• 제목/요약/키워드: Multi-level security

검색결과 217건 처리시간 0.025초

Adaptive data hiding scheme based on magic matrix of flexible dimension

  • Wu, Hua;Horng, Ji-Hwei;Chang, Chin-Chen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권9호
    • /
    • pp.3348-3364
    • /
    • 2021
  • Magic matrix-based data hiding schemes are applied to transmit secret information through open communication channels safely. With the development of various magic matrices, some higher dimensional magic matrices are proposed for improving the security level. However, with the limitation of computing resource and the requirement of real time processing, these higher dimensional magic matrix-based methods are not advantageous. Hence, a kind of data hiding scheme based on a single or a group of multi-dimensional flexible magic matrices is proposed in this paper, whose magic matrix can be expanded to higher dimensional ones with less computing resource. Furthermore, an adaptive mechanism is proposed to reduce the embedding distortion. Adapting to the secret data, the magic matrix with least distortion is chosen to embed the data and a marker bit is exploited to record the choice. Experimental results confirm that the proposed scheme hides data with high security and a better visual quality.

The Use of Innovative Distance Learning Technologies in the Training of Biology Students

  • Biletska, Halyna;Mironova, Nataliia;Kazanishena, Natalia;Skrypnyk, Serhii;Mashtakova, Nataliia;Mordovtseva, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • 제22권11호
    • /
    • pp.115-120
    • /
    • 2022
  • The main purpose of the study is to identify the key aspects of the use of innovative distance learning technologies in the training of biology students. Currently, there is a modernization, the evolution of the education system from a classical university to a virtual one, from lecture material teaching to computer educational programs, from a book library to a computer one, from multi-volume paper encyclopedias to modern search databases. During studies in higher education, distance learning ensures the delivery of information in an interactive mode through the use of information and communication technologies. The main disadvantage of distance learning is the emotional interaction of the teacher with students. It is necessary to increase the level of methodological developments for independent studies of students. The methodology includes a number of theoretical methods. Based on the results of the study, the main elements of the use of innovative distance learning technologies in the training of biology students were identified.

Efficiency of Graph for the Remodularization of Multi-Level Software Architectures

  • Lala Madiha HAKIK
    • International Journal of Computer Science & Network Security
    • /
    • 제24권5호
    • /
    • pp.33-39
    • /
    • 2024
  • In a previous study we proceeded to the remodularization architecture based on classes and packages using the Formal Concept Analysis (FCA)[13] [14] [30]. we then got two possible remodularized architectures and we explored the issue of redistributing classes of a package to other packages, we used an approach based on Oriented Graph to determine the packages that receive the redistributed classes and we evaluated the quality of a remodularized software architecture by metrics [31] [28] [29]. In this paper, we will address the issue of the efficiency of the Oriented Graph in the remodularization of software architectures compared to the Formal Concept Analysis FCA method. The formal method of FCA concept is not popularized among scientists as opposed to the use of the labeled directed graph. It is for this reason that our directed graph approach is more effective in its simplicity and popularity.

일본의 신(新) 해양전략과 해상전력 발전 동향 분석 - 중국의 해양패권 추구에 대한 대응을 중심으로 - (The analysis on Japan's New Maritime Strategy and the Development of its Naval Forces - focusing on Japan's countermeasure to China's pursuing of maritime hegemony -)

  • 배준형
    • Strategy21
    • /
    • 통권40호
    • /
    • pp.5-36
    • /
    • 2016
  • Recently, the Japanese government revised the three guidelines of its security policy, the National Security Strategy(NSS), the National Defense Program Outline and Midterm Defense Buildup Plan, exceptionally at one time. This means Japan has been seeking the new strategy and strengthening military power considering changing regional security environment. Moreover, Japan revised the security laws for the right to collective self-defense, which authorized the use of force even when Japan is not under attack. Also, Japan renewed the Guidelines for Japan-U.S. Defense Cooperation in twenty years, and has expanded JSDF's scope of activity to a worldwide level. These changes imply Japan would constantly seek to build military forces focusing on naval forces. Because Japan's naval forces, the JMSDF is the means that allow Japan to use its force at anywhere overseas and expand its roles and missions in international society by the basis of the right to collective self-defense. This research will analyze Japan's new maritime strategy and trend of force development and eventually look for the implication on our maritime security These days, Japan has perceived Chinese rapid increase of naval power and pursuing of maritime hegemony as a grave threat. In response to this, Japan is designing new maritime strategy, which are "remote islands defense and recapture" and proactively develop a new type of naval forces to accomplish this new strategy. The Japan's "remote island defense and recapture strategy" is to harden its defensive posture in Nansei islands which correspond to China's 1st island chain for chinese A2/AD strategy and directly encounter with China and to protect its own dominium and maritime interest while supporting US national strategy in East Asia. Japan continues to build compact, multi-functional ship to accomplish "remote island defense and recapture strategy" and keep strengthening its maritime power projection capability to include build of new amphibious ship, and large, multi-functional ship which can provide effective C2. These changes imply that Japan is shifting its strategy from passive and defensive to proactive and aggressive way and continues to pursue naval buildup.The implication of Japan's new maritime strategy and naval buildup needs to be observed carefully and we need to keep developing naval power required to protect our maritime sovereignty and interest.

인터넷은행을 위한 개선된 본인확인 구조 (Advanced Mandatory Authentication Architecture Designed for Internet Bank)

  • 홍기석;이경호
    • 정보보호학회논문지
    • /
    • 제25권6호
    • /
    • pp.1503-1514
    • /
    • 2015
  • 인터넷은행 환경 조성과 관련하여 금융당국이 발표한 비대면 실명확인 정책은 대면 이상의 정확성을 기하기 위해 다중확인을 원칙으로 하고 있다. 인터넷은행은 기존 인터넷뱅킹과 법적 실체와 사업모델이 다른데, 본인확인 구조로써 인터넷뱅킹의 본인확인 구조를 유지한 채 실명확인만 대면에서 비대면으로 대체하는 것은 최초 가입자에게 불편을 줄 뿐 아니라, 엄격한 대면확인을 거치는 인터넷뱅킹보다 보안위험에 더 노출될 수 있다. 본 연구는 인터넷은행의 서비스 단계를 등급화하고, 등급에 따라 차등화된 서비스등록 및 이용이 이루어지도록 개선된 본인확인 구조를 제안한다. 또한, 인터넷은행에 대해 발생할 수 있는 보안취약점과 공격모델을 수립하고, 각 공격모델에 대한 인증매체의 보안특성과 서비스 단계별 안전성을 분석한 결과 등급에 따라 기존 인터넷뱅킹보다 비슷하거나 더 높은 안전성을 제공하고, 이용자 가입 유도 측면에서 유용함을 확인하였다.

Securitization and the Merger of Great Power Management and Global Governance: The Ebola Crisis

  • Cui, Shunji;Buzan, Barry
    • 분석과 대안
    • /
    • 제3권1호
    • /
    • pp.29-61
    • /
    • 2019
  • Within the discipline of International Relations (IR), the literatures on global governance (GG) and great power management (GPM) at best ignore each other, and at worst treat the other as a rival or enemy. On the one hand, the GPM literature, like both realism in all its forms, and neoliberalism, takes for granted the ongoing, disproportionate influence of the great powers in the management of the international system/society, and does not look much beyond that. On the other hand, the GG literature emphasizes the roles of smaller states, non-state actors and intergovernmental organizations (IGOs), and tends to see great powers more as part of the problem than as part of the solution. This paper argues that the rise to prominence of a non-traditional security agenda, and particularly of human security, has triggered a de facto merger of GPM and GG that the IR literature usually treated as separate and often opposed theories. We use the Ebola crisis of 2014-15 to show how an issue framed as human security brought about a multi-actor response that combined the key elements of GPM and GG. The security framing overrode many of the usual inhibitions between great powers and non-state actors in humanitarian crises, including even the involvement of great power military forces. Through examining broadly the way in which the Ebola crisis is tackled, we argue that in an age of growing human security challenges, GPM and GG are necessarily and fruitfully merging. The role of great powers in this new human security environment is moving away from the simple means and ends of traditional GPM. Now, great powers require the ability to cooperate and coordinate with multiple-level actors to make the GG/GPM nexus more effective and sustainable. In doing so they can both provide crucial resources quickly, and earn respect and status as responsible great powers. IGOs provide legitimation and coordination to the GPM/GG package, and non-state actors (NSAs) provide information, specialist knowledge and personnel, and links into public engagement. In this way, the unique features of the Ebola crisis provide a model for how the merger of GPM and GG might be taken forward on other shared-fate threats facing global international society.

  • PDF

Protecting Privacy of User Data in Intelligent Transportation Systems

  • Yazed Alsaawy;Ahmad Alkhodre;Adnan Abi Sen
    • International Journal of Computer Science & Network Security
    • /
    • 제23권5호
    • /
    • pp.163-171
    • /
    • 2023
  • The intelligent transportation system has made a huge leap in the level of human services, which has had a positive impact on the quality of life of users. On the other hand, these services are becoming a new source of risk due to the use of data collected from vehicles, on which intelligent systems rely to create automatic contextual adaptation. Most of the popular privacy protection methods, such as Dummy and obfuscation, cannot be used with many services because of their impact on the accuracy of the service provided itself, they depend on changing the number of vehicles or their physical locations. This research presents a new approach based on the shuffling Nicknames of vehicles. It fully maintains the quality of the service and prevents tracking users permanently, penetrating their privacy, revealing their whereabouts, or discovering additional details about the nature of their behavior and movements. Our approach is based on creating a central Nicknames Pool in the cloud as well as distributed subpools in fog nodes to avoid intelligent delays and overloading of the central architecture. Finally, we will prove by simulation and discussion by examples the superiority of the proposed approach and its ability to adapt to new services and provide an effective level of protection. In the comparison, we will rely on the wellknown privacy criteria: Entropy, Ubiquity, and Performance.

빌딩 에너지시스템 통합네트워크 구축에 관한 연구 (The Novel Configuration of Integrated Network for Building Energy System)

  • 홍원표
    • 한국조명전기설비학회:학술대회논문집
    • /
    • 한국조명전기설비학회 2008년도 추계학술대회 논문집
    • /
    • pp.229-234
    • /
    • 2008
  • The new millennium has started with several innovations driven by fast evolution of the technologies in energy sector. A strong impulse towards the diffusion of new economical efficient technologies regulatory incentives related to energy production from renewable source and a small scale building trigeneration and to promotion of more sustainable environmental-friendly generation solutions, the evolution of electricity markets, more and more binding local emission constraints, and the need for improving the security of supply to reduce the energy system vulnerability. The 24 percentage energy quantify of total energy consumption consumes in commercial buildings and residential houses and the 30% portion of total $CO_2$ emissions covers also in the commercial buildings and residential houses sector. To cope with efficiently this energy sinuation in building sector, Building microgrid or building tooling, heating & power(BCHP) system has been interested in recent day due to meeting thermal and electric energy requirements efficiently and with appropriate energy quality. A multi agent system is a collective of intelligent agents that communicate with each other and work cooperatively to achieve common goals. Also, it is to medicate and coordinate communication between Control Areas and Security Coordinators for teal-time control of the BCHP system and the power pid. In this new circumstance, it is very important to integrate the power and energy delivery system and the information system(communication, networks, and intelligent equipment) that controls it. Therefore, development of smart control modules with open communication protocol and seamlessly interchange the data and information between control network and data network including extranet and intranet give a great meanings. We designed and developed the TCP/IP-CAN IED agent modules and ModBus./LonTalk/(TCP/IP) IED agent ones to configure the multi-agent system based smart energy network of commercial buildings and also intelligent algorithms for inverter fault diagnostics which ran be operated in control level or agent level network.

  • PDF

과탐지 감소를 위한 NSA 기반의 다중 레벨 이상 침입 탐지 (Negative Selection Algorithm based Multi-Level Anomaly Intrusion Detection for False-Positive Reduction)

  • 김미선;박경우;서재현
    • 정보보호학회논문지
    • /
    • 제16권6호
    • /
    • pp.111-121
    • /
    • 2006
  • 인터넷이 빠르게 성장함에 따라 네트워크 공격기법이 변화되고 새로운 공격 형태가 나타나고 있다. 네트워크상에서 알려진 침입의 탐지는 효율적으로 수행되고 있으나 알려지지 않은 침입에 대해서는 오탐지(false negative)나 과탐지(false positive)가 너무 높게 나타난다. 또한, 네트워크상에서 지속적으로 처리되는 대량의 패킷에 대하여 실시간적인 탐지와 새로운 침입 유형에 대한 대응방법과 인지능력에 한계가 있다. 따라서 다양한 대량의 트래픽에 대해서 탐지율을 높이고 과탐지를 감소할 수 있는 방법이 필요하다. 본 논문에서는 네트워크 기반의 이상 침입 탐지 시스템에서 과탐지를 감소하고, 침입 탐지 능력을 향상시키기 위하여 다차원 연관 규칙 마이닝과 수정된 부정 선택 알고리즘(Negative Selection Algorithm)을 결합한 다중 레벨 이상 침입 탐지 기술을 제안한다. 제안한 알고리즘의 성능 평가를 위하여 기존의 이상 탐지 알고리즘과 제안된 알고리즘을 수행하여, 각각의 과탐지율을 평가, 제시하였다.

DRDoS 공격에 대한 다단계 탐지 기법 (Multi-level detection method for DRDoS attack)

  • 백남균
    • 한국정보통신학회논문지
    • /
    • 제24권12호
    • /
    • pp.1670-1675
    • /
    • 2020
  • 본 연구에서는 DRDoS 공격에 대한 효과적인 네트워크 기반 대응책을 수립하는데 필요한 기초 자료를 제공하고자, DRDoS의 네트워크 기반 특징을 식별하고 이에 대한 확률 및 통계 기법을 적용한 새로운 'DRDoS 공격 다단계 탐지기법'을 제안하고자 한다. 제안된 기법은 DRDoS의 특징인 반사 서버의 증폭에 의한 네트워크 대역폭에서 무제한 경쟁으로 정상적인 트래픽이 무분별하게 차단될 수 있는 한계를 제거하고자 'Server to Server' 및 이에 대한 'Outbound 세션 증적' 여부를 비교하여 정확한 DRDoS 식별 및 탐지가 가능하고 이에 대한 트래픽에 대해서만 통계 및 확률적 임계값을 적용하기에, 네트워크 기반 정보보호 제품은 이를 활용하여 완벽하게 DRDoS 공격 프레임을 제거가 가능하다. 시험을 통해 제안한 기법이 DRDoS 공격에 대한 식별 및 탐지 정확성을 높이고 희생자 서버의 서비스 가용성을 확보함을 확인하였다. 따라서 본 연구결과는 DRDoS 공격 식별 및 대응에 크게 기여할 수 있을 것으로 기대한다.