• Title/Summary/Keyword: Association ID

Search Result 207, Processing Time 0.028 seconds

Design of Web based ID Traffic Analysis System (웹기반의 침입탐지 트래픽 분석 시스템 설계)

  • 한순재;오창석
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.11a
    • /
    • pp.144-148
    • /
    • 2003
  • A general administrator's response ability plunged in confusion as intrusion detection system like an existing Snort display much alert messages on administrator's screen. Also, there are some possibilities to cause false positive. In this paper, to solve these problems, we designed Web-based ID(Intrusion Detection) traffic analysis system using correlation, and implemented so that administrator can check easily whole intrusion traffic state in web which dividing into normal and intrusion traffic using Libpcap, Snort, ACID, Nmap and Nessus. As a simulation result, it is proved that alert message number and false positive rate are minimized.

  • PDF

Design of Traceback System using Selected Router (선택적 라우터를 이용한 역추적 시스템의 설계)

  • Lee, Jeong-Min;Lee, Kyoon-Ha
    • Convergence Security Journal
    • /
    • v.3 no.3
    • /
    • pp.91-97
    • /
    • 2003
  • As increasing of Internet user and fast development of communication, many security problems occur. Because of Internet is design and development for speed not security, it is weak to attack from malicious user. furthermore attack is more developed to have high efficiency and intelligent. We proposed effective traceback system in network and consider that ability of constitution. Traceback by Selected Router system is consists of managed router and manager system. Selected router marks router ID to packet which passing selected router, and use this router ID for traceback and filtering. Consequently this system reduce damage of attack.

  • PDF

A Study on Data Processing Methodology of Picking System using Zigbee Wireless Communication (지그비 무선 통신을 이용한 피킹 시스템의 데이터 처리방안에 관한 연구)

  • Kim, Young-Il
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.6
    • /
    • pp.269-274
    • /
    • 2013
  • In this paper, we propose the design and implementation method of picking system using zigbee wireless communication in order to solve problems of the conventional picking system which has expensive labors and maintenance costs. We use multi router based star-tree topology as a default routing topology to provide the reliable data transmission and define the method of ID configuration and data transmission. We confirm that successful data transmission ratio of multi router based picking system is maximum 20% higher than that of single router based picking system.

An Efficient Security Protocol for Transaction in Mobile Data Network (모바일 데이터 망에서의 거래를 위한 효율적인 보안 프로토콜)

  • Kim, Jang-Hwan;Rhee, Chung-Sei
    • Convergence Security Journal
    • /
    • v.6 no.2
    • /
    • pp.43-51
    • /
    • 2006
  • The existing electronic transaction protocol uses a cryptography algorithm that is not suitable for mobile environment because of limited memory and process ability. In this paper, we propose an efficient transaction protocol suitable for mobile embedded system. The proposed protocol reduces computation and process time by using ID-based cryptography algorithm and ECC (elliptic curve cryptosystem). It uses vendor authentication only in the first transaction, and from the second transaction, it requires transaction after authentication with session created by applying ECC technique. Therefore, the creation number of authentication for the vendor can be reduced from n to one. And it reduces process time because it provides the same security with 160 bits as with 1024 bits of RSA.

  • PDF

Angiotensin-converting enzyme gene insertion/deletion polymorphism is not associated with BMI in Korean adults

  • Kwon, Insu
    • Korean Journal of Exercise Nutrition
    • /
    • v.24 no.1
    • /
    • pp.24-28
    • /
    • 2020
  • [Purpose] Recent studies have demonstrated a probable association between ACE I/D polymorphism and obesity. Thus, this study aimed to investigate whether ACE I/D polymorphism influenced the susceptibly of developing obesity in Korean adults. [Methods] A total of 353 healthy Korean adults aged between 30 and 82 years were recruited, including 157 males and 196 females. Among the participants, 103 (29.2 %) were classified as normal (BMI < 23 kg/m2), 117 (33.1 %) as overweight (23 kg/m2 ≤ BMI < 25 kg/m2), and 133 (37.7 %) as obese (BMI ≥ 25 kg/m2). ACE polymorphism (rs1799752) analysis was performed using the MGB TaqMan® SNP Genotyping assay with 3 types of primers and 2 types of probes. The distributions of the ACE genotypes and allele frequencies were analyzed among the three groups using the Hardy-Weinberg equilibrium, chi-square tests, and multiple regression analysis. [Results] The distribution of the ACE genotypes were as follows: normal [II: n=38 (36.9 %), ID: n=46 (36.8 %), DD: n=19 (18.4 %)], overweight [II: n=43 (36.8 %), ID: n=55 (47.0 %), DD: n=19 (16.2 %)], and obese [II: n=41 (30.8 %), ID: n=76 (57.0 %), DD: n=16 (12.0 %)]. Unexpectedly, the I allele, rather than the D allele, was common in the obese group. [Conclusion] ACE I/D polymorphism is not associated with BMI in Korean adults. Thus, it is unlikely to be a powerful candidate gene for obesity in Korean adults.

A Study on Digital Fingerprinting Technology for the Copyright Protection of the Image Contents Printout (이미지 콘텐츠 출력물의 저작권보호를 위한 디지털 핑거프린팅 기술에 관한 연구)

  • Seo, Yong-Seok;Kim, Won-Gyum;Lee, Seon-Hwa;Suh, Young-Ho;Hwang, Chi-Jung
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.242-245
    • /
    • 2006
  • This paper addresses an image fingerprinting scheme for the print-to-capture model performed by a photo printer and digital camera. When capturing an image by a digital camera, various kinds of distortions such as noise, geometrical distortions, and lens distortions are applied slightly and simultaneously. In this paper, we consider several steps to extract fingerprints from the distorted image in print-and capture scenario. To embed ID into an image as a fingerprint, multi-bits embedding is applied. We embed 64 bits ID information as a fingerprint into spatial domain of color images. In order to restore a captured image from distortions a noise reduction filter is performed and a rectilinear tiling pattern is used as a template. To make the template a multi-bits fingerprint is embedded repeatedly like a tiling pattern into the spatial domain of the image. We show that the extracting is successful from the image captured by a digital camera through the experiment.

  • PDF

Design on Protection and Authentication System of IPTV Contents using HSI Watermark (HSI 워터마크를 이용한 IPTV 콘텐츠 보호 및 인증 시스템 설계)

  • Kim, Dae-Jin;Choi, Hong-Sub
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.7
    • /
    • pp.55-62
    • /
    • 2010
  • While the broadband network and multimedia technologies have been developing, the commercial market of digital contents also has been widely spreading with recently starting IPTV. As the IPTV services are getting to be generalized and popularized, the contents illicit copying and distribution of copyright meterials tends to draw more attentions. So we need a right service system that can protect contents and copyright using watermark inserting. Until now, the conventional protection and authentication system is taking advantages of merits both in CAS and DRM. But this system can not protect the contents when acquiring them from TV output using A/D convertor. So we apply watermark method using HSI color space against contents illicit copying. And for distribution of copyright materials. we compound unique settop ID and copyrighter's ID to make new ID that is watermark. When inserting watermark, we use the watermark for copyright protection and authentication. So we can protect copyright and identify last settop's user in illicit distribution. we design download based IPTV contents protection and authentication system using HSI watermark method.

Realization of Location based Service with ePosition by Defining the New DNS Resource Record (새로운 DNS 리소스 레코드 정의를 통한 ePosition 위치 기반 서비스)

  • Jang, Dong-Heyok;Lee, Sang-Zee;Kim, Kyung-Hun;Kwon, Oh-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.4
    • /
    • pp.264-272
    • /
    • 2008
  • In ubiquitous geographic information environment, the users are provided with geographic information anywhere and any time on their needs by any types of devices and communication media. The unique location ID, ePosition, is a new technology to support UBGI environment, using a logical location ID instead of physical location of a point of interest. Domain names of plural ePosition servers, where location information with its ePosition is stored, needs to be registered in DNS for some service through Internet. For better ePosition service of the type of public service like email service, a set of DNS resource records can be newly defined. This paper suggests a new DNS resource record EPO for implementation of the ePosition service through Internet.

A Attendance-Absence Checking System using the Self-organizing Face Recognition (자기조직형 얼굴 인식에 의한 학생 출결 관리 시스템)

  • Lee, Woo-Beom
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.3
    • /
    • pp.72-79
    • /
    • 2010
  • A EAARS(Electronic Attendance-Absence Recording System) is the important LSS(Learning Support System) for blending a on-line learning in the face-to-face classroom. However, the EAARS based on the smart card can not identify a real owner of the checked card. Therefore, we develop the CS(Client-Sever) system that manages the attendance-absence checking automatically, which is used the self-organizing neural network for the face recognition. A client system creates the ID file by extracting the face feature, a server system analyzes the ID file sent from client system, and performs a student identification by using the Recognized weight file saved in Database. As a result, The proposed CS EAARS shows the 92% efficiency in the CS environment that includes the various face image database of the real classroom.