• Title/Summary/Keyword: Information Security Evaluation

Search Result 932, Processing Time 0.025 seconds

Phishing Detection Methodology Using Web Sites Heuristic (웹사이트 특징을 이용한 휴리스틱 피싱 탐지 방안 연구)

  • Lee, Jin Lee;Park, Doo Ho;Lee, Chang Hoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.10
    • /
    • pp.349-360
    • /
    • 2015
  • In recent year, phishing attacks are flooding with services based on the web technology. Phishing is affecting online security significantly day by day with the vulnerability of web pages. To prevent phishing attacks, a lot of anti-phishing techniques has been made with their own advantages and dis-advantages respectively, but the phishing attack has not been eradicated completely yet. In this paper, we have studied phishing in detail and categorize a process of phishing attack in two parts - Landing-phase, Attack-phase. In addition, we propose an phishing detection methodology based on web sites heuristic. To extract web sites features, we focus on URL and source codes of web sites. To evaluate performance of the suggested method, set up an experiment and analyze its results. Our methodology indicates the detection accuracy of 98.9% with random forest algorithm. The evaluation of proof-of-concept reveals that web site features can be used for phishing detection.

Evaluation of Corn Production Based on Different Climate Scenarios

  • Twumasi, George Blay;Choi, Kyung-Sook
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2016.05a
    • /
    • pp.518-518
    • /
    • 2016
  • Agriculture is the lifeblood of the economy in Ghana, employs about 42% of the population work force and accounts for 30% of the Gross Domestic Product (GDP). Corn (maize) is the major cereal crop grown as staple food under rain fed conditions, covers over 92% of the total agricultural area, and contributes 54% of the caloric intake. Issues of hunger and food insecurity for the entire nation are associated with corn scarcity and low production. The climate changes are expected to affect corn production in Ghana. This study evaluated variations of corn yields based on different climate conditions of rain-fed area in the Dangbe East District of Ghana. AquaCrop model has been used to simulate corn growing cycles in study area for this purpose. The main goal for this study was to predict yield of corn using selected climatic parameters from 1992 to 2013 using different climate scenarios. The Model was calibrated and validated using observed field data, and the simulated grain yields matched well with observed values for the season under production giving an R squared (R2)of 0.93 and Nash-Sutcliff Error(NSE) of 0.21. Study results showed that rainfall reduction in the range of -5% to -20% would reduce the yield from 1.315ton/ha to 0.421ton/ha (-21. 3%) whereas increasing temperature from 1% to 7% would result in the maximum yield reduction of -20.6% (1.315 to 1.09 ton/ha.). On the other hand, increasing rainfall from 5-20% resulted in yield increment of 68% (1.315-2.209 ton/ha) and decreasing temperature produce 7% increase in yield ( 1.315 to 1.401ton/ha). These results provide useful information to adopt strategies by the Government of Ghana and farmers for improving national food security under climate change.

  • PDF

Extending Role-based Access Control for Privacy Preservation in Academic Affairs System (교무업무시스템에서의 개인정보보호를 위한 역할기반 접근 제어 확장)

  • Kim, Bo-Seon;Hong, Eui-Kyeong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.2
    • /
    • pp.171-179
    • /
    • 2008
  • RBAC(Role based Access Control) is effective way of managing user's access to information object in enterprise level and e-government system. The concept of RBAC is that the access right to object in a system is not directly assigned o users but assigned by being a member of a role which is defined in a organization. RBAC is utilized for controling access range of privacy but it does not support the personal legal right of control over information and right of limited access to the self. Nor it contains the way of observation of privacy flow that is guided in a legal level. In this paper, extended RBAC model for protecting privacy will be suggested and discussed. Two components of Data Right and Assigning Data Right are added to existed RBAC and the definition of each component is redefined in aspect of privacy preservation. Data Right in extended RBAC represents the access right to privacy data. This component provides the way of control over who can access which privacy and ensures limitation of access quantity of privacy. Based on this extended RBAC, implemented examples are presented and the evaluation is discussed by comparing existed RBAC with extended RBAC.

Research for the Element to Analyze the Performance of Modern-Web-Browser Based Applications (모던 웹 브라우저(Modern-Web-Browser) 기반 애플리케이션 성능분석을 위한 요소 연구)

  • Park, Jin-tae;Kim, Hyun-gook;Moon, Il-young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.278-281
    • /
    • 2018
  • The early Web technology was to show text information through a browser. However, as web technology advances, it is possible to show large amounts of multimedia data through browsers. Web technologies are being applied in a variety of fields such as sensor network, hardware control, and data collection and analysis for big data and AI services. As a result, the standard has been prepared for the Internet of Things, which typically controls a sensor via HTTP communication and provides information to users, by installing a web browser on the interface of the Internet of Things. In addition, the recent development of web-assembly enabled 3D objects, virtual/enhancing real-world content that could not be run in web browsers through a native language of C-class. Factors that evaluate the performance of existing Web applications include performance, network resources, and security. However, since there are many areas in which web applications are applied, it is time to revisit and review these factors. In this thesis, we will conduct an analysis of the factors that assess the performance of a web application. We intend to establish an indicator of the development of web-based applications by reviewing the analysis of each element, its main points, and its needs to be supplemented.

  • PDF

A Study on Evaluation of the Appropriateness of Hospitalization for Patients with Stroke (뇌졸중 환자의 재원 적절성 평가에 관한 연구)

  • Choi, Eun-Mi;Yoo, In-Sook
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.233-240
    • /
    • 2012
  • This study aimed to clarify any factors that may have effect on the appropriateness of hospital admission and hospitalization with the intention of facilitating more efficient occupancy of hospital beds and better medical services in the aspect of their quality, minimizing unnecessary occupancy of beds, and ultimately helping patients requiring acute treatments to use immediately hospitals. This paper selected 154 Stroke patients who left neurology department of one general hospital from March, 1, 2006 to September, 31, 2010 as targets to meet the rate according to medical care security and to see the trend of recent 4 years. As study method, this paper analized medical treatment record with AEP to evaluate the appropriateness of hospital admission and stay and the collected data was computerized through SPSS 12.0. Based upon the results above, the conclusion was drawn that the higher appropriateness of hospital admission and the shorter length of hospital stay will lead to the higher appropriateness of hospitalization. In other words, it is required to provide hospitalized patients with all kinds of behaviors including medical treatments and nursing care service, management of pharmaceuticals, tests, rehabilitation and symptoms, as well as instructions and information for patients. Meanwhile, as it was found that the length of hospital stay may affect the appropriateness of hospitalization, the longer length of hospital stay may result in reduced bed turnover rate. In this light, it is necessary to organize a task force team responsible for evaluation and control of the appropriateness of hospitalization and hospital stay length to improve the quality of medical service in a medical center, so that patients can leave the center timely. Ultimately, governmental supports such as expansion of long-term care facilities will reduce the necessary length of hospital stay so that patients with stroke can receive rehabilitative treatments and long-term care service shortly after completion of acute treatments.

Evaluation of Regional Drought Vulnerability Assessment Based on Agricultural Water and Reservoirs (지역기반 농업용수의 가뭄재해 취약성 평가)

  • Mun, Young-Sik;Nam, Won-Ho;Jeon, Min-Gi;Kim, Han-Joong;Kang, Ku;Lee, Jung-Chul;Ha, Tae-Hyun;Lee, Kwangya
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.62 no.2
    • /
    • pp.97-109
    • /
    • 2020
  • Drought is one of the most influential disasters in sustainable agriculture and food security of nations. In order to preemptively respond to agricultural droughts, vulnerability assessments were conducted to predict the possibility of drought in the region, the degree of direct or indirect damage, and the ability to cope with the damage. Information on agricultural drought vulnerability status of different regions is extremely useful for implementation of long term drought management measures. The purpose of this study is to develop and implement a quantitative approach for measuring agricultural drought vulnerability at sub-district level based on agricultural water and reservoirs. To assess the vulnerability in a quantitative manner and also to deal with different physical and socioeconomic data on the occurrence of agricultural drought, we selected the appropriate factors for the assessment of agricultural drought vulnerability through preceding studies, and analyzed the meteorological and agricultural reservoir data from 2015 to 2018. Each item was weighted using AHP (Analytic Hierarchy Process) analysis and evaluated through the agricultural drought vulnerability estimation. The entire national vulnerability assessments showed that Ganghwa, Naju, and Damyang were the most vulnerable to agricultural droughts. As a result of analyzing spatial expression, Gyeongsang-do is relatively more vulnerable to drought than Gangwon-do and Gyeonggi-do. The results revealed that the methodology and evaluation items achieved good performance in drought response. In addition, vulnerability assessments based on agricultural reservoir are expected to contribute supporting effective drought decisions in the field of agricultural water management.

Design of NePID using Anomaly Traffic Analysis and Fuzzy Cognitive Maps (비정상 트래픽 분석과 퍼지인식도를 이용한 NePID 설계)

  • Kim, Hyeock-Jin;Ryu, Sang-Ryul;Lee, Se-Yul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.4
    • /
    • pp.811-817
    • /
    • 2009
  • The rapid growth of network based IT systems has resulted in continuous research of security issues. Probe intrusion detection is an area of increasing concerns in the internet community. Recently, a number of probe intrusion detection schemes have been proposed based on various technologies. However, the techniques, which have been applied in many systems, are useful only for the existing patterns of probe intrusion. They can not detect new patterns of probe intrusion. Therefore, it is necessary to develop a new Probe Intrusion Detection technology that can find new patterns of probe intrusion. In this paper, we proposed a new network based probe intrusion detector(NePID) using anomaly traffic analysis and fuzzy cognitive maps that can detect intrusion by the denial of services attack detection method utilizing the packet analyses. The probe intrusion detection using fuzzy cognitive maps capture and analyze the packet information to detect syn flooding attack. Using the result of the analysis of decision module, which adopts the fuzzy cognitive maps, the decision module measures the degree of risk of denial of service attack and trains the response module to deal with attacks. For the performance evaluation, the "IDS Evaluation Data Set" created by MIT was used. From the simulation we obtained the max-average true positive rate of 97.094% and the max-average false negative rate of 2.936%. The true positive error rate of the NePID is similar to that of Bernhard's true positive error rate.

Technology Standards Policy Support Plans for the Advancement of Smart Manufacturing: Focusing on Experts AHP and IPA (스마트제조 고도화를 위한 기술표준 정책영역 발굴 및 우선순위 도출: 전문가 AHP와 IPA를 중심으로)

  • Kim, Jaeyoung;Jung, Dooyup;Jin, Young-Hyun;Kang, Byung-Goo
    • Informatization Policy
    • /
    • v.30 no.4
    • /
    • pp.40-61
    • /
    • 2023
  • The adoption of smart factories and smart manufacturing as strategies to enhance competitiveness and stimulate growth in the manufacturing sector is vital for a country's future competitiveness and industrial transformation. The government has consistently pursued smart manufacturing innovation policies starting with the Manufacturing Innovation 3.0 strategy in the Ministry of Industry. This study aims to identify policy areas for smart factories and smart manufacturing based on technical standards. Analyzing policy areas at the current stage where the establishment and support of domestic standards aligning with international technical standards are required is crucial. By prioritizing smart manufacturing process areas within the industry, policymakers can make well-informed decisions to advance smart manufacturing without blindly following international standardization in already well-established areas. To achieve this, the study utilizes a hierarchical analysis method including expert interviews and importance-performance analysis for the five major process areas. The findings underscore the importance of proactive participation in standardization for emerging technologies, such as data and security, instead of solely focusing on areas with extensive international standardization. Additionally, policymakers need to consider carbon emissions, energy costs, and global environmental challenges to address international trends in export and digital trade effectively.

Performance Evaluation of a Novel Chaos Transceiver for the High Level Modulation (고레벨 변조를 위한 새로운 카오스 송수신기의 성능 평가)

  • Lee, Jun-Hyun;Ryu, Heung-Gyoon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.1
    • /
    • pp.31-36
    • /
    • 2014
  • Security of chaos communication system that has characteristic of sensitive initial conditions is superior to digital communication systems, but BER(Bit Error Rate) performance is evaluatied badly. So, studies in order to improve the BER performance is important. existing studies, BER performance of proposed chaos transceiver is possible to improve than the CDSK(Correlation Delay Shift Keying) system because it has characteristic that has very few addition elements like noise signal except for the desired signal. Chaos communication system has many symbols because it spreads according to characteristic of chaos map. Therefore, study that can have the good data rate in chaos communication system is required. Information bits of existing chaos modulation system are modulated as -1 and 1 on the basis of BPSK system. However, instead of BPSK system, if chaos communication system is applied high level modulation systems such as QPSK system and 16QAM system, it is possible to have good data rate because more data are transmitted at a time. In the paper, when QPSK system and 16QAM system are applied to proposed chaos transceiver in existing study, we evaluate the SER(Symbol Error Rate) performance and compare the each performance. Also, when QPSK system and 16QAM system are applied to proposed chaos transceiver, we evaluate the anti-jamming performance of proposed system.

Performance Evaluation Plan of Maritime VHF Digital Communications System (해상용 VHF 디지털통신 시스템의 성능평가 방안)

  • Ju, Yang-Ro;Kim, Kab-Ki;Choi, Jo-Cheon;Lee, Seong Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.7
    • /
    • pp.582-588
    • /
    • 2014
  • IMO and IALA have undertaken projects that GMDSS Modernization and E-navigation, which refer to "Future digital communications systems" for a more efficient transmission of voice and data communications in the VHF maritime mobile service. ITU has also resolved in WRC-07 Resolution 357 to study the use of spectrum-efficient technologies in order to provide for the operation of ship and port security and maritime safety systems. IALA and ITU WP5B have coordinated for the technical developments and the spectrum issues. Recommendation ITU-R M.1842-1 has approved by WP5B meeting. This revision provides a wideband data service both 50kHz and 100kHz in the VHF maritime mobile service. This paper has studied E-navigation, its needs for data exchange that includes explanations of the current methods for transmitting data by VHF that based in land mobile radio service. A further technologies trend is estimated for Recommendation ITU-R M.1842-1, that is based on the land mobile radio standards with some tailored to fit the needs of the maritime mobile service.