• Title/Summary/Keyword: Cyber Protection

Search Result 244, Processing Time 0.03 seconds

Zero-knowledge proof algorithm for Data Privacy

  • Min, Youn-A
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.67-75
    • /
    • 2021
  • As pass the three revised bills, the Personal Information Protection Act was revised to have a larger application for personal information. For an industrial development through an efficient and secure usage of personal information, there is a need to revise the existing anonymity processing method. This paper modifies the Zero Knowledge Proofs algorithm among the anonymity processing methods to modify the anonymity process calculations by taking into account the reliability of the used service company. More detail, the formula of ZKP (Zero Knowledge Proof) used by ZK-SNAKE is used to modify the personal information for pseudonymization processing. The core function of the proposed algorithm is the addition of user variables and adjustment of the difficulty level according to the reliability of the data user organization and the scope of use. Through Setup_p, the additional variable γ can be selectively applied according to the reliability of the user institution, and the degree of agreement of Witness is adjusted according to the reliability of the institution entered through Prove_p. The difficulty of the verification process is adjusted by considering the reliability of the institution entered through Verify_p. SimProve, a simulator, also refers to the scope of use and the reliability of the input authority. With this suggestion, it is possible to increase reliability and security of anonymity processing and distribution of personal information.

Companies Entering the Metabus Industry - Major Big Data Protection with Remote-based Hard Disk Memory Analysis Audit (AUDIT) System

  • Kang, Yoo seok;Kim, Soo dong;Seok, Hyeonseon;Lee, Jae cheol;Kwon, Tae young;Bae, Sang hyun;Yoon, Seong do;Jeong, Hyung won
    • Journal of Integrative Natural Science
    • /
    • v.14 no.4
    • /
    • pp.189-196
    • /
    • 2021
  • Recently, as a countermeasure for cyber breach attacks and confidential leak incidents on PC hard disk memory storage data of the metaverse industry, it is required when reviewing and developing a remote-based regular/real-time monitoring and analysis security system. The reason for this is that more than 90% of information security leaks occur on edge-end PCs, and tangible and intangible damage, such as an average of 1.20 billion won per metaverse industrial security secret leak (the most important facts and numerical statistics related to 2018 security, 10.2018. the same time as responding to the root of the occurrence of IT WORLD on the 16th, as it becomes the target of malicious code attacks that occur in areas such as the network system web due to interworking integration when building IT infrastructure, Deep-Access-based regular/real-time remote. The concept of memory analysis and audit system is key.

Intelligent Piracy Site Detection Technique with High Accuracy

  • Kim, Eui-Jin;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.285-301
    • /
    • 2021
  • Recently, with the diversification of media services and the development of smart devices, users have more opportunities to use digital content, such as movies, dramas, and music; consequently, the size of the copyright market expands simultaneously. However, there are piracy sites that generate revenue by illegal use of copyrighted works. This has led to losses for copyright holders, and the scale of copyrighted works infringed due to the ever-increasing number of piracy sites has increased. To prevent this, government agencies respond to copyright infringement by monitoring piracy sites using online monitoring and countermeasure strategies for infringement. However, the detection and blocking process consumes a significant amount of time when compared to the rate of generating new piracy sites. Hence, online monitoring is less effective. Additionally, given that piracy sites are sophisticated and refined in the same way as legitimate sites, it is necessary to accurately distinguish and block a site that is involved in copyright infringement. Therefore, in this study, we analyze features of piracy sites and based on this analysis, we propose an intelligent detection technique for piracy sites that automatically classifies and detects whether a site is involved in infringement.

The Intelligent Blockchain for the Protection of Smart Automobile Hacking

  • Kim, Seong-Kyu;Jang, Eun-Sill
    • Journal of Multimedia Information System
    • /
    • v.9 no.1
    • /
    • pp.33-42
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.

A Study on Efficient DDoS Protection Techniques using Anycast and BGP ECMP (Anycast 구조와 BGP ECMP를 활용한 효율적인 DDoS 공격 방어 기법에 대한 연구)

  • Hong, Yun Seok;Han, Wooyoung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.125-128
    • /
    • 2022
  • As the number of online systems based on the internet gradually increases, cyber-scale attacks that interfere with the normal operation of web services are also on the rise. In particular, distributed denial-of-service attacks (DDoS) that interfere with normal web service operations are also increasing. Therefore, this paper presents an efficient DDoS attack defense technique utilizing Equal Cost Multi-Path (BGP ECMP) routing techniques in networks of Anycast type by operating PoP basis of major attack sources and describes how high-availability web services can be operated.

  • PDF

A review on Phytochemistry and pharmacological Activities of Cirsium setidens (Dunn) Nakai (고려엉겅퀴(Cirsium setidens (Dunn) Nakai)의 구성성분 및생리활성에 관한 리뷰)

  • MiAe Cho;Bumjung Kim
    • The Korea Journal of Herbology
    • /
    • v.38 no.4
    • /
    • pp.31-43
    • /
    • 2023
  • Objectives : The objective of this study was to investigate the phytochemistry and pharmacological activities of Cirsium setidens. Methods : Domestic and international articles about Cirsium setidens were investigated. A review was perfoemed via DB searching engine such as Sci.Direct, Springer, DBpia, KISS, Google scholar, Kipris, and so on. Total 73 listed literature were classified by compound analysis and pharmacological efficacy. Results : C. setidens contains pectolinarin and its glycoside, pectolinarigenin as index compounds, and linarin, apigenin, diosmetin, scopoletin, acacetin, cirsimarin, cirsimaritin, setidenosides A and B, silymarin, hispidulin, 92 volatile compounds, and 15 fatty acids. The Pharmacological activities of C. setidens has been reported to inhibit of platelet aggregation and fat accumulation in the liver, inhibit to hepatitis, anti-cancer, antibacterial, skin improvement, hair growth, liver protection, anti-diabetic, anti-inflammatory, sedative. Also, It has been reported the effect of cholesterol-lowering and anti-obesity, neuroprotective effects, increasing human stem cell viability, inhibiting osteoclast formation and osteogenic differentiation. Conclusion : This reviews showed that C. setidens which has been traditionally used for the treatment of inflammation and hypertension, has anticancer and river protective effect, as well as hair loss and diet. In order to maximize the efficacy of C. setidens, research has also begun on the effect of processing processes such as fermentation or fine powdering and combining natural plant resources.

Study on Emerging Security Threats and National Response

  • Il Soo Bae;Hee Tae Jeong
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.4
    • /
    • pp.34-41
    • /
    • 2023
  • The purpose of this paper is to consider the expansion of non-traditional security threats and the national-level response to the emergence of emerging security threats in ultra-uncertain VUCA situations. As a major research method for better analysis, the theoretical approach was referred to papers published in books and academic journals, and technical and current affairs data were studied through the Internet and literature research. The instability and uncertainty of the international order and security environment in the 21st century brought about a change in the security paradigm. Human security emerged as the protection target of security was expanded to individual humans, and emerging security was emerging as the security area expanded. Emerging security threatsthat have different characteristicsfrom traditionalsecurity threats are expressed in various ways, such as cyber threats, new infectious disease threats, terrorist threats, and abnormal climate threats. First, the policy and strategic response to respond to emerging security threats is integrated national crisis management based on artificial intelligence applying the concept of Foresight. Second, it is to establish network-based national crisis management smart governance. Third, it is to maintain the agile resilience of the concept of Agilience. Fourth, an integrated response system that integrates national power elements and national defense elements should be established.

Measures to Increase Evacuation Safety through Performance-Based Design of Escape Room Cafes (방탈출카페의 성능위주설계에 의한 피난안전성 확대 방안)

  • Hong-Sang Lee;Jai Young Lee;Ha-Sung Kong
    • Journal of the Korea Safety Management & Science
    • /
    • v.25 no.4
    • /
    • pp.95-104
    • /
    • 2023
  • The purpose of this study is to propose measures to increase evacuation safety by calculating the habitable time using a fire and evacuation simulation program for the Room-escape cafe currently in operation, and comparing and analyzing it with the evacuation required time. Assuming a fire due to overheating of electric heaters in use in front of the warehouse, the habitable time was calculated through fire simulation, and the occupant's evacuation time calculated through evacuation simulation according installation of safety facilities, etc. was compared and analyzed with the habitable time. In the case of escape room cafes with safety facilities installed, evacuation safety was satisfied, but in escape room cafes without safety facilities, the evacuation safety was not secure. As a result of analyzing evacuation safety for each scenario based on the ASET analyzed in the fire simulation, it was found that in scenario 1, evacuation safety was secured and everyone successfully evacuated, while in scenario 2, no one succeeded in evacuation. These results can be said to confirm that the installation of safety facilities is very important in business establishments such as escape room cafes, which become enclosed structures when games are started.

Improving the Efficiency of Cybersecurity Risk Analysis Methods for Nuclear Power Plant Control Systems (원전 제어시스템 사이버보안 위험 분석방법의 효율성 개선)

  • Shin-woo Lee;Jung-hee Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.3
    • /
    • pp.537-552
    • /
    • 2024
  • Domestic nuclear power plants operate under the establishment of the "Information System Security Regulations" in accordance with the Nuclear Safety Act, introducing and implementing a cybersecurity system that encompasses organizational structure as well as technical, operational, and managerial security measures for assets. Despite attempts such as phased approaches and alternative measures for physical protection systems, the reduction in managed items has not been achieved, leading to an increased burden on security capabilities due to limited manpower at the site. In the main text, an analysis is conducted on Type A1 assets performing nuclear safety functions using Maintenance Rules (MR) and EPRI Technical Assessment Methodology (TAM) from both a maintenance perspective and considering device characteristics. Through this analysis, approaches to re-evaluate the impact of cyber intrusions on asset functionality are proposed.

Design of the Copyright Protection for ePub e-Book System using Certification Information (인증 정보를 이용한 전자책 ePub의 저작권 보호 시스템 설계)

  • Jang, Seung-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.9
    • /
    • pp.2197-2204
    • /
    • 2015
  • In recent times, the high-tech society has become the most important issue by IT technology and publication network. Today such flows have also been the case in the e-book field. Today's electronic publication is changing day by day. But there are some problems according to the prevalence of e-book. E-book is similar to p-book(paper-book). There is a limit to have perfect feeling of a texture of p-book. In order to purchase an e-book, people use online. People having malicious intent could copy and distribute it illegally. It leads to cyber abuses. This paper aims at the copyright protection of e-book ePub writers. The proposed e-book copyright protection system is designed using e-book production Sigil environment and C program environment. This system uses client-server communication through e-book ePub as authentication information. It discerns whether to permit or not for a client to read the e-book using authentication information. Authentication information includes ID, password, IP address, limited time of authentication information, GUID(Globally Unique Identifier). If authentication information about e-book meets requirements, people can use it. But if not, it blocks people's approach by quitting program.