• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.026 seconds

Design and Implementation of Firewall Log Message Analysis System based on XML (XML 기반의 침입차단 로그 메시지 분석 시스템 설계 및 구현)

  • 전석훈;김석훈;손우용;이창우;송정길
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.125-130
    • /
    • 2004
  • The Internet is aggregate of trustless networks essentially. Because the Internet is very difficult to control flowing of information, taking advantage of enough sporadic resource, security problem that can protect internal important stock from the Internet is risen seriously. Recently, virus accident and generation rate about system intrusion that happen become much higher and various than past. On these time, is progressing researcher for invasion cutout to keep away illegal act vigorouslyand do continuous development. In this paper, reporting administrator log information about invader's illegal act depending on XML format form, and I wished to solve problem that happen in administration side developing invasion interception system that can control to remote.

  • PDF

Legal Institutional Considerations of UAV-based Convergence Services : Privacy Protection (UAV기반 융합서비스에 대한 법·제도적 고찰 - Privacy 보호를 중심으로 -)

  • Noh, Jong-ho;Kwon, Hun-yeong
    • Convergence Security Journal
    • /
    • v.17 no.3
    • /
    • pp.31-40
    • /
    • 2017
  • UAV (Unmanned Aerial Vehicle) is increasingly used in diverse fields such as disaster, distributi on, and logistics, but it is pointed out that the inadequacy of related laws and invasion of privacy is an obstacle to industrial growth. The regulatory framework for UAV convergence services is pr oposed based on the regulatory framework. From the technical point of view, regulation on archite ctural design, from the market point of view, concurrent operation of services in a limited area, a l egal evaluation based on post-evaluation rather than a pre-regulation under the legislation of visua l information protection law and a social consensus will contribute to the early settlement of UAV -based convergence services.

The Effect of SNS Fatigue and Negative Emotions on SNS Discontinuance Intention (SNS 피로감 및 부정적 느낌이 SNS 중단의도에 미치는 영향)

  • Son, Dal-Ho;Kim, Kyung-Sook
    • The Journal of Information Systems
    • /
    • v.25 no.2
    • /
    • pp.111-129
    • /
    • 2016
  • Purpose Today, world-wide societies share their daily life and many communities exchange their information through the explosive developed SNS and the social media systems. However, many SNS fatigue related factors forced the discontinuance of SNS. This paper is aim to examine effect of SNS feature and negative emotion to figure out the reason of SNS discontinuance. This is verifying the effect of maintenance of SNS, security concern and psychological concern on SNS fatigue and the effect of upward/lateral comparison on negative emotion. Moreover, the effect of SNS fatigue and negative concern on the SNS discontinuance intention was examined. Design/methodology/approach This research used to the survey method to test its hypotheses and the survey population is Facebook SNS users. A software tool called AMOS 18 is used to analyze the structural equation model. Findings The results showed that maintenance of SNS, security concern and psychological concern had a positive effect on SNS fatigue respectively and upward/lateral comparison did on negative emotion. In addition, SNS fatigue and negative emotion had significant effect on discontinuance intention.

Efficient Implementation of Crypto Processing Based on Pre_Buffered Key Stream Method (Pre_Buffered 키스트림을 이용한 효율적인 암호처리 구현)

  • Kang, Cheol-Oh;Kim, Eun-Chan;Park, Jea-Min;Ryou, Jea-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.989-1000
    • /
    • 2013
  • Mobile devices use VPN solution to transfer information securely through open network in mobile office environment. In this paper, we propose Pre_Buffered mechanism that improves the throughput of IPSec VPN using low performance H/W crypto Token. Pre_Buffered method precompute key stream, store them in Buffer and use them in IPSec engine for IP packet processing. Moreover, Design, analysis, and experimental results prove the efficiency and feasibility of our proposed method.

An Improved One Round Authenticated Group Key Agreement (개선된 원 라운드 인증 그룹 키 합의 프로토콜)

  • Kim, Ho-Hee;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.3-10
    • /
    • 2013
  • Several identity-based and authenticated key agreement protocols have been proposed. It remains at issue to design secure identity based and authenticated key agreement protocols. In this paper, we propose a one round authenticated group key agreement protocol which uses one more key pair as well as the public key and private key of typical IBE(Identity-Based Encryption) system. The proposed protocol modified Shi et al.'s protocol and He et al.'s protocol. The public and private keys and the signature process of our protocol are simpler than them of their protocols. Our protocol is secure and more efficient than their protocols in communication and computation costs.

Design and Implementation of a Web based Collaboration Learning System for Question Marking (웹 기반 문제저작 중심 협동 학습 시스템 설계 및 구현)

  • Choi, Yue-Soon;Jung, Suck-Tae;Park, Jong-Goo
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.127-133
    • /
    • 2006
  • Some Research is actively being done on a web-based collaborative learning system. This is changes in educational paradigm in the knowledge information age. A web-based collaborative learning system for question making is to improve the effect of studying through positive interactions between colleagues and to motivate studying through group competitions. This system is designed to active and self-leading studying when a learner do collaborative learning for question making in group. This system can help initiate and active studying to learner through a course of collaborative learning for question making. It can be used to achieve collaborative learning in various ways.

  • PDF

A Study of Evaluation System for Facial Expression Recognition based on LDP (LDP 기반의 얼굴 표정 인식 평가 시스템의 설계 및 구현)

  • Lee, Tae Hwan;Cho, Young Tak;Ahn, Yong Hak;Chae, Ok Sam
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.23-28
    • /
    • 2014
  • This study proposes the design and implementation of the system for a facial expression recognition system. LDP(Local Directional Pattern) feature computes the edge response in a different direction from a pixel with the relationship of neighbor pixels. It is necessary to be estimated that LDP code can represent facial features correctly under various conditions. In this respect, we build the system of facial expression recognition to test LDP performance quickly and the proposed evaluation system consists of six components. we experiment the recognition rate with local micro patterns (LDP, Gabor, LBP) in the proposed evaluation system.

A Study on LDP Code Design to includes Facial Color Information (얼굴색 정보를 포함하기 위한 LDP 코드 설계에 관한 연구)

  • Jung, Woong Kyung;Lee, Tae Hwan;Ahn, Yong Hak;Chae, Ok Sam
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.9-15
    • /
    • 2014
  • In this paper, we proposed a new LDP code to solve a previous LDP code's problem and can include a face-color information. To include the face-color information, we developed various methods reducing the existing LDP code and analyzed the results. A new LDP code is represented by 6-bits different from the previous LDP code To adapt to a noise and environmental changes effectively and include 2-bits face-color information. The result shows better recognition rates of face and facial-expression than the existing methods effectively.

Design and Implementation of HAL and Java API for Embedded System (임베디드 시스템을 위한 HAL과 JAVA API 설계 및 구현)

  • Lee, Jin-Kwan;Lee, Dae-Hyung;Jung, Kyu-Cheol;Lee, Jong-Chan;Park, Ki-Hong
    • Convergence Security Journal
    • /
    • v.8 no.1
    • /
    • pp.57-65
    • /
    • 2008
  • The implement of JAVA API for supporting the embedded system is capable of developing the object oriented system with code reuse because the developer is able to use JAVA in the embedded system. The system dependant parts for implementing JAVA API are realized from a native function. In this paper, we devide JAVA API into the platform-independent JAVA part and platform-dependent native part for the implementation of JAVA API to manage the linux based embedded system devices, and focus on the control of the embedded system devices using JAVA API.

  • PDF

Implementation and Design of Proxy System for Web vulnerability Analysis (웹 취약점 분석을 위한 프락시 시스템의 설계 및 구현)

  • Kim, Gwang-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.9
    • /
    • pp.1011-1018
    • /
    • 2014
  • Because of the proliferation of web services through web site, web hacking attempts are increasing using vulnerabilities of the web application. In order to improve the security of web applications, we have to find vulnerabilities in web applications and then have to remove. This paper addresses a vulnerability in a web application on existing problems and analyze and propose solutions to the vulnerability. This paper have checked the stability of existing web security solutions and evaluated its suitability through analysis of vulnerability. Also, we have implemented the vulnerability analysis tools for web Proxy system and proposed methods to optimize for resolution of web vulnerabilities.