• Title/Summary/Keyword: Security design

Search Result 3,415, Processing Time 0.028 seconds

Design of a Secure Payment Mechanism based on S/MIME (S/MIME을 적용한 안전한 지불 메커니즘 설계)

  • Chun, Cheul-Woo;Lee, Jong-Hu;Lee, Sang-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.5
    • /
    • pp.482-494
    • /
    • 2002
  • In E-mail based accounting system, the remitter does not have need to find collector's account number. To transfer money to a collector's account, what remitter need is just a collector's E-mail address. But the current E-mail based accounting systems are built on SSL technology. Basically SSL provides some security services - confidentiality, user authentication and data integrity, but does not provide non-repudiation. So, in the current E-mail based accounting system, it is possible to deny transaction. And there is no receipt of transaction. In this paper, we design and implementation of a S/MIME applied Secure Payment Mechanism. In our system, every account information - account number, receiver name, amount of money, etc. - is included in a 'check' message. And this message is protected under the Secure Web-mail using S/MIME. In a view point of the convenience, users using our system do not have need to find collector's account number. And in a view point of the security, our system provides confidentiality, user authentication, data integrity and non-repudiation. Moreover our system provides a receipt.

Optimized Web Design Method by Analyzing the Websites (웹사이트 분석을 통한 최적화 설계 방안)

  • Jang, Hee-Seon
    • Convergence Security Journal
    • /
    • v.15 no.2
    • /
    • pp.19-24
    • /
    • 2015
  • As the Internet usage such as Web3.0, future internet, and internet of things increases, the big data through information exchange between the users and web servers increases. Analyzing those web data, the commercial web sites use the analytic results for marketing and campaign, and non-commercial web sites also use the results to improve the user's services satisfaction. In this paper, the quantitative index is presented to analyze the web sites, and optimized web site design method is also presented through the correlation analysis of index and significance test. From the results for 138 web sites, it is observed that strong plus(+) correlation for visits-unique visitors and page views-average visit duration exists. We also observe the minus(-) correlation between bounce rate and page views per user(or ratio of new visits). In specific, to reduce the bounce rate for users, the strategy to increase the page views and ratio of new visits rather than visits and unique visitors is needed.

Implementation and Design of Port Scan Detecting System Detecting Abnormal Connection Attempts (비정상 연결시도를 탐지한 포트 스캔 탐지 시스템의 설계 및 구현)

  • Ra, Yong-Hwan;Cheon, Eun-Hong
    • Convergence Security Journal
    • /
    • v.7 no.1
    • /
    • pp.63-75
    • /
    • 2007
  • Most of computer systems to be connected to network have been exposed to some network attacks and became to targets of system attack. System managers have established the IDS to prevent the system attacks over network. The previous IDS have decided intrusions detecting the requested connection packets more than critical values in order to detect attacks. This techniques have False Positive possibilities and have difficulties to detect the slow scan increasing the time between sending scan probes and the coordinated scan originating from multiple hosts. We propose the port scan detection rules detecting the RST/ACK flag packets to request some abnormal connections and design the data structures capturing some of packets. This proposed system is decreased a False Positive possibility and can detect the slow scan, because a few data can be maintained for long times. This system can also detect the coordinated scan effectively detecting the RST/ACK flag packets to be occurred the target system.

  • PDF

System Design and Implementation for New Move Picture Solution EZ-MOV Using FLV (FLV를 이용한 새로운 동명상 솔루션 EZ-MOV 대한 시스템 설계 및 구현)

  • Kwon, O-Byoung;Shin, Hyun-Cheul
    • Convergence Security Journal
    • /
    • v.9 no.2
    • /
    • pp.79-84
    • /
    • 2009
  • Recently, Move Picture Files have the same file format and a compression technique as Window Media Video form. but Moving Pictures using file format and a compression technique have question about Motion blur and compressibility. In this paper, we design and Implement for new Move Picture Solution EZ-MOV using FLV different from developed FLV(Flash Video) in the Macromedia company. EZ-MOV have advantages as follow. first, FLV player is able to compact disk access time and DRM (Digital Rights Management) with a built-in self and unable to an illegal video recording, second, whenever WMV formal file encoded FLV are able to lossless compression to fifty percent, third, FLV is able to Moving Picture streaming no buffering. fourth, FLV file is able streaming service no streaming server. fifth, FLV file is able to streaming service keep pace with download and streaming. sixth, FLV file is able to full duplex service.

  • PDF

Design of an Intrusion Detection and Self-treatment System for IoT (사물인터넷을 위한 침입탐지 및 자가 치료 시스템의 설계)

  • Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.5
    • /
    • pp.9-15
    • /
    • 2018
  • With the advent of the 5G communication era recently, advancement of the convergence technologies related to IoT has been progressed rapidly. IoT convergence technologies using various sensors are actively applied many fields in our lives, and it contributes to the popularization of these convergence technologies among many people successfully. The security problem of the IoT which connects many things on the network is critically vulnerable and is one of the most important challenge to be solved urgently. In this paper, we design an intrusion detection and self-treatment system for IoT, which can detect external attacks and anomalies in order to solve the security problems in IoT, perform self-treatment by operating the vaccine program according to the intrusion type whenever it detects certain intrusion. Furthermore, we consider the broadcasting of intrusion alarm message according to the frequency of similar circumstances in order to block intrusion contagious in IoT.

A Design of a Robust Vector Quantizer for Wavelet Transformed Images (웨이브렛벤환 영상 부호화용 범용 벡터양자화기의 설계)

  • Do, Jae-Su;Cho, Young-Suk
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.83-90
    • /
    • 2006
  • In this paper, we propose a new design method for a robust vector quantizer that is independent of the statistical characteristics of input images in the wavelet transformed image coding. The conventional vector quantizers have failed to get quality coding results because of the different statistical properties between the image to be quantized and the training sequence for a codebook of the vector quantizer. Therefore, in order to solve this problem, we used a pseudo image as a training sequence to generate a codebook of the vector quantizer; the pseudo image is created by adding correlation coefficient and edge components to uniformly distributed random numbers. We will clearly define the problem of the conventional vector quantizers, which use real images as a training sequence to generate a codebook used, by comparing the conventional methods with the proposed through computer simulation. Also, we will show the proposed vector quantizer yields better coding results.

  • PDF

Software Engineering Research Trends Meta Analyzing for Safety Software Development on IoT Environment (IoT 환경에서 안전한 소프트웨어 개발을 위한 소프트웨어공학 메타분석)

  • Kim, Yanghoon;Park, Wonhyung;Kim, Guk-boh
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.11-18
    • /
    • 2015
  • The new environments arrive such as ICT convergence, cloud computing, and big data, etc., how to take advanta ge of the existing software engineering technologies has become an important key. In addition, the importance of re quirement analysis for secure software and design phase has been shown in the IoT environment While the existing studies have focused on the utilization of the technique applied to IoT environment, the studies for enhancing analys is and design, the prerequisite steps for safely appling these techniques to the site, have been insufficient. So, we tr y to organize research trends based on software engineering and analyze their relationship in this paper. In detail, w e classify the research trends of software engineering to perform research trends meta-analysis, and analyze an ann ual development by years. The flow of the major research is identified by analyzing the correlation of the key word s. We propose the strategies for enhancing the utilization of software engineering techniques to develop high-quality software in the IoT environment.

A Study on the Interior Environmental Planning Factors for Improving Safety and Security in Early Children Facilities (안전성 향상을 위한 유아시설 실내환경 계획요인에 관한 연구)

  • Byun, Gi-Dong;Kwon, Ju-Yeong;Ha, Mi-Kyoung
    • Korean Institute of Interior Design Journal
    • /
    • v.24 no.2
    • /
    • pp.197-205
    • /
    • 2015
  • Recently in most homes, children are mostly cared in early childhood education facilities. However, the increased number of safety accidents on children cared in such facilities has become a social issue. For that, the purpose of this study is to suggest interior environmental planning elements to improve safety level of early childhood education facilities. This study was carried out by performing literature review analysis and survey. First, in total of 42 environmental planning elements that can be applied domestically were derived from analyzing safety related guidelines for children facilities located both domestically and internationally then a survey was carried out targeted for teachers and staffs in the facilities on importance of the factors. The results of this study are as followings. First, it is required to intensify the level of safety related training for teachers and staffs in the facilities including better treatment for them. Second, the necessity of safety environment by each space in such facilities is required to be approached upon the level of child activities. Third, facilities planning and finalizing planning are important for improving safety of early childhood education facilities. Forth, from factor analysis on the extracted environmental planning elements that are considered as important by the teachers from both day care centers and kindergartens, they were categorized in 5 groups including 'collision and fall prevention plan', 'physical characteristic consideration plan', 'evacuation safety plan', 'lock security plan' and 'outer control plan'. It is fair to say that constructing a better safety environment for children can be achieved by the environmental planning factors by this study.

A Design and Implementation of System to Provide Secure Digital Contents Distribution on Mobile Environment (무선 환경에서 안전한 디지털 컨텐츠 유통을 제공하는 시스템 설계 및 구현)

  • Lee, Kwon-Il;Kim, Bong-Seon;Shin, Young-Chan;Ryou, Jae-Cheol;Lee, Jun-Seok
    • The KIPS Transactions:PartC
    • /
    • v.11C no.3
    • /
    • pp.327-336
    • /
    • 2004
  • There is a need for content providers and operators to control the usage of downloaded digital contents. Digital Rights Management(DRM) is the means to control the usage of the digital contents once it has been downloaded. Therefore, appropriate security mechanism is required. The mobile DRM system Is same as the general DRM system. We use encryption technology to package digital contents. In case of Mobile DRM system, secure distribution and secure keeping of packaging encryption key is important. In this paper, we design and implement DRM system on the Mobile Environments following on OMA(Open Mobile Alliance) DRM Model. We considered being a secure DRM system to contain appropriate security solution.

Design and Implementation of Human-Detecting Radar System for Indoor Security Applications (실내 보안 응용을 위한 사람 감지 레이다 시스템의 설계 및 구현)

  • Jang, Daeho;Kim, Hyeon;Jung, Yunho
    • Journal of IKEEE
    • /
    • v.24 no.3
    • /
    • pp.783-790
    • /
    • 2020
  • In this paper, the human detecting radar system for indoor security applications is proposed, and its FPGA-based implementation results are presented. In order to minimize the complexity and memory requirements of the computation, the top half of the spectrogram was used to extract features, excluding the feature extraction techniques that require complex computation, feature extraction techniques were proposed considering classification performance and complexity. In addition, memory requirements were minimized by designing a pipeline structure without storing the entire spectrogram. Experiments on human, dog and robot cleaners were conducted for classification, and 96.2% accuracy performance was confirmed. The proposed system was implemented using Verilog-HDL, and we confirmed that a low-area design using 1140 logics and 6.5 Kb of memory was possible.