• Title/Summary/Keyword: Audit techniques

Search Result 46, Processing Time 0.021 seconds

An Analysis of a Structure and Implementation of Error-Detection Tool of Cryptography API-Next Generation(CNG) in Microsoft (마이크로소프트의 차세대 암호 라이브러리 구조에 관한 연구 및 오류-검출 도구 구현)

  • Lee, Kyungroul;You, Ilsun;Yim, Kangbin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.153-168
    • /
    • 2016
  • This paper introduces a structure, features and programming techniques for the CNG(Cryptography API: Next Generation), which is the substitution of the CAPI(Cryptography API) from Microsoft. The CNG allows to optimize a scope of functions and features because it is comprised of independent modules based on plug-in structure. Therefore, the CNG is competitive on development costs and agility to extend. In addition, the CNG supports various functions for the newest cryptographic algorithm, audit, kernel-mode programming with agility and possible to contribute for core cryptography services in a new environment. Therefore, based on these advantageous functions, we analyze the structure of CNG to extend it for the enterprise and the public office. In addition, we implement an error-detection tool for program which utilizes CNG library.

Effective Intrusion Detection using Evolutionary Neural Networks (진화신경망을 이용한 효과적 인 침입탐지)

  • Han Sang-Jun;Cho Sung-Bae
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.301-309
    • /
    • 2005
  • Learning program's behavior using machine learning techniques based on system call audit data is an effective intrusion detection method. Rule teaming, neural network, statistical technique, and hidden Markov model are representative methods for intrusion detection. Among them neural networks are known for its good performance in teaming system call sequences. In order to apply it to real world problems successfully, it is important to determine their structure. However, finding appropriate structure requires very long time because there are no formal solutions for determining the structure of networks. In this paper, a novel intrusion detection technique using evolutionary neural networks is proposed. Evolutionary neural networks have the advantage that superior neural networks can be obtained in shorter time than the conventional neural networks because it leams the structure and weights of neural network simultaneously Experimental results against 1999 DARPA IDEVAL data confirm that evolutionary neural networks are effective for intrusion detection.

A Study of the Back-tracking Techniques against Hacker's Mobile Station on WiBro (WiBro에서 공격 이동단말에 대한 역추적기법 연구)

  • Park, Dea-Woo;Lim, Seung-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.3
    • /
    • pp.185-194
    • /
    • 2007
  • WiBro has become intentionally standardize as IEEE 802.16e. This WiBro service has been started by a portable internet at home as well as abroad. In this paper, an offender hacker do not direct attack on system on system that It marched an attack directly in damage system because a place oneself in mobile station of portable internet WiBro and avoid to attack hacker's system. At this time, a mobile make use of network inspection policy for back-tracking based on log data. Used network log audit, and presented TCP/IP bases at log bases as used algorithm, the SWT technique that used Thumbprint Algorithm. Timing based Algorithm, TCP Sequence number. Study of this paper applies algorithm to have been progressed more that have a speed to be fast so that is physical logical complexity of configuration of present Internet network supplements a large disadvantage, and confirm an effective back-tracking system. result of research of this paper contribute to realize a back-tracking technique in ubiquitous in WiBro internet network.

  • PDF

Clustering Normal User Behavior for Anomaly Intrusion Detection (비정상행위 탐지를 위한 사용자 정상행위 클러스터링 기법)

  • Oh, Sang-Hyun;Lee, Won-Suk
    • The KIPS Transactions:PartC
    • /
    • v.10C no.7
    • /
    • pp.857-866
    • /
    • 2003
  • For detecting an intrusion based on the anomaly of a user's activities, previous works are concentrated on statistical techniques in order to analyze an audit data set. However. since they mainly analyze the average behavior of a user's activities, some anomalies can be detected inaccurately. In this paper, a new clustering algorithm for modeling the normal pattern of a user's activities is proposed. Since clustering can identify an arbitrary number of dense ranges in an analysis domain, it can eliminate the inaccuracy caused by statistical analysis. Also, clustering can be used to model common knowledge occurring frequently in a set of transactions. Consequently, the common activities of a user can be found more accurately. The common knowledge is represented by the occurrence frequency of similar data objects by the unit of a transaction as veil as the common repetitive ratio of similar data objects in each transaction. Furthermore, the proposed method also addresses how to maintain identified common knowledge as a concise profile. As a result, the profile can be used to detect any anomalous behavior In an online transaction.

Effect of Choice of Overseas Travel on Fear of risk in Overseas (해외에서 발생한 위험에 대한 두려움이 해외여행 선택에 미치는 영향)

  • Shin, Jaehun;Kim, Sangwooon
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.2
    • /
    • pp.198-205
    • /
    • 2019
  • Purpose: This study was conducted and analyzed using statistical techniques to examine the impact of fear of risk committed by risk committed overseas on people who are about to travel abroad. Method: In the event of a risk, fear of a risk occurs, and fear of a risk adversely affects people's daily lives, and in the event of a decline in daily life, affecting the economy and social activities of the area, a small risk often has a huge impact on society. In particular, the fear of risk committed abroad has an impact on overseas activities as overseas travel has been activated in time for the global era. Result and Conclusion: Therefore, according to the research, the fear of crimes committed overseas has a negative effect on the choice of overseas travel.

Study on Improvement in Reliability of Measurement and Analysis for Polycyclic Aromatic Hydrocarbons in the Atmosphere (대기 중 다환방향족탄화수소(PAHs)의 측정.분석 신뢰도 향상에 관한 고찰)

  • Lee, Min-Do;Lim, Yong-Jae;Lee, Sang-Uk;Kong, Boo-Joo;Lee, Sang-Deok;Han, Jin-Seok
    • Journal of Korean Society for Atmospheric Environment
    • /
    • v.23 no.5
    • /
    • pp.515-525
    • /
    • 2007
  • In this study, various techniques for measurement and analysis of PAHs in the ambient air were verified in order to select a more reliable method. Sampling and analysis of PAHs were done by the EPA TO-13a method. QA/QC of the measurement was conducted to minimize errors in sampling and analyzing processes. The linearity of calibration curve of the PAH standards was good ($R^2{\geq}0.99$). Audit accuracy was evaluated using 5 internal standards of PAHs ($Naphthalene-d_8,\;Acenaphthene-d_{10},\;Phenanthrene-d_{10},\;Chrysene-d_{12},\;Perylene-d_{12}$). Relative standard deviations of the internal standard of the PAHs were ranged from 6.22% for $acenaphthene-d_{10}$ to 8.11% for $chrysene-d_{12}$. To evaluate the surrogate recoveries, two field surrogate standards of PAHs ($fluoranthene-d_{10},\;benzo(a)pyrene-d_{12}$) and two extract surrogate standards of the PAHs ($fluorene-d_{10},\;pyrene-d_{12}$) were spiked into all samples before field sampling and sample extraction, respectively. Recoveries of field the surrogate standards ranged from $80.4{\pm}12.2%$ for $fluoranthene-d_{10}$ to $66.2{\pm}12.8%$ for $benzo(a)pyrene-d_{12}$. Extraction recoveries of the surrogate standards ranged from $70.4{\pm}10.2%$ for $fluorene-d_{10}$ to $77.6{\pm}10.8%$ for $pyrene-d_{10}$. The detection limit of benzo(a)pyrene among 16 PAHs standards for quantitation was 20 pg.