• Title/Summary/Keyword: Security Techniques

Search Result 1,571, Processing Time 0.029 seconds

A Study on Techniques for Cryptographic-based Privacy-Preserving Data Mining (암호학 기반의 프라이버시 보존형 데이터 마이닝 기술에 관한 연구)

  • Yu, Joon-Suk;Hong, Do-Won;Chung, Kyo-Il
    • Annual Conference of KIPS
    • /
    • 2005.11a
    • /
    • pp.983-986
    • /
    • 2005
  • 최근 들어서 데이터 마이닝은 마케팅, 시장 분석, 사업전략 및 도시계획 수립 등 다양한 분야에서 폭넓게 활용되고 있으며, 새로운 분야로 그 활용 영역을 넓혀가고 있다. 하지만 데이터 마이닝은 그 과정에서 데이터 소유자들의 프라이버시가 침해될 수 있는 문제를 내포하고 있으며, 최근에는 이러한 문제를 해결하고자 하는 노력들이 나타나고 있다. 본 논문에서는 데이터 마이닝에서 이러한 문제를 해결하기 위한 프라이버시 보호 기술들에 대해서 살펴보고 각 방법의 특징에 대해서 기술한다. 특히, 안전한 다자간 계산(Secure multiparty computation)에 기반한 암호학적 프라이버시 보호 기술과 그 활용 가능성에 대해서도 기술한다.

  • PDF

A Study on Selective Encryption of Huffman Codes (허프만 코드의 선택적 암호화에 관한 연구)

  • Park, Sang-Ho
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.57-63
    • /
    • 2007
  • The security of data in network is provided by encryption. Selective encryption is a recent approach to reduce the computational cost and complexity for large file size data such as image and video. This paper describes techniques to encrypt Huffman code and discusses the performance of proposed scheme. We propose a simple encryption technique applicable to the Huffman code and study effectiveness of encryption against insecure channel. Our scheme combine encryption process and compression process, and it can reduce processing time for encryption and compression by combining two processes.

  • PDF

Jamming Vulnerability on Aviation Communication System by Smart-phone with Frequency Modulation (스마트폰 주파수 변조를 이용한 항공 통신 시스템 전파교란 취약점)

  • Kim, In-Bum;Kim, Yoon-Young;Park, Won-Hyung
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.49-59
    • /
    • 2010
  • Recently, As smart phone offers rather superior functionality and interface than normal phone, the number of user increase rapidly. for the convenience of user, there are so many case of customize the system. Simultaneously a number of smart phones which vulnerable to security increase Exponentially. The number of malware which targets smartphone increases Annually, namely Threats have intensified. In this thesis, we suggest the Techniques and countermeasures of the vulnerability which targets aviation communication system by Smart-phone RF module with frequency modulation.

A Study of Contingency Screening Method for Voltage Security Analysis. (전압안전도해석을 위한 상정사고스크린닝에 관한 연구)

  • Song, Kil-Yeong;Kim, Yeong-Han;Choi, Sang-Geu
    • Proceedings of the KIEE Conference
    • /
    • 1988.07a
    • /
    • pp.879-882
    • /
    • 1988
  • This paper describes a fast security analysis techique for voltage security assessment. The new method identifies the location of buses with potential voltage problems and thereby defines a voltage-sensitive subnetwork for contingency screening. The efficieny of this method is derived from the use of a voltage subnetwork to drastically reduce the number of bus voltages to be solved; and subsequently from the use of compensation techniques and sparse-vectors methods for screening. Results demonstrating the effectiveness of the method on the IEEE-14 bus model system are presented.

  • PDF

Power System Security Assessment Using The Neural Networks (신경회로망을 이용한 전력계통 안전성 평가 연구)

  • Lee, Kwang-Ho;Hwang, Seuk-Young
    • Proceedings of the KIEE Conference
    • /
    • 1997.07c
    • /
    • pp.1130-1132
    • /
    • 1997
  • This paper proposed an application of artificial neural networks to security assessment(SA) in power system. The SA is a important factor in power system operation, but conventional techniques have not achieved the desired speed and accuracy. Since the SA problem involves classification, pattern recognition, prediction, and fast solution, it is well suited for Kohonen neural network application. Self organizing feature map(SOFM) algorithm in this paper provides two dimensional multi maps. The evaluation of this map reveals the significant security features in power system. Multi maps of multi prototype states are proposed for enhancing the versatility of SOFM neural network to various operating state.

  • PDF

The TOR Data Communication System

  • Haraty, Ramzi A.;Zantout, Bassam
    • Journal of Communications and Networks
    • /
    • v.16 no.4
    • /
    • pp.415-420
    • /
    • 2014
  • Since the day the Internet became a common and reliable mechanism for communication and data transfer, security officers and enthusiasts rallied to enforce security standards on data transported over the globe. Whenever a user tries communicating with another recipient on the Internet, vital information is sent over different networks until the information is dropped, intercepted, or normally reaches the recipient. Critical information traversing networks is usually encrypted. In order to conceal the sender's identity, different implementations have proven successful - one of which is the invention of anonymous networks. This paper thoroughly investigates one of the most common and existing techniques used during data communication for avoiding traffic analysis as well as assuring data integrity - the onion router (TOR). The paper also scrupulously presents the benefits and drawbacks of TOR.

A Study of Trace-back Connection Maintenance Techniques using TCP Hijacking (TCP Hijacking을 이용한 역추적 Connection 유지 기법 연구)

  • Kim, Hwan-Kuk;Han, Seung-Wan;Seo, Dong-Il
    • Annual Conference of KIPS
    • /
    • 2003.05c
    • /
    • pp.2153-2156
    • /
    • 2003
  • 인터넷 사용자의 급증에 따라, 인터넷을 통한 각종 침해사고 역시 크게 증가되고 있다 이러한 각종 침해사고로부터의 대응 방법으로 해킹을 시도하는 해커의 실제 위치를 실시간으로 추적하는 침입자 역추적 기술에 대한 연구가 활발히 이루어지고 있다. 본 논문에서는 TCP Connection Traceback 기술에서 사용되는 기법 중에 하나인 패킷 워터마킹 역추적 기법에서 TCP Hijacking 해킹기술을 이용하여 Reply 패킷의 Connection 유지 어려움을 해결하는 방법을 제시한다.

  • PDF

Securing RTP Packets Using Per-Packet Key Exchange for Real-Time Multimedia

  • Jung, Younchan;Festijo, Enrique;Atwood, J. William
    • ETRI Journal
    • /
    • v.35 no.4
    • /
    • pp.726-729
    • /
    • 2013
  • For secure multimedia communications, existing encryption techniques use an online session key for the key exchange, for which key size is limited to less than 10 digits to accommodate the latency condition caused by user devices only being able to handle low computational loads. This condition results in poor security of recorded encrypted data. In this letter, we propose a packet key scheme that encrypts real-time packets using a different key per packet for multimedia applications. Therefore, a key of a relatively small size can provide after-transmission confidentiality to data of a real-time session.

Feedforward Input Signal Generation for MIMO Nonminimum Phase Autonomous System Using Iterative Learning Method (반복학습에 의한 MIMO Nonminimum Phase 자율주행 System의 Feedforward 입력신호 생성에 관한 연구)

  • Kim, Kyongsoo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.2
    • /
    • pp.204-210
    • /
    • 2018
  • As the 4th industrial revolution and artificial intelligence technology develop, it is expected that there will be a revolutionary changes in the security robot. However, artificial intelligence system requires enormous hardwares for tremendous computing loads, and there are many challenges that need to be addressed more technologically. This paper introduces precise tracking control technique of autonomous system that need to move repetitive paths for security purpose. The input feedforward signal is generated by using the inverse based iterative learning control theory for the 2 input 2 output nonminimum-phase system which was difficult to overcome by the conventional feedback control system. The simulation results of the input signal generation and precision tracking of given path corresponding to the repetition rate of extreme, such as bandwidth of the system, shows the efficacy of suggested techniques and possibility to be used in military security purposes.

Development of an electronic auction system using Java security (Java보안기술을 이용한 전자 경매시스템 개발)

  • Yoon, Doo-Shik;Park, Hyun-Dong;Lee, Jong-Hu;Lee, Man-Ho;Ryu, Jae-Cheol
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.2
    • /
    • pp.401-410
    • /
    • 2000
  • As the INternet has progressed, the auction service has been provided on several sites. But, most servers have security vulnerabilities; it causes the critical damage to the users. So the countermeasure to prevent the damageis needed immediately. In this paper, we design and implement the seccure electronic auction system using the Java security techniques.

  • PDF