• Title/Summary/Keyword: Text Security

검색결과 349건 처리시간 0.113초

Detection of SIP Flooding Attacks based on the Upper Bound of the Possible Number of SIP Messages

  • Ryu, Jea-Tek;Roh, Byeong-Hee;Ryu, Ki-Yeol
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제3권5호
    • /
    • pp.507-526
    • /
    • 2009
  • Since SIP uses a text-based message format and is open to the public Internet, it provides a number of potential opportunities for Denial of Service (DoS) attacks in a similar manner to most Internet applications. In this paper, we propose an effective detection method for SIP flooding attacks in order to deal with the problems of conventional schemes. We derive the upper bound of the possible number of SIP messages, considering not only the network congestion status but also the different properties of individual SIP messages such as INVITE, BYE and CANCEL. The proposed method can be easily extended to detect flooding attacks by other SIP messages.

연계계통에서 발전기 정지에 따른 주파수의 동적 변화 (Dynamic change of frequency after a generator outage in an Interconnection considering the primary control)

  • 블라디미르;문영환;윤재영
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2001년도 춘계학술대회 논문집 전력기술부문
    • /
    • pp.95-99
    • /
    • 2001
  • Frequency is the unique physical value for all the interconnected systems. Therefore. the load frequency control is in the responsibility of all members in the interconnection power unbalance in one of the interconnected system can cause the problems in others. In the following text a brief description and the role of frequency in an interconnected system will be presented. Following is the short description of the Balkan Interconnection (UCTE Second Synchronous Zone) with schematic diagram. A Power-Frequency (P-f) dynamic model of a control area wil1 be shown. Model gives the analytical solution for frequency change versus a time after outage of a generator in the power system. This model will be applied to the Balkan Interconnection and compared with numerical approach. Advantages and drawbacks of the analytical method will be discussed Purpose of using this model is to investigate if the pumps in reversible hydropower plant will be underfrequency shed after the outage of the biggest generator unit in the interconnection, according %o (n-1) security postulate.

  • PDF

Next-Generation Personal Authentication Scheme Based on EEG Signal and Deep Learning

  • Yang, Gi-Chul
    • Journal of Information Processing Systems
    • /
    • 제16권5호
    • /
    • pp.1034-1047
    • /
    • 2020
  • The personal authentication technique is an essential tool in this complex and modern digital information society. Traditionally, the most general mechanism of personal authentication was using alphanumeric passwords. However, passwords that are hard to guess or to break, are often hard to remember. There are demands for a technology capable of replacing the text-based password system. Graphical passwords can be an alternative, but it is vulnerable to shoulder-surfing attacks. This paper looks through a number of recently developed graphical password systems and introduces a personal authentication system using a machine learning technique with electroencephalography (EEG) signals as a new type of personal authentication system which is easier for a person to use and more difficult for others to steal than other preexisting authentication systems.

증강현실을 활용한 상황인지기반의 편재형 자동차 정비 서비스 (Ubiquitous Car Maintenance Services Using Augmented Reality and Context Awareness)

  • 이규원;서동우;이재열
    • 한국CDE학회논문집
    • /
    • 제12권3호
    • /
    • pp.171-181
    • /
    • 2007
  • Ubiquitous computing is a vision of our future computing lifestyle in which computer systems seamlessly integrate into our everyday lives, providing services and information in anywhere and anytime fashion. Augmented reality (AR) can naturally complement ubiquitous computing by providing an intuitive and collaborative visualization and simulation interface to a three-dimensional information space embedded within physical reality. This paper presents a service framework and its applications for providing context-aware u-car maintenance services using augmented reality, which can support a rich set of ubiquitous services and collaboration. It realizes bi-augmentation between physical and virtual spaces using augmented reality. It also offers a context processing module to acquire, interpret and disseminate context information. In particular, the context processing module considers user's preferences and security profile for providing private and customer-oriented services. The prototype system has been implemented to support 3D animation, TTS (Text-to-Speech), augmented manual, annotation, and pre- and post-augmentation services in ubiquitous car service environments.

HTML5 차세대 웹표준 환경에서의 보안 이슈

  • 강석철;박정섭
    • 정보보호학회지
    • /
    • 제24권4호
    • /
    • pp.44-55
    • /
    • 2014
  • HTML5는 차세대 웹문서 표준으로서, 텍스트와 하이퍼링크만을 표시하던 HTML(Hyper Text Markup Language)이 멀티미디어 등 다양한 어플리케이션까지 표현 제공하도록 진화한 "웹 프로그래밍 언어"이다. ActiveX 등 비표준 기술의 남용 및 이의 방치로 인해서 초래된 웹의 갈라파고스화와 접근성 취약문제를 해결하고, 글로벌 OS 플랫폼 업체에 종속될 우려가 있는 ICT 중소 벤처기업에게 돌파구를 제시하기 위해 HTML5가 등장하였다. HTML5는 2014년 8월 경 최종 표준이 확정될 것으로 전망되나, 현재 웹브라우저 기업을 비롯한 글로벌 업체들은 오디오 비디오 그래픽 등 표준화가 많이 진행된 기능을 중심으로(특히 모바일 영역에서) HTML5를 적극 도입하여 사용 중이다. 하지만 HTML5에서는 지금까지 존재하지 않았던 다양한 웹보안 취약점들이 나타날 수 있다. 대부분의 웹사이트들은 신규 웹보안 위협에 대부분 취약할 것으로 예상되며, 이에 대한 정부차원의 대응이 필요할 것으로 보인다. 본고에서는 HTML5에서 발생 가능한 보안 위협을 설명하고 이에 대한 대응방법을 제안하고자 한다.

A Stream Ciphering Method using a Chaotic System

  • Choi, Hyun-Jun;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of information and communication convergence engineering
    • /
    • 제8권4호
    • /
    • pp.433-436
    • /
    • 2010
  • In this paper, we presented a ciphering method whose target data is any kind of digital bit-stream. It uses a chaotic system as the main encrypting tool, MISR (Multi-Input Signature Register), and shift-and-rotation function, all of which are exclusive-ORed with the plaintext. Also, it incorporates a cipher text feedback mode such that part of the previously ciphered data is fed back to encrypt the current data. The encryption block size and the amount of feedback data are different at each ciphering operation. Experimental results with the image/video date showed that this method has enough speed and encryption effect with negligible latency time. Thus, we are expecting it to have various application areas that need high speed stream ciphering with high security level.

대화식 휴대용 영어학습기 개발 (Development of Portable Conversation-Type English Leaner)

  • 유재택;윤태섭
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2004년도 심포지엄 논문집 정보 및 제어부문
    • /
    • pp.147-149
    • /
    • 2004
  • Although most of the people have studied English for a long time, their English conversation capability is low. When we provide them portable conversational-type English learners by the application of computer and information process technology, such portable learners can be used to enhance their English conversation capability by their conventional conversation exercises. The core technology to develop such learner is the development of a voice recognition and synthesis module under an embedded environment. This paper deals with voice recognition and synthesis, prototype of the learner module using a DSP(Digital Signal Processing) chip for voice processing, voice playback function, flash memory file system, PC download function using USB ports, English conversation text function by the use of SMC(Smart Media Card) flash memory, LCD display function, MP3 music listening function, etc. Application areas of the prototype equipped with such various functions are vast, i.e. portable language learners, amusement devices, kids toy, control by voice, security by the use of voice, etc.

  • PDF

텍스트 마이닝을 통한 핀테크 연관 핵심 기술 특허 추출 방법 (Essential Technical Patent Extraction Method Associated with Fintech Based on Text Mining)

  • 이황로;최은미
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2015년도 추계학술발표대회
    • /
    • pp.1219-1222
    • /
    • 2015
  • 금융과 IT가 융합되는 핀테크(Fintech)가 IT산업과 금융산업에 새로운 패러다임으로 급부상하고 있다. 핀테크 기술에 대한 기술동향을 파악하고 유사한 연관 기술을 도출하는 것은 관련 사업자가 시장 경쟁에서 우위를 차지하기 위해 필요한 전략적 방향을 제시해 준다. 하지만 핀테크와 같이 단 기간 내에 기술에 대한 파급 속도가 빠르게 일어나며 산업전반에서 기술선점의 필요성이 크게 대두되는 경우 특허 데이터베이스만으로 유사기술을 검색을 위한 키워드를 선정하는 것이 어렵다는 단점이 있다. 본 논문에서는 새롭게 이슈화되는 기술 중 그 성장세가 급격하게 변화하여 등록된 특허만으로는 연관 기술 영역을 파악하는 일이 번거로운 상황에서 기사 분석을 통해 연관 기술 키워드를 추출 할 수 있는 방법을 제안하고자 한다. 특히 핀테크에서 중요하게 인식되는 결제, 보안, 사용자환경에 대한 연관 기술 키워드를 기사 내용에 포함되는 단어의 빈도 분석을 통해 추출하고자 하였다. 최종적으로 추출된 기술 키워드를 이용하여 실제 특허 검색 데이터베이스에서 관련 특허를 수집하고 분석하여 핀테크와 관련성이 매우 높은 연관 핵심 기술 특허를 도출하였다.

Design and Implementation of Road Construction Risk Management System based on LPWA and Bluetooth Beacon

  • Lee, Seung-Soo;Kim, Yun-cheol;Jee, Sung-Hyun
    • 한국컴퓨터정보학회논문지
    • /
    • 제23권12호
    • /
    • pp.145-151
    • /
    • 2018
  • While commercialization of IoT technologies in the safety management sector is being promoted in terms of industrial safety of large indoor businesses, implementing a system for risk management of small outdoor work sites with frequent site movements is not actively implemented. In this paper, we propose an efficient dynamic workload balancing strategy which combined low-power, wide-bandwidth (LPWA) communication and low-power Bluetooth (BLE) communication technologies to support customized risk management alarm systems for each individual (driver/operator/manager). This study was designed to enable long-term low-power collection and transmission of traffic information in outdoor environment, as well as to implement an integrated real-time safety management system that notifies a whole field worker who does not carry a separate smart device in advance. Performance assessments of the system, including risk alerts to drivers and workers via Bluetooth communication, the speed at which critical text messages are received, and the operation of warning/lighting lamps are all well suited to field application.

Algorithm Design to Judge Fake News based on Bigdata and Artificial Intelligence

  • Kang, Jangmook;Lee, Sangwon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제11권2호
    • /
    • pp.50-58
    • /
    • 2019
  • The clear and specific objective of this study is to design a false news discriminator algorithm for news articles transmitted on a text-based basis and an architecture that builds it into a system (H/W configuration with Hadoop-based in-memory technology, Deep Learning S/W design for bigdata and SNS linkage). Based on learning data on actual news, the government will submit advanced "fake news" test data as a result and complete theoretical research based on it. The need for research proposed by this study is social cost paid by rumors (including malicious comments) and rumors (written false news) due to the flood of fake news, false reports, rumors and stabbings, among other social challenges. In addition, fake news can distort normal communication channels, undermine human mutual trust, and reduce social capital at the same time. The final purpose of the study is to upgrade the study to a topic that is difficult to distinguish between false and exaggerated, fake and hypocrisy, sincere and false, fraud and error, truth and false.