• Title/Summary/Keyword: Information gathering

Search Result 839, Processing Time 0.025 seconds

Analysis of Threat Model and Requirements in Network-based Moving Target Defense

  • Kang, Koo-Hong;Park, Tae-Keun;Moon, Dae-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.10
    • /
    • pp.83-92
    • /
    • 2017
  • Reconnaissance is performed gathering information from a series of scanning probes where the objective is to identify attributes of target hosts. Network reconnaissance of IP addresses and ports is prerequisite to various cyber attacks. In order to increase the attacker's workload and to break the attack kill chain, a few proactive techniques based on the network-based moving target defense (NMTD) paradigm, referred to as IP address mutation/randomization, have been presented. However, there are no commercial or trial systems deployed in real networks. In this paper, we propose a threat model and the request for requirements for developing NMTD techniques. For this purpose, we first examine the challenging problems in the NMTD mechanisms that were proposed for the legacy TCP/IP network. Secondly, we present a threat model in terms of attacker's intelligence, the intended information scope, and the attacker's location. Lastly, we provide seven basic requirements to develop an NMTD mechanism for the legacy TCP/IP network: 1) end-host address mutation, 2) post tracking, 3) address mutation unit, 4) service transparency, 5) name and address access, 6) adaptive defense, and 7) controller operation. We believe that this paper gives some insight into how to design and implement a new NMTD mechanism that would be deployable in real network.

An Energy Efficient MAC Protocol Considering the Funneling Effect for Wireless Sensor Networks (무선 센서 네트워크에서 퍼널링 효과를 고려한 에너지 효율적인 MAC 프로토콜의 설계)

  • Oh, Kyoung-Seok;Woo, Seok;Sung, Seok-Jin;Kim, Ki-Seon
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.41-42
    • /
    • 2007
  • DMAC is an energy efficiency and low latency protocol designed for data gathering tree structures. However, it causes the funneling effect which is many-to-one traffic patterns in tree structures, consequently, results in packet collisions, losses, and energy consumptions in low depth nodes. In this paper, we present an energy efficient MAC protocol with fairness-based scheduling to avoid the funneling effect of DMAC protocol. By using traffic information from children nodes, our protocol dynamically adjusts duty cycles of last-depth nodes to mitigate overloaded packets in the vicinity of the sink node. Therefore, we expect our protocol to save more energy and achieve better packet delivery ratio, compared to DMAC protocol.

  • PDF

Mobile Data System Implementation of P2P used (P2P를 이용한 모바일 데이터 시스템 구현)

  • Kim, Dong-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.8
    • /
    • pp.1691-1695
    • /
    • 2005
  • Mobile P2P Service can compose free network from one client to another without central server function. Diversified Information & Data are able to be transmitted among peer to peer based upon extended mobile concept. In this paper Mobile P2P Service is applied to the program which gathering, sharing, analysis agricultural information and the natural disasters Information We desire to authenticate request about service to user who is administered between each user to limit connection. Wish to admit authentication mechanism to mechanism that can do information sharing suety in P2P environment to solve this in this treatise and design authentication mechanism.

Design and Implementation of AIGT System for Safety Certification of Agricultural Products (농산물 안전인증을 위한 AIGT 시스렘의 설계 및 구현)

  • Jung Hoe-Kyung;Yu Seong-Jae;Kim Ki-Tae;Min Byung-Hun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.7
    • /
    • pp.1246-1252
    • /
    • 2006
  • Recently, customers interest increase in the agricultural product safety when receiving the many information about food problem due to the development of media. Such amid, domestic agricultural environment don't have a system that safety certification of agricultural product. At this rate, domestic agricultural products will decrease the competitive power and apprehend by the giving a market to foreign agricultural product. In this paper, we designed and implementation of AIGT system for the improvement of agricultural environment to producing the agricultural product safety and customers' reliability increase to offering clear information. Also, we defined the right data structure for agricultural environment. The monitoring and video conference are imported for efficient improvement of environment.

A Study of the Improvement Method of I-pin Mass Illegal Issue Accident (아이핀 대량 부정발급 사고에 대한 개선방법 연구)

  • Lee, Younggyo;Ahn, Jeonghee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.2
    • /
    • pp.11-22
    • /
    • 2015
  • The almost of Web page has been gathered the personal information(Korean resident registration number, name, cell-phone number, home telephone number, E-mail address, home address, etc.) using the membership and log-in. The all most user of Web page are concerned for gathering of the personal information. I-pin is the alternative means of resident registration number and has been used during the last ten-year period in the internet. The accident of I-pin mass illegal issue was happened by hacker at February, 2015. In this paper, we analysis the problems of I-pin system about I-pin mass illegal issue accident and propose a improvement method of it. First, I-pin issue must be processed by the off-line of face certification in spite of user's inconvenience. Second, I-pin use must be made up through second certification of password or OTP. The third, the notification of I-pin use must be sent to the user by the text messaging service of cell-phone or the E-mail. The forth, I-pin must be used an alternative means of Korean resident registration number in Internet. The methods can reduce the problems of I-pin system.

EEDARS: An Energy-Efficient Dual-Sink Algorithm with Role Switching Mechanism for Event-Driven Wireless Sensor Networks

  • Eslaminejad, Mohammadreza;Razak, Shukor Abd;Ismail, Abdul Samad Haji
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.10
    • /
    • pp.2473-2492
    • /
    • 2012
  • Energy conservation is a vital issue in wireless sensor networks. Recently, employing mobile sinks for data gathering become a pervasive trend to deal with this problem. The sink can follow stochastic or pre-defined paths; however the controlled mobility pattern nowadays is taken more into consideration. In this method, the sink moves across the network autonomously and changes its position based on the energy factors. Although the sink mobility would reduce nodes' energy consumption and enhance the network lifetime, the overhead caused by topological changes could waste unnecessary power through the sensor field. In this paper, we proposed EEDARS, an energy-efficient dual-sink algorithm with role switching mechanism which utilizes both static and mobile sinks. The static sink is engaged to avoid any periodic flooding for sink localization, while the mobile sink adaptively moves towards the event region for data collection. Furthermore, a role switching mechanism is applied to the protocol in order to send the nearest sink to the recent event area, hence shorten the path. This algorithm could be employed in event-driven and multi-hop scenarios. Analytical model and extensive simulation results for EEDARS demonstrate a significant improvement on the network metrics especially the lifetime, the load and the end-to-end delay.

A Study on The Efficiency Elevation Method of IT Security System Evaluation via Process Improvement (프로세스 개선을 통한 정보보호제품 평가 효율 향상 방법에 관한 연구)

  • 김태훈;성윤기;조규민;김상호;노병규
    • Convergence Security Journal
    • /
    • v.3 no.1
    • /
    • pp.23-30
    • /
    • 2003
  • As IT industries grow rapidly, many kinds of problems related to information security have gained force. Demands for information security products such as firewall, Intrusion Detection System have grown and the reliability and the safety of information security products is gathering strength. The evaluation for information security products is putting in operation, but developers have a difficulty in timely presenting their products due to long time for the evaluation. In this paper, we suggest the efficient elevation method for information security product by improving the development process in order to meet the assurance requirements of the Common Criteria.

  • PDF

Multi-Attribute Data Fusion for Energy Equilibrium Routing in Wireless Sensor Networks

  • Lin, Kai;Wang, Lei;Li, Keqiu;Shu, Lei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.1
    • /
    • pp.5-24
    • /
    • 2010
  • Data fusion is an attractive technology because it allows various trade-offs related to performance metrics, e.g., energy, latency, accuracy, fault-tolerance and security in wireless sensor networks (WSNs). Under a complicated environment, each sensor node must be equipped with more than one type of sensor module to monitor multi-targets, so that the complexity for the fusion process is increased due to the existence of various physical attributes. In this paper, we first investigate the process and performance of multi-attribute fusion in data gathering of WSNs, and then propose a self-adaptive threshold method to balance the different change rates of each attributive data. Furthermore, we present a method to measure the energy-conservation efficiency of multi-attribute fusion. Based on our proposed methods, we design a novel energy equilibrium routing method for WSNs, viz., multi-attribute fusion tree (MAFT). Simulation results demonstrate that MAFT achieves very good performance in terms of the network lifetime.

An Energy-Efficient Data Gathering Method in Wireless Sensor Networks Based on Mobile Sinks (모바일 싱크 기반 무선 센서 네트워크에서 에너지 효율적인 데이터 수집 기법)

  • Kim, Sang-Lae;Park, Jun-Ho;Seong, Dong-Ook;Yoo, Jae-Soo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06d
    • /
    • pp.205-207
    • /
    • 2012
  • 무선 센서 네트워크에서 에너지 효율적인 네트워크 구성을 위해 데이터를 수집하는 싱크 노드에 이동성을 적용시킨 모바일 싱크를 이용한 데이터 수집 기법이 활발하게 연구되고 있다. 하지만 최근 모바일 싱크를 적용한 데이터 수집 기법에서는 무선 센서 노드들의 에너지 소모를 분산시켜 네트워크의 수명은 증가시켰지만 고정적인 경로를 기반으로 하여 이벤트 데이터의 신속한 수집이 불가능하거나 이동성을 갖는 모바일 싱크로의 동적 라우팅 패스의 빈번한 설정으로 인해 최적화된 에너지 효율을 제공하지 못한다. 본 논문에서는 이와 같은 문제점을 해결하기 위해 모바일 싱크 기반의 무선 센서 네트워크 환경에서 에너지 효율성을 고려하여 이벤트 데이터를 우선 수집하는 데이터 수집 기법을 제안한다. 제안하는 기법은 특정 이벤트가 발생할 경우, 모바일 싱크의 이동성을 이용하여 특정 이벤트 데이터를 빠르게 수집하며 일반적인 모니터링 데이터의 압축과 전송 주기를 변경함으로써 전반적인 QoS를 향상시킨다. 성능평가 결과, 제안하는 기법은 기존 기법에 비해 이벤트 데이터에 대한 응답시간이 평균 57% 감소하였고, 네트워크의 수명이 평균 19% 증가하였다.

A Study on Demands of Land Use Information for Spatial Planning (공간계획을 위한 토지이용정보 수요 조사 연구)

  • Lee, Joo-Il;Choi, Chang-Gyu
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.05a
    • /
    • pp.88-91
    • /
    • 2006
  • Land Use Information is the key of the rational decision in urban and regional planning. Although the local and central governments have data related to land use, urban and regional planners can gather the land use information in difficulty. For use the data which the governments have made, they should formally show their needs and applications, On this background, this study try to show the demands of such information for urban planning using questionnaire. Analyzing the result, it can present the hardness of gathering land use information, the high demands, and the needs of the each data field.

  • PDF