• Title/Summary/Keyword: Network Security System

Search Result 2,729, Processing Time 0.024 seconds

The Sentence Similarity Measure Using Deep-Learning and Char2Vec (딥러닝과 Char2Vec을 이용한 문장 유사도 판별)

  • Lim, Geun-Young;Cho, Young-Bok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.10
    • /
    • pp.1300-1306
    • /
    • 2018
  • The purpose of this study is to see possibility of Char2Vec as alternative of Word2Vec that most famous word embedding model in Sentence Similarity Measure Problem by Deep-Learning. In experiment, we used the Siamese Ma-LSTM recurrent neural network architecture for measure similarity two random sentences. Siamese Ma-LSTM model was implemented with tensorflow. We train each model with 200 epoch on gpu environment and it took about 20 hours. Then we compared Word2Vec based model training result with Char2Vec based model training result. as a result, model of based with Char2Vec that initialized random weight record 75.1% validation dataset accuracy and model of based with Word2Vec that pretrained with 3 million words and phrase record 71.6% validation dataset accuracy. so Char2Vec is suitable alternate of Word2Vec to optimize high system memory requirements problem.

Biometric Information and OTP based on Authentication Mechanism using Blockchain (블록체인을 이용한 생체정보와 OTP 기반의 안전한 인증 기법)

  • Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.3
    • /
    • pp.85-90
    • /
    • 2018
  • Blockchain technology provides distributed trust structure; with this, we can implement a system that cannot be forged and make Smart Contract possible. With blockchain technology emerging as next generation security technology, there have been studies on authentication and security services that ensure integrity. Although Internet-based services have been going with user authentication with password, the information can be stolen through a client and a network and the server is exposed to hacking. For the reason, we suggest blockchain technology and OTP based authentication mechanism to ensure integrity. In particular, the Two-Factor Authentication is able to ensure secure authentication by combining OTP authentication and biometric authentication without using password. As the suggested authentication applies multiple hash functions and generates transactions to be placed in blocks in order for biometric information not to be identified, it is protected from server attacks by being separate from the server.

One-time Session Key based HTTP DDoS Defense Mechanisms (일회성 세션 키 기반 HTTP DDoS 공격 방어기법)

  • Choi, Sang-Yong;Kang, Ik-Seon;Kim, Yong-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.8
    • /
    • pp.95-104
    • /
    • 2013
  • DDoS attacks have became as a social threat since 2009 7.7 DDoS turmoil. Even though defence techniques have been developing to provide against those threats, they become much more sophisticate. In recent years, the attack form of DDoS is changing from high amount of traffic attack of network layers to highly sophisticate small amount of application layers. To make matters worse, attack agent for the attack has became very intelligent so that it is difficult to be blocked since it can't be distinguished from normal PCs. In the user authentication system(such as CAPTCHA) User intervention is required to distinguish normal PCs and intelligent attack agents and in particular, in a NAT environment, IP-based blocking method can be cut off the normal users traffic at the same time. This research examined defense techniques which are able to distinguish between agent and normal PC and effectively block ways the HTTP DDoS offense applying one-time session key based authentication method using Cookie which is used in HTTP protocol to protect web sever from sophisticate application layer of DDoS.

Cost Analysis for the Reformation of CCTV Transmission Systems (CCTV 전송방식 전환에 따른 비용 분석)

  • Lee, Dong-Su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.6
    • /
    • pp.748-755
    • /
    • 2019
  • CCTV Systems have been operated in the variety of serveillance fields of the apartment, transportation, safety, physical security, and so on. And their uses are largely increasing as the CCTV transmission technology has been changed from analog to IP network way. Domestic industry has been working to upgrade from analog CCTV systems to High-Definition(HD) CCTV systems for recent years, which involves a few issues such as mixing with several transmission technologies and duplicated investment in each area because the technological analysis and criteria are specifically not arranged. This paper examines the technical issues of the transmission method between HD analog and HD IP CCTV systems, and induces the criteria of the cost analysis and its weighting factors for HD CCTV reformation. By simulating the cost analysis results of both the HD CCTV systems on apartment environment, this paper proposes the reference for the choice of HD CCTV system reformation.

Structure Analysis of ARS Cryptoprocessor based on Network Environment (네트워크 환경에 적합한 AES 암호프로세서 구조 분석)

  • Yun, Yeon-Sang;Jo, Kwang-Doo;Han, Seon-Kyoung;You, Young-Gap;Kim, Yong-Dae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.5
    • /
    • pp.3-11
    • /
    • 2005
  • This paper presents a performance analysis model based on an M/M/1 queue and Poisson distribution of input data traffic. The simulation on a pipelined AES system with processing rate of 10 rounds per clock shows $4.0\%$ higher performance than a non-pipelined version consuming 10 clocks per transaction. Physical implementation of pipelined AES with FPGA takes 3.5 times bigger gate counts than the non-pipelined version whereas the pipelined version yields only $3.5\%$ performance enhancement. The proposed analysis model can be used to optimize cost-performance of AES hardware designs.

A Hybrid Multiple Pattern Matching Scheme to Reduce Packet Inspection Time (패킷검사시간을 단축하기 위한 혼합형 다중패턴매칭 기법)

  • Lee, Jae-Kook;Kim, Hyong-Shik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.27-37
    • /
    • 2011
  • The IDS/IPS(Intrusion Detection/Prevention System) has been widely deployed to protect the internal network against internet attacks. Reducing the packet inspection time is one of the most important challenges of improving the performance of the IDS/IPS. Since the IDS/IPS needs to match multiple patterns for the incoming traffic, we may have to apply the multiple pattern matching schemes, some of which use finite automata, while the others use the shift table. In this paper, we first show that the performance of those schemes would degrade with various kinds of pattern sets and payload, and then propose a hybrid multiple pattern matching scheme which combines those two schemes. The proposed scheme is organized to guarantee an appropriate level of performance in any cases. The experimental results using real traffic show that the time required to do multiple pattern matching could be reduced effectively.

Determination Method of TTL for Improving Energy Efficiency of Wormhole Attack Defense Mechanism in WSN (무선 센서 네트워크에서 웜홀 공격 방어기법의 에너지 효율향상을 위한 TTL 결정 기법)

  • Lee, Sun-Ho;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.4
    • /
    • pp.149-155
    • /
    • 2009
  • Attacks in wireless sensor networks (WSN), are similar to the attacks in ad-hoc networks because there are deployed on a wireless environment. However existing security mechanism cannot apply to WSN, because it has limited resource and hostile environment. One of the typical attack in WSN is setting up wrong route that using wormhole. To overcome this threat, Ji-Hoon Yun et al. proposed WODEM (WOrmhole attack DEfense Mechanism) which can detect and counter with wormhole. In this scheme, it can detect and counter with wormhole attacks by comparing hop count and initial TTL (Time To Live) which is pre-defined. The selection of a initial TTL is important since it can provide a tradeoff between detection ability ratio and energy consumption. In this paper, we proposed a fuzzy rule-based system for TTL determination that can conserve energy, while it provides sufficient detection ratio in wormhole attack.

Safety Management Network of Sports Facilities Abroad and System Status (해외의 스포츠시설 안전관리 네트워크 및 시스템 현황)

  • Kim, Il-Gwang;Kwon, Hei-Won;Choi, Jin-Ho
    • Journal of Digital Convergence
    • /
    • v.14 no.6
    • /
    • pp.547-562
    • /
    • 2016
  • The purpose of this research was to provide the information of mandatory regulation for Korean sports facilities and the preliminary data for building sport safety management manual through sports facilities abroad and system status. Futhermore, based on the information of sports facilities safety management, this research performed the benchmarking of each country sports facilities safety management system. As a result, in the U.S, Department of Homeland Security(DHS) leads effort to achieve a safe, secure, and resilient homeland. In Germany, law & regulations, sports facilities safety guideline and expert extension have been reviewed. Germany is more realistic and practical than other countries. In Australia, Major Hazard Facilities(MHF) is responsible for eliminating the risk of a major incident. Emergency Management System(EMS) should spontaneously respond when the alarm is raised as early detection and intervention are vital to ensuring that a small incident does not escalate to become a major disaster.

A Study of Establishment of Softwaresystem Configuration for Improving Health Information Sharing (의료정보 공유기능 향상을 위한 소프트웨어시스템 기반구성 방법에 관한 연구)

  • Han, Soon-Hwa;Ju, Se-Jin
    • Journal of Digital Contents Society
    • /
    • v.15 no.1
    • /
    • pp.11-18
    • /
    • 2014
  • The strength of our country is based on high-speed networks to build a nationwide health information network to improve the quality of health care is needed. However, nature of the medical services in the hospital medical record form, so that all departments characterize each medical department, a common format that can be used for all disease is a very difficult challenge. This study is one of the ways to improve this priority issue on health information sharing medical information system(PACS/HIS) information linkage between the problem of information, compatibility and security issues derived. The problem is derived from the requirements of theorem 3 to 6 items. This is effective in order to improve sharing of medical information for the purpose of designing the software system. Sharing of medical information software system design are derived from stakeholders, requirements analysis, architecture design, software framework, configuration, architecture evaluation process. This study is based on the medical information standardization environmental diagnosis of a medical information system design. Software design philosophy is based on a new framework for deriving the function and mechanism made up.

Design of the Personalized User Authentication Systems (개인 맞춤형 사용자 인증 시스템 설계)

  • Kim, Seong-Ryeol
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.143-148
    • /
    • 2018
  • In this paper, we propose a personalized user authentication system (PUAS) that can be used in multiple stages in user authentication by customizing the password keyword to be used in user authentication. The proposal concept is that the user oneself defines the password keyword to be used in user authentication so as to cope with a passive retransmission attack which reuses the password obtained when the server system is accessed in user authentication. The authentication phase is also designed so that it can be expanded in multiple stages in a single step. Also, it is designed to store user-defined password related information in an arbitrary encrypted place in the system, thereby designing to disable the illegal access of the network. Therefore, even if an intruder accesses the system using the proposed system, it is possible to generate personal authentication information by generating a password keyword through unique personal information possessed only by an individual and not know the place where the generated authentication information is stored, It has a strong security characteristic.