• Title/Summary/Keyword: Security Search

Search Result 524, Processing Time 0.027 seconds

A recovery method for deleted records in the ESE Database (ESE 데이터베이스 내의 삭제된 레코드 복구 기법)

  • Kim, Jeong-hyeon;Choi, Jong-hyun;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1143-1151
    • /
    • 2015
  • Extensible Storage Engine (ESE) database is a database developed by Microsoft. This database is used in web browser like Internet Explorer, Spartan and in Windows system with Windows Search, System Resource Usage Monitor. Previous ESE database viewer can display an incorrect result and can't read the file depending on collected environment and status of files. And the deleted record recovery tool is limited to some program and cannot recover all tables. This paper suggests the universal recovery method for deleted records and presents the experimental results through development of tool.

Efficient Differential Trail Searching Algorithm for ARX Block Ciphers (ARX 구조를 가지는 블록 암호에 대한 효율적인 차분 경로 자동 탐색 알고리즘)

  • Kim, Seojin;Kang, HyungChul;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1421-1430
    • /
    • 2016
  • In this paper, we suggest an advanced method searching for differential trails of block cipher with ARX structure. we use two techniques to optimize the automatic search algorithm of differential trails suggested by A. Biryukov et al, and obtain 2~3 times faster results than Biryukov's when implemented in block cipher SPECK. This results contribute to find better differential trails than previous results.

Optimization of multi-water resources in economical and sustainable way satisfying different water requirements for the water security of an area

  • Gnawali, Kapil;Han, KukHeon;Koo, KangMin;Yum, KyungTaek;Jun, Kyung Soo
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2019.05a
    • /
    • pp.161-161
    • /
    • 2019
  • Water security issues, stimulated by increasing population and changing climate, are growing and pausing major challenges for water resources managers around the world. Proper utilization, management and distribution of all available water resources is key to sustainable development for achieving water security To alleviate the water shortage, most of the current research on multi-sources combined water supplies depends on an overall generalization of regional water supply systems, which are seldom broken down into the detail required to address specific research objectives. This paper proposes the concept of optimization framework on multi water sources selection. A multi-objective water allocation model with four objective functions is introduced in this paper. Harmony search algorithm is employed to solve the applied model. The objective functions addresses the economic, environmental, and social factors that must be considered for achieving a sustainable water allocation to solve the issue of water security.

  • PDF

An efficient privacy-preserving data sharing scheme in social network (소셜 네트워크에 적합한 효율적인 프라이버시 보호 데이터 공유 기법)

  • Jeon, Doo-Hyun;Chun, Ji-Young;Jeong, Ik-Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.447-461
    • /
    • 2012
  • A social network service(SNS) is gaining popularity as a new real-time information sharing mechanism. However, the user's privacy infringement is occurred frequently because the information that is shared through a social network include the private information such as user's identity or lifestyle patterns. To resolve this problem, the research about privacy preserving data sharing in social network are being proceed actively. In this paper, we proposed the efficient scheme for privacy preserving data sharing in social network. The proposed scheme provides an efficient conjunctive keyword search functionality. And, users who granted access right to storage server can store and search data in storage server. Also,, our scheme provide join/revocation functionality suited to the characteristics of a dynamic social network.

A Study on AI-Based Fault Injection Parameter Search Algorithm (인공지능기반 오류주입 매개변수 탐색 기술 동향)

  • Jinyong Lee;Joongchan Na;Myunghyun Kim
    • Annual Conference of KIPS
    • /
    • 2024.10a
    • /
    • pp.208-211
    • /
    • 2024
  • 오류 주입 공격(Fault Injection Attack)은 시스템에 의도적으로 오류를 주입하여 취약점을 드러내는 강력한 공격 기법으로, 공격에 사용되는 매개변수 탐색 최적화는 제한된 시간 내 성공적인 공격을 위해 필수적인 기술이다. 본 논문에서는 인공지능(Artificial Intelligence) 기반 알고리즘, 특히 유전 알고리즘(Genetic Algorithm, GA)과 미메틱 알고리즘(Memetic Algorithm, MA)이 오류 주입 매개변수 탐색 최적화에 어떻게 적용되었는지 사례를 통해 살펴보고, 이러한 기법들이 기존의 무작위 탐색(Random Search, RS) 방법에 비해 높은 탐색 효율성과 성공률을 어떻게 달성했는지 분석한다. 또한, 각 알고리즘의 장단점을 비교하여 평가하고, 오류 주입 공격의 정밀도와 효율성을 더욱 향상시키기 위한 추가 연구 방향을 제안한다.

Improving Elasticsearch for Chinese, Japanese, and Korean Text Search through Language Detector

  • Kim, Ki-Ju;Cho, Young-Bok
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.1
    • /
    • pp.33-38
    • /
    • 2020
  • Elasticsearch is an open source search and analytics engine that can search petabytes of data in near real time. It is designed as a distributed system horizontally scalable and highly available. It provides RESTful APIs, thereby making it programming-language agnostic. Full text search of multilingual text requires language-specific analyzers and field mappings appropriate for indexing and searching multilingual text. Additionally, a language detector can be used in conjunction with the analyzers to improve the multilingual text search. Elasticsearch provides more than 40 language analysis plugins that can process text and extract language-specific tokens and language detector plugins that can determine the language of the given text. This study investigates three different approaches to index and search Chinese, Japanese, and Korean (CJK) text (single analyzer, multi-fields, and language detector-based), and identifies the advantages of the language detector-based approach compared to the other two.

A Study on the ITS integrated airport security system (ITS 통합 공항 보안시스템에 관한 고찰)

  • Kim, Chun-Suk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.2
    • /
    • pp.339-344
    • /
    • 2013
  • Airport security activities to ensure the airport's facilities and assets from crime, such as theft, to prevent. security systems that support these activities efficiently so you can be called. security center systems, CCTV systems, access control systems, intrusion detection systems, security communication systems, warning broadcasting system, network security systems, perimeter intrusion detection systems, search systems, and information security systems for the security system will be examined.

E-mail Header-Based Search and Seizure for Internet Portal Digital Forensics (포털 전자메일 압수수색을 위한 메일헤더기반 디지털포렌식)

  • Lee, Hae-Jin;Shon, Tae-Shik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1129-1140
    • /
    • 2018
  • In accordance with the spread of the Internet and the development of various digital devices, the amount of electronic information is rapidly increasing. Selection of electronic information seizure searches continues to increase for third parties, such as portal sites e-mails that persons do not possess directly from the electronic information, and it is also used as evidence in court. However, the current method of searching for houses has many problems such as the absence of notice of seizure search result, seizure searches are proceeded indiscriminately against whole e-mail after calculating only during the seizure period, and seizure search procedure And presented the improvement points.

SQUIRREL SEARCH PID CONTROLLER ALGORITHM BASED ACTIVE QUEUE MANAGEMENT TECHNIQUE FOR TCP COMMUNICATION NETWORKS

  • Keerthipati.Kumar;R.A. KARTHIKA
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.123-133
    • /
    • 2023
  • Active queue management (AQM) is a leading congestion control system, which can keep smaller queuing delay, less packet loss with better network utilization and throughput by intentionally dropping the packets at the intermediate hubs in TCP/IP (transmission control protocol/Internet protocol) networks. To accelerate the responsiveness of AQM framework, proportional-integral-differential (PID) controllers are utilized. In spite of its simplicity, it can effectively take care of a range of complex problems; however it is a lot complicated to track down optimal PID parameters with conventional procedures. A few new strategies have been grown as of late to adjust the PID controller parameters. Therefore, in this paper, we have developed a Squirrel search based PID controller to dynamically find its controller gain parameters for AQM. The controller gain parameters are decided based on minimizing the integrated-absolute error (IAE) in order to ensure less packet loss, high link utilization and a stable queue length in favor of TCP networks.

Hyperspectral Image Classification using EfficientNet-B4 with Search and Rescue Operation Algorithm

  • S.Srinivasan;K.Rajakumar
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.213-219
    • /
    • 2023
  • In recent years, popularity of deep learning (DL) is increased due to its ability to extract features from Hyperspectral images. A lack of discrimination power in the features produced by traditional machine learning algorithms has resulted in poor classification results. It's also a study topic to find out how to get excellent classification results with limited samples without getting overfitting issues in hyperspectral images (HSIs). These issues can be addressed by utilising a new learning network structure developed in this study.EfficientNet-B4-Based Convolutional network (EN-B4), which is why it is critical to maintain a constant ratio between the dimensions of network resolution, width, and depth in order to achieve a balance. The weight of the proposed model is optimized by Search and Rescue Operations (SRO), which is inspired by the explorations carried out by humans during search and rescue processes. Tests were conducted on two datasets to verify the efficacy of EN-B4, with Indian Pines (IP) and the University of Pavia (UP) dataset. Experiments show that EN-B4 outperforms other state-of-the-art approaches in terms of classification accuracy.