• Title/Summary/Keyword: Security Techniques

Search Result 1,571, Processing Time 0.029 seconds

Design and Evaluation of an Anomaly Detection Method based on Cross-Feature Analysis using Rough Sets for MANETs (모바일 애드 혹 망을 위한 러프 집합을 사용한 교차 특징 분석 기반 비정상 행위 탐지 방법의 설계 및 평가)

  • Bae, Ihn-Han;Lee, Hwa-Ju
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.27-35
    • /
    • 2008
  • With the proliferation of wireless devices, mobile ad-hoc networking (MANETS) has become a very exciting and important technology. However, MANET is more vulnerable than wired networking. Existing security mechanisms designed for wired networks have to be redesigned in this new environment. In this paper, we discuss the problem of anomaly detection in MANET. The focus of our research is on techniques for automatically constructing anomaly detection models that are capable of detecting new or unseen attacks. We propose a new anomaly detection method for MANETs. The proposed method performs cross-feature analysis on the basis of Rough sets to capture the inter-feature correlation patterns in normal traffic. The performance of the proposed method is evaluated through a simulation. The results show that the performance of the proposed method is superior to the performance of Huang method that uses cross-feature based on the probability of feature attribute value. Accordingly, we know that the proposed method effectively detects anomalies.

  • PDF

Breeding Strategies to Increase Production Potential of Major Food Crops in Korea (식량생산능력 향상을 위한 농작물 육종전략)

  • Kim Gwang Ho;Kim Seok Dong;Park Mun Ung;Mun Heon Pal
    • Proceedings of the Korean Society of Crop Science Conference
    • /
    • 1999.11a
    • /
    • pp.80-101
    • /
    • 1999
  • Self-sufficiency ratio of food crops in Korea is estimated under $20{\%}$ in 2010 because total food consumption including feed will be increased. but food grain production will be decreased. It is necessary to maintain the optimum level of food self-sufficiency rate to secure national food demand/supply balance and non-trade and multiple function of agriculture in Korea. It will be possible to produce more food grains having the acceptable quality if the appropriate policy and cropping techniques are developed and practised in future. Breeding for high yielding varieties should be the first target to raise the production potential of food crops . Number of varieties developed during last 30 years is counted as 353 in food crops. New varieties developed in 1990s showed the higher yield potential and the improved agronomic characteristics compared with 1970s and 1980s varieties. But number of varieties planted on the farmer's field over $5{\%}$ of national planting area is less than one third of total varieties developed Breeding efforts to maintain planting area of main food crops should be focussed on consumer's demand and farmer's need. They are the best quality variety in each field of crop utilization, the newly designed variety adapting to changes of natural, rural and cropping environment, and the higher yielding variety. It is also needed to develop new quality crop varieties for inducing more consumption of crop grain produced in Korea for direct food or processing. Development of barley varieties for animal feed. high income soybean varieties, high quality wheat variety. and super yielding rice and barley varieties are also needed to keep or maximize national food production potential. In order to establish the appropriate cropping technique for domestic food security, the strong and continuous interest and financial support on crop breeding are required, and the inter-disciplinary and inter-institutionary researches should be strengthened for successful crop breeding.

  • PDF

Enhanced Secure Sensor Association and Key Management in Wireless Body Area Networks

  • Shen, Jian;Tan, Haowen;Moh, Sangman;Chung, Ilyong;Liu, Qi;Sun, Xingming
    • Journal of Communications and Networks
    • /
    • v.17 no.5
    • /
    • pp.453-462
    • /
    • 2015
  • Body area networks (BANs) have emerged as an enabling technique for e-healthcare systems, which can be used to continuously and remotely monitor patients' health. In BANs, the data of a patient's vital body functions and movements can be collected by small wearable or implantable sensors and sent using shortrange wireless communication techniques. Due to the shared wireless medium between the sensors in BANs, it may be possible to have malicious attacks on e-healthcare systems. The security and privacy issues of BANs are becoming more and more important. To provide secure and correct association of a group of sensors with a patient and satisfy the requirements of data confidentiality and integrity in BANs, we propose a novel enhanced secure sensor association and key management protocol based on elliptic curve cryptography and hash chains. The authentication procedure and group key generation are very simple and efficient. Therefore, our protocol can be easily implemented in the power and resource constrained sensor nodes in BANs. From a comparison of results, furthermore, we can conclude that the proposed protocol dramatically reduces the computation and communication cost for the authentication and key derivation compared with previous protocols. We believe that our protocol is attractive in the application of BANs.

A Study on a Violence Recognition System with CCTV (CCTV에서 폭력 행위 감지 시스템 연구)

  • Shim, Young-Bin;Park, Hwa-Jin
    • Journal of Digital Contents Society
    • /
    • v.16 no.1
    • /
    • pp.25-32
    • /
    • 2015
  • With the increased frequency of crime such as assaults and sexual violence, the reliance on CCTV in arresting criminals has increased as well. However, CCTV, which should be monitored by human labor force at all times, has limits in terms of budget and man-power. Thereby, the interest in intelligent security system is growing nowadays. Expanding the techniques of an objects behavior recognition in previous studies, we propose a system to detect forms of violence between 2~3 objects from images obtained in CCTV. It perceives by detecting the object with the difference operation and the morphology of the background image. The determinant criteria to define violent behaviors are suggested. Moreover, provable decision metric values through measurements of the number of violent condition are derived. As a result of the experiments with the threshold values, showed more than 80% recognition success rate. A future research for abnormal behaviors recognition system in a crowded circumstance remains to be developed.

An Effective Query Rewriting Method in Secure XML Access Control (안전한 XML 접근제어에서 효율적인 질의 재작성 기법)

  • An, Dong-Chan;Byun, Chang-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.127-137
    • /
    • 2006
  • We propose two phase filtering scheme to develop an efficient mechanism for XML databases to control query-based access. An access control environment for XML documents and some techniques to deal with fine-grained authorization priorities and conflict resolution issues are proposed. Despite this, relatively little work has been done to enforce access controls particularly for XML databases in the case of query-based access. The basic idea utilized is that a user query interaction with only necessary access control rules is modified to an alternative form through a query optimization technique, which is guaranteed to have no access violations using tree-aware metadata of XML schemas. The scheme can be applied to any XML database management system and has several advantages such as small execution time overhead, fine-grained controls, and safe and correct query modification. The experimental results clearly demonstrate the efficiency of the approach.

  • PDF

A Study on Application for Super Speed Maglev Railway of System Engineering Technology (시스템 엔지니어링 기법의 초고속 자기부상철도 적용에 관한 연구)

  • Han, Young-Jae;Jo, Jung-Min;Lee, Jin-Ho;Kim, Dong-Hyun;Lee, Chul-Ung
    • Journal of the Korean Society for Railway
    • /
    • v.18 no.4
    • /
    • pp.317-324
    • /
    • 2015
  • A super speed maglev is a complicated system integrating electric, electronic, mechanic, civil and construction engineering. So, there must be an integrative system to monitor and manage operation requirements and standard features of each subsystem and the interfaces between each technology. As an indispensable part that can ensure whole system performance, a secure interface for each individual subsystem is an important management item of system engineering. By securing the interface performance of each individual subsystem, system failure can be effectively prevented in advance. Based on system engineering techniques, improvement of security and reliability for a super speed maglev is described in this research.

Analysis of the Routing Path Tracking Technology for Mobility Host (이동성 호스트를 위한 라우팅 경로 추적 기술 분석)

  • Park, Jin-tae;Phyo, Gyung-soo;Moon, Il-young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.638-640
    • /
    • 2016
  • Recently, Humanity enter the super-connection generation that linking human and things as a result of the development ICT technologies. IoT technology is growing rapidly as a result of IoT technology appearance and development of smart device, technology expansion, the spread of smart sensors, spread diffusion of smart devices, construction of a variety of network. These techniques are applied to those having a mobility is growing importance of network technology. Real-time service and features, such as the accuracy of the data it became important. In order to implement the IoT will need to take into account IP, security, a lot of things such as a service model, but in this paper, want to discuss mobility, for the tracking technology of routing path for efficient service delivery of the host. Therefore, in this paper, the routing path that is currently study examined the tracking technology, we try to refer to routing method of the future of the mobile host.

  • PDF

Initial Authentication Protocol of Hadoop Distribution System based on Elliptic Curve (타원곡선기반 하둡 분산 시스템의 초기 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.253-258
    • /
    • 2014
  • Recently, the development of cloud computing technology is developed as soon as smartphones is increases, and increased that users want to receive big data service. Hadoop framework of the big data service is provided to hadoop file system and hadoop mapreduce supported by data-intensive distributed applications. But, smpartphone service using hadoop system is a very vulnerable state to data authentication. In this paper, we propose a initial authentication protocol of hadoop system assisted by smartphone service. Proposed protocol is combine symmetric key cryptography techniques with ECC algorithm in order to support the secure multiple data processing systems. In particular, the proposed protocol to access the system by the user Hadoop when processing data, the initial authentication key and the symmetric key instead of the elliptic curve by using the public key-based security is improved.

The Satisfaction of Store Characteristics Depending on On-Line Store Type (온라인 의류 점포 유형에 따른 점포속성 만족도)

  • Kim, Eun-Sook;Kim, Mi-Young
    • Journal of the Korean Society of Costume
    • /
    • v.57 no.7
    • /
    • pp.1-14
    • /
    • 2007
  • This study investigates the differences between the satisfaction factors of store characteristics depending on on-line clothing store type and its satisfaction index. The collected data were analyzed by using SPSS 10.0 software with various techniques such as paired t-test, T-test, Cronbach's ${\alpha}$ reliability and factor analysis that use principal component analysis and Varimax orthogonal rotation were used. The results are summarized as follows: 1. By categorizing the level of on-line store characteristics satisfaction depending on its type, clarifies the differences between its satisfaction. The satisfaction rank of general merchandise store was as followed: searching and approaching system, buying process service, screen-displayed design, product, store credit. On the other hand, the satisfaction rank of general store was as followed: screen-displayed design, store credit, buying process service. 2. By analyzing the difference of satisfaction depending on the store type, it was found that general merchandise store was more satisfied with screen-displayed design, approaching and searching, whole payment process, the safety of payment and shipping service, security service when compared to specialty store. It was also found that specialty store was more satisfied with the variety of product, update of rare items, quality and price of product. 3. By analyzing the difference between the type of on-line clothing store satisfaction depending on age, in the case of general merchandise store, the result showed that people in their thirties were more satisfied with buying process service, store credit, customer management system when compared to twenties. In the case of specialty store, the result showed that people in their twenties were more satisfied with customer management service when compared to thirties, and when it came to buying process service, it was vice versa.

Implementation of Secure Keypads based on Tetris-Form Protection for Touch Position in the Fintech (핀테크에서 터치 위치 차단을 위한 테트리스 모양의 보안 키패드의 구현)

  • Mun, Hyung-Jin;Kang, Sin-Young;Shin, ChwaCheol
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.8
    • /
    • pp.144-151
    • /
    • 2020
  • User-authentication process is necessary in Fintech Service. Especially, authentication on smartphones are carried out through PIN which is inputted through virtual keypads on touch screen. Attacker can analogize password by watching touched letter and position over the shoulder or using high definition cameras. To prevent password spill, various research of virtual keypad techniques are ongoing. It is hard to design secure keypad which assures safety by fluctuative keypad and enhance convenience at once. Also, to reconfirm user whether password is wrongly pressed, the inputted information is shown on screen. This makes the password easily exposed through high definition cameras or Google Class during recording. This research analyzed QWERTY based secure keypad's merits and demerits. And through these features, creating Tetris shaped keypad and piece them together on Android environment, and showing inputted words as Tetris shape to users through smart-screen is suggested for the ways to prevent password spill by recording.