• Title/Summary/Keyword: Mail security

Search Result 181, Processing Time 0.027 seconds

Pseudonym-based Anonymous PKI with Short Group Signature (Short Group Signature를 이용한 가명 기반 PKI)

  • Lee, Sok-Joon;Han, Seung-Wan;Lee, Yun-Kyung;Chung, Byung-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.703-707
    • /
    • 2008
  • Nowadays, Internet becomes an essential element in our life. We can make use of numerous on-line services through Internet such as information search, on-line shopping, e-mail service, etc. But, while getting the benefits of Internet service, invasion of our privacy frequently occurs because on-line service providers tend to request excessive or unnecessary personal information. So, there have been some researches on anonymous authentication, which means that user can authenticate herself, not revealing her identity or personal information. But, most of the researches are not somewhat applicable to current authentication infrastructure. In this paper, we propose a pseudonym-based anonymous PKI with short group signature. Using our proposed scheme, we can provide anonymity with conditional traceability to current PKI.

  • PDF

A Study on the Establishment of Evaluation Criterion for the Housing Information Related Internet Web Sites (주거 관련 정보 사이트의 평가기준 설정에 관한 연구)

  • Park, Hyun-Ok
    • Korean Journal of Human Ecology
    • /
    • v.10 no.1
    • /
    • pp.83-91
    • /
    • 2001
  • Currently, obtaining information about the housing studies through the internet web sites is one of the outstanding mediums. Those are of the housings, architecture, interior design, furniture products, hotels and its journals, etc., and out of all those informations are the highly expected value of use. But. it may causes the public users to experience a negative effect, because many of those informations provided on the internet web sites related to the housing studies/informations are not providing an equal quality of information. And measuring the quality is also not easy. This study focuses on the establishment of evaluation criterion for the housing information-related internet web sites. In such a vein, it proposes a clear model to evaluate the information qualities with the 43 questionnaires / examining items. To test the questionnaires/rating items, the analysis has been implemented which has shown the reciprocal effect between the 2 major factors. One major factor with 4 variables on the information searches are (1) the accuracy/reliability of contents and techniques, (2) the design of a picture and communication, (3) the readability and security, and (4) the security of private information, and the other factor with 3variables on the additional services are (1) the diversities of contents and ease of orderings, (2) the abilities of search and e-mail, and (3) the events and after services. This study/rating model will provide the users with a fundamental material in evaluating the quality of housing information on the internet web sites.

  • PDF

Designing and Realization of the System for the Improvement of Processing Capability of Intrusion Detection by Using O/S Information (O/S 정보를 이용한 침입탐지 처리성능 향상에 관한 시스템 설계 및 구현)

  • Son, Man-Kyung;Lee, Dong-Hwi;J Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.2
    • /
    • pp.91-99
    • /
    • 2006
  • As the speed of network has fastened and the Internet has became common, an ill-intentioned aggression, such as worm and E-mail virus rapidly increased. So that there too many defenses created the recent Intrusion detection system as well as the Intrusion Prevention Systems to defense the malicious aggression to the network. Also as the form of malicious aggression has changed, at the same time the method of defense has changed. There is "snort" the most representive method of defense and its Rules file increases due to the change of aggression form. This causes decline of capability for detection. This paper suggest, design, and realize the structure for the improvement of processing capability by separating the files of Snort Rule according to o/s. This system show more improvement of the processing capability than the existing composion.

  • PDF

A Study for Analysing Key Factors for Establishing the Omni-Channel Customer System in a Financial Enterprise Using ANP (ANP 모형을 이용한 금융기업의 옴니채널 고객 시스템의 중요 구축 요소 분석)

  • Hwang, Hyun-Cheon;Kim, Woo-Je
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.43 no.1
    • /
    • pp.50-60
    • /
    • 2020
  • The omni-channel customer system is the communication system between enterprise and customer via multiple channels such as mail, email, SMS, and mobile. The omni-channel customer system complements each other channel through the integration of each channel. The purpose of this research is to derive key factors and calculate the weights that a financial enterprise considers when adopting the omni-channel customer system. For this research, we analyzed the request for proposal documents used for the omni-channel customer system implementation projects in the financial enterprise. Also, we derived, classified, and stratified the key factors to be considered for the introduction of the omni-channel customer system in the financial enterprise. As a result of analyzing the key factors, customer experience, operations, and security were identified as the components of the top category in introducing the omni-channel customer system in the financial sector. Furthermore, the weight for each key factor was calculated by using ANP. As a result of ANP, operations, customer experience, and security were important in order. Also, the degree of easiness for connecting with other systems and the various abilities for representing the contents of the omni-channels were derived as the important key factors.

Coward Analysis based Spam SMS Detection Scheme (동시출현 단어분석 기반 스팸 문자 탐지 기법)

  • Oh, Hayoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.693-700
    • /
    • 2016
  • Analyzing characteristics of spam text messages had limitations since spam datasets are typically difficult to obtain publicly and previous studies focused on spam email. Although existing studies, such as through the use of spam e-mail characterization and utilization of data mining techniques, there are limitations that influence is limited to high spam detection techniques using a single word character. In this paper, we reveal the characteristics of the spam SMS based on experiment and analysis from different perspectives and propose coward analysis based spam SMS detection scheme with a publicly disclosed spam SMS from the University of Singapore. With the extensive performance evaluations, we show false positive and false negative of the proposed method is less than 2%.

Study on Improved Detection Rule Formation via Information Leakage Malware Analysis (정보유출 악성코드 분석을 통한 개선된 탐지 규칙 제작 연구)

  • Park, Won-Hyung;Yang, Kyeong-Cheol;Lee, Dong-Hwi;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.1-8
    • /
    • 2008
  • Not only the recent hacking techniques are becoming more malicious with the sophisticated technology but also its consequences are bringing more damages as the broadband Internet is growing rapidly. These may include invasion of information leakage, or identity theft over the internet. Its intent is very destructive which can result in invasion of information leakage, hacking, one of the most disturbing problems on the net. This thesis describes the technology of how you can effectively analyze and detect these kind of E-Mail malicious codes. This research explains how we can cope with malicious code more efficiently by detection method.

  • PDF

A Study on the Effective Countermeasure of Business Email Compromise (BEC) Attack by AI (AI를 통한 BEC (Business Email Compromise) 공격의 효과적인 대응방안 연구)

  • Lee, Dokyung;Jang, Gunsoo;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.835-846
    • /
    • 2020
  • BEC (Business Email Compromise) attacks are frequently occurring by impersonating accounts or management through e-mail and stealing money or sensitive information. This type of attack accounts for the largest portion of the recent trade fraud, and the FBI estimates that the estimated amount of damage in 2019 is about $17 billion. However, if you look at the response status of the companies compared to this, it relies on the traditional SPAM blocking system, so it is virtually defenseless against the BEC attacks that social engineering predominates. To this end, we will analyze the types and methods of BEC accidents and propose ways to effectively counter BEC attacks by companies through AI(Artificial Intelligence).

KI-HABS: Key Information Guided Hierarchical Abstractive Summarization

  • Zhang, Mengli;Zhou, Gang;Yu, Wanting;Liu, Wenfen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4275-4291
    • /
    • 2021
  • With the unprecedented growth of textual information on the Internet, an efficient automatic summarization system has become an urgent need. Recently, the neural network models based on the encoder-decoder with an attention mechanism have demonstrated powerful capabilities in the sentence summarization task. However, for paragraphs or longer document summarization, these models fail to mine the core information in the input text, which leads to information loss and repetitions. In this paper, we propose an abstractive document summarization method by applying guidance signals of key sentences to the encoder based on the hierarchical encoder-decoder architecture, denoted as KI-HABS. Specifically, we first train an extractor to extract key sentences in the input document by the hierarchical bidirectional GRU. Then, we encode the key sentences to the key information representation in the sentence level. Finally, we adopt key information representation guided selective encoding strategies to filter source information, which establishes a connection between the key sentences and the document. We use the CNN/Daily Mail and Gigaword datasets to evaluate our model. The experimental results demonstrate that our method generates more informative and concise summaries, achieving better performance than the competitive models.

A proposed E-mail Security Protocol using One-time key (일회성키를 이용한 전자우편 보안 프로토콜)

  • 장준교;이상하;김동규
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1998.10a
    • /
    • pp.506-508
    • /
    • 1998
  • 전세계가 정보화 열풍을 겪고 있는 시점에서, 엄청난 사용자들이 다양한 인터넷 서비스 중 전자우편 서비스를 생활의 일부분으로 사용하고 있다. 그러나 기존의 전자우편 서비스만을 제공하는 환경하에서는 많은 보안 위험요소 들이 존재하고 있으며 전자우편 서비스의 사용에 많은 제약과 노출 위험 가능성을 안고 있다. 이러한 문제점들을 극복하기 위한 노력들이 이미 기울여져 다양한 방법으로 해결책을 제시하고 있지만 아직 완전한 형태의 결과물이 나오지 못하고 있다. 그 중 대표적인 PEM은 구현의 어려움으로 인하여 보편화되지 못하고 있으며, 또 다른 제품의 PGP는 키 인증 등의 문제점을 안고 있는 실정이다. 또한 이들 제품들은 전자우편 보안 요구사항들을 모두 충족시켜주지 못한다는 문제점들도 안고 있다. 본 논문에서는 위에서 언급했던 제품들이 안고 있는 문제점들을 극복할 수 있는 다른 해결책을 내 놓기 위해 모든 보안 요구사항을 만족할 수 있고 사용하기 편리한 전자우편 보안 프로토콜을 설계하였다. 이를 위해서 비대칭키 방식인 키 분배서버를 이용하며, 하부 사용자는 키 분배 서버에 의존해 기밀성 및 무결성등 정보보호 서비스를 제공 받을 수 있다.

  • PDF

User authentication and Secure communication for POP3 Security (POP3 보안을 위한 사용자 인증과 암호화 통신)

  • Lee, Hyoung-Seung;Heu, Shin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1998.10a
    • /
    • pp.503-505
    • /
    • 1998
  • 인터넷의 빠른 성장으로 인해 E-mail은 특정 부류만의 사람이 사용하는 것이 아니라 일반 대중에게도 널리 사용되는 생활의 일부분이 되었다. 현재의 POP3 구조에서느 원격 접속을 시도할 경우 사용자의 ID와 Password는 암호화가 안된 상태로 전송된다. 이러한 것 때문에 여러 보안 공격의 대상이 될 수 있으며 여러 보안 문제를 발생시키고 있다.본 논문에서는 기존의 POP3에서 PASS라는 명령어를 통한 사용자 인증 과정에서 나타나는 무제점을 지적하고 이를 방지하기 위한 새로운 인증방법을 One-Time Password System을 이용해서 제시하고 구현하고자 한다. 또한 One-Time Password System을 이용해 불법적인 방법으로 알아낸 암호의 재사용을 방지했다. 또한 암호화 통신을 위해 관용 암호화 방식의 IDEA 알고리즘을 이용했으며, 키 분배와 관리 문제는 One-Time Password System에서 생성한 키를 IDEA의 비밀키로 사용함으로써 해결했다.

  • PDF