• 제목/요약/키워드: Security solution

검색결과 995건 처리시간 0.026초

A Study on u-paperless and secure credit card delivery system development

  • Song, Yeongsim;Jang, Jinwook;jeong, Jongsik;Ahn, Taejoon;Joh, Joowan
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권4호
    • /
    • pp.83-90
    • /
    • 2017
  • In the past, when the credit card was delivered to the customer, the postal agreement and receipt were signed by customer. The repossessed documents were sent back to the card company through the reorganization process. The card company checks the error by scanning and keeps it in the document storage room. This process is inefficient in cost and personnel due to delivery time, document print out, document sorting, image scanning, inspection work, and storage. Also, the risk of personal data spill is very high in the process of providing personal information. The proposed system is a service that receives a postal agreement and a receipt to a recipient when signing a credit card, signing the mobile image instead of paper, and automatically sending it to the card company server. We have designed a system that can protect the cost of paper documents, complicated work procedures, delivery times and personal information. In this study, we developed 'u-paperless' and secure credit card delivery system applying electronic document and security system.

IPsec의 보안상 문제점과 해결방안 (A security problem and its solution in Ipsec)

  • 김정현;원유집;임을규
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2006년도 하계종합학술대회
    • /
    • pp.37-38
    • /
    • 2006
  • In this paper, we describe a security problem of IPsec. And we propose a solution for this problem. The problem is a fragility of IPsec Gateway which is used in tunnel mode. The role of IPsec Gateway is encrypting or decrypting IPsec packets. Because of the role of IPsec Gateway, IPsec Gateway suffers overhead for decrypting numerous packets. Adversaries can easily attack IPsec Gateway using a DDoS attack. To solve this problem, we propose the "Priority based Random Packet Drop" method. In this method, the white list which is a list of normal users is created. After that, according to the frequency of uses, the method marks priorities of random drops to the white list. If anomalous traffic appeared, this method will drop many packets which consist of anomalous traffic. In simple experiment, we show our solution is proper to defend IPsec Gateway. For this experiment, we use empirical backbone traffic which includes DoS attacks.

  • PDF

Hepatitis C Stage Classification with hybridization of GA and Chi2 Feature Selection

  • Umar, Rukayya;Adeshina, Steve;Boukar, Moussa Mahamat
    • International Journal of Computer Science & Network Security
    • /
    • 제22권1호
    • /
    • pp.167-174
    • /
    • 2022
  • In metaheuristic algorithms such as Genetic Algorithm (GA), initial population has a significant impact as it affects the time such algorithm takes to obtain an optimal solution to the given problem. In addition, it may influence the quality of the solution obtained. In the machine learning field, feature selection is an important process to attaining a good performance model; Genetic algorithm has been utilized for this purpose by scientists. However, the characteristics of Genetic algorithm, namely random initial population generation from a vector of feature elements, may influence solution and execution time. In this paper, the use of a statistical algorithm has been introduced (Chi2) for feature relevant checks where p-values of conditional independence were considered. Features with low p-values were discarded and subject relevant subset of features to Genetic Algorithm. This is to gain a level of certainty of the fitness of features randomly selected. An ensembled-based learning model for Hepatitis has been developed for Hepatitis C stage classification. 1385 samples were used using Egyptian-dataset obtained from UCI repository. The comparative evaluation confirms decreased in execution time and an increase in model performance accuracy from 56% to 63%.

Comparative Analysis of IoT Enabled Multi Scanning Parking Model for Prediction of Available Parking Space with Existing Models

  • Anchal, Anchal;Mittal, Pooja
    • International Journal of Computer Science & Network Security
    • /
    • 제22권8호
    • /
    • pp.404-412
    • /
    • 2022
  • The development in the field of the internet of things (IoT) have improved the quality of the life and also strengthened different areas in the society. All cities across the world are seeking to become smarter. The creation of a smart parking system is the essential use case in smart cities. In recent couple of years, the number of vehicles has increased significantly. As a result, it is critical to make the use of technology that enables hassle-free parking in both public and private spaces. In conventional parking systems, drivers are not able to find free parking space. Conventional systems requires more human interference in a parking lots. To manage these circumstances there is an intense need of IoT enabled parking solution that includes the well defined architecture that will contain the following components such as smart sensors, communication agreement and software solution. For implementing such a smart parking system in this paper we proposed a design of smart parking system and also compare it with convetional system. The proposed design utilizes sensors based on IoT and Data Mining techniques to handle real time management of the parking system. IoT enabled smart parking solution minimizes the human interference and also saves energy, money and time.

Solving the Travelling Salesman Problem Using an Ant Colony System Algorithm

  • Zakir Hussain Ahmed;Majid Yousefikhoshbakht;Abdul Khader Jilani Saudagar;Shakir Khan
    • International Journal of Computer Science & Network Security
    • /
    • 제23권2호
    • /
    • pp.55-64
    • /
    • 2023
  • The travelling salesman problem (TSP) is an important combinatorial optimization problem that is used in several engineering science branches and has drawn interest to several researchers and scientists. In this problem, a salesman from an arbitrary node, called the warehouse, starts moving and returns to the warehouse after visiting n clients, given that each client is visited only once. The objective in this problem is to find the route with the least cost to the salesman. In this study, a meta-based ant colony system algorithm (ACSA) is suggested to find solution to the TSP that does not use local pheromone update. This algorithm uses the global pheromone update and new heuristic information. Further, pheromone evaporation coefficients are used in search space of the problem as diversification. This modification allows the algorithm to escape local optimization points as much as possible. In addition, 3-opt local search is used as an intensification mechanism for more quality. The effectiveness of the suggested algorithm is assessed on a several standard problem instances. The results show the power of the suggested algorithm which could find quality solutions with a small gap, between obtained solution and optimal solution, of 1%. Additionally, the results in contrast with other algorithms show the appropriate quality of competitiveness of our proposed ACSA.

IBM DIGITAL LIBRARY

  • Kook, Hong-Jung
    • 한국데이타베이스학회:학술대회논문집
    • /
    • 한국데이타베이스학회 1995년도 제4회 멀티미디어 산업기술 학술대회 논문집
    • /
    • pp.20-42
    • /
    • 1995
  • ■ IBM Digital Library is a major new IBM initiative ■ Customer solutions are available today ■ End-to-End solution focused on content asset management and creation, security, access and distribution.(omitted)

  • PDF

보안문서와 트랜잭션ID 연계기반 개인정보유통경로 탐지기법 연구 (Study on Detection Technique of Privacy Distribution Route based on Interconnection of Security Documents and Transaction ID)

  • 신재호;김인석
    • 정보보호학회논문지
    • /
    • 제25권6호
    • /
    • pp.1435-1447
    • /
    • 2015
  • 금융회사에서는 내부자에 의한 개인정보유출 방지 및 내부통제 강화를 위하여 E-DRM(Enterprise-Digital Right Management), 개인정보검색, DLP(Data Loss Prevention), 출력물보안, 인터넷 망 분리시스템, 개인정보모니터링 시스템 등의 보안 솔루션을 도입 운영하고 있다. 하지만 개인정보유출 사고는 계속해서 발생하고 있으며, 이 기종 보안 솔루션간의 독립적인 로그 체계로 인하여 개인정보문서의 회사 내부유통 및 외부반출 관련한 정합성 있는 유통경로의 연관 분석이 어렵다. 본 논문은 보안문서를 기반으로 하여 업무시스템 및 이 기종 보안 솔루션간의 로그를 유기적으로 정합성 있게 연관 분석할 수 있는 연결고리 체계 방안을 제시하고, 업무시스템을 통하여 개인PC에 생성되는 보안문서나 개인이 작성한 보안문서에 대한 Life-Cycle 관리방안 및 개인정보가 포함된 보안문서에 대한 유통경로 추적을 위한 효율적인 탐지 방안을 제안하고자 한다.

정보보호 교육에 대한 연구 동향 분석 (An Analysis of Research Trends in Information Security Education)

  • 김건우;김정덕
    • 정보보호학회논문지
    • /
    • 제26권2호
    • /
    • pp.489-499
    • /
    • 2016
  • 정보기술의 급속한 발달에는 다양한 혜택과 정보유출 등과 같은 위협이 공존하고 있으며, 이에 따라 정보보호의 중요성에 대한 인식이 증가하고 있다. 기술적인 솔루션도 중요하지만 점차 고도화되는 보안위협에 대응하기 위해서는 무엇보다도 보안역량을 강화할 필요가 있다. 정보보호 교육은 보안역량 강화를 위한 대표적인 방법 중의 하나로, 국가, 기업, 학계에서 다양한 노력들이 이루어지고 있다. 하지만 거시적인 측면에서의 발전방향을 도출하기 위해서는 현재까지 수행된 연구들을 분석하는 것이 필요하다. 본 논문은 국내외 정보보호 교육에 대한 연구 동향을 분석하여 개선사항을 도출하는 탐색적 연구로서, 해외 4개의 저널, 국내 2개의 저널에서 수집한 정보보호 교육, 훈련, 인식관련 177개의 논문을 대상으로 게재현황에 대한 기본 분석을 수행하였다. 또한 이 중에서 정보보호 교육 관련 70개 논문을 대상으로 상세 분석을 수행하였다. 연구 결과, 국내의 경우 교육과정 분석에 대한 연구가 대다수이며, 향후 교육 분야의 다변화와 실험연구 등을 통한 교육 효과성 측정관련 연구가 수행될 필요가 있다.

사이버 위협의 안보화 동향에 대한 이론적 배경과 비판적 논의 (Theoretical Background and Critical Discussion about Securitzation Trend of Cyber Threat)

  • 이광호;이승규;김호길
    • 융합보안논문지
    • /
    • 제19권5호
    • /
    • pp.99-105
    • /
    • 2019
  • 본 연구에서는 사이버 위협이 사회적으로 담론화 과정을 통해 안보화 되는 이론적 배경과 주요 동향을 제시하였다. 특히 사이버 위협의 안보화에 대한 비판적 논의을 코펜하겐학파의 안보화 이론을 바탕으로 설명하였다. 또한 사이버 위협의 안보화 과정을 설명한 비전통적 위협의 안보화와 신흥안보이슈의 안보화를 기존 연구를 바탕으로 제시하였으며 이에 대한 한계점을 설명하였다. 또한 현재 나타나고 있는 사이버 위협의 군사화 현상이 기술담론과 군사담론의 결합을 통해 나타나는 현상임과 이에 대한 경계적 시각을 제시하고자 하였다. 본 연구를 통해 사이버 위협의 안보화 과정에 대한 객관적 통찰력을 바탕으로 보편적 해법 제시의 한계와 함께 군사화의 경계적 시각을 우리군에 제시하고자 한다.

우리나라 경호업의 현황 및 발전방안 (THE SITUATION AND DEVELOPMENT OF SECURITY GUARD WORKS ON OUR COUNTRY)

  • 박주현
    • 시큐리티연구
    • /
    • 제1호
    • /
    • pp.123-134
    • /
    • 1997
  • Our conuntry have come out to the phenomenon to the atrocity crimes, make into a intellecture crims and specialization with them due to various change to the expension of economy growth, drift of population to cities and sense of value is plunged in confution, Now that things have come to this day, since foundation of the security guard law it first begin, ten years, civilian securities guard law was include to the civil service securities law due to amendment fo the civility secuties law newly on Dec. 30, 1995. According to the amendment, the part of the public peace of peoples livelihood were slough of the visual angle in knowledge which function of the civilies security were only be in under the government dimension were put in order to be tointly according to the such state of affairs, should found the consider a counterplan fundamentally regarding to the what to doing efforts foster the civilities securitylaw and qualitalive elevation of presidential guards. To make a long story short by few words, the question resolves itself into the following five points. The first, peoples arrengements for the attitude fo public duty service with devotedly Sustaining publicity work activities for the thire divert of the understanding of civilian security guard. The secondly, Existing security traders and security association should to support to the civilian security works. The third, The government office concerned should strengthen the licensing system in order to improve the quality of existings in order to may establishment newly systems of license and technical institute of regarding to them. The fourth, Should be newly organixed the exclusive organization of personal protective works in the police buroau for the sustaining development of civirity guard works and soundness of the upbringing. The fifth, It is necessary to found the reserch institute for the study on oretical, scholarly, study for the technical reserch and enlargement of effeciveness And try to find a solution to the Universitys function and duty, activity plan, support plan to the Department of security specialist for the come forward in succession it under the national assistance. The finally, I am sure that the Korean security association could be transiormed into the organization which reliable and receive a love from the peoples when doing best utmost to do pursuit of the structure to be a securitys legalism, specialization and total security systems.

  • PDF