• 제목/요약/키워드: Security Enhancement

검색결과 354건 처리시간 0.021초

임베디드 장비 상에서의 공개키 기반 암호를 위한 다중 곱셈기 최신 연구 동향 (Research on Multi-precision Multiplication for Public Key Cryptography over Embedded Devices)

  • 서화정;김호원
    • 정보보호학회논문지
    • /
    • 제22권5호
    • /
    • pp.999-1007
    • /
    • 2012
  • 공개키 기반 암호화 상에서의 다중 곱셈 연산은 높은 복잡도로 인해 성능 개선을 위해서는 우선적으로 고려되어야 한다. 특히 임베디드 장비는 기존의 환경과는 달리 한정적인 계산 능력과 저장 공간으로 인해 높은 복잡도를 나타내는 공개키 기반의 암호화를 수행하기에는 부적합한 특성을 가진다. 이를 극복하기 위해 다중 곱셈 연산을 빠르게 연산하고 적은 저장공간을 요구하는 기법이 활발히 연구되고 있다. 본 논문에서는 자원 한정적인 센서 네트워크 상에서의 효율적인 공개키 기반 암호화 구현을 위한 다중 곱셈기의 최신 연구 동향을 살펴본다. 이는 앞으로의 센서 네트워크상에서의 공개키 기반 암호화 구현을 위한 참고자료로서 활용이 가능하다.

차분 전력 분석 공격의 성능 향상을 위한 전처리 기법 (A Pre-processing Technique for Performance Enhancement of the Differential Power Analysis Attack)

  • 이유석;이유리;이영준;김형남
    • 정보보호학회논문지
    • /
    • 제20권4호
    • /
    • pp.109-115
    • /
    • 2010
  • 차분 전력 분석(Differential Power Analysis, DPA) 기법은 암호화 과정 중 발생하는 누설정보를 이용하는 효과적인 부채널 공격(side-channel attack, SCA) 종의 하나로 알려져 있다. 그러나 공격에 사용되는 누설 전력 신호에는 암호화와 관련이 없는 동작에 의해 야기된 전력 신호가 함께 포함되어 있으며, 이로 인해 공격의 효율성이 크게 저하된다. 따라서 본 논문에서는 차분 전력 분석 기법의 공격 성능을 향상시키기 위해, 측정된 전력 신호로부터 암호화 과정에 관련된 부분만을 추출하는 전처리 방법을 제안한다. 모의실험 결과를 통해 제안된 전처리 방법을 적용한 차분 전력 분석 공격은 기존의 차분 전력 분석 공격에 비해 매우 적은 수의 누설 전력 신호만으로도 암호화 알고리즘에 사용된 비밀 키를 찾을 수 있음을 보인다.

Health Care Optimization by Maximizing the Air-Ambulance Operation Time

  • Melhim, Loai Kayed B.
    • International Journal of Computer Science & Network Security
    • /
    • 제22권2호
    • /
    • pp.357-361
    • /
    • 2022
  • Employing the available technologies and utilizing the advanced means to improve the level of health care provided to citizens in their various locations. Citizens have the right to get a proper health care services despite the location of their residency or the distance from the health care delivery centers, a goal that can be achieved by utilizing air ambulance systems. In such systems, aircrafts and their life spans are the essential component, the flight duration of the aircraft during its life span is determined by the maintenance schedule. This research, enhances the air ambulance systems by presenting a proposal that maximizes the aircraft flight duration during its life span. The enhancement will be reached by developing a set of algorithms that handles the aircraft maintenance problem. The objective of these algorithms is to minimize the maximum completion time of all maintenance tasks, thus increasing the aircraft operation time. Practical experiments performed to these algorithms showed the ability of these algorithms to achieve the desired goal. The developed algorithms will manage the maintenance scheduling problem to maximize the uptime of the air ambulance which can be achieved by maximizing the minimum life of spare parts. The developed algorithms showed good performance measures during experimental tests. The 3LSL algorithm showed a higher performance compared to other algorithms during all performed experiments.

Linguistic and Stylistic Markers of Influence in the Essayistic Text: A Linguophilosophic Aspect

  • Kolkutina, Viktoriia;Orekhova, Larysa;Gremaliuk, Tetiana;Borysenko, Natalia;Fedorova, Inna;Cheban, Oksana
    • International Journal of Computer Science & Network Security
    • /
    • 제22권5호
    • /
    • pp.163-167
    • /
    • 2022
  • The article explores linguo-stylistic influence markers in essayistic texts. The novelty of this investigation is provided by its perspective. Essayism is looked at as a style of thinking and writing and studied as a holistic philosophical and cultural phenomenon, as a revalent form of comprehension of reality that features non-lasting author's judgements and enhancement of the author's voice in the text. Based on the texts by V. Rosanov, G.K. Chesterton, and D. Dontsov, the remarkable English, Russian, and Ukrainian essay-writers of the first party of the 20th century, the article tracks the typical ontological-and-existentialist correlation at the content, stylistic, and semantic levels. It is observed in terms of the ideas presented in the texts of these publicists and the lexicostylistic markers of the influence on the reader that enable these ideas to implement. The explored poetic syntax, key lexemes, dialogueness, intonational melodics, specific language, free associations, aphoristic nature, verbalization of emotions and feeling in the psycholinguistic form of their expression, stress, heroic elevation, metaphors and evaluative linguistic units in the ontological-and-existentialist aspects contribute to extremely delicate and demanding nature of the essayistic style. They create a "lacework" of unpredictable properties, intellectual illumination, unexpected similarity, metaphorical freshness, sudden discoveries, unmotivated unities.

데이터처리전문기관의 역할 및 보안 강화방안 연구: 버몬트주 데이터브로커 비교를 중심으로 (A Study on the Role and Security Enhancement of the Expert Data Processing Agency: Focusing on a Comparison of Data Brokers in Vermont)

  • 김수한;권헌영
    • 한국IT서비스학회지
    • /
    • 제22권3호
    • /
    • pp.29-47
    • /
    • 2023
  • With the recent advancement of information and communication technologies such as artificial intelligence, big data, cloud computing, and 5G, data is being produced and digitized in unprecedented amounts. As a result, data has emerged as a critical resource for the future economy, and overseas countries have been revising laws for data protection and utilization. In Korea, the 'Data 3 Act' was revised in 2020 to introduce institutional measures that classify personal information, pseudonymized information, and anonymous information for research, statistics, and preservation of public records. Among them, it is expected to increase the added value of data by combining pseudonymized personal information, and to this end, "the Expert Data Combination Agency" and "the Expert Data Agency" (hereinafter referred to as the Expert Data Processing Agency) system were introduced. In comparison to these domestic systems, we would like to analyze similar overseas systems, and it was recently confirmed that the Vermont government in the United States enacted the first "Data Broker Act" in the United States as a measure to protect personal information held by data brokers. In this study, we aim to compare and analyze the roles and functions of the "Expert Data Processing Agency" and "Data Broker," and to identify differences in designated standards, security measures, etc., in order to present ways to contribute to the activation of the data economy and enhance information protection.

Sorting Instagram Hashtags all the Way throw Mass Tagging using HITS Algorithm

  • D.Vishnu Vardhan;Dr.CH.Aparna
    • International Journal of Computer Science & Network Security
    • /
    • 제23권11호
    • /
    • pp.93-98
    • /
    • 2023
  • Instagram is one of the fastest-growing online photo social web services where users share their life images and videos with other users. Image tagging is an essential step for developing Automatic Image Annotation (AIA) methods that are based on the learning by example paradigm. Hashtags can be used on just about any social media platform, but they're most popular on Twitter and Instagram. Using hashtags is essentially a way to group together conversations or content around a certain topic, making it easy for people to find content that interests them. Practically on average, 20% of the Instagram hashtags are related to the actual visual content of the image they accompany, i.e., they are descriptive hashtags, while there are many irrelevant hashtags, i.e., stophashtags, that are used across totally different images just for gathering clicks and for search ability enhancement. Hence in this work, Sorting instagram hashtags all the way through mass tagging using HITS (Hyperlink-Induced Topic Search) algorithm is presented. The hashtags can sorted to several groups according to Jensen-Shannon divergence between any two hashtags. This approach provides an effective and consistent way for finding pairs of Instagram images and hashtags, which lead to representative and noise-free training sets for content-based image retrieval. The HITS algorithm is first used to rank the annotators in terms of their effectiveness in the crowd tagging task and then to identify the right hashtags per image.

A Multi-Class Classifier of Modified Convolution Neural Network by Dynamic Hyperplane of Support Vector Machine

  • Nur Suhailayani Suhaimi;Zalinda Othman;Mohd Ridzwan Yaakub
    • International Journal of Computer Science & Network Security
    • /
    • 제23권11호
    • /
    • pp.21-31
    • /
    • 2023
  • In this paper, we focused on the problem of evaluating multi-class classification accuracy and simulation of multiple classifier performance metrics. Multi-class classifiers for sentiment analysis involved many challenges, whereas previous research narrowed to the binary classification model since it provides higher accuracy when dealing with text data. Thus, we take inspiration from the non-linear Support Vector Machine to modify the algorithm by embedding dynamic hyperplanes representing multiple class labels. Then we analyzed the performance of multi-class classifiers using macro-accuracy, micro-accuracy and several other metrics to justify the significance of our algorithm enhancement. Furthermore, we hybridized Enhanced Convolution Neural Network (ECNN) with Dynamic Support Vector Machine (DSVM) to demonstrate the effectiveness and efficiency of the classifier towards multi-class text data. We performed experiments on three hybrid classifiers, which are ECNN with Binary SVM (ECNN-BSVM), and ECNN with linear Multi-Class SVM (ECNN-MCSVM) and our proposed algorithm (ECNNDSVM). Comparative experiments of hybrid algorithms yielded 85.12 % for single metric accuracy; 86.95 % for multiple metrics on average. As for our modified algorithm of the ECNN-DSVM classifier, we reached 98.29 % micro-accuracy results with an f-score value of 98 % at most. For the future direction of this research, we are aiming for hyperplane optimization analysis.

Artificial Intelligence Application using Nutcracker Optimization Algorithm to Enhance Efficiency & Reliability of Power Systems via Optimal Setting and Sizing of Renewable Energy Sources as Distributed Generations in Radial Distribution Systems

  • Nawaf A. AlZahrani;Mohammad Hamza Awedh;Ali M. Rushdi
    • International Journal of Computer Science & Network Security
    • /
    • 제24권1호
    • /
    • pp.31-44
    • /
    • 2024
  • People have been using more energy in the last years. Several research studies were conducted to develop sustainable energy sources that can produce clean energy to fulfill our energy requirements. Using renewable energy sources helps to decrease the harm to the environment caused by conventional power plants. Choosing the right location and capacity for DG-RESs can greatly impact the performance of Radial Distribution Systems. It is beneficial to have a good and stable electrical power supply with low energy waste and high effectiveness because it improves the performance and reliability of the system. This research investigates the ideal location and size for solar and wind power systems, which are popular methods for producing clean electricity. A new artificial intelligent algorithm called Nutcracker Optimization Algorithm (NOA) is used to find the best solution in two common electrical systems named IEEE 33 and 69 bus systems to examine the improvement in the efficiency & reliability of power system network by reducing power losses, making voltage deviation smaller, and improving voltage stability. Finally, the NOA method is compared with another method called PSO and developed Hybrid Algorithm (NOA+PSO) to validate the proposed algorithm effectiveness and enhancement of both efficiency and reliability aspects.

지능형 위협인지 및 능동적 탐지대응을 위한 Snort 침입탐지규칙 연구 (Study of Snort Intrusion Detection Rules for Recognition of Intelligent Threats and Response of Active Detection)

  • 한동희;이상진
    • 정보보호학회논문지
    • /
    • 제25권5호
    • /
    • pp.1043-1057
    • /
    • 2015
  • 지능형 위협을 빠르게 인지하고 능동적으로 탐지 및 대응하기 위해 주요 공공단체 및 민간기관에서는 침입탐지시스템(IDS)을 관리 운영하고 있으며, 이는 공격의 검출 및 탐지에 매우 중요한 역할을 한다. 그러나 IDS 경보의 대부분은 오탐(false positive)을 생성하는 문제가 있다. 또한, 알려지지 않은 악성코드를 탐지하고 사전에 위협을 인지 대응하기 위해서 APT대응솔루션이나 행위기반체계를 도입 운영하고 있다. 이는 가상기술을 이용해 악성코드를 직접실행하고 가상환경에서 이상행위를 탐지하거나 또는 다른방식으로 알려지지 않은 공격을 탐지한다. 그러나 이 또한 가상환경 회피, 트래픽 전수조사에 대한 성능적 문제, 정책오류 등의 약점 등이 존재한다. 이에 따라 결과적으로 효과적인 침입탐지를 위해서는 보안관제 고도화가 매우 중요하다. 본 논문에서는 보안관제 고도화의 한가지 방안으로 침입탐지시스템의 주요 단점인 오탐(false positive)을 줄이는 방안에 대해 논한다. G기관의 경험적 데이터를 근거로 실험을 수행한 결과 세 가지 유형 11가지 규칙을 도출하였다. 이 규칙을 준수하여 테스트한 결과 전반적인 오탐율이 30%~50% 이상 줄어들고 성능이 30% 이상 향상됨을 검증하였다.

경비업자의 개인정보보호에 관한 연구 (A Study on the Protection for Personal Information in Private Security Provider's)

  • 안황권;김일곤
    • 융합보안논문지
    • /
    • 제11권5호
    • /
    • pp.99-108
    • /
    • 2011
  • 이 연구의 목적은 외국의 개인정보보호 제도를 바탕으로 우리나라 개인정보처리자인 경비업자가 경비업무 수행 중에 반드시 준수해야 할 개인정보보호의 제도를 논의하고 유의점을 제시하는 것이다. 특히 개인정보보호법의 기본이념과 원칙, 수집 이용, 민감정보 고유식별정보 처리와 개인정보 암호화 등의 안전조치 강화, 영상정보처리기기의 설치 운영제한, 개인정보 유출대응에 대한 벌칙 등을 기술함과 동시에 이에 대한 대응 방안을 제안하는데 있다. 이를 위해 외국의 개인정보보호법 사례를 고찰하고자 한다. 이를 바탕으로 이 연구에서 제안하는 유의점은 경비업자가 충분한 법적 검토와 더불어 인식을 변화하는 것이다. 아울러 첫째, 개인정보의 수집 이용시 이용의 목적을 가능한 명확하고 구체적으로 특정하고, 둘째, 개인정보 수집의 필요성에 따라 적법하게 개인정보를 취득하여야 하며, 셋째, 개인정보의 이용 목적 외에 또는 제3자에게 개인정보를 제공해서는 아니 되며, 넷째, 개인정보의 안전한 관리 조치에 의거 안전조치 의무를 숙지하고, 개인정보가 유출되는 것을 방지해야할 필요가 있다.