• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.028 seconds

Design of False Alerts Reducing Model Using Fuzzy Technique for Intrusion Detection System (퍼지기법을 이용한 침입 탐지 시스템 오류경고메시지 축소 모델 설계)

  • Sung, Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.794-798
    • /
    • 2007
  • As the development of information technology and thus the growth of security incidents, so implement are coming out for defense the intrusion about the system. However the error detection program has got a difficulty to find out the intrusions because that has become so many false alert messages. In this study is how to reduce the messages for the false alerts which come from the internal of the network and using the Fuzzy techniques for reduce the uncertainty of the judge. Therefore it makes the model which can decrease false alert message for better detection.

  • PDF

A Design for Single Web Authentication at Network Service Foundation (네트워크 서비스 기반의 단일 웹 인증 설계)

  • Lee, Jae-Wan;Ban, Kyung-Sig;Kim, Hyoung-Jin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.457-460
    • /
    • 2007
  • Recently, Network companies have introduced security solutions to protect the network from intrusions, attacks and viruses but the network has still weakness and vulnerability. It is time to bring more stable and reliable authentication system that would meet the Internet user's need. In this study, Current broadband networks don't have hierarchic and stable authentication solutions. And so, an integrated and hierarchic system is needed to provide a various kinds of application services.

  • PDF

On the Factors that Affect Customers' Satisfaction in Social Commerce (소셜 커머스 고객 만족에 영향을 미치는 요인에 관한 연구)

  • Choi, Sungho;Lee, Sang-Yong Tom
    • Knowledge Management Research
    • /
    • v.15 no.2
    • /
    • pp.165-182
    • /
    • 2014
  • Social commerce is regarded as a kind of e-commerce that utilizes social media. Considering increasing complaints around social commerce market, it is important to see customers' satisfaction level and intentions to repurchase. In this study, we examine antecedents that affect customers' satisfaction and relationship between satisfaction and intention to repurchase in social commerce market. We also use social media characteristics as moderators between antecedents and customers' satisfaction. The main results are as follows. First, except site design, most of the intrinsic factors of service quality, such as information, transaction, communication and perceived security had positive effects on customers' satisfaction. Second, all the extrinsic factors of service quality, such as discount rate, constraints, and discrimination had significant impacts on customers' satisfaction. Third, the social media characteristics could not moderate the relationship between service qualities and customers' satisfaction. Fourth, customers' satisfaction had positive effect on the intention to spread through social media. Fifth, customers' satisfaction had positive effect on the intention to repurchase. Social commerce companies need to set up strategies considering the antecedents of customers' satisfaction using these research results. They also need to secure customers that have sustainable purchasing intentions.

  • PDF

Design of patch antenna combined with slots for smart GPS module (Smart GPS 모듈용 슬롯과 결합된 패치안테나 설계)

  • Jang, Min-Gyu;Lee, Young-Soon;Cho, Dong-Kyun
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.2
    • /
    • pp.177-182
    • /
    • 2013
  • In this paper, printed antenna which can be applied to a built-in wireless module of the security controller operating at global positioning system(GPS) L1 frequency band(1.575GHz) is proposed. The proposed antenna is basically composed of a microstrip patch antenna with inserting feed. In particular left and right slots which are respectively asymmetric are used for impedance matching, whereas slot with one open-end and shorting point are used on the bottom plane to set operating frequency and enhance bandwidth. It is observed at the desired GPS L1 frequency band that the radiation efficiency and gain of the proposed antenna are 90% and more than 4.8dBi respectively.

Implementing a Light-Weight Authentication Protocol for Resource-Constraint Mobile Device in Ubiquitous Environment (유비쿼터스 환경에서 제한적인 능력을 갖는 이동장치를 위한 경량의 인증 프로토콜 구현)

  • Lim, Kyu-Sang;You, Il-Sun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.823-826
    • /
    • 2007
  • In ubiquitous environment, mobile devices, which users carry, tend to be resource-constraint, thus resulting in the need for an authentication protocol, which provides light-weight computations as well as strong security. Recently S/Key based protocols, which satisfy such a requirement by achieving light-weight computations, strong authentication and session key exchange, have been proposed. In particular, You and Jung's protocol is more efficient and secure than others. In this paper, we compare and analyze You-Jung with other protocols. Also, we design an authentication scenario and status of mobile devices while implementing the protocol.

  • PDF

The Design of Active Storage Virtualization System for Information Protection (정보보호를 위한 능동적 스토리지 가상화 시스템 설계)

  • Cho, Kyoung-Ok;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.9
    • /
    • pp.2040-2048
    • /
    • 2010
  • In contemporary society, though convenience and efficiency of work using information system is growing high, adverse effect problems of malignant code, system hacking, information leak by insiders due to the development of the network are raising their head daily. Because of this, enormous work forces and expenses for the recovery and management of system is needed. The existing system can be divided into two aspects: security solution which surveils and treats virus and malignant codes, and network management solution which observes the system of computer, and practices maintenance and repair such as management, recovery, backup. This treatise applied Active Write Filter mechanism and the technology based on NFS and complemented the maintenance problems of user data of the existing system and designed the system which enables solving problems of intellectual property right such as information protection and illegal work.

Design of Image Security Algorithms Using Hybrid Encryption (하이브리드 암호화 방식을 활용한 이미지 보안 알고리즘 설계)

  • Kim, Ji-Seong;Jang, Si-Woong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.213-216
    • /
    • 2018
  • 인터넷이 발전하게 되면서 여러 가지 정보들을 메일, 메시지 등을 이용하여 주고받기 시작하였다. 여러 가지 정보들에는 이미지도 포함되는데, 중요한 신상정보나 설계도, 계약서 등의 정보들도 이미지 파일로 주고받는 경우가 생기게 되면서 이 이미지가 실수 또는 해킹 등의 이유로 유출되게 되었을 시 생기는 문제들이 점점 커져가고 있는 상황이다. 이미지를 주고받을 때도 유출을 방지하기 위한 여러가지 보안방법들이 중요해지고 있다. 본 논문에서는 이미지를 암호화할 수 있게 해주고 암호화를 할 때 사용한 키를 한번 더 암호화 하는 알고리즘을 설계하였다. 기존의 암호화 방식에서 AES 암호화만 이용할 대칭키가 유출될 경우 본래의 데이터도 유출되게 된다. 본 논문에서는 이러한 문제를 방지하기 위해 암호화에 사용된 대칭키를 한번 더 암호화하는 방법을 제안한다. 선택한 원본 이미지 파일의 데이터를 텍스트 데이터로 변환한 후 AES-256암호화를 이용하여 대칭키 암호를 사용자가 설정할 수 있게 하고 그 대칭키 암호를 이용하여 암호화한다. 이때 32바이트 길이의 대칭키를 사용하는데, 대칭키의 유출을 방지하기 위해 RSA 암호화를 이용, 비대칭키를 생성한 후 대칭키를 한번 더 암호화 한다. 암호화된 대칭키는 비대칭키를 이용 복호화할 수 있고, 암호화된 데이터는 대칭키 암호를 이용해서 원래의 데이터로 복호화가 가능하다. 이러한 방법을 사용하여 보안강도를 더 높일 수 있다.

  • PDF

Design and Verification of Applied Information Processing Protocol in the Message Security System (정보처리를 응용한 메시지 보안 시스템의 설계 및 검증)

  • Shin, Seung-Jung;Kim, Suk-Woo;Ryu, Dae-Hyun;Kwon, Chang-Heui;Kim, Young-Soo
    • Annual Conference of KIPS
    • /
    • 2003.05b
    • /
    • pp.879-882
    • /
    • 2003
  • 인터넷환경에서 전자상거래는 여러 가지 상황관계를 상호간에 메시지를 통해서 이루어진다. 그러므로 이에 대한 가장 중요한 요소는 메시지 인증이며, 이는 거래당사자들이 수신된 메시지의 신뢰성을 확인하는 과정이다. 메시지의 진정성은 위조불가, 부인분가, 변경불가, 출처인증으로 구성되어 있고, 공개키 암호화를 통해 수행 할 수 있다. X.400 메시지처리 시스템과 공개키 암호화에 기반을 두고 있는 PGP가 메시지 교환에 널리 사용되고 있다. 본 연구에서는 공개키 암호화와 X.400 프로토콜 그리고 PGP상에 존재하는 메시지 인증 문제를 해결하기 위하여 NMAP로 명명된 공개정보 기반 암호화 시스템을 제안하고 이를 설계 구현하였다. 구현된 메시지 인증 프로토콜의 검증을 위해 퍼지적분을 사용하였다. 제안된 시스템은 전자상거래의 활성화와 비대화형 인증 서비스 제공에 사용될 수 있을 것이다.

  • PDF

The Study on the Elementary Schoolchild's the Fear of Crime in Pedestrian Environment around Elementary School in Detached Housing Area - Focused on the Pedestrian path around 5 Elementary School in Ilsan New Town - (초등학교 주변 보행환경에 대한 초등학생의 범죄 불안감 조사 연구 - 일산 다세대 주택지에 위치하는 5개 초등학교 주변 보행환경을 중심으로 -)

  • Lee, You-Mi
    • KIEAE Journal
    • /
    • v.15 no.2
    • /
    • pp.69-78
    • /
    • 2015
  • Purpose: The aim of this study was to analyze the elementary schoolchildren's the fear of crime in pedestrian environment of elementary school for providing the basic design resource. Method:In order to deal with that, the questionnaire survey on the elementary schoolchildren's the fear of crime were conducted in 5 elementary schools in Ilsan new town. The results of the 293 questionnaires survey were analyzed through SPSS program. Result: The main results were as follows. The level of fear of crime in pedestrian environment differed in these 5 elementary schools because of the width of pedestrian path, the concealed place around pedestrian path, the nearness of park, the height/shape/interval of trees, the number of car and the closure-watching in the school caused by fence and trees and so on. The level of fear of crime in pedestrian environment differed between that of boy groups and that of girls groups because of the number of emergency bell/telephon, the shape of pedestrian path, the number of security office, the number of car and the concealed place around pedestrian path and so on.

Development of Multi-function Sensor Integration Module System for Smart Green Building (스마트 그린빌딩 구현을 위한 다기능 센서 통합 모듈 시스템 개발)

  • Kim, Bong-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.10
    • /
    • pp.4799-4804
    • /
    • 2013
  • Green IT technology for the growth of low-carbon green environment and future development of the new technology. Therefore, in this paper, data generated by the security module for RFID applications, smart green building Sung multi-function sensor integrated module that can be integrated environment for building monitoring and management system has been developed. The development of a thermal sensor, temperature sensor, smog sensor, CO2 sensor, O2 sensor, tension sensor and damage detection sensor module with integrated system module integrated multi-functional sensors implemented in the paper. In real-time monitoring by allowing was design and developed system that can be implemented smart green building environment for the environment inside buildings.