• Title/Summary/Keyword: information security system

Search Result 6,591, Processing Time 0.037 seconds

Biometric Information Protection Measures in the Biometric Person Authentication System Using Match-on-Card (Match-on-Card를 사용한 생체 개인 인증 시스템에서의 생체정보 보호대책)

  • 이상곤;조대성
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.6
    • /
    • pp.237-246
    • /
    • 2003
  • To acquire certificate of security evaluation for information protection Products, it is necessary for a designer to grasp the threats listed in a protection profile and to reflect them in the product design. BDPP is a protection profile for the biometric devices. In this paper, we applied BDPP to a Match-on-Card, and ertracted some security requirements to protect biometric data against threats. We also studied some countermeasures satisfying the security requirements.

Automatic malware generation system design using EA (진화알고리즘을 이용한 악성코드 자동생성 시스템 설계)

  • Kwon, Se-Hoon;Kown, Jae-Yeong;Lee, Seung-Hun;Lee, Hyun-Woo;Lee, Jong-Rak;Won, Il-Yong
    • Annual Conference of KIPS
    • /
    • 2017.11a
    • /
    • pp.193-196
    • /
    • 2017
  • 본 연구는 기존의 변종 악성코드와는 달리 진화알고리즘을 기반으로 한 악성코드 자동 생성 프레임워크에 대한 것이다. 우리가 제안하는 시스템은 소스가 알려지지 않는 바이너리 상태의 악성코드를 역공학적 기법을 이용하여 소스 상태로 복원하고 복원된 소스를 이용하여 다양한 변종 악성코드를 생성하는 것이다. 진화 연산을 적용하기 위해 평가함수의 설계가 중요한데, 우리는 행동 기반 분석 기반의 평가 함수를 포함하는 프레임워크를 제안하였다.

An implementation and security analysis on H.235 for VoIP security on embedded environments (임베디드 환경에서의 H.235 기반 VoIP 보안 단말 구현 및 안전성 분석에 관한 연구)

  • 김덕우;홍기훈;이상학;정수환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7C
    • /
    • pp.1007-1014
    • /
    • 2004
  • In this paper, H.235 based security mechanism for H.323 multimedia applications was implemented in embedded environment. H.235 covers authentication using HMAC-SHAI -96, authenticated Diffie-Hellman key exchange, security capability exchange, session key management for voice encryption, and encryption functions such as DES, 3DES, RC2. H.235-based mechanisms were also analyzed in terms of its security and possible attacks.

SSO based Security Management in Cloud Computing Environment

  • Jing, Si Da;Jung, Young-Min;Chung, Mok-Dong
    • Korea Information Processing Society Review
    • /
    • v.17 no.2
    • /
    • pp.18-29
    • /
    • 2010
  • In this paper, we surveyed SSO based security management including the knowledge domain of the area of cloud and its relevant components. Cloud computing refers to the delivery of software and other technology services over the Internet by a service provider. SSO refers to the ability to log on to a single security system once, rather than logging on separately to multiple security systems. Existing SSO solutions in cloud computing environment suggest several methods. SSO-based security Issues illustrate these key items in cloud computing environment such as risks and security vulnerabilities of SSO. SSO supports for multiple and different domains in cloud computing environment.

  • PDF

Analysis of Threats Factor in IT Convergence Security (IT 융합보안에서의 위협요소 분석)

  • Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.1 no.1
    • /
    • pp.49-55
    • /
    • 2010
  • As the developing of the information communication technology, more and more devices are with the capacity of communication and networking. The convergence businesses which communicate with the devices have been developing rapidly. The IT convergence communication is viewed as one of the next frontiers in wireless communications. In this paper, we analyze detailed security threats against M2M(Machine to Machine), intelligent vehicle, smart grid and u-Healthcare in IT convergence architecture. We proposed a direction of the IT convergence security that imbedded system security, forensic security, user authentication and key management scheme.

Developing File Security for Windows Operating System (윈도우 운영체제에서 파일 보안 기능 개발)

  • Jang, Seung-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.6
    • /
    • pp.1423-1428
    • /
    • 2010
  • This paper designs file security function on Windows O.S. Whenever you use Windows O.S, you need to protect some file data. This paper designs these security protection functions. This paper proposes two security functions on Windows O.S. One is file security. the other is directory access protection. To check the proposed functions well, I experiment the above functions on the Windows O.S. By this experiment, I confirmed that the proposed function worked well.

Network Abnormal Behavior Analysis System (네트워크 악성행위 분석시스템)

  • Choi, Sunoh;Choi, Yangseo;Lee, Jonghoon;Lee, Jooyoung;Kirn, Jonghyun;Kim, Ikkyun
    • Annual Conference of KIPS
    • /
    • 2016.10a
    • /
    • pp.189-190
    • /
    • 2016
  • 요즘 사이버 공격이 많이 발생함에 따라 기존의 디지털 포렌식 뿐만 아니라 네트워크 트래픽을 수집해서 사이버 공격을 분석하는 네트워크 포렌식에 대한 연구가 많이 수행되고 있다. 그러나 네트워크 포렌식을 수행하기 위해서는 여러가지 어려움이 존재한다. 이러한 문제를 해결하기 위하여 우리는 이 논문에서 네트워크 악성행위를 분석하기 위한 시스템 및 방법을 제안한다.

A Poisonous Plants Classification System Using Data Augmentation And Transfer Learning (데이터 확장과 전이학습을 이용한 독초 분류 시스템)

  • Kim, Min-Je;Lee, Su-Min;Park, Ju-Chan;Lee, Hye-Won;Kwon, Chan-Min;Won, Il-Young
    • Annual Conference of KIPS
    • /
    • 2018.10a
    • /
    • pp.660-663
    • /
    • 2018
  • 최근 5년간 식용 나물과 독초를 구별하지 못한 채 섭취하여 다수의 환자가 발생하였다. 본 논문에서는 인체에 치명적인 결과를 일으킬 수 있는 독초를 CNN을 통해 분류하는 시스템을 제안한다. 부족한 양의 샘플 데이터는 데이터 확장 기법을 통해 확보하였고, 연구에 사용된 하드웨어의 한계를 극복하기 위해 전이학습을 적용하였다. 실험은 데이터 확장과 전이 학습 적용 여부에 따라 4가지 유형별로 진행되었으며, 각 유형은 20회씩 반복한 테스트의 결과를 종합하여 평균을 내었다. 이와 같은 실험에서 의미 있는 결과를 얻었다. 본 논문의 시스템을 이용한 독초 섭취 사고의 예방이 기대된다.

Cognitive Radio Anti-Jamming Scheme for Security Provisioning IoT Communications

  • Kim, Sungwook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.4177-4190
    • /
    • 2015
  • Current research on Internet of Things (IoT) has primarily addressed the means to enhancing smart resource allocation, automatic network operation, and secure service provisioning. In particular, providing satisfactory security service in IoT systems is indispensable to its mission critical applications. However, limited resources prevent full security coverage at all times. Therefore, these limited resources must be deployed intelligently by considering differences in priorities of targets that require security coverage. In this study, we have developed a new application of Cognitive Radio (CR) technology for IoT systems and provide an appropriate security solution that will enable IoT to be more affordable and applicable than it is currently. To resolve the security-related resource allocation problem, game theory is a suitable and effective tool. Based on the Blotto game model, we propose a new strategic power allocation scheme to ensure secure CR communications. A simulation shows that our proposed scheme can effectively respond to current system conditions and perform more effectively than other existing schemes in dynamically changeable IoT environments.

Analysis of Technology and Security Threats on Blockchain (블록체인 기술 및 보안 위협 분석)

  • Jun, Euna;Lee, Cheulhee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.4
    • /
    • pp.47-56
    • /
    • 2018
  • We analyzed security threats and suggested countermeasures about the block chain technologies which has emerged as a core technology of the fourth industrial revolution. We know that increasing the security leads to slow down program processing rate in the block chain systems. The block chain system which is currently an early stage of technological development, to become an economic and social infrastructure, development of technology and active policy implementation will be necessary. We studied on the security threats and countermeasures of the Bit Coin based on block chain. Further research should be undertaken on the possibility that future studies could have a real adverse effect on the integrity of the data.