• Title/Summary/Keyword: Hierarchical Security

Search Result 266, Processing Time 0.026 seconds

Design of A Cross Working Mechanism for Hierarchical Security Policy (계층적 보안 정책에서의 Cross 연동 메커니즘)

  • 이지인;엄남경;이상호
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.04a
    • /
    • pp.787-789
    • /
    • 2001
  • 인터넷은 전세계를 대상으로 구축된 네트워크로서 개방형 구조의 프로토콜을 사용하므로 대부분의 호스트 컴퓨터 시스템들은 정보보안에 취약한 상태이다. 이와 같은 보안 취약성으로 인해 상용화 서비스에 대한 교환 정보의 수정, 검색, 파괴 등의 역기능이 발생하고 있다. 이 논문에서는 기존의 보안 방식 정책으로는 인터넷 보안의 역기능에 대한 완벽한 대책이 될 수 없으므로 이에 따른 보안정책 크로스 연동 메커니즘을 설계하여, 기존의 방식과 비교 분석해서 앞으로의 차세대 인터넷에 적합한 연동메커니즘을 제안하고자 한다.

  • PDF

Intrusion Detection and Response System using Hierarchical Packet Analysis (계층적 패킷분석에 기반한 침입탐지 및 대응시스템)

  • 지정훈;남택용;손승원
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.169-172
    • /
    • 2002
  • 기존의 보안시스템은 각 기관의 로컬네트워크에 설치되어 해당 도메인으로 들어오는 트래픽에 대한 침입탐지에 의한 침입차단이 주된 역할이었다. 최근에는 침입자의 우회공격 및 DDoS 와 같은 공격의 증가로 이러한 시스템의 효용성이 크게 저하되고 있다. 본 논문에서는 침입자의 공격에 대하여 보다 적극적이고 효율적인 대응을 위하여 계층적인 패킷분식에 기반한 침입탐지 및 대응시스템을 제안한다. 계층적인 패킷분석을 위하여 가입자네트워크에서는 세션단위의 정보분식을 수행하고, 백본네트워크에서는 패킷단위의 정보분석을 수행한다. 네트워크도메인간에 이러한 정보교환을 통해서 침입탐지 및 역추적을 수행한다. 본 논문에서는 해당 시스템의 전체구조 및 각 기능구조를 보이며, 각 기능구조간의 동작구조를 보인다. 본 시스템을 통하여 침입자의 새로운 공격유형에 대한 탐지 및 대응이 가능하며, 침입사례의 조기발견을 동하여 네트워크의 안정성을 높일 수 있다.

  • PDF

A Study on Facility Information System using GIS and Semantic Web in Underground Space

  • Cui, Yulan;Hwang, Hyun-Suk;Kim, Chang-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.12
    • /
    • pp.1843-1854
    • /
    • 2010
  • The utilization of underground space has recently increased with the complication of road, the rise of the land price, and the development of green technology. Underground space ranges from classical excavations to subway, underground cities, and shopping malls where there are crowds of people. At this time, government has spent a lot of money in installing various types of safety facilities for preparations of increasing potential disasters. Therefore, an effective facility management system is required. In this paper, we propose an information retrieval process to effectively extract the facilities' information based on the ontology and spatial analysis in underground space. The ontology-based searching supports hierarchical and associated results as well as knowledge sharing with hierarchy concepts. The spatial analysis based searching has "Buffer" and "Near" functions to operate on a map without understanding any property of the facility information.

A Study on Applied Orientations of Management Science Technique in Police Audit Planning Process (경찰감사 기획과정시 관리과학기법 응용방안)

  • Kim, Jeong-Heon;Song, Keon-Sup
    • Korean Security Journal
    • /
    • no.5
    • /
    • pp.109-130
    • /
    • 2002
  • As proceeding Munmin and Kukmin's government, it is to bring in regionalism of genernal public administration and police administration, specialization, efficiency issue, demand inventing of audit technique to meet this trends. Especially, according to supporting qualitative improvement of the audit, its environment faced that orienting performance audit emphasis on not the legality but the efficiency more systematic and scientific theory or technique. In order to attain police audit's efficiency through performance audit, this study discussed that scientific management techniques should be applied police audit. Accordingly, the primary purpose of this study is to apply public audit to scientific management technique, bring to light limits in public sector(especially, police sector). To be efficiency audit(namely, performance audit), 1) OR techniques are explained linear programming, network modeling, PERT/CPM, queuing matrix model, simulation, 2) Statistical analysis methods are argued delphi technique, data envelopment analysis(DEA), analytic hierarchical process(AHP), time series analysis models etc.

  • PDF

Developing the Stage Evaluation Model for e-Business Company using Analytic Hierarchy Process (분석적 계층기법을 활용한 e-Business 기업의 초기투자단계 및 성장단계별 평가모형의 개발)

  • Choi, Hye-Jin;Han, In-Goo;Oh, Kyong-Joo
    • Asia pacific journal of information systems
    • /
    • v.15 no.1
    • /
    • pp.45-61
    • /
    • 2005
  • This study develops the evaluation model for e-Business company using analytic hierarchy process. As the first step of this study, we derived the appraisal standards based on the previous literature and the knowledge of experts from venture capitalists, security companies, credit evaluation companies, and consulting firms. In order to validate the evaluating factors in the models, this study was supported by analysts of top ranked venture capitalists in Korea. Through their assistance, this study can determine necessary evaluating factors that refined and deepened the models. Four expert groups, such as venture capitalists, credit analysts, analysts of security company and e-Business consultants, provide their knowledge for the determination of the weights of evaluating factors in the hierarchical model through the questionnaires and interviews. The results show that the weights of the evaluating factors differed by the maturity of e-Business company.

A Study on Hierarchy-based Secure Encryption Protocol for Trust Improvement on Multicast Environment of MANET (MANET의 멀티캐스트 환경에서 신뢰성 향상을 위한 계층기반 암호 프로토콜 기법 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.3
    • /
    • pp.43-51
    • /
    • 2017
  • MANET consists of only wireless nodes having limited processing capability. It processes routing and data transmission through cooperation among each other. And it is exposed to many attack threats due to the dynamic topology by movement of nodes and multi-hop communication. Therefore, the reliability of transmitted data between nodes must be improved and security of integrity must be high. In this paper, we propose a method to increase the reliability of transmitted data by providing a secure cryptography protocol. The proposed method used a hierarchical structure to provide smooth cryptographic services. The cluster authentication node issues the cluster authentication key pair and unique key to the nodes. The nodes performs the encryption through two steps of encryption using cluster public key and block encryption using unique key. Because of this, the robustness against data forgery attacks was heightened. The superior performance of the proposed method can be confirmed through comparative experiment with the existing security routing method.

Contrast Analysis According to Hierarchical Access Structure on Visual Cryptography Scheme and Its Application into Human identification (시각암호에서 계층적 접근구조에 따른 휘도분석과 식별에 응용)

  • 최창근
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.8 no.2
    • /
    • pp.13-26
    • /
    • 1998
  • 시각암호는 비밀화상을 share라 불리는 암호화된 형태로 분산하는 방법으로서n명의 참여자로 이루어진 잡합 p에 대하여, 각 참여자는 share로 구성된 슬라이드(transparency)를 한장씩 부여받는다. 참여자들의 인가된 부분집합은 슬라이드를 중첩시켜 시각적으로 비밀정보를 복원할 수 있지만, 다른 부분집합은 비밀 정보를 복원 할 수 없다. 이 방법은 비밀정보를 복원라기 위하여 인간의 시각 체계를 이용하므로 컴퓨터를 사용한 복잡한 연산이 필요 없는 이점이 있는 반면에 복원화상의 휘도가 손실되는 단점이 있다. 이논문에서는 참여자의 계층화를 고려한 (2, n) VCS(Visual Cryptography Scheme)를 구성하기 위한 새로운 모델을 제안하고 계층적 접근구조에 의해 휘도를 개선하는 방법을 보인다. 제안하는 방법의 효율을 평가하기 위하여 (2, n) VC로 재구성되는 화상의 휘도를 분석한다. 또한 그 응용으로서 한 장의 슬라이드로 사용자와 시스템 사이에 상호식별이 가능한 메카니즘을 제시한다.

Comprehensive review on Clustering Techniques and its application on High Dimensional Data

  • Alam, Afroj;Muqeem, Mohd;Ahmad, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.237-244
    • /
    • 2021
  • Clustering is a most powerful un-supervised machine learning techniques for division of instances into homogenous group, which is called cluster. This Clustering is mainly used for generating a good quality of cluster through which we can discover hidden patterns and knowledge from the large datasets. It has huge application in different field like in medicine field, healthcare, gene-expression, image processing, agriculture, fraud detection, profitability analysis etc. The goal of this paper is to explore both hierarchical as well as partitioning clustering and understanding their problem with various approaches for their solution. Among different clustering K-means is better than other clustering due to its linear time complexity. Further this paper also focused on data mining that dealing with high-dimensional datasets with their problems and their existing approaches for their relevancy

Enhanced MPR Selection Strategy for Multicast OLSR

  • Matter, Safaa S.;Al Shaikhli, Imad F.;Hashim, Aisha H.A.;Ahmed, Abdelmoty M.;Khattab, Mahmoud M.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.137-144
    • /
    • 2022
  • Wireless community networks (WCNs) are considered another form of ownership of internet protocol (IP) networks, where community members manage and own every piece of equipment in a decentralized way, and routing for traffic is done in a cooperative manner. However, the current routing protocols for WCNs suffer from stability and scalability issues. In this paper, an enhanced routing protocol is proposed based on the optimized link state routing (OLSR) protocol to meet the standards of efficiency in terms of stability and scalability. The proposed routing protocol is enhanced through two phases: multicasting expansion and multipoint relay (MPR) selection based on an analytical hierarchical process (AHP). The experimental results demonstrate that the proposed routing protocol outperforms the OLSR protocol in terms of network control overhead and packet delivery ratio by 18% and 1% respectively.

Hierarchical watermarking technique for detecting digital watermarking attacks (디지털 워터마킹 공격 탐지를 위한 계층적 워터마킹 기법)

  • Do-Eun Kim;So-Hyun Park;Il-Gu Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.283-284
    • /
    • 2024
  • 디지털 워터마킹은 디지털 컨텐츠에 정보를 삽입하는 기술이다. 종래의 디지털 워터마킹 기술은 견고성과 비가시성 사이에 트레이드오프 관계를 가지고, 변형 및 노이즈 공격 등에 취약하다. 본 논문에서는 호스트 이미지의 비가시성을 보장하면서 효율적인 공격 탐지와 소유자 식별이 가능한 워터마킹 기법을 제안한다. 제안한 방식은 주파수 분할 기반의 계층적 워터마킹 및 공격 탐지 시그니처 삽입을 통해 비가시성을 보장하며 용량과 견고성 측면에서 종래의 방법보다 향상된 성능을 보였다. 실험 결과에 따르면 종래의 디지털 워터마크가 무력화되는 왜곡 공격 상황에서 공격 탐지 시그니처 검출이 가능하여 워터마크 공격을 탐지하고 소유자를 식별할 수 있었다.