• Title/Summary/Keyword: Data integrity

Search Result 1,385, Processing Time 0.024 seconds

Design and Analysis of the Log Authentication Mechanism based on the Merkle Tree (Merkle Tree 기반의 로그인증 메커니즘 설계 및 분석)

  • Lee, Jung yeob;Park, Chang seop
    • Convergence Security Journal
    • /
    • v.17 no.1
    • /
    • pp.3-13
    • /
    • 2017
  • As security log plays important roles in various fields, the integrity of log data become more and more important. Especially, the stored log data is an immediate target of the intruder to erase his trace in the system penetrated. Several theoretical schemes to guarantee the forward secure integrity have been proposed, even though they cannot provide the integrity of the log data after the system is penetrated. Authentication tags of these methods are based on the linear-hash chain. In this case, it is difficult to run partial validation and to accelerate generating and validating authentication tags. In this paper, we propose a log authentication mechanism, based on Mekle Tree, which is easy to do partial validation and able to apply multi threading.

Countermeasure against MITM attack Integrity Violation in a BLE Network (BLE 네트워크에서 무결성 침해 중간자 공격에 대한 대응기법)

  • Han, Hyegyeon;Lee, Byung Mun
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.2
    • /
    • pp.221-236
    • /
    • 2022
  • BLE protocol prevents MITM attacks with user interaction through some input/output devices such as keyboard or display. Therefore, If it use a device which has no input/output facility, it can be vulnerable to MITM attack. If messages to be sent to a control device is forged by MITM attack, the device can be abnormally operated by malicious attack from attacker. Therefore, we describes a scenario which has the vulnerabilities of the BLE network in this paper and propose countermeasure method against MITM attacks integrity violations. Its mechanism provides data confidentiality and integrity with MD5 and security key distribution of Diffie Helman's method. In order to verify the effectiveness of the countermeasure method proposed in this paper, we have conducted the experiments. ​As experiments, the message was sent 200 times and all of them successfully detected whether there was MITM attack or not. In addition, it took at most about 4.2ms delay time with proposed countermeasure method between devices even attacking was going on. It is expected that more secure data transmission can be achieved between IoT devices on a BLE network through the method proposed.

Real-Time File Integrity Checker for Intrusion Recovery and Response System (침입 복구 및 대응 시스템을 위한 실시간 파일 무결성 검사)

  • Jeun Sanghoon;Hur Jinyoung;Choi Jongsun;Choi Jaeyoung
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.6
    • /
    • pp.279-287
    • /
    • 2005
  • File integrity checking is the most reliable method to examine integrity and stability of system resources. It is required to examine the whole data whenever auditing system's integrity, and its process and result depends on administrator's experience and ability. Therefore the existing method is not appropriate to intrusion response and recovery systems, which require a fast response time. Moreover file integrity checking is able to collect information about the damaged resources, without information about the person who generated the action, which would be very useful for intrusion isolation. In this paper, we propose rtIntegrit, which combines system call auditing functions, it is called Syswatcher, with file integrity checking. The rtlntegrit can detect many activities on files or file system in real-time by combining with Syswatcher. The Syswatcher audit file I/O relative system call that is specified on configuration. And it can be easily cooperated with intrusion response and recovery systems since it generates assessment data in the standard IDMEF format.

Regression Algorithms Evaluation for Analysis of Crosstalk in High-Speed Digital System

  • Minhyuk Kim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.6
    • /
    • pp.1449-1461
    • /
    • 2024
  • As technology advances, processor speeds are increasing at a rapid pace and digital systems require a significant amount of data bandwidth. As a result, careful consideration of signal integrity is required to ensure reliable and high-speed data processing. Crosstalk has become a vital area of research in signal integrity for electronic packages, mainly because of the high level of integration. Analytic formulas were analyzed in this study to identify the features that can predict crosstalk in multi-conductor transmission lines. Through the analysis, five variables were found and obtained a dataset consisting of 302,500, data points. The study evaluated the performance of various regression models for optimization via automatic machine learning by comparing the machine learning predictions with the analytic solution. Extra tree regression consistently outperformed other algorithms, with coefficients of determination exceeding 0.9 and root mean square logarithmic errors below 0.35. The study also notes that different algorithms produced varied predictions for the two metrics.

A Study on Characteristics and Techniques that Affect Data Integrity for Digital Forensic on Flash Memory-Based Storage Devices (플래시 메모리 기반 저장장치에서 디지털 포렌식을 위한 데이터 무결성에 영향을 주는 특성 및 기술 연구)

  • Hyun-Seob Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.3
    • /
    • pp.7-12
    • /
    • 2023
  • One of the most important characteristics of digital forensics is integrity. Integrity means that the data has not been tampered with. If evidence is collected during digital forensic and later tampered with, it cannot be used as evidence. With analog evidence, it's easy to see if it's been tampered with, for example, by taking a picture of it. However, the data on the storage media, or digital evidence, is invisible, so it is difficult to tell if it has been tampered with. Therefore, hash values are used to prove that the evidence data has not been tampered with during the process of collecting evidence and submitting it to the court. The hash value is collected from the stored data during the evidence collection phase. However, due to the internal behavior of NAND flash memory, the physical data shape may change over time from the acquisition phase. In this paper, we study the characteristics and techniques of flash memory that can cause the physical shape of flash memory to change even if no intentional data corruption is attempted.

Dilution of Precision (DOP) Based Landmark Exclusion Method for Evaluating Integrity Risk of LiDAR-based Navigation Systems

  • Choi, Pil Hun;Lee, Jinsil;Lee, Jiyun
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.9 no.3
    • /
    • pp.285-292
    • /
    • 2020
  • This paper introduces a new computational efficient Dilution of Precision (DOP)-based landmark exclusion method while ensuring the safety of the LiDAR-based navigation system that uses an innovation-based Nearest-Neighbor (NN) Data Association (DA) process. The NN DA process finds a correct landmark association hypothesis among all potential landmark permutations using Kalman filter innovation vectors. This makes the computational load increases exponentially as the number of landmarks increases. In this paper, we thus exclude landmarks by introducing DOP that quantifies the geometric distribution of landmarks as a way to minimize the loss of integrity performance that can occur by reducing landmarks. The number of landmarks to be excluded is set as the maximum number that can satisfy the integrity risk requirement. For the verification of the method, we developed a simulator that can analyze integrity risk according to the landmark number and its geometric distribution. Based on the simulation, we analyzed the relationship between DOP and integrity risk of the DA process by excluding each landmark. The results showed a tendency to minimize the loss of integrity performance when excluding landmarks with poor DOP. The developed method opens the possibility of assuring the safety risk of the Lidar-based navigation system in real-time applications by reducing a substantial amount of computational load.

The Influencing Factors on the Ego Integrity of Elderly Living Alone (독거노인의 자아통합감에 미치는 영향요인)

  • Jeong, Hyun Jeong;Yoon, Sook Hee
    • The Journal of Korean Academic Society of Nursing Education
    • /
    • v.21 no.4
    • /
    • pp.499-508
    • /
    • 2015
  • Purpose: This study was conducted in order to determine the extent of ego integrity and to confirm the association between the sense of ego integrity and integrated loneliness, social support, and social activities. Methods: For this study, 146 elderly people participated. The data was analyzed with SPSS/WIN 21.0, using descriptive statistics, t-test, ANOVA, correlation analysis, and hierarchical regression analysis. Results: In regards to differences between ego integrity according to general characteristics of subjects, there was a statistically significant difference in education (F=4.13, p=.007). In elderly living alone, ego integrity was significantly positive correlated with social support and social activities, but negative correlated with loneliness. These variables explained 43.2% of the sense of ego integrity. Conclusion: The study suggested that nursing programs and social activity programs designed to aid the elderly living alone must focus on reducing loneliness, as well as increasing social support and social activities, while taking education into consideration. Also, these programs should strive to build social support systems.

Development of Integrity Evaluation System for CANDU Pressure Tube (CANDU 압력관에 대한 건전성 평가 시스템 개발)

  • Kwak, Sang-Log;Lee, Joon-Seong;Kim, Young-Jin;Park, Youn-Won
    • Proceedings of the KSME Conference
    • /
    • 2000.11a
    • /
    • pp.843-848
    • /
    • 2000
  • The pressure tube is a major component of the CANDU reactor, which supports nuclear fuel bundle and it's containment vessel. If a flaw is found during the periodic inspection from the pressure tubes, the integrity evaluation must be carried out, and the safety requirements must be satisfied for continued service. In order to complete the integrity evaluation, complicated and iterative calculation procedures are required. Besides, a lot of data and knowledge for the evaluation are required for the entire integrity evaluation process. For this reason, an integrity evaluation system, which provides efficient way of evaluation with the help of attached databases, was developed. The developed system was built on the basis of ASME Sec. XI and FFSG(Fitness For Service Guidelines for zirconium alloy pressure tubes in operating CANDU reactors) issued by the AECL, and covers the delayed hydride cracking(DHC). Various analysis methods are provided for the integrity evaluation of pressure tube. In order to verify the developed system, several case studies have been performed and the results were compared with those from AECL. A good agreement was observed between those two results.

  • PDF

A Study on FAD Development for Probabilistic Pressure Tube Integrity Assessment (압력관의 확률론적평가에 타당한 파손평가선도 작성에 관한 연구)

  • Kwak, Sang-Log;Wang, Jong-Bae;Choi, Young-Hwan;Park, Youn-Won
    • Proceedings of the KSME Conference
    • /
    • 2003.11a
    • /
    • pp.1211-1215
    • /
    • 2003
  • Pressure tubes are major component of nuclear reactor, but only selected samples are periodically examined due to numerous numbers of tubes. Current in-service inspection result show there is high probability of flaw existence at un-inspected pressure tube. Probabilistic analysis is applied in this study for the integrity assessment of un-inspected pressure tube. But all the current integrity evaluations procedures are based on conventional deterministic approaches. So many integrity evaluation parameters are not directly apply to probabilistic analysis. As a result of this study failure assessment diagram are proposed based on test data.

  • PDF

The Effects of Ego Integrity on Death Anxiety of the Elderly: Focusing on the Mediating Effect of Depression (노인의 자아통합감이 죽음불안에 미치는 영향 : 우울의 매개효과를 중심으로)

  • Chang, Kyung-Eun
    • Korean Journal of Human Ecology
    • /
    • v.20 no.5
    • /
    • pp.917-926
    • /
    • 2011
  • The purpose of this study is to identify the influence of ego integrity on death anxiety of the elderly, mediated by depression based on Erikson theory(1963). For this study, 313 elderly over 60 years old in Daegu city participated in a survey. The data of the survey was analyzed using SPSS 15.0 and Structural Equation Modeling(SEM) with AMOS 7.0. The results of the study are as follows: ego integrity of the elderly does not influence death anxiety due to the suppressing effect of depression. However, depression does mediate the relation between ego integrity and death anxiety fully. Such findings suggest that the Erikson theory can also be applied to elderly Korean citizens. A practical benefit derived from the study's results is the proposition to implement a reminiscence program, reinforce depression treatment and prevention systems, and augment a death awareness movement for elderly.