• Title/Summary/Keyword: information security system

Search Result 6,599, Processing Time 0.029 seconds

Design and Implementation of the Linux Kernel Backdoor Intruder Tracing-Response System (리눅스 커널 백도어 침입자 추적대응시스템 설계 및 구현)

  • Jeon, Wan-Keun
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.43-50
    • /
    • 2005
  • This paper is about the method that chases the Linux kernel backdoor intruder and copes with the kernel backdoor attack. We have a limit to trace the hacker with the current log analysing method because the hacker generally removes the log file and use the forge IP information. I propose the solution to solve the problem with the DeFor system. Through the restoration of the deleted log file, analysis of it and full HDD image, promptly quick response, it is possible to trace hacker spot and reduce hacking damage.

  • PDF

The Software Architecture of A Secure and Efficient Group Key Agreement Protocol

  • Lopez-Benitez, Noe
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.3
    • /
    • pp.21-25
    • /
    • 2014
  • Group communications are becoming popular in Internet applications such as video conferences, on-line chatting programs, games, and gambling. Secure and efficient group communication is needed for message integration, confidentiality, and system usability. However, the conventional group key agreement protocols are too much focused on minimizing the computational overhead by concentrating on generating the common group key efficiently for secure communication. As a result, the common group key is generated efficiently but a failure in authentication allows adversaries to obtain valuable information during the group communication. After achieving the secure group communication, the secure group communication should generate the group key efficiently and distribute it to group members securely, so the balance of security and system usage must be considered at the same time. Therefore, this research proposes the software architecture model of a secure and efficient group communication that will be imbedded into networking applications.

  • PDF

Study of the Enhancement of Military Operation Supporting System (비상시 정부의 효율적인 군사작전 지원방안 연구)

  • Choi, Jae-Kyung
    • Journal of National Security and Military Science
    • /
    • s.5
    • /
    • pp.87-130
    • /
    • 2007
  • ROK and the United States finally reached accord on the controversial transition of Wartime Operational Control on February, 2007, and ROK Government needs to strengthen the role of supporting for the comprehensive threats of futuristic warfare. The crucial point of the supporting for Military Operation depends on the nation's mobilization capabilities. For the effective mobilization the following facets can be improved further. First of all, the organizational integrity of the mobilization network within the government can be bolstered along the vertical command chain. The process of mobilization must be improved and it is import to utilize the information system. On the other side the government plan to distribute timely the mobilized resources must be made up for the weak points and developed continuously. We can expect these points to be improved steadily with the execution of the National Defence Reform 2020.

  • PDF

The study of Port-MIS ship information displaying method in VTS operation console (Port-MIS 선박 정보를 VTS 운용 콘솔에 현시하는 방안에 대한 연구)

  • Oh, Seung-hee;Lee, Byung-Gil
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2014.10a
    • /
    • pp.179-181
    • /
    • 2014
  • 지금까지의 해상교통관제시스템(Vessel Traffic System: VTS)에서 관제를 수행함에 있어서 관제사들이 확인할 수 있는 선박에 대한 정보는 AIS(Automatic Identification System) 정보에 한정적이었다. 하지만 선박에서 전달받는 AIS 정적 정보는 한정적이며, 정확성 역시 신뢰할 수 없을 경우가 많은 실정이다. 그래서 관제사들은 선박의 정확한 정보 확인을 위해서 항만운영시스템(Port-MIS)에 별도로 접속하여 해당 선박에 대한 정보를 조회하여 활용하는 상황이다. 현재 ETRI에서는 Single Windows 개념을 적용한 차세대 해상교통관제시스템을 개발하면서 관제사들의 편의성 제공을 위해 추가적인 Port-MIS의 연동 없이 관제 화면을 통해 관제중인 선박에 대한 Port-MIS 정보를 조회하여 현시할 수 있도록 개발하고 있다. 본 논문에서는 관제사들의 VTS 현시용 선박 정보 필드에 대한 요구사항을 도출하고, 이를 제공하기 위한 시스템 설계 구조에 대해서도 기술한다.

  • PDF

A robust optical security system using polarization and phase masks

  • Kim, Jae-Hyun;Shin, Chang-Mok;Seo, Dong-Hoan;Kim, Jong-Yun;Park, Se-Joon;Kim, Soo-Joong
    • Proceedings of the IEEK Conference
    • /
    • 2000.07b
    • /
    • pp.919-922
    • /
    • 2000
  • A robust optical security technique using ortho-gonally polarized lights in the interferometer is proposed. We use orthogonally polarized lights in order to minimize the noise generated by the refractive index change due to vibration, flow of air, change of temperature etc. To make orthogonally polarized lights the first beam splitter in the Mach-Zehnder interferometer is substituted by a polarizing beam splitter(PBS). Because of incoherence of orthogonally polarized lights, the noise generated by the change of refractive index is minimized. To encrypt an image we use the random partition and the diffusing of pixel. Finally we make Phase-only-filters of each image which is randomly partitioned and diffused pixel by pixel. Simulation results show the proposed system has the ability of encryption and decryption of an image.

  • PDF

Real-Time Control System

  • Gharbi, Atef
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.19-27
    • /
    • 2021
  • Tasks scheduling have been gaining attention in both industry and research. The scheduling that ensures independent task execution is critical in real-time systems. While task scheduling has gained a lot of attention in recent years, there have been few works that have been implemented into real-time architecture. The efficiency of the classical scheduling strategy in real-time systems, in particular, is still understudied. To reduce total waiting time, we apply three scheduling approaches in this paper: First In/First Out (FIFO), Shortest Execution Time (SET), and Shortest-Longest Execution Time (SLET). Experimental results have demonstrated the efficacy of the SLET in comparison with the others in most cases in a wide range of configurations.

Integration Facility Management: Interface Coordination in Process Management

  • Laksmana, Dimas Indra;Wijayaningtyas, Maranatha;Indriani, Sri;Kiswandono, Kiswandono
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.319-323
    • /
    • 2022
  • The information research system continues to be developed and directed at leading research National Institute of Technology (ITN) Malang in accordance with the Research Strategic Plan of ITN Malang. One of them is a computer system in a complete integrated facility management activity, such as this research scheme. The purpose of this research is to combine and integrate people, places, product, processes and technology. All of them are integrate existing organizational factors into a more effective, simplifying of complex processes, identifying and scheduling, notes, decision makers and more. This research was conducted in stages by design with a structured model stage for 3 (three) years (focus on humans, products and processes), research on Integration Facility Management: Interface Coordination in human resources and product management have been completed on 2019 and 2020. While the focus of research this year is to obtain an integrated facility management Interface Coordination in Process Management.

Modern Technologies for the Development of Distance Education

  • Kryshtanovych, Svitlana;Chorna-Klymovets, Iryna;Semeriak, Iryna;Mordous, Iryna;Zainchkivska, Iryna
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.103-108
    • /
    • 2022
  • The main purpose of the study is to determine the features of the application of modern technologies for the development of distance education. The global process of transition to the information society, as well as the economic, political and social changes that accompany it, are accelerating the reform of the higher education system, in which distance education occupies a special place. Based on the results of the study, the main features of the use of modern technologies for the development of distance education are characterized. Future research should be devoted to investigating the impact of Industry 4.0 on the education system.

Analysis & Implementation of SISO, SIMO, MISO and MIMO in 5G Communication Systems Based on SDR

  • Meriem DRISSI;Nabil BENJELLOUN;Philippe DESCAMPS;Ali GHARSALLAH
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.140-146
    • /
    • 2023
  • With the rapid growth of new users and massive need for very high data rate in 5G communications system, different technologies have been developed and applied to enhance communication efficiency. One of those technologies is the MISO, MISO and MIMO which transmits and receives information with more reliability by using multiple antennas on transmitter or/and receiver side. This paper presents the latest trends in 5G telecommunications system based on software defined radio, A novel low-cost SIMO, MISO and MIMO using flexibility between USRP and Simulink is implemented tested and validated.

Bitcoin Algorithm Trading using Genetic Programming

  • Monira Essa Aloud
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.210-218
    • /
    • 2023
  • The author presents a simple data-driven intraday technical indicator trading approach based on Genetic Programming (GP) for return forecasting in the Bitcoin market. We use five trend-following technical indicators as input to GP for developing trading rules. Using data on daily Bitcoin historical prices from January 2017 to February 2020, our principal results show that the combination of technical analysis indicators and Artificial Intelligence (AI) techniques, primarily GP, is a potential forecasting tool for Bitcoin prices, even outperforming the buy-and-hold strategy. Sensitivity analysis is employed to adjust the number and values of variables, activation functions, and fitness functions of the GP-based system to verify our approach's robustness.