• Title/Summary/Keyword: Security design

Search Result 3,415, Processing Time 0.032 seconds

A Design of Estimate-information Filtering System using Artificial Intelligent Technology (인공지능 기술을 활용한 부동산 허위매물 필터링 시스템)

  • Moon, Jeong-Kyung
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.115-120
    • /
    • 2021
  • An O2O-based real estate brokerage web sites or apps are increasing explosively. As a result, the environment has been changed from the existing offline-based real estate brokerage environment to the online-based environment, and consumers are getting very good feelings in terms of time, cost, and convenience. However, behind the convenience of online-based real estate brokerage services, users often suffer time and money damage due to false information or malicious false information. Therefore, in this study, in order to reduce the damage to consumers that may occur in the O2O-based real estate brokerage service, we designed a false property information filtering system that can determine the authenticity of registered property information using artificial intelligence technology. Through the proposed research method, it was shown that not only the authenticity of the property information registered in the online real estate service can be determined, but also the temporal and financial damage of consumers can be reduced.

LDCSIR: Lightweight Deep CNN-based Approach for Single Image Super-Resolution

  • Muhammad, Wazir;Shaikh, Murtaza Hussain;Shah, Jalal;Shah, Syed Ali Raza;Bhutto, Zuhaibuddin;Lehri, Liaquat Ali;Hussain, Ayaz;Masrour, Salman;Ali, Shamshad;Thaheem, Imdadullah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.463-468
    • /
    • 2021
  • Single image super-resolution (SISR) is an image processing technique, and its main target is to reconstruct the high-quality or high-resolution (HR) image from the low-quality or low-resolution (LR) image. Currently, deep learning-based convolutional neural network (CNN) image super-resolution approaches achieved remarkable improvement over the previous approaches. Furthermore, earlier approaches used hand designed filter to upscale the LR image into HR image. The design architecture of such approaches is easy, but it introduces the extra unwanted pixels in the reconstructed image. To resolve these issues, we propose novel deep learning-based approach known as Lightweight deep CNN-based approach for Single Image Super-Resolution (LDCSIR). In this paper, we propose a new architecture which is inspired by ResNet with Inception blocks, which significantly drop the computational cost of the model and increase the processing time for reconstructing the HR image. Compared with the other state of the art methods, LDCSIR achieves better performance in terms of quantitively (PSNR/SSIM) and qualitatively.

Android Application Call Relationship Analysis Based on DEX and ELF Binary Reverse Engineering (DEX와 ELF 바이너리 역공학 기반 안드로이드 어플리케이션 호출 관계 분석에 대한 연구)

  • Ahn, Jinung;Park, Jungsoo;Nguyen-Vu, Long;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.45-55
    • /
    • 2019
  • DEX file and share objects (also known as the SO file) are important components that define the behaviors of an Android application. DEX file is implemented in Java code, whereas SO file under ELF file format is implemented in native code(C/C++). The two layers - Java and native can communicate with each other at runtime. Malicious applications have become more and more prevalent in mobile world, they are equipped with different evasion techniques to avoid being detected by anti-malware product. To avoid static analysis, some applications may perform malicious behavior in native code that is difficult to analyze. Existing researches fail to extract the call relationship which includes both Java code and native code, or can not analyze multi-DEX application. In this study, we design and implement a system that effectively extracts the call relationship between Java code and native code by analyzing DEX file and SO file of Android application.

Design and Implementation of API Extraction Method for Android Malicious Code Analysis Using Xposed (Xposed를 이용한 안드로이드 악성코드 분석을 위한 API 추출 기법 설계 및 구현에 관한 연구)

  • Kang, Seongeun;Yoon, Hongsun;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.105-115
    • /
    • 2019
  • Recently, intelligent Android malicious codes have become difficult to detect malicious behavior by static analysis alone. Malicious code with SO file, dynamic loading, and string obfuscation are difficult to extract information about original code even with various tools for static analysis. There are many dynamic analysis methods to solve this problem, but dynamic analysis requires rooting or emulator environment. However, in the case of dynamic analysis, malicious code performs the rooting and the emulator detection to bypass the analysis environment. To solve this problem, this paper investigates a variety of root detection schemes and builds an environment for bypassing the rooting detection in real devices. In addition, SDK code hooking module for Android malicious code analysis is designed using Xposed, and intent tracking for code flow, dynamic loading file information, and various API information extraction are implemented. This work will contribute to the analysis of obfuscated information and behavior of Android Malware.

An Enhancement Scheme of Dynamic Analysis for Evasive Android Malware (분석 회피 기능을 갖는 안드로이드 악성코드 동적 분석 기능 향상 기법)

  • Ahn, Jinung;Yoon, Hongsun;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.519-529
    • /
    • 2019
  • Nowadays, intelligent Android malware applies anti-analysis techniques to hide malicious behaviors and make it difficult for anti-virus vendors to detect its presence. Malware can use background components to hide harmful operations, use activity-alias to get around with automation script, or wipe the logcat to avoid forensics. During our study, several static analysis tools can not extract these hidden components like main activity, and dynamic analysis tools also have problem with code coverage due to partial execution of android malware. In this paper, we design and implement a system to analyze intelligent malware that uses anti-analysis techniques to improve detection rate of evasive malware. It extracts the hidden components of malware, runs background components like service, and generates all the intent events defined in the app. We also implemented a real-time logging system that uses modified logcat to block deleting logs from malware. As a result, we improve detection rate from 70.9% to 89.6% comparing other container based dynamic analysis platform with proposed system.

Design of Mobile-based Security Agent for Contents Networking in Mixed Reality (융합현실에서 콘텐츠 네트워킹을 위한 모바일 기반 보안 중계 설계)

  • Kim, Donghyun;Lim, Jaehyun;Kim, Seoksoo
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.3
    • /
    • pp.22-29
    • /
    • 2019
  • Due to the development of ICT technology, convergence reality contents are utilized as technology for providing services in various industrial fields by visualizing various information such as sensor information and shared information in a service platform showing only simple three-dimensional contents. Research is underway to reduce the weight of applications by transmitting the resources of the object to be enhanced to the network as the information and the contents to be provided increase. In order to provide resources through the network, servers for processing various information such as pattern information, content information, and sensor information must be constructed in a cloud environment. However, in order to authenticate data transmitted and received in real-time in a cloud environment, there is a problem in that the processing is delayed and a delay phenomenon occurs in the rendering process and QoS is lowered. In this paper, we propose a system to distribute cloud server which provides augmented contents of convergent reality service that provides various contents such as sensor information and three - dimensional model, and shorten the processing time of reliable data through distributed relay between servers Respectively.

Design and Analysis of Technical Management System of Personal Information Security using Web Crawer (웹 크롤러를 이용한 개인정보보호의 기술적 관리 체계 설계와 해석)

  • Park, In-pyo;Jeon, Sang-june;Kim, Jeong-ho
    • Journal of Platform Technology
    • /
    • v.6 no.4
    • /
    • pp.69-77
    • /
    • 2018
  • In the case of personal information files containing personal information, there is insufficient awareness of personal information protection in end-point areas such as personal computers, smart terminals, and personal storage devices. In this study, we use Diffie-Hellman method to securely retrieve personal information files generated by web crawler. We designed SEED and ARIA using hybrid slicing to protect against attack on personal information file. The encryption performance of the personal information file collected by the Web crawling method is compared with the encryption decryption rate according to the key generation and the encryption decryption sharing according to the user key level. The simulation was performed on the personal information file delivered to the external agency transmission process. As a result, we compared the performance of existing methods and found that the detection rate is improved by 4.64 times and the information protection rate is improved by 18.3%.

A Design of a Data Service providing Additional Information of ID Advertising (ID 광고의 부가정보를 제공하는 데이터서비스 설계)

  • KO, Kwangil
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.61-68
    • /
    • 2018
  • As the digital broadcasting era settled in, the TV, which was only used to watch broadcast programs, developed as a medium for operating various data services. This means that an environment, in which the viewers' TV usage behavior can be changed from a passive attitude to an attitude of actively consuming the media, has been established. Since the advertising market is an industry that is heavily influenced by changes in the media, these changes causes changes in the form of advertising and the advertising consumption behavior of viewers. In this environment, the broadcasting industry needs to think about the new growth strategy that links the possibility of data service with the advertisement market. In this study, we designed a data service that provides supplementary information of an ID advertisement, which has the weakness of short exposure time and shortage of information expression space. Specifically, we have designed the usage scenario and user interface of the data service and developed a method, based on the international digital broadcasting standard DV B, that provides the supplementary information defined by the type of ID advertisement to the data service.

  • PDF

Improvement of Satellite Ocean Information Service for Offshore Marine Industry (연근해 해양산업을 위한 위성해양 정보 서비스 개선방안)

  • Cho, Bo-Hyun;Lee, Gun-Wook;Kim, Dong-Chun;Yang, Keum-Cheol;Kim, SG;Yo, Seung-jae
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.85-91
    • /
    • 2018
  • In this study, we design a marine environmental information service system with satellite images based on satellite images to reduce the damage caused by changes in the marine environment. The system provides satellite oceanographic information such as water temperature, chlorophyll, float, etc. as hierarchical texts, which is implemented as a unit module Web service so that it can be expanded in OpenAPI environment. And stability of system plug-in portability, service hours, data extraction precision and speed are used as a basis for diagnosing service stability. By securing the function and performance of the service system implemented in this study, it can be expanded to a complex technology that can customize the users by group by adding not only general services of existing systems operated by location but also information about a specific interested areas. Especially, various other items of interest including marine environment information are developed in modules, so we expect to be able to expand and service the system by plugging into the system and to spread it in technical linkage with the related institution information system.

  • PDF

An Improved Model Design for Traceback Analysis Time Based on Euclidean Distance to IP Spoofing Attack (IP 스푸핑 공격 발생 시 유클리드 거리 기반의 트레이스 백 분석시간 개선 모델)

  • Liu, Yang;Baek, Hyun Chul;Park, Jae Heung;Kim, Sang Bok
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.11-18
    • /
    • 2017
  • Now the ways in which information is exchanged by computers are changing, a variety of this information exchange method also requires corresponding change of responding to an illegal attack. Among these illegal attacks, the IP spoofing attack refers to the attack whose process are accompanied by DDoS attack and resource exhaustion attack. The way to detect an IP spoofing attack is by using traceback information. The basic traceback information analysis method is implemented by comparing and analyzing the normal router information from client with routing information existing in routing path on the server. There fore, Such an attack detection method use all routing IP information on the path in a sequential comparison. It's difficulty to responding with rapidly changing attacks in time. In this paper, all IP addresses on the path to compute in a coordinate manner. Based on this, it was possible to analyze the traceback information to improve the number of traceback required for attack detection.