• Title/Summary/Keyword: Physical security

Search Result 1,047, Processing Time 0.03 seconds

A New framework for IP Traceback : Inference of Logical Topology by Measuring Packet Losses (IP 역추적을 위한 새로운 접근 : 패킷 손실 기반의 논리적 전송 경로 추정)

  • 이준엽;이승형;양훈기;고재영;강철오;정주영
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.3
    • /
    • pp.39-47
    • /
    • 2002
  • This paper deals with study of a new framework for the traceback of distributed DoS(Denial of Service) attacks in the Internet, in which many sources flood "spoofed" IP packets towards a single victim. In our scheme, the destination host traces those anonymous packets' losses, and infers the logical end-to-end paths back towards the sources. This method is based on the fact that there is a strong correlation between packet losses when those packets traverse along a same route, and the simulation results show high probabilities of detecting the topology under a certain condition. Compared with previous approaches, our scheme has a number of distinct features: It can be performed in realtime or non-realtime, without any supports of routers or ISPs. Our results may be applied to the inference of physical topology and to support previous approaches.pproaches.

Structure Analysis of ARS Cryptoprocessor based on Network Environment (네트워크 환경에 적합한 AES 암호프로세서 구조 분석)

  • Yun, Yeon-Sang;Jo, Kwang-Doo;Han, Seon-Kyoung;You, Young-Gap;Kim, Yong-Dae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.5
    • /
    • pp.3-11
    • /
    • 2005
  • This paper presents a performance analysis model based on an M/M/1 queue and Poisson distribution of input data traffic. The simulation on a pipelined AES system with processing rate of 10 rounds per clock shows $4.0\%$ higher performance than a non-pipelined version consuming 10 clocks per transaction. Physical implementation of pipelined AES with FPGA takes 3.5 times bigger gate counts than the non-pipelined version whereas the pipelined version yields only $3.5\%$ performance enhancement. The proposed analysis model can be used to optimize cost-performance of AES hardware designs.

A Random ID-based RFID Mutual authentication protocol for detecting Impersonation Attack against a back-end server and a reader (서버와 리더의 위장공격 탐지가 가능한 랜덤 ID기반 RFID 상호 인증 프로토콜)

  • Yeo, Don-Gu;Lee, Sang-Rae;Jang, Jae-Hoon;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.89-108
    • /
    • 2010
  • Recently many mutual authentication protocol for light-weight hash-based for RFID have been proposed. Most of them have assumed that communications between a backend server and reader are secure, and not considered threats for backend server and RFID reader impersonation. In the real world, however, attacks against database or reader are more effective rather than attacks against RFID tag, at least from attacker's perspective. In this paper, we assume that all communications are not secure to attackers except the physical attack, and considering realistic threats for designing a mutual authentication protocol based on hash function. And It supports a mutual authentication and can protect against the replay attack, impersonation attack, location tracking attack, and denial of service attack in the related work. We besides provide a secure and efficient RFID mutual authentication protocol which resists impersonation attacks on all of the entities and alow a backend server to search tag-related information efficiently. We conclude with analyzing the safety and efficiency among latest works.

Classes in Object-Oriented Modeling (UML): Further Understanding and Abstraction

  • Al-Fedaghi, Sabah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.139-150
    • /
    • 2021
  • Object orientation has become the predominant paradigm for conceptual modeling (e.g., UML), where the notions of class and object form the primitive building blocks of thought. Classes act as templates for objects that have attributes and methods (actions). The modeled systems are not even necessarily software systems: They can be human and artificial systems of many different kinds (e.g., teaching and learning systems). The UML class diagram is described as a central component of model-driven software development. It is the most common diagram in object-oriented models and used to model the static design view of a system. Objects both carry data and execute actions. According to some authorities in modeling, a certain degree of difficulty exists in understanding the semantics of these notions in UML class diagrams. Some researchers claim class diagrams have limited use for conceptual analysis and that they are best used for logical design. Performing conceptual analysis should not concern the ways facts are grouped into structures. Whether a fact will end up in the design as an attribute is not a conceptual issue. UML leads to drilling down into physical design details (e.g., private/public attributes, encapsulated operations, and navigating direction of an association). This paper is a venture to further the understanding of object-orientated concepts as exemplified in UML with the aim of developing a broad comprehension of conceptual modeling fundamentals. Thinging machine (TM) modeling is a new modeling language employed in such an undertaking. TM modeling interlaces structure (components) and actionality where actions infiltrate the attributes as much as the classes. Although space limitations affect some aspects of the class diagram, the concluding assessment of this study reveals the class description is a kind of shorthand for a richer sematic TM construct.

The Error of the Method of Angular Sections of Microwave Sounding of Natural Environments in the System of Geoecological Monitoring

  • Fedoseeva, E.V.;Kuzichkin, O. R.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.47-53
    • /
    • 2021
  • The article deals with the problems of application of microwave methods in systems of geoecological monitoring of natural environments and resources of the agro-industrial complex. It is noted that the methods of microwave radiometry make it possible, by the power of the measured intrinsic radio-thermal radiation of the atmosphere, when solving inverse problems using empirical and semi-empirical models, to determine such parameters of the atmosphere as thermodynamic temperature, humidity, water content, moisture content, precipitation intensity, and the presence of different fractions of clouds.In addition to assessing the meteorological parameters of the atmosphere and the geophysical parameters of the underlying surface based on the data of microwave radiometric measurements, it is possible to promptly detect and study pollution of both the atmosphere and the earth's surface. A technique has been developed for the analysis of sources of measurement error and their numerical evaluation, because they have a significant effect on the accuracy of solving inverse problems of reconstructing the values of the physical parameters of the probed media.To analyze the degree of influence of the limited spatial selectivity of the antenna of the microwave radiometric system on the measurement error, we calculated the relative measurement error of the ratio of radio brightness contrasts in two angular directions. It has been determined that in the system of geoecological monitoring of natural environments, the effect of background noise is maximal with small changes in the radiobrightness temperature during angular scanning and high sensitivity of the receiving equipment.

A Case Study of the Implementation and Verification of VLAN-applied Network Based on a Five-step Scenario (5단계 시나리오에 기반한 VLAN이 적용된 네트워크 구현 및 검증 사례연구)

  • Kim, No-Whan;Park, Jin-Seob
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.1
    • /
    • pp.25-36
    • /
    • 2021
  • This paper presents a topology based on packet tracer and a five-step scenario model to make it easier for students to understand the network on which VLANs are applied. Virtual LAN (VLAN), developed as an alternative solution to the Routers that distribute broadcast traffic, is a virtual local area network that logically configured regardless of the physical network. The VLAN prevents the network performance degradation resulting from the broadcast traffic by dividing the broadcast domain so that the bandwidth can be used more efficiently. In addition, it enhances the security because on communication between the devices belonging to different VLANs is impossible. The five-step scenarios in this paper presented an efficient implementation case for students to understand and validate the various functions of VLANs through ping/telnet/tracert test and simulation, after setting up each step of programming switches and routers in the virtual network.

Usability Evaluation of Mobile Banking Applications in Digital Business as Emerging Economy

  • Hamid, Khalid;Iqbal, Muhammad Waseem;Muhammad, Hafiz Abdul Basit;Fuzail, Zubair;Ghafoor, Zahid Tabassum;Ahmad, Sana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.250-260
    • /
    • 2022
  • Mobile Banking Applications (MBAPs) is one of the recent fads in mobile trading applications (Apps). MBAPs permit users to execute exchanges of money and many more whenever it might suit them; however, the primary issue for mobile banking Apps is usability. Hardly any investigation analyzes usability issues dependent on user's age, gender, exchanging accomplices, or experience. The purpose of this study is to determine the degree of usability issues, and experience of mobile banking users. The survey employs a quantitative method and performs user experiment on 240 participants with six different tasks on the application's interface. The post experiment survey is done with concerning participants. On the other hand, banking experts and Information Technology (IT) expert's group is also involved after the experiment. Expert's opinions about existing mobile banking Apps and suggestions for improving usability of MBAPs are collected through physical means (like questionnaire and interview) and online means like Google form. After that comparison of the opinions of users and experts about MBAPs is performed. The experimentation measures the tasks usability of various mobile banking apps with respect to its effectiveness, efficiency, trustfulness, learnability, memorability and satisfaction. The usability testing was led at different Universities and the outcomes acquired show that there are privacy and trust issues with their mobile banking apps. There is also a gap between users and experts which should be minimized by applying customized usability models, modes concept like other application software and also by adding complete features of banking in MBAPs. It will benefit mobile banking apps users, developers and usability engineers by providing user-friendly which are up to the mark of user's requirements.

Website and Digital Content between Material Property and Intellectual Ownership Rights within the Legal Regulation of Internet

  • Azab, Rania S.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.424-435
    • /
    • 2022
  • When the owners of the intellectual property rights of digital content have lost control over it in the digital environment, there emerged fears that the intellectual property laws, especially copyright law, would not be effective as in the material (Offline ) world. The reason is that the digital environment helps to reproduce copies in high quality and at almost no cost, while copyright law protection has been limited to programs embedded in CDs. According to copyright laws, the owner of the program did not have the right to prevent buyers of the initial physical copy of the program from copying and reselling it to more than one individual without the permission of the original owner. As a result, business owners have invented the idea of licensing digital content and programs instead of selling them. They set out terms that serve their commercial interests regardless of their abuse to intellectual property laws or even the rules of the traditional contract to sell a material property. The abuse has resulted from the way those terms are concluded and the heavy rules that are unfair to consumer rights. Therefore, business owners insisted on dealing with the website and its programs and digital content as material property. Here raises the question of whether the website and its digital content are subject to the protection of copyright law or the rules of the traditional contract or licensing contracts. As the answer to this question affects the protection of consumer rights, is it possible to find a balance between it and the protection of the owners of digital programs' rights.That is what we will discuss in this paper.

Informatization of Early Childhood Education: the EU Experience

  • Puyo, Olga;Yemchyk, Oleksandra;Klevaka, Lesya;Voloshyn, Svitlana;Dulibskyy, Andriy
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.696-702
    • /
    • 2021
  • Informatization of early childhood education in the EU occurs in the context of the use of ICT as a means of sharing experiences, practices in the education and training of preschool children, communication, both at the national level and locally - within educational institutions, as a means of document management, search, data processing and information for the management of early childhood educational institutions, and planning activities for these institutions. This article aims to identify the features of the informatization of early childhood education in EU countries. Results. The countries of the EU have different levels of workload on the staff of early childhood education institutions, which is caused by different numbers of preschoolers and workforce. The greatest load on the staff in France due to a large number of preschoolers, which, despite the reduction, remained the highest among all the countries. By comparison, Poland's significant workload is mitigated by the size of its workforce. With almost equal numbers of staff in Poland and Germany, the countries differ significantly in the number of preschoolers. The countries also have different funding mechanisms for early childhood education, which determines the potential for digitalization. In France, total spending on early childhood education has grown the least (by 11 % between 2012 and 2018), in Poland by 51 %, in the Czech Republic by 44 %, and in Germany by 49%. In France, 100 % is funded by the government, in Poland 78 % is funded by the government, in the Czech Republic and Germany 87 % and 85 % respectively is funded by the government. The results of the survey of teachers' training in the use of ICTs and the level of specialists' readiness to use them in their studies indicate a mismatch between education and the practice of using technology. At the same time, given the high level of professional training of teachers in the use of technology in education, a low level of practice of ICT use in teaching preschool children was revealed. Teachers require professional development of ICT skills.

Influence of Police Authorities and Units on Transport Safety in the European Union Countries

  • Chervinchuk, Andrii;Pylypenko, Yevheniia;Veselov, Mykola;Pylypiv, Ruslan;Merdova, Olga
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.109-114
    • /
    • 2022
  • The article is devoted to analyzing the police influence on road safety formation. The globalization processes confirm the study's relevance, provoking population mobility and the need to increase freight traffic. The study aims to identify the factors that affect road safety and the activities of the police and the EU transport safety units. An empirical analysis using factor analysis, correlation analysis, and general scientific methods of cognition were carried out to achieve the goal. The analysis results found that the number of police officers affects road safety, but not in all countries, which confirms the importance of other factors. Based on the analysis results of the scientific literature, the factors affecting transport safety are legislative regulation, the use of innovative technologies, transport infrastructure, geography, and psycho-physical and emotional drivers factors. It has been proved that the police authorities and units cannot fully ensure transport safety in the European Union because the safety is formed by a complex of actions by the state and road users.