• Title/Summary/Keyword: information security system

Search Result 6,599, Processing Time 0.032 seconds

Performance Improvement of Fuzzy C-Means Clustering Algorithm by Optimized Early Stopping for Inhomogeneous Datasets

  • Chae-Rim Han;Sun-Jin Lee;Il-Gu Lee
    • Journal of information and communication convergence engineering
    • /
    • v.21 no.3
    • /
    • pp.198-207
    • /
    • 2023
  • Responding to changes in artificial intelligence models and the data environment is crucial for increasing data-learning accuracy and inference stability of industrial applications. A learning model that is overfitted to specific training data leads to poor learning performance and a deterioration in flexibility. Therefore, an early stopping technique is used to stop learning at an appropriate time. However, this technique does not consider the homogeneity and independence of the data collected by heterogeneous nodes in a differential network environment, thus resulting in low learning accuracy and degradation of system performance. In this study, the generalization performance of neural networks is maximized, whereas the effect of the homogeneity of datasets is minimized by achieving an accuracy of 99.7%. This corresponds to a decrease in delay time by a factor of 2.33 and improvement in performance by a factor of 2.5 compared with the conventional method.

Power Consumption Analysis for Security attack in TPM

  • Kennedy, Grace;Cho, Dong-Sub
    • Annual Conference of KIPS
    • /
    • 2011.04a
    • /
    • pp.917-919
    • /
    • 2011
  • Recently, most network communication chips are powered; which causes power consumption a heavily constraint. Since, there are a lot of expectations on TPM to have a high performance in terms of authentication of its device. During the design process there is a need to estimate the security of the design but it always when the chip has already been manufactured. This paper designed a power consumption control monitor in TPM device which evaluate the voltage drop during processing of use. Therefore we will analyze the power consumption profile. The result shows that the voltage drop leads to vulnerability of the system to attackers during communication process.

Eye Blink Detection and Alarm System to Reduce Symptoms of Computer Vision Syndrome

  • Atheer K. Alsaif;Abdul Rauf Baig
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.193-206
    • /
    • 2023
  • In recent years, and with the increased adoption of digital transformation and spending long hours in front of these devices, clinicians have observed that the prolonged use of visual display units (VDUs) can result in a certain symptom complex, which has been defined as computer vision syndrome (CVS). This syndrome has been affected by many causes, such as light refractive errors, poor computer design, workplace ergonomics, and a highly demanding visual task. This research focuses on eliminating one of CVSs, which is the eye dry syndrome caused by infrequent eye blink rate while using a smart device for a long time. This research attempt to find a limitation on the current tools. In addition, exploring the other use cases to utilize the solution based on each vertical and needs.

A study on the sharing system for insider threats behavior using pseudonymisation based on consortium blockchain network (컨소시엄 블록체인 네트워크 기반에서 가명처리를 활용한 안전한 기업 내부자 위협 행위 데이터 공유 시스템 연구)

  • Yoon, WonSeok;Chang, HangBae
    • Annual Conference of KIPS
    • /
    • 2021.11a
    • /
    • pp.348-351
    • /
    • 2021
  • 본 논문에서는 지속적으로 늘어나고 있는 내부의 유출자를 탐지하기위해 컨소시엄 블록체인 기술을 활용하여 기업간 직원의 PC사용 행위 로그 데이터를 가명처리하여 블록에 기록하여 네트워크에 참여한 다른 기업들간의 안전한 공유를 통해 내부자 유출 데이터 및 시나리오의 확장하여 내부에서의 유출을 탐지할 수 있는 데이터 셋을 확보하는 연구를 제안한다. 현재 내부자 위협탐지의 한계점중 가장 큰 요소를 차지하는 부족한 실제 사례의 내부자 유출 데이터 셋의 문제점을 본 연구를 통해서 네트워크 참여 기업간의 내부자 유출 데이터를 확장하고 타기업의 유출 사례를 활용해 기업에서 발생할 수 있는 내부자 유출을 미연에 방지할 수 있다.

Establish a security control system through attack packet analysis with Suricata, Elastic Stack, and Kafka (Suricata와 Elastic Stack, Kafka를 이용한 공격 패킷 분석 및 보안관제 시스템 구축)

  • Lee, Da-Eun;Lee, Hye-Rin;Jo, Min-Gyu
    • Annual Conference of KIPS
    • /
    • 2021.11a
    • /
    • pp.1144-1147
    • /
    • 2021
  • 코로나19 대유행으로 인해 전 세계가 원격으로 일상을 옮겨가면서 인터넷 트래픽량이 증가하고 보안 위협 또한 높아졌다. 높은 보안성이 요구되는 현 상황에 대응하기 위해 본 논문에서는 Suricata와 Elastic Stack, Kafka를 이용해 보안관제 로그 분석시스템을 구축하였다. 실시간으로 공격을 탐지하고 로그를 수집해 유의미한 데이터를 도출하여 시각화한다. 또한 시각화 한 대시보드를 제공함으로써 사용자는 공격의 위험도를 파악할 수 있고 앞으로의 공격을 대비할 수 있다.

Policy Proposals With Respect To The Increase In Cyber Threats Through E-mail (이메일을 통한 사이버위협 증대에 따른 정책 제안)

  • Park, Poe-il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.243-245
    • /
    • 2022
  • In this paper, a policy to manage e-mail system with respect to the increase in cyber threats through e-mail will be proposed but only from the perspective of security. After covering recent trends on cyber threats through e-mail, security measures including technical, administrative and operational will be encountered in order to finalize the policy proposal.

  • PDF

Analyze Diagnostic Data from Samsung Android Smartphones (삼성 안드로이드 스마트폰의 진단데이터 분석)

  • Hyungchul Cho;Junki Kim;Jungheum Park
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.3
    • /
    • pp.479-491
    • /
    • 2024
  • Android manufacturers collect diagnostic data to improve the quality of service to users around the world. The content and frequency of diagnostic data collected by these Android manufacturers is unknown. We analyze the diagnostic data collection behavior of Samsung smartphones, which has the largest share of the Android market among smartphone manufacturers, to explain which diagnostic data is communicated to the server via network packets, how the system app that collects the diagnostic data works, and whether the diagnostic data violates user privacy.

A data security transmission system and method based on key exchange encryption protocol (키 교환 암호 프로토콜 기반 데이터 보안 전송 시스템 및 방법)

  • Jaekyung Park
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2024.01a
    • /
    • pp.423-424
    • /
    • 2024
  • 본 논문은 TCP/IP 네트워크 및 암호 프로토콜을 결합하여 CCTV 카메라 영상 데이터를 안전하게 전송하는 시스템에 관한 것이다. 특히, TCP Handshake에서 암호 키를 교환하고, 디바이스의 시그니처 정보를 활용하여 키를 생성하는 키 교환 암호 프로토콜을 도입한다. 이를 통해 CCTV 카메라의 영상 데이터를 암호화하여 전송하고, 수신 시 복호화하여 저장한다. 또한, 적어도 하나 이상의 CCTV 카메라에 대한 보안 인증과 네트워크 연결 상태를 제어하며, 중간자 공격을 방지하기 위한 안전한 키 교환을 수행한다. 이로써 안전성이 강화된 CCTV 카메라 시스템을 제공할 수 있다.

  • PDF

A DATA SYSTEM AND ENCRYPTION METHOD BASED ON KEY EXCHANGE CRYPTOGRAPHIC PROTOCOL USING ENHANCED SECURITY FUNCTION IN NETWORK LAYER (네트워크 계층에 강화된 보안 기능을 활용한 키 교환 암호 프로토콜 기반 데이터 시스템 및 암호화 방법)

  • Jaekyung-Park
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2024.01a
    • /
    • pp.425-426
    • /
    • 2024
  • 본 논문은 표준 TCP/IP 네트워크의 특징 및 암호 프로토콜의 특징을 결합하여 TCP Handshake 단계에서 암호 키 교환을 수행하고, 디바이스의 고유한 시그니처 정보를 사용하여, 암호 키 생성 데이터로 사용하여, 보안성을 강화하는 것을 특징 으로 하는 네트워크 계층에 강화된 보안 기능을 활용한 키 교환 암호 프로토콜 기반 데이터 시스템 및 암호화 방법에 관한 것으로 개발된 프로토콜을 키 교환 프로토콜로 대체할 경우보다 안전한 보안 프로토콜을 제공할 수 있다.

  • PDF

Digital Technologies for Learning a Foreign Language in Educational Institutions

  • Olha Byriuk;Tetiana Stechenko;Nataliya Andronik;Oksana Matsnieva;Larysa Shevtsova
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.89-94
    • /
    • 2024
  • The main purpose of the study is to determine the main elements of the use of digital technologies for learning a foreign language in educational institutions. The era of digital technologies is a transition from the traditional format of working with information to a digital format. This is the era of the total domination of digital technologies. Digital technologies have gained an unprecedented rapid and general distribution. In recent years, all spheres of human life have already undergone the intervention of digital technologies. Therefore, it is precisely the educational industry that faces a difficult task - to move to a new level of education, where digital technologies will be actively used, allowing you to conveniently and quickly work in the information field for more effective learning and development. The study has limitations and they relate to the fact that the practical activities of the process of using digital technologies in the system of preparing the study of a foreign language were not taken into account.