• Title/Summary/Keyword: Security Techniques

Search Result 1,571, Processing Time 0.03 seconds

Analysis of Access Authorization Conflict for Partial Information Hiding of RDF Web Document (RDF 웹 문서의 부분적인 정보 은닉과 관련한 접근 권한 충돌 문제의 분석)

  • Kim, Jae-Hoon;Park, Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.49-63
    • /
    • 2008
  • RDF is the base ontology model which is used in Semantic Web defined by W3C. OWL expands the RDF base model by providing various vocabularies for defining much more ontology relationships. Recently Jain and Farkas have suggested an RDF access control model based on RDF triple. Their research point is to introduce an authorization conflict problem by RDF inference which must be considered in RDF ontology data. Due to the problem, we cannot adopt XML access control model for RDF, although RDF is represented by XML. However, Jain and Farkas did not define the authorization propagation over the RDF upper/lower ontology concepts when an RDF authorization is specified. The reason why the authorization specification should be defined clearly is that finally, the authorizatin conflict is the problem between the authorization propagation in specifying an authorization and the authorization propagation in inferencing authorizations. In this article, first we define an RDF access authorization specification based on RDF triple in detail. Next, based on the definition, we analyze the authoriztion conflict problem by RDF inference in detail. Next, we briefly introduce a method which can quickly find an authorization conflict by using graph labeling techniques. This method is especially related with the subsumption relationship based inference. Finally, we present a comparison analysis with Jain and Farkas' study, and some experimental results showing the efficiency of the suggested conflict detection method.

A Study of Cyber Operation COP based on Multi-layered Visualization (멀티레이어드 시각화를 적용한 사이버작전 상황도 개발에 관한 연구)

  • Kwon, Koohyung;Kauh, Jang-hyuk;Kim, Sonyong;Kim, Jonghwa;Lee, Jaeyeon;Oh, Haengrok
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.143-151
    • /
    • 2020
  • The cyber battlefield called the fifth battlefield, is not based on geological information unlike the existing traditional battlefiels in the land, sea, air and space, and has a characteristics that all information has tightly coupled correlation to be anlayized. Because the cyber battlefield has created by the network connection of computers located on the physical battlefield, it is not completely seperated from the geolocational information but it has dependency on network topology and software's vulnerabilities. Therefore, the analysis for cyber battlefield should be provided in a form that can recognize information from multiple domains at a glance, rather than a single geographical or logical aspect. In this paper, we describe a study on the development of the cyber operation COP(Common Operational Picture), which is essential for command and control in the cyber warfare. In particular, we propose an architecure for cyber operation COP to intuitively display information based on visualization techniques applying the multi-layering concept from multiple domains that need to be correlated such as cyber assets, threats, and missions. With this proposed cyber operation COP with multi-layered visualization that helps to describe correlated information among cyber factors, we expect the commanders actually perfcrm cyber command and control in the very complex and unclear cyber battlefield.

New Approaches to Quality Monitoring of Higher Education in the Process of Distance Learning

  • Oseredchuk, Olga;Drachuk, Ihor;Teslenko, Valentyn;Ushnevych, Solomiia;Dushechkina, Nataliia;Kubitskyi, Serhii;Сhychuk, Antonina
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.35-42
    • /
    • 2022
  • The article identifies the problem of monitoring the quality of higher education in three main areas, which are comparative pedagogical systems of education. The first direction is determined by dissertation works, the second - monographs and textbooks, and the third reveals scientific periodicals. According to its internal structure, monitoring the quality of education combines important management components identified in the article (analysis, evaluation and forecasting of processes in education; a set of methods for tracking processes in education; collecting and processing information to prepare recommendations for research processes and make necessary adjustments). Depending on the objectives, three areas of monitoring are identified: informational (involves the accumulation, structuring and dissemination of information), basic (aimed at identifying new problems and threats before they are realized at the management level), problematic (clarification of patterns, processes, hazards, those problems that are known and significant from the point of view of management). According to its internal structure, monitoring the quality of education combines the following important management components: analysis, evaluation and forecasting of processes in education; a set of techniques for tracking processes in education; collection and processing of information in order to prepare recommendations for the development of the studied processes and make the necessary adjustments. One of the priorities of the higher education modernization program during the COVID-19 pandemic is distance learning, which is possible due to the existence of information and educational technologies and communication systems, especially for effective education and its monitoring in higher education. The conditions under which the effectiveness of pedagogical support of monitoring activities in the process of distance learning is achieved are highlighted. According to the results of the survey, the problems faced by higher education seekers are revealed. A survey of students was conducted, which had a certain level of subjectivity in personal assessments, but the sample was quite representative.

An Adversarial Attack Type Classification Method Using Linear Discriminant Analysis and k-means Algorithm (선형 판별 분석 및 k-means 알고리즘을 이용한 적대적 공격 유형 분류 방안)

  • Choi, Seok-Hwan;Kim, Hyeong-Geon;Choi, Yoon-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1215-1225
    • /
    • 2021
  • Although Artificial Intelligence (AI) techniques have shown impressive performance in various fields, they are vulnerable to adversarial examples which induce misclassification by adding human-imperceptible perturbations to the input. Previous studies to defend the adversarial examples can be classified into three categories: (1) model retraining methods; (2) input transformation methods; and (3) adversarial examples detection methods. However, even though the defense methods against adversarial examples have constantly been proposed, there is no research to classify the type of adversarial attack. In this paper, we proposed an adversarial attack family classification method based on dimensionality reduction and clustering. Specifically, after extracting adversarial perturbation from adversarial example, we performed Linear Discriminant Analysis (LDA) to reduce the dimensionality of adversarial perturbation and performed K-means algorithm to classify the type of adversarial attack family. From the experimental results using MNIST dataset and CIFAR-10 dataset, we show that the proposed method can efficiently classify five tyeps of adversarial attack(FGSM, BIM, PGD, DeepFool, C&W). We also show that the proposed method provides good classification performance even in a situation where the legitimate input to the adversarial example is unknown.

Use of Multimedia Technologies in Extra-Curricular Works in Order to Improve the Quality of Training of Future Specialists

  • Tverezovska, Nina;Kovbasa, Tetiana;Pryhalinska, Tetiana;Mykhniuk, Serhii;Lopushan, Tetiana;Radionova, Olena;Kuchai, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.35-42
    • /
    • 2022
  • The article deals with the role of extra-curricular work by means of multimedia technologies in order to improve the quality of training of future specialists. An important condition for achieving high results in training specialists is the optimal combination of classroom and independent extra-curricular work of students by means of multimedia technologies. Very significant is the development of student independence, the formation of skills of independent search activity, the ability to take responsibility, independently solve a problem, find constructive solutions, a way out of a crisis situation, and so on. Extra-curricular work forms students' ability to master the techniques of analysis, synthesis, generalization, comparison; develops flexibility of thinking; opens up opportunities for the development and stabilization of positive learning motives to activate the process of mastering knowledge by means of multimedia technologies as a means of forming the personality of a highly qualified specialist. The concept of multimedia as one of the priority areas of Information Technology, which plays a particularly important role in the process of informatization of education, is revealed, and its advantages in education are shown. The advent of multimedia systems optimizes transformations in education, in many areas of professional activity, science, art, etc. The necessity of distance learning to improve the quality of training of future specialists using multimedia technologies in extra-curricular work is justified. The effectiveness of pedagogical support in the process of distance learning is achieved by the following conditions, which is revealed in the article. Various forms and types of extra-curricular work of students that are used in the modern practice of the educational environment of a higher education institution are described. Scientific and informational activity is considered a key area of information activity. The analysis of scientific and information activities in the field of education allows us to identify its main functions, which emphasize the growing role of scientific information in the education system, in particular, extra-curricular work using multimedia technologies. Operational, complete, accurate, targeted information that meets objective and subjective needs becomes an important link between the field of management, science and practice.

Use of Digital Educational Resources in the Training of Future Specialists in the EU Countries

  • Plakhotnik, Olga;Zlatnikov, Valentyn;Matviienko, Olena;Bezliudnyi, Oleksandr;Havrylenko, Anna;Yashchuk, Olena;Andrusyk, Pavlo
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.17-24
    • /
    • 2022
  • The article proves that the main goal of informatization of higher education institutions in the EU countries is to improve the quality of education of future specialists by introducing digital educational resources into the education process. The main tasks of informatization of education are defined. Digital educational resources are interpreted as a set of data in digital form that is applicable for use in the learning process; it is an information source containing graphic, text, digital, speech, music, video, photo and other information aimed at implementing the goals and objectives of modern education; educational resources on the Internet, electronic textbooks, educational programs, electronic libraries, etc. The creation of digital educational resources is defined as one of the main directions of informatization of all forms and levels of Education. Types of digital educational resources by educational functions are considered. The factors that determine the effectiveness of using digital educational resources in the educational process are identified. The use of digital educational resources in the training of future specialists in the EU countries is considered in detail. European countries note that digital educational resources in professional use allow you to implement a fundamentally new approach to teaching and education, which is based on broad communication, free exchange of opinions, ideas, information of participants in a joint project, on a completely natural desire to learn new things, expand their horizons; is based on real research methods (scientific or creative laboratories), allowing you to learn the laws of nature, the basics of techniques, technology, social phenomena in their dynamics, in the process of solving vital problems, features of various types of creativity in the process of joint activities of a group of participants; promotes the acquisition by teachers of various related skills that can be very useful in their professional activities, including the skills of using computer equipment and various digital technologies.

Analysis of the Impact of Building Congested Area for Urban Flood Analysis (도심지 침수해석을 위한 건축물 밀집 지역 영향 분석)

  • Kim, Sung-Uk;Jun, Kye-Won;Lee, Seung-Hee;Pi, Wan-Seop
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.3
    • /
    • pp.41-46
    • /
    • 2022
  • Recently, the scale of flood damage occurring in urban areas is increasing due to climate change and urbanization, so various flooding analysis techniques are needed. In the Sadangcheon Stream basin, which has been continuously flooded since 2010, a basic plan for improving drainage was established using XP-SWMM and measures to prevent flooding were proposed. However, in the process of inundation analysis, the analysis considering the city's buildings was not conducted, resulting in a problem that the degree of flooding damage tends to be overestimated. Therefore, in this study, XP-SWMM was used to compare and analyze cases where buildings were not considered and designated as inactive areas. As a result of the study, it was analyzed if the building was not considered, the flood damaged area was 271,100 m2 and the depth of submersion was 0.15 m, and if the building was considered inactive area, the flood damaged area was 172,900 m2 and the depth of submersion was 0.32 m that it is under-estimated about 36% and an flow velocity around the building increased from 1.62 m/s to 1.83 m/s about 1.12 times.

The Role of Innovative Activities in Training Students Using Computer Technologies

  • Minenok, Antonina;Donets, Ihor;Telychko, Tetiana;Hud, Hanna;Smoliak, Pavlo;Kurchatova, Angelika;Kuchai, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.105-112
    • /
    • 2022
  • Innovation is considered as an implemented innovation in education - in the content, methods, techniques and forms of educational activity and personality education (methods, technologies), in the content and forms of organizing the management of the educational system, as well as in the organizational structure of educational institutions, in the means of training and education and in approaches to social services in education, distance and multimedia learning, which significantly increases the quality, efficiency and effectiveness of the educational process. The classification of currently known pedagogical technologies that are most often used in practice is shown. The basis of the innovative activity of a modern teacher is the formation of an innovative program-methodical complex in the discipline. Along with programmatic and content provision of disciplines, the use of informational tools and their didactic properties comes first. It combines technical capabilities - computer and video technology with live communication between the lecturer and the audience. In pedagogical innovation, the principles reflecting specific laws and regularities of the implementation of innovative processes are singled out. All principles are elements of a complex system of organization and management of innovative activities in the field of education and training. They closely interact with each other, which enhances the effect of each of them due to the synergistic effect. To improve innovative activities in the training of students, today computer technologies are widely used in pedagogy as a science, as well as directly in the practice of the pedagogical process. They have gained the most popularity in such activities as distance learning, online learning, assistance in the education management system, development of programs and virtual textbooks in various subjects, searching for information on the network for the educational process, computer testing of students' knowledge, creation of electronic libraries, formation of a unified scientific electronic environment, publication of virtual magazines and newspapers on pedagogical topics, teleconferences, expansion of international cooperation in the field of Internet education. The article considers computer technologies as the main building material for the entire society. In the modern world, there is a need to prepare a person for life in a multimedia environment. This process should be started as early as possible, because the child's contact with the media is present almost from the moment of his birth.

A Forensic Methodology for Detecting Image Manipulations (이미지 조작 탐지를 위한 포렌식 방법론)

  • Jiwon Lee;Seungjae Jeon;Yunji Park;Jaehyun Chung;Doowon Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.4
    • /
    • pp.671-685
    • /
    • 2023
  • By applying artificial intelligence to image editing technology, it has become possible to generate high-quality images with minimal traces of manipulation. However, since these technologies can be misused for criminal activities such as dissemination of false information, destruction of evidence, and denial of facts, it is crucial to implement strong countermeasures. In this study, image file and mobile forensic artifacts analysis were conducted for detecting image manipulation. Image file analysis involves parsing the metadata of manipulated images and comparing them with a Reference DB to detect manipulation. The Reference DB is a database that collects manipulation-related traces left in image metadata, which serves as a criterion for detecting image manipulation. In the mobile forensic artifacts analysis, packages related to image editing tools were extracted and analyzed to aid the detection of image manipulation. The proposed methodology overcomes the limitations of existing graphic feature-based analysis and combines with image processing techniques, providing the advantage of reducing false positives. The research results demonstrate the significant role of such methodology in digital forensic investigation and analysis. Additionally, We provide the code for parsing image metadata and the Reference DB along with the dataset of manipulated images, aiming to contribute to related research.

S-PRESENT Cryptanalysis through Know-Plaintext Attack Based on Deep Learning (딥러닝 기반의 알려진 평문 공격을 통한 S-PRESENT 분석)

  • Se-jin Lim;Hyun-Ji Kim;Kyung-Bae Jang;Yea-jun Kang;Won-Woong Kim;Yu-Jin Yang;Hwa-Jeong Seo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.193-200
    • /
    • 2023
  • Cryptanalysis can be performed by various techniques such as known plaintext attack, differential attack, side-channel analysis, and the like. Recently, many studies have been conducted on cryptanalysis using deep learning. A known-plaintext attack is a technique that uses a known plaintext and ciphertext pair to find a key. In this paper, we use deep learning technology to perform a known-plaintext attack against S-PRESENT, a reduced version of the lightweight block cipher PRESENT. This paper is significant in that it is the first known-plaintext attack based on deep learning performed on a reduced lightweight block cipher. For cryptanalysis, MLP (Multi-Layer Perceptron) and 1D and 2D CNN(Convolutional Neural Network) models are used and optimized, and the performance of the three models is compared. It showed the highest performance in 2D convolutional neural networks, but it was possible to attack only up to some key spaces. From this, it can be seen that the known-plaintext attack through the MLP model and the convolutional neural network is limited in attackable key bits.