• Title/Summary/Keyword: information security system

Search Result 6,599, Processing Time 0.035 seconds

Development of multi-media multi-path Optimization Network Technology Using RNN Algorithm (RNN 알고리즘을 이용한 다매체 다중경로 최적화 네트워크 기술 개발)

  • Pokki Park;Youngdong Kim
    • Convergence Security Journal
    • /
    • v.24 no.3
    • /
    • pp.95-104
    • /
    • 2024
  • The performance capability of the future battlefield depends on whether the next-generation technology of the Fourth Industrial Revolution, called ABCMS (AI, Bigdata, Cloud, Mobile, Security), can be applied to secure innovative defense capabilities It is no exaggeration to say. In addition, the future military operation environment is rapidly changing into a net work-oriented war (NCW) in which all weapon systems mutually share battlefield information and operate in real-time within a single integrated information and communication network based on the network and is expanding to the scope of operation of the manned and unmanned complex combat system. In particular, communication networks responsible for high-speed and hyperconnectivity require high viability and efficiency in power operation based on multi-tier (defense mobile, satellite, M/W, wired) networks for the connection of multiple combat elements and smooth distribution of information. From this point of view, this study is different from conventional single-media, single-path transmission with fixed specifications, It is an artificial intelligence-based transmission technology using RNN (Recurrent Neural Networks) algorithm and load distribution during traffic congestion using available communication wired and wireless infrastructure multimedia simultaneously and It is the development of MMMP-Multi-Media Multi-Path adaptive network technology.

Ensemble Based Optimal Feature Selection Algorithm for Efficient Intrusion Detection in Wireless Sensor Network

  • Shyam Sundar S;R.S. Bhuvaneswaran;SaiRamesh L
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.8
    • /
    • pp.2214-2229
    • /
    • 2024
  • Wireless sensor network (WSN) consists of large number of sensor nodes that are deployed in geographical locations to collect sensed information, process data and communicate it to the control station for further processing. Due the unfriendly environment where the sensors are deployed, there exist many possibilities of malicious nodes which performs malicious activities in the network. Therefore, the security threats affect performance and life time of sensor networks, whereas various security aspects are there to address security issues in WSN namely Cryptography, Trust Management, Intrusion Detection System (IDS) and Intrusion Prevention Systems (IPS). However, IDS detect the malicious activities and produce an alarm. These malicious activities exploit vulnerabilities in the network layer and affect all layers in the network. Existing feature selection methods such as filter-based methods are not considering the redundancy of the selected features and wrapper method has high risk of overfitting the classification of intrusion. Due to overfitting, the classification algorithm fails to detect the intrusion in better manner. The main objective of this paper is to provide the efficient feature selection algorithm which was suitable for any type classification algorithm to detect the intrusion in an effective manner. This paper, the security of the network is addressed by proposing Feature Selection Algorithm using Chi Squared with Ensemble Method (FSChE). The proposed scheme employs the combination of decision tree along with the random forest classification algorithm to form ensemble classifier. The experimental results justify the feasibility of the proposed scheme in terms of attack detection, packet delivery ratio and time analysis by employing NSL KDD cup data Set. The obtained results shows that the proposed ensemble method increases the overall performance by 10% to 25% with respect to mentioned parameters.

Effective Risk Management Technique through OSINT and Cyber Threat Intelligence within the Enterprise (OSINT와 기업 내 사이버 위협 인텔리전스를 통한 효과적인 위험 대응 기법)

  • Kwangsuk Moon;Junbeom Hur
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.5
    • /
    • pp.949-959
    • /
    • 2024
  • Recently, as enterprises utilize the cloud and artificial intelligence, it is becoming increasingly difficult to protect exposed interfaces with existing perimeter security methods. Accordingly, zero trust-based comprehensive risk management is becoming necessary. Most enterprises use vulnerability inspection and bug bounty (security vulnerability reporting system) as basic risk management methods, but it is difficult to effectively respond to unpredictable problems such as zero-day attacks or open source vulnerabilities with these methods alone. Therefore, in this paper, we propose a risk response technique for the entire enterprise that links external OSINT (open source information) and CTI of national government agencies to detect threats through CTI (cyber threat intelligence) and collects the enterprise's own CTI. As a result of comparing the method of threat detection and blocking that collects the enterprise's own CTI by configuring a honeypot for effective threat detection and links it to the CTI of an external government agency, the proposed technique showed a 65.8% higher performance improvement in detection accuracy and verified the effect of reducing the number of attackers in the organization through this method

The Design and Implementation for the Secure Protocol of MHS (MHS의 정보보호 프로토콜 설계 및 구현 연구)

  • 이형수;정선이;정진욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.8
    • /
    • pp.1117-1127
    • /
    • 1993
  • 전자우편서비스가 확대됨에 따라 정보 보호 문제가 중요한 현안으로 대두될 것이다. 이러한 필요성에 따라, MHS(Message Handling System) 시스템의 정보보호(Information Security) 서비스에 관련된 표준화(X.400 series)와 보안 서비스에 관련된 키 관리 메카니즘 표준화(X.509)출 분석하려다. 본 연구에서는 여러가지 보안서비스 중, 안전한 메시지 전송을 위해 1차적으로 메시지 비밀보장, 메시지 무결성, 발신처 인증 서비스를 위 한 SMP(Secure Message Protocol ) 프로토콜을 설계하여 UNIX BSD 4.3 시스템환경에서 구현하였다.

  • PDF

Novel Design of Ultrashort Pulse Excimer Laser Amplifier System II (Temporal Gain Control and Phase Distortion/ASE Characteristics)

  • Lee, Young-Woo
    • Journal of information and communication convergence engineering
    • /
    • v.1 no.4
    • /
    • pp.228-232
    • /
    • 2003
  • The previous design work for very large final amplifier pumped by electron beam module was described from the point of view of energy characteristics. In this work, the design problems for phase front distortion, ASE, and gain control in large aperture amplifier are presented in detail.

A Plan of e-Settlement Study for Effective Improvement of e-Money Based on e-Commerce (전자상거래 기반에서 전자화폐의 효율성 향상을 위한 전자결제 연구 방안)

  • Ahn, Byeong-Tae;Lee, Chong-Ha;Chung, Bhum-Suk
    • Management & Information Systems Review
    • /
    • v.19
    • /
    • pp.129-143
    • /
    • 2006
  • The internet industry is gradually increasing according to the explosive explosion of internet and development of information communication industry. Specially, The payment method of settlement means is diversed with development of e-commerce. In this paper, we propose a settlement method using e-settlement in the network. and we suggest a security method for efficiency of e-money. Also, we propose a reform plan of e-settlement system.

  • PDF

A Design of Location Tracking Service System based on MMDBMS (MMDBMS에 기반한 위치 추적 서비스 시스템의 설계)

  • Lee, Soon-Mi
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2010.07a
    • /
    • pp.403-405
    • /
    • 2010
  • 위치 추적 서비스와 같은 LBS 서비스는 신속하게 변화하는 수많은 양의 공간 및 이동 객체를 관리 및 실시간으로 처리해야 하므로 고성능의 DBMS가 필요하다. 본 논문에서는 실시간 처리와 고성능 처리를 향상시키기 위한 메인 메모리 기반의 이동체 DBMS를 사용한 위치 추적 서비스 시스템을 제안하였다.

  • PDF

A Study on the Implementation of User Medical Information Sharing System in u-Healthcare Enviornment (u-Healthcare 환경에서 안전한 의료정보공유에 대한 연구)

  • Jang, Seon-Ju;Kim, Kyu-Seok
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2012.07a
    • /
    • pp.395-396
    • /
    • 2012
  • 본 연구에서는 의료정보공유가 활발하게 이루어지게 될 u-Healthcare환경에서 발생할 수 있는 보안 취약점에 대하여 알아보고 안전하게 의료정보를 공유하기 위한 보안요구사항을 제안한다.

  • PDF

Novel Design of Ultrashort Pulse Excimer Laser Amplifier System I (Energy Characteristics)

  • Lee, Young-Woo
    • Journal of information and communication convergence engineering
    • /
    • v.1 no.1
    • /
    • pp.39-43
    • /
    • 2003
  • The technology required to advance the state of the art of ultra-high-intensity excimer amplifier construction to the 100 J/100fs output pulse level is identified. The preliminary design work for very large final amplifier pumped by electron beam module is described, and key design problems and approaches are presented and discussed in detail based on the recent experimental and theoretical results.

Implementation of Enhancement Security System based on Network Access Control (네트워크 접근제어 기반의 보안강화 시스템 구현)

  • Oh, Seung-Heon
    • Annual Conference of KIPS
    • /
    • 2014.04a
    • /
    • pp.372-374
    • /
    • 2014
  • 오늘날 사이버보안침해 위협의 증가에 따른 기업 내의 중요자료 유출을 방지할 수 있는 방안에 대한 연구의 필요성이 증대되고 있다. 본 논문에서는 비인가자의 네트워크 접속을 차단하는 네트워크 통제(NAC) 시스템과 개인 PC의 저장매체관리 시스템을 연계하여 정보보안의 핵심요소인 기밀성을 강화할 수 있는 모델을 제안하였다. 필수 SW(저장매체제어)를 설치하지 않을 경우 네트워크를 차단함으로서, 비인가자의 네트워크 차단과 동시에 중요자료 유출을 미연에 방지하여 보안을 강화할 수 있다.