• Title/Summary/Keyword: Adaptive Security System

Search Result 105, Processing Time 0.03 seconds

Adaptive Multi-Layer Security Approach for Cyber Defense (사이버 방어를 위한 적응형 다중계층 보호체제)

  • Lee, Seong-kee;Kang, Tae-in
    • Journal of Internet Computing and Services
    • /
    • v.16 no.5
    • /
    • pp.1-9
    • /
    • 2015
  • As attacks in cyber space become advanced and complex, monotonous defense approach of one-one matching manner between attack and defense may be limited to defend them. More efficient defense method is required. This paper proposes multi layers security scheme that can support to defend assets against diverse cyber attacks in systematical and adaptive. We model multi layers security scheme based on Defense Zone including several defense layers and also discuss essential technical elements necessary to realize multi layers security scheme such as cyber threats analysis and automated assignment of defense techniques. Also effects of multi layers security scheme and its applicability are explained. In future, for embodiment of multi layers security scheme, researches about detailed architecture design for Defense Zone, automated method to select the best defense technique against attack and modeling normal state of asset for attack detection are needed.

Improving Reliability and Security in IEEE 802.15.4 Wireless Sensor Networks (IEEE 802.15.4 센서 네트워크에서의 신뢰성 및 보안성 향상 기법)

  • Shon, Tae-Shik;Park, Yong-Suk
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.407-416
    • /
    • 2009
  • Recently, various application services in wireless sensor networks are more considered than before, and thus reliable and secure communication of sensor network is turning out as one of essential issues. This paper studies such communication in IEEE 802.15.4 based sensor network. We present IMHRS (IEEE 802.15.4 MAC-based Hybrid hop-by-hop Reliability Scheme) employing EHHR (Enhanced Hop-by-Hop Reliability), which uses Hop-cache and Hop-ack and ALC (Adaptive Link Control), which considers link status and packet type. Also, by selecting security suite depending on network and application type, energy efficiency is considered based on HAS (Hybrid Adaptive Security) Framework. The presented schemes are evaluated by simulations and experiments. Besides, the prototype system is developed and tested to show the potential efficiency.

An Efficient E-learning and Internet Service Provision for Rural Areas Using High-Altitude Platforms during COVID-19 Pan-Demic

  • Sameer Alsharif;Rashid A. Saeed;Yasser Albagory
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.71-82
    • /
    • 2024
  • This paper proposes a new communication system for e-learning applications to mitigate the negative impacts of COVID-19 where the online massive demands impact the current commu-nications systems infrastructures and capabilities. The proposed system utilizes high-altitude platforms (HAPs) for fast and efficient connectivity provision to bridge the communication in-frastructure gap in the current pandemic. The system model is investigated, and its performance is analyzed using adaptive antenna arrays to achieve high quality and high transmission data rates at the student premises. In addition, the single beam and multibeam HAP radio coverage scenarios are examined using tapered uniform concentric circular arrays to achieve feasible communication link requirements.

IDS System Using Adaptive Resonance Theory2 (Adaptive Resonance Theory2를 이용한 침입탐지 시스템)

  • 박현철;노태우;서재수;박일곤;김진원;문종섭;한광택;최대식;고재영
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.43-47
    • /
    • 2001
  • 본 논문은 신경망 이론중 하나인 Adaptive Resonance Theory(ART)을 사용하여 네트워크 상의 불법적인 침입을 탐지하는 기법에 대한 연구이다. ART는 비교사 학습을 하는 신경망으로써, 적응적인 학습능력이 있으며, 또 새로운 패턴에 대해서 새로운 클러스터를 생산하는 능력이 있다. ART의 이러한 특성을 이용하여, 여러 가지 침입패턴을 네트워크상에서 생산하여 학습을 시키고, 또 test 했으며, test 이후에도 on-line 상에서 새로운 공격 pattern도 찾아냄을 보였다. 따라서, 이미 알려진 침입뿐만 아니라 새롭게 발생하는 침입 기법에 대해서도 새로운 rule의 첨가 없이 적극적으로 대처할 수 있을 것으로 예측된다.

  • PDF

A Direction-Adaptive Watermarking Technique Based on 2DCT in the Buyer-Seller Watermarking Protocol (구매자-판매자 워터마킹 프로토콜상에서 DCT 기반의 방향성 적응 워터마킹)

  • Seong, Teak-Young;Kwon, Ki-Chang;Lee, Suk-Hwan;Kwon, Ki-Ryong;Woo, Chong-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.7
    • /
    • pp.778-786
    • /
    • 2014
  • Buyer-seller watermarking protocol is one of the copyright protection techniques which combine a cryptographic protocol used in electronic commerce with a digital wetermarking scheme aiming at proving the ownership of multimedia contents and preventing the illegal reproduction and redistribution of digital contents. In this paper, it is proposed a new watermarking scheme in an encrypted domain in an image that is based on the block-DCT framework. In order to implement watermarking scheme in a public-key cryptosystem, it is divided that frequency coefficients exist as real number into integer and decimal layer. And the decimal layer is modified integer type through integral-processing. Also, for robustness and invisibility required in watermarking scheme, it is designed a direction-adaptive watermarking scheme based on locally edge-properties of each block in an image through analyzing distribution property of the frequency coefficients in a block using JND threshold.

A Study on the Effect of Learning Activities and Feedback Seeking Behavior toward the End Users' Faithful Appropriation of Information Security System (조직내 최종사용자의 합목적적인 정보보호 시스템 사용 내재화와 학습, 피드백 추구 행동 연구)

  • Kim, Min Woong;Cheong, Ki Ju
    • The Journal of Information Systems
    • /
    • v.25 no.3
    • /
    • pp.117-146
    • /
    • 2016
  • Purpose The purpose of this paper is to examine factors and mechanism inducing end users' faithful appropriation of information security behavior through the information security system. This study is also trying to find out the role of Employees' adaptive activities like learning and feedback seeking behavior for the information security in organizations. Design/methodology/approach An empirical study was carried out with a sample of employees working in the financial service company. Employees(n = 268) completed a written questionnaire. Structural equation modeling was used to analyze the data. Findings Results indicated that employees' learning activities and feedback seeking behavior fully mediated the effect of major information security factors toward end users' faithfulness of appropriation of information security systems. In order to increase the level of employees information security behavior in accordance with security guideline, organizations should facilitate interactions that support the feedback seeking process between employees on information security awareness and behavior. Additionally, organizations may reinforce these behaviors by periodical training and adopting bounty hunter systems.

Fault Diagnosis with Adaptive Control for Discrete Event Systems

  • El Touati, Yamen;Ayari, Mohamed
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.165-170
    • /
    • 2021
  • Discrete event systems interact with the external environment to decide which action plan is adequate. Some of these interactions are not predictable in the modelling phase and require consequently an adaptation of the system to the metamorphosed behavior of the environment. One of the challenging issues is to guarantee safety behavior when failures tend to derive the system from normal status. In this paper we propose a framework to combine diagnose technique with adaptive control to avoid unsafe sate an maintain the normal behavior as long as possible.

Dynamism Competent LEACH Replication Deliberate for Wireless Sensor Network

  • KONDA HARI KRISHNA;TAPSI NAGPAL;Y. SURESH BABU
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.7-12
    • /
    • 2023
  • Remote sensor systems are utilized in a few applications, including military, restorative, ecological and family unit. In every one of these applications, vitality use is the deciding component in the execution of wireless sensor systems. Thusly, strategies for information steering and exchanging to the base station are critical in light of the fact that the sensor hubs keep running on battery control and the vitality accessible for sensors is constrained. There are two explanations for the various leveled directing Low Energy Adaptive Clustering Hierarchy convention be in investigated. One, the sensor systems are thick and a considerable measure of excess is engaged with correspondence. Second, with a specific end goal to build the versatility of the sensor arrange remembering the security parts of correspondence. In this exploration paper usage of LEACH steering convention utilizing NS2 test system lastly upgraded vitality productive EE-LEACH directing convention guarantees that the chose cluster heads will be consistently conveyed over the system with a specific end goal to enhance the execution of the LEACH convention. EE-LEACH enhances vitality utilization by around 43%.

ATCS: An Adaptive TCP Coding Scheme for Satellite IP Networks

  • Dong, Wei;Wang, Junfeng;Huang, Minhuan;Tang, Jian;Zhou, Hongxia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.5
    • /
    • pp.1013-1027
    • /
    • 2011
  • In this paper we propose ATCS, a practical TCP protocol coding scheme based on network coding for satellite IP networks. The proposal is specially designed to enhance TCP performance over satellite networks. In our scheme, the source introduces a degree of redundancy and transmits a random linear combination of TCP packets. Since the redundant packets are utilized to mask packet loss over satellite links, the degree of redundancy is determined by the link error rates. Through a simple and effective method, ATCS estimates link error rates in real time and then dynamically adjusts the redundant factor. Consequently, ATCS is adaptable to a wide range of link error rates by coding TCP segments with a flexible redundancy factor. Furthermore, the scheme is compatible with traditional TCP variants. Simulation results indicate that the proposal improves TCP performance considerably.

Design of Network Access Control by Adaptive Network Security System (적응형 네트워크 보안시스템의 네트워크 접근제어 설계)

  • Kim Dae-Sik;Park Jong-Youll;Noh Bong-Nam
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.745-748
    • /
    • 2006
  • 현재의 네트워크 시스템은 보안시스템 및 신규시스템이 추가됨에 따라 복잡함이 증가하고, 그에 따라 관리하기가 어려워져 관리자나 사용자가 이용하기에 불편함이 따른다. 또한 사용자의 잦은 변동과 단말의 이동성으로 인해 네트워크 관리하는데 있어 관리자가 해야할 일들이 많아 졌다. 따라서 앞으로의 네트워크 관리도구는 복잡성을 해결하고, 사용자의 편의성에 중점을 두어야 한다. 이러한 요구사항을 정리하여 본 논문에서는 사용자에게는 보다 쉽게 사용하고, 관리자에게는 최소비용과 관리의 용이성을 위한 보안시스템을 설계하였다. 이 시스템은 신규 사용자의 네트워크 접속후 인증을 받기위한 부분에 있어서 리눅스 시스템과 네트워크 장비를 연동해서 관리자가 정책적용시 자동으로 ACL을 구성해 보안관리를 강화하는데 목적을 두고 설계하였다.

  • PDF