• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.043 seconds

A Study of an NAT Protocol using Virtual IP Information in the TCP Segment (TCP 세그멘트내의 가상 IP 정보를 이용하는 NAT 프로토콜에 대한 연구)

  • Hwang, Jae-Yong;Ju, Gi-Ho
    • The Journal of Engineering Research
    • /
    • v.5 no.1
    • /
    • pp.45-55
    • /
    • 2004
  • NAT (Network Address Translation) is an IP address modification protocol that translates private IP address into authentic Internet address. The main features of NAT are to improve network security and to save IP address. Generally speaking, in order to perform its functionality, NAT uses the address information in the packet header. Certain application protocols, however, use the information in the packet data as well as the information in the packet header to perform end-to-end communication. Therefore, to support these types of application protocols, NAT should be able to perform appropriate translation of protocol information in the packet data. In this thesis, we design and implement a method which translates virtual IP information in the packet date into real IP information by using port proxy server.

  • PDF

A Comparative Study of Internet Banking Satisfaction Model in South Korea and Indonesia

  • Wati, Yulia;Koo, Chul-Mo
    • Asia pacific journal of information systems
    • /
    • v.19 no.4
    • /
    • pp.1-28
    • /
    • 2009
  • Banking industries have continuously innovated through technology-enhanced products and services. Many studies have recognized the importance of the Internet in banking industries, arguing that it has been widely adopted. Many studies published on the Internet banking in specific countries are mostly related with such issues as internet banking adoption and acceptance, security and risks of online banking system, and interface design. Several studies have been done to examine the differences and similarities between other banking channels and the Internet banking. However, to the best of our knowledge, only a limited number of studies has examined the differences and similarities between two specific countries in order to create a new customer satisfaction model. In this research, we studied the internet banking satisfaction model by comparing two countries: South Korea and Indonesia. We conducted an empirical study based on the data collected in both two countries. In this research, we found that countries which have adopted electric banking services, particularly between a country with high ICT adoption and a country with low ICT adoption, show different satisfaction trends. Based on the study results, herein we provide discussion, managerial, and practical implications.

The Design and Analysis of Secure DRM Systems using Steganography (스테가노그래피를 이용한 안전한 DRM 시스템 설계 및 분석)

  • Do Kyoung-Hwa;Jun Moon-Seog
    • Journal of Internet Computing and Services
    • /
    • v.4 no.5
    • /
    • pp.21-29
    • /
    • 2003
  • Transferring the contents for multimedia shows recently very activity, So this fact ailows the contents for multimedia to be commercialized. These contents, however, included much vulnerability that it is difficult to be commercialized because attackers easily reproduce that. Many developers want to use watermarking method as the technique to protect the contents for multimedia, but it is very vulnerable to use only one method, This paper proposes the Secure DRM system which protects the contents for multimedia steganography methods. The DRM system is more powerful than general DRM systems in that it has the special feature of watermarking and steganography techniques, We can prevent the attackers from reproducing and stealing the contents illegally, and authenticating users through DRM systems.

  • PDF

Towards Designing Efficient Lightweight Ciphers for Internet of Things

  • Tausif, Muhammad;Ferzund, Javed;Jabbar, Sohail;Shahzadi, Raheela
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.8
    • /
    • pp.4006-4024
    • /
    • 2017
  • Internet of Things (IoT) will transform our daily life by making different aspects of life smart like smart home, smart workplace, smart health and smart city etc. IoT is based on network of physical objects equipped with sensors and actuators that can gather and share data with other objects or humans. Secure communication is required for successful working of IoT. In this paper, a total of 13 lightweight cryptographic algorithms are evaluated based on their implementation results on 8-bit, 16-bit, and 32-bit microcontrollers and their appropriateness is examined for resource-constrained scenarios like IoT. These algorithms are analysed by dissecting them into their logical and structural elements. This paper tries to investigate the relationships between the structural elements of an algorithm and its performance. Association rule mining is used to find association patterns among the constituent elements of the selected ciphers and their performance. Interesting results are found on the type of element used to improve the cipher in terms of code size, RAM requirement and execution time. This paper will serve as a guideline for cryptographic designers to design improved ciphers for resource constrained environments like IoT.

Implementation of abnormal behavior detection Algorithm and Optimizing the performance of Algorithm (비정상행위 탐지 알고리즘 구현 및 성능 최적화 방안)

  • Shin, Dae-Cheol;Kim, Hong-Yoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.11
    • /
    • pp.4553-4562
    • /
    • 2010
  • With developing networks, information security is going to be important and therefore lots of intrusion detection system has been developed. Intrusion detection system has abilities to detect abnormal behavior and unknown intrusions also it can detect intrusions by using patterns studied from various penetration methods. Various algorithms are studying now such as the statistical method for detecting abnormal behavior, extracting abnormal behavior, and developing patterns that can be expected. Etc. This study using clustering of data mining and association rule analyzes detecting areas based on two models and helps design detection system which detecting abnormal behavior, unknown attack, misuse attack in a large network.

Design Thermal Image Processing System using Common Image Processor (상용 이미지 프로세서를 이용한 열화상 영상 처리 시스템 설계)

  • Cha, Jeong-Woo;Han, Joon-Hwan;Park, Chan;Kim, Yong-Jin
    • Annual Conference of KIPS
    • /
    • 2019.10a
    • /
    • pp.5-7
    • /
    • 2019
  • 열화상 시스템은 물체로부터 발산되는 적외선을 영상화하여 물체를 탐지하는 장점으로 인해 군사 분야는 물론 현재 민수 분야(자동차, Security 시스템)에 활용분야가 넓어지고 있다. 기존에는 대부분 FPGA 기반으로 열화상 열상 모듈을 개발하였지만 민수 분야에 다양한 요구사항 및 범용성에 유연한 대처가 힘든 실정이다. 따라서 다양한 요구사항과 범용성을 만족하기 위한 시스템의 필요성이 대두되었다. 본 논문에서는 상용 이미지 프로세서를 이용한 열화상 영상 처리 시스템을 제안한다. 제안된 시스템은 기존 FPGA 기반 시스템이 아닌 상용 이미지 프로세서를 사용함으로써 범용 영상 입·출력 인터페이스 및 각종 디바이스를 지원함에 따라 다양한 요구사항과 범용성을 만족한다. 따라서 시스템이 구축이 되면 뛰어난 접근성으로 인하여 시스템 추가/변경 시 기존의 시스템에 비해 개발 비용 및 기간을 단축할 수 있으며 그로 인하여 다양한 고객 요구사항 만족, 개발 비용 및 시간 단축, 제품 출시일 등 다양한 이점을 얻을 것으로 예상한다.

Design of robust Medical Image Security Algorithm using Watershed Division Method (워터쉐드 분할 기법을 이용한 견고한 의료 영상보안 알고리즘 설계)

  • Oh, Guan-Tack;Jung, Min-Six;Lee, Yun-Bae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.11
    • /
    • pp.1980-1986
    • /
    • 2008
  • A digital watermarking technique used as a protection and certifying mechanism of copyrighted creations including music, still images, and videos in terms of lading any loss in data, reproduction and pursuit. This study suggests using a selected geometric invariant point through the whole processing procedure based on the invariant point so that it will be robust in a geometric transformation attack. The introduced algorithm here is based on a watershed splitting method in order to make medical images strong against RST transformation and other processing. This algorithm also proved that is has robustness against not only RST attack, but also JPEG compression attack and filtering attack.

Analysis of Importance of Intellectual Properties on Semiconductor Design and Its Reuse (반도체설계의 지식재산권과 그 재사용의 중요성에 대한 분석)

  • Moon, Sangook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.924-927
    • /
    • 2009
  • IP reuse technology, for the sake of out-performance and the reduction of development period of IT-SoC is the most essential factor for the sound growth of SoC industry. As for this IP reuse technology, it is very important to decide the proper specification and the standardization of the requirement from the companies, as well as to develop our own domestic technological know-how which does not depend on import. In this study, we propose to analyze a security core IP with pure domestic technological know-how, mentioning an example from $CAST_{TM}$, which presently is an American company costing royalty.

  • PDF

RUP Model Based SBA Effectiveness Analysis by Considering the V Process and Defense Simulation Hierarchy (V 프로세스와 국방시뮬레이션 모델유형을 고려한 RUP 모델 기반의 SBA 효과도 분석)

  • Cha, HyunJu;Kim, Hyung Jong;Lee, Hae Young
    • Journal of the Korea Society for Simulation
    • /
    • v.24 no.3
    • /
    • pp.55-60
    • /
    • 2015
  • This paper presents an SBA (simulation-based acquisition) effectiveness analysis environment using the RUP (Relational Unified Process) model. The RUP model has 4 phases which cover the whole development steps such as requirement analysis, design, development and test. By applying the RUP model, SW development can be represented with the iterations of developments for each phase. Such a characteristics of the model would make the model suitable for defense acquisition. In this paper, we show the relation between the RUP model and V process model, which is the foundation for defense acquisition. In order to show how the model could be applied to SBA effectiveness analysis, graphical user interfaces for the analysis are presented at the end of the paper.

Residential Environment Satisfaction of One-person Households : Focused on Young (19-39) Women in Korea

  • KIM, Sun-Ju
    • The Journal of Economics, Marketing and Management
    • /
    • v.9 no.6
    • /
    • pp.15-24
    • /
    • 2021
  • Purpose: The purpose of this study is to analyze the residential environment satisfaction of young women's one-person households and the characteristics of young one-person households, and to present policy implications for their housing problems. Research design, data, and methodology: This study used 11th Korea Financial Panel Data. Analysis methods in this study include basic statistical analysis, frequency analysis, multiple regression analysis, and artificial neural network analysis. Results: As a result of the analysis of this study, 1) young one-person households showed that women had higher ratios of non-regular workers, real estate debt than men, and lower average income. The percentage of young people owning their own homes was very low at about 5%. 2) For young women, the higher the education level and monthly consumption, the lower the housing satisfaction. 3) Young women living in rental housing had lower housing satisfaction than their own. Conclusions: Women are paying more for housing security than men in young one-person households. In addition, the proportion of their own houses is very low. Therefore, there is a need for a policy on the housing safety issue of young women's one-person households. And policies to support young one-person households to own their own homes are required.