{\circ}C$. The anisotropic elastic constants should be calculated with different equations depend on the angle. If the anisotropic angle is lower than 45$^{\circ}$, V$\sub$21/ may be used. However, if the anisotropic angle is higher than 45$^{\circ}$, V$\sub$12/ may be used.

  • PDF

Authentication of Hierarchical Mobile IPv6 Handover Using Modified Return Rotability (Modified Return Routability를 이용한 Hierarchical Mobile IPv6 Handover 인증 기법)

  • Kim, Jung-Hwan;Yu, Ki-Sung;Park, Byung-Yeon;Noh, Min-Ki;Mun, Young-Song
    • Journal of Internet Computing and Services
    • /
    • v.8 no.6
    • /
    • pp.21-28
    • /
    • 2007
  • Hierarchical Mobile IPv6 improves performance of Mobile IPv6 by managing Binding Update in terms of location, With improved handover delay, realization of delay-sensitive services (e,g, VoIP or video streaming) has become more persuadable, Comparing with Mobile IPv6, however, Hierarchical Mobile IPv6 brings security threats related to Local Binding Update to mobile network, In the RFC 4140, specific methods to authenticate Local Binding Update message are not explicitly presented. It is essential that design secure architecture to address problems related to authenticating Local Binding Update, Many secure suggestions for Local Binding Update, however, concentrate on infrastructure-based solutions such as AAA PKI. These approaches may cause scalability problem when the suggested solutions are applied to real network. Therefore we suggest authentication method that doesn't require infrastructure, In addition to authentication of Local Binding Update, our method also provides mobile node with power saving ability.

  • PDF

Deep Learning-Based User Emergency Event Detection Algorithms Fusing Vision, Audio, Activity and Dust Sensors (영상, 음성, 활동, 먼지 센서를 융합한 딥러닝 기반 사용자 이상 징후 탐지 알고리즘)

  • Jung, Ju-ho;Lee, Do-hyun;Kim, Seong-su;Ahn, Jun-ho
    • Journal of Internet Computing and Services
    • /
    • v.21 no.5
    • /
    • pp.109-118
    • /
    • 2020
  • Recently, people are spending a lot of time inside their homes because of various diseases. It is difficult to ask others for help in the case of a single-person household that is injured in the house or infected with a disease and needs help from others. In this study, an algorithm is proposed to detect emergency event, which are situations in which single-person households need help from others, such as injuries or disease infections, in their homes. It proposes vision pattern detection algorithms using home CCTVs, audio pattern detection algorithms using artificial intelligence speakers, activity pattern detection algorithms using acceleration sensors in smartphones, and dust pattern detection algorithms using air purifiers. However, if it is difficult to use due to security issues of home CCTVs, it proposes a fusion method combining audio, activity and dust pattern sensors. Each algorithm collected data through YouTube and experiments to measure accuracy.

Design and Verification of Applied Public Information Based Authentication Protocol in the Message Security System (공개정보를 이용한 메시지 보안 시스템의 인증 프로토콜 설계 및 검증)

  • 김영수;신승중;최흥식
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.8 no.1
    • /
    • pp.43-54
    • /
    • 2003
  • E-Commerce, characterized by the exchange of message, occurs between individuals, organizations, or both. A critical promotion factor of e-Commerce is message authentication, the procedure that allows communicating parties to verify the received messages are authentic. It consists of message unforgery, message non-repudiation, message unalteration, and origin authentication. It is possible to perform message authentication by the use of public key encryption. PGP(Pretty Good Privacy) based on X.400 MHS(Message Handling System) and PKC(Public Key Cryptosystem) makes extensive use of message exchange. In this paper we propose, design and implement NMAP(New Message Authentication Protocol), an applied public information based encryption system to solve the message authentication problem inherent in public key encryption such as X.400 protocol and PGP protocol and were to cope with the verification of NMAP using fuzzy integral. This system is expected to be use in the promotion of the e-Commerce and can perform a non-interactive authentication service.

  • PDF

Improving Data Availability by Data Partitioning and Partial Overlapping on Multiple Cloud Storages (다수 클라우드 스토리지로의 데이터 분할 및 부분 중복을 통한 데이터 가용성 향상)

  • Park, Jun-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1498-1508
    • /
    • 2011
  • A cloud service customer has no other way but to wait for his lost data to be recovered by the cloud service provider when the data was lost or not accessible for a while due to the provider's system failure, cracking attempt, malfunction, or outage. We consider a solution to address this problem that can be implemented in the cloud client's domain, rather than in the cloud service provider's domain. We propose a high level architecture and scheme for successfully retrieving data units even when several cloud storages are not accessible at the same time. The scheme is based on a clever way of partitioning and partial overlapping of data for being stored on multiple cloud storages. In addition to providing a high level of data availability, the scheme makes it possible to re-encrypt data units with new keys in a user transparent way, and can produce the complete log of every user's data units accessed, for assessing data disclosure, if needed.

Biometrics System Technology Trends Based on Biosignal (생체신호 기반 바이오인식 시스템 기술 동향)

  • Choi, Gyu-Ho;Moon, Hae-Min;Pan, Sung-Bum
    • Journal of Digital Convergence
    • /
    • v.15 no.1
    • /
    • pp.381-391
    • /
    • 2017
  • Biometric technology is a technology for authenticating a user using the physical or behavioral features of the inherent characteristics of the individual. With the necessity and efficiency of the technology in the fields of finance, security, access control, medical welfare, inspection, and entertainment, the service range has been expanding. Biometrics using biometric information such as fingerprints and faces have been exposed to counterfeit and disguised threats and become a social problem. Recent studies using a bio-signal from the inside of the body other than the bio-information of the external body are being developed. This paper analyzes the recent research and technology of biometric systems using bio-signals, ECG, heart sounds, EEG, and EMG to present the skills needed for the development direction. In the future, utilizing the deep learning to build and analyze database to manage bio-signal based big data for the complex condition of individuals, biometrics technologies suitable for real time environment are expected to be researched.