• Title/Summary/Keyword: information security system

Search Result 6,599, Processing Time 0.034 seconds

Enhanced ANTSEC Framework with Cluster based Cooperative Caching in Mobile Ad Hoc Networks

  • Umamaheswari, Subbian;Radhamani, Govindaraju
    • Journal of Communications and Networks
    • /
    • v.17 no.1
    • /
    • pp.40-46
    • /
    • 2015
  • In a mobile ad hoc network (MANET), communication between mobile nodes occurs without centralized control. In this environment the mobility of a node is unpredictable; this is considered as a characteristic of wireless networks. Because of faulty or malicious nodes, the network is vulnerable to routing misbehavior. The resource constrained characteristics of MANETs leads to increased query delay at the time of data access. In this paper, AntHocNet+ Security (ANTSEC) framework is proposed that includes an enhanced cooperative caching scheme embedded with artificial immune system. This framework improves security by injecting immunity into the data packets, improves the packet delivery ratio and reduces end-to-end delay using cross layer design. The issues of node failure and node malfunction are addressed in the cache management.

A study on a Preventive measure of traffic congestion in building security system (빌딩 출입 보안 시스템의 정보폭주 방지방법에 관한 연구)

  • 서창옥;김계국
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.1
    • /
    • pp.71-77
    • /
    • 2004
  • In general, security server controls information of people who usually come to building. In order to exit and entrance, while they bring Identification card into contact with card reader, server admits them into building after asks whether their informations are or not in database. However if many People want to exit and entrance in all direction. it may give rise to a serious traffic congestion. Therefore the delay is due to server's overload. In this paper, we suggested IZA(Identification Zone Algorithm) in order to prevent of traffic congestion.

  • PDF

Efficient Certificate-Based Proxy Re-encryption Scheme for Data Sharing in Public Clouds

  • Lu, Yang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.7
    • /
    • pp.2703-2718
    • /
    • 2015
  • Nowadays, public cloud storage is gaining popularity and a growing number of users are beginning to use the public cloud storage for online data storing and sharing. However, how the encrypted data stored in public clouds can be effectively shared becomes a new challenge. Proxy re-encryption is a public-key primitive that can delegate the decryption right from one user to another. In a proxy re-encryption system, a semi-trusted proxy authorized by a data owner is allowed to transform an encrypted data under the data owner's public key into a re-encrypted data under an authorized recipient's public key without seeing the underlying plaintext. Hence, the paradigm of proxy re-encryption provides a promising solution to effectively share encrypted data. In this paper, we propose a new certificate-based proxy re-encryption scheme for encrypted data sharing in public clouds. In the random oracle model, we formally prove that the proposed scheme achieves chosen-ciphertext security. The simulation results show that it is more efficient than the previous certificate-based proxy re-encryption schemes.

Implementation of Illegal and Objectionable Multimedia Retrieval Using the MPEG-7 Visual Descriptor and Multi-Class SVM (MPEG-7 시각서술자와 Multi-Class SVM을 이용한 불법 및 유해 멀티미디어 분석 시스템 구현)

  • Choi, Byeong-Cheol;Kim, Jung-Nyeo;Ryou, Jea-Cheol
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.711-712
    • /
    • 2008
  • We developed a XMAS (X Multimedia Analysis System) for analyzing the illegal and objectionable multimedia in Internet environment based on Web2.0. XMAS uses the MPEG-7 visual descriptor and multi-class SVM (support vector machine) and its performance (accuracy on precision) is about 91.6% for objectionable multimedia analysis and 99.9% for illegal movie retrieval.

  • PDF

Design of Management Information and Implementation of Central Management System for Managing Multiple Heterogeneous IDS Agents (다수의 이종 IDS Agent 관리를 위한 관리정보 설계와 중앙관리 시스템 구현)

  • 정훈조;정태명
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.385-389
    • /
    • 2001
  • 인터넷 기술이 발전되고 활성화됨에 따라 인터넷에 연결된 호스트들과 네트워크는 외부의 악의적인 침입자에 의해 공격받을 수 있는 잠재성이 나날이 증가하고 있다. 이러한 이유로 네트워크 및 호스트 보안에 대한 관심과 연구활동이 활발해 졌으며, 대표적인 보안 솔루션 중의 하나인 침입탐지시스템이 각광을 받고 있다. 탐지 기술적 분류에 따라 크게 네트워크 기반 침입탐지시스템과 호스트 기반 침입탐지시스템이 존재하며, 한편으로 네트워크 규모의 증대로 다수의 침입탐지시스템의 운용이 필요하다. 이와 같이 이질적인 다수의 침입탐지시스템을 운용하는 경우, 관리의 복잡성과 관리비용의 증대라는 문제점을 내포한다. 본 논문에서는 이질적인 다수의 침입탐지에이전트들을 통합 관리하기 위한 중앙통제 시스템의 구현을 설명하고, 여기에 확장성과 유연성을 부여하기 위한 관리 자료 구조의 설계에 대해 기술한다.

  • PDF

Impact of ITSM Military Service Quality and Value on Service Trust

  • Woo, Hanchul;Lee, Sangdo;Huh, Jun-Ho;Jeong, Sukjae
    • Journal of Multimedia Information System
    • /
    • v.7 no.1
    • /
    • pp.55-72
    • /
    • 2020
  • As the IT service environment grows, it is critical in terms of IT service quality to minimize the occurrence of failures due to changes in applications and to diagnose and recover in a short period of time how failure will affect the business. Thus, the Defense Acquisition Program Administration (DAPA) has been building and operating ITSMs to implement IT service management in a leading manner. Information Technology Service Management (ITSM) is divided into events, obstacles, changes, versions and setup management to ensure flexibility and stability in service delivery. It is also operated separately from service level, availability, capacity, financial and IT service continuity management to ensure service quality and cost efficiency. Based on ITSM military service history, this study looks at the impact of quality of service on value, satisfaction, and trust. The results of the analysis are highly valuable for future ITSM implementation and operation.

Endorsed Tools List and Guideline for high-level security system evaluation (보안 시스템 평가를 위한 정형화 도구 리스트와 가이드 라인)

  • Lee, Ji-Yeon;Yoo, Hee-Jun;Choi, Jin-Young;Nam, Yun-Sun
    • Annual Conference of KIPS
    • /
    • 2000.10a
    • /
    • pp.145-148
    • /
    • 2000
  • 현대 사회는 정보통신 기술의 발달로 정보 시스템의 사용이 급격히 증가되고 있다. 정보화의 가속화에 따라 다양한 역기능들 또한 도출되고 있다. 여러 가지 역기능들로부터 정보를 보호하고 안정한 정보 유통을 위한 양질의 정보보호 시스템을 위해 정보보호 제품에 대한 평가를 수행하고 있다. 각국의 평가 등급을 살펴보면, 정형기법을 사용한 시스템이 높은 등급을 받고 있다. 특히, 미국의 평가 등급인 TCSEC을 관리하는 NIST 에서는 최상위 등급을 받기 위해서는 정형화 시스템을 사용해야 한다. 이를 위해 미국에서 시행하고 있는 승인된 TOOL 리스트와 이 리스트에 포함되기 위한 평가와 가이드 라인을 분석하여 현재 사용하고 있는 tool 들을 평가해보고 국내 실정에 맞는 최고등급 평가에 사용될 수 있는 검증 받은 도구 리스트와 가이드라인의 초안을 제시하고자 한다.

  • PDF

RFID Mutual Autentication Protocol Using AES (AES를 이용한 RFID 상호인증 프로토콜)

  • Kim, Seok;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.9
    • /
    • pp.1963-1969
    • /
    • 2012
  • Recently use of RFID(Radio Frequency Identification) tends to be rapidly increased and will be also extended throughout the whole life. Using radio-frequency data can be recognized automatically in the RFID system is vulnerable to personal information protection or security. And passive tags have a hardware problem is the limit for applying cryptographic. This paper presents an authentication protocol using AES and Nounce. After completing mutual authentication server to access and strengthen security vulnerability to the use of the Nounce, because safety in denial of service attacks.

The consideration about prevention ways of discovery of emergency situation which is based on guard techniques (경호기법에 의한 위급상황의 발견과 대처 방안에 관한 고찰)

  • Gong, Bae-wan
    • Journal of the Society of Disaster Information
    • /
    • v.6 no.2
    • /
    • pp.11-20
    • /
    • 2010
  • All of the people or objects which are contacted during the activity of guard are added to range of objects. guard has to notice decision, question proposal, observation, accomplish to be happened them at the same time recognizing the steps as soon as possible. Before a lot of information of client are shown, guard expert has to search observation of materialization, extension of reservation, notification of business and causes of danger through personal interviews. Rapid communication system has to be assumed and effective caution, protection and shelter and following prevention are cooperated as well as has to care about safe of guard object by a protective wall. And also has to get out of the ground, keep the large shape when moves, prevent the trials of attack from the assassinators after takeing control over weapons.

Design of Blockchain Model for Ransomware Prevention (랜섬웨어 방지를 위한 블록체인 활용 모델에 대한 설계)

  • An, Jung-hyun;Kim, Ki-chun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.314-316
    • /
    • 2017
  • Ransomware, a malicious program that requires money and then locks computers and files on network users for financial harvesting, will continue to evolve. Ransomware is a threat in mail systems that send and receive business information. By using Block Chain, Distributed Ledger technology, it is designed to be a safe mail system in which the automatically generated Ramsomware symptom data is directly linked to the security policy in the enterprise.

  • PDF