• Title/Summary/Keyword: information security system

Search Result 6,599, Processing Time 0.029 seconds

A Study on the Active Traceback Scheme Respond ing to a Security Incident (침해사고 대응을 위한 능동적 역추적 기법에 관한 연구)

  • Park Myung Chan;Park Young Shin;Choi Yong Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.1 s.33
    • /
    • pp.27-34
    • /
    • 2005
  • Current security reinforcement systems are Passive defense system that only blocks filter to all traffic from the attacker. So, Those are weak re-attack and Stepping Stones attack because active response about attacker is lacking. Also, present techniques of traceback need much time and manpower by log information collection and trace through the personal inspection and active response is lacking. In this paper, We propose technique for TCP connection traceback that can apply in present internet and trace to inserted marking on IP header to correspond re-attack and Stepping Stones attack. Therefore, Proposed technique is unnecessary correction of existing network component and can reduce size of marked information and overhead of resources.

  • PDF

Metro Telecommunication Basis Facilities Standardization and Functional Improvement Research (도시철도 구내정보통신 기반설비 표준화 및 기능 향상방안)

  • Kim Moon-Tae;Yoon In-Young
    • Proceedings of the KSR Conference
    • /
    • 2005.11a
    • /
    • pp.964-968
    • /
    • 2005
  • The standardization of information communication is doing a Internal each other connection and each other characteristic stability operation security in objective. From the low-speed network of the subway operation beginning currently it changes with the superhigh speed digital information transmission communication service environment which is a quality service, the hazard which plans the quality improvement of the efficient communication service use which hits to here and passenger service the standardization of the technical standard which stands and the improvement which hits to an engineering standard and facility must come to accomplish. The facility which existing is been old or the enclosure communication equipments which are insufficient. it improves, establishment itexpands efficiently, like this facilities it is stabilized and it is economic and rationally use maintenance it manages with the plan for the inside and outside of the country information communication relation technical standard and engineering standard service feature improvement and future expandability and economical efficiency, the possibility of having a pliability in order to be, rational technical standard and standard it takes a triangular position, efficient characteristic security of information communication service there is a place objective which promises the rational development of course city railroad communication system with character. Function improvement of enclosure communication base equipment, against an improvement and standardization plan it described trom the prosecution which it sees.

  • PDF

Improved Application Test Data Range Selection Method in a Non-Personal Information Identification Environment (개인정보 비식별 환경에서의 개선된 응용프로그램 테스트 데이터 범위 선정 방법)

  • Baek, Song-yi;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.823-834
    • /
    • 2020
  • In the past, when the personal information leakage incident of the three card companies, the computer program development was followed by the same strict electronic financial supervision regulations as the operating environment. However, when developing a computerized program, the application data is being verified with the integrity of the test data being compromised because the identification of the scope of conversion of the test data associated with the application is unclear. Therefore, in this paper, we proved by presenting a process and algorithm for selecting a range of sufficient test data conversion targets associated with a specific application.

Implementation of User Account Vulnerability Checking Function System using MS-SQL Database (MS-SQL 데이터베이스에서 특정 계정 취약점 판별 시스템 구현)

  • Jang, Seung-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.10
    • /
    • pp.2482-2488
    • /
    • 2014
  • This paper proposes that a user account of the MS-SQL is checked whether expirated or not in C++ program environment. Vulnerability checking module decides security weakness for password change time or user configuration time. The proposed module prevents and protects a user account from a malicious user account. Recently, Information Assets becomes more important. If the loss of database information it would make large damage in our life. This paper develops user account checking module, which checks whether user password have not been changed for a long time or whether the user account expirated in the MS-SQL Database. By checking security vulnerability using this feature, a malicious user cannot access the Database.

Spatial Data Stream Processing Platform for Ubiquitous Application Services (유비쿼터스 응용 서비스를 위한 공간 데이터 스트림 처리 플랫폼)

  • Chung, Weon-Il;Kim, Hwan-Koo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.3
    • /
    • pp.906-913
    • /
    • 2010
  • Sensors related to the geographic information are gathering strength as core technologies for various ubiquitous services like u-City project for the new town of the future to provide total information services by the high IT infrastructure. These sensors generate the very large real-time streaming data because these are set up and controlled with wide areas of the geographical distribution. On this, we propose an efficient spatial data stream processing system to support various u-GIS services based on geographic sensors.

Face Spoofing Attack Detection Using Spatial Frequency and Gradient-Based Descriptor

  • Ali, Zahid;Park, Unsang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.892-911
    • /
    • 2019
  • Biometric recognition systems have been widely used for information security. Among the most popular biometric traits, there are fingerprint and face due to their high recognition accuracies. However, the security system that uses face recognition as the login method are vulnerable to face-spoofing attacks, from using printed photo or video of the valid user. In this study, we propose a fast and robust method to detect face-spoofing attacks based on the analysis of spatial frequency differences between the real and fake videos. We found that the effect of a spoofing attack stands out more prominently in certain regions of the 2D Fourier spectra and, therefore, it is adequate to use the information about those regions to classify the input video or image as real or fake. We adopt a divide-conquer-aggregate approach, where we first divide the frequency domain image into local blocks, classify each local block independently, and then aggregate all the classification results by the weighted-sum approach. The effectiveness of the methodology is demonstrated using two different publicly available databases, namely: 1) Replay Attack Database and 2) CASIA-Face Anti-Spoofing Database. Experimental results show that the proposed method provides state-of-the-art performance by processing fewer frames of each video.

Technological Aspects of the Use of Modern Intelligent Information Systems in Educational Activities by Teachers

  • Tkachuk, Stanislav;Poluboiaryna, Iryna;Lapets, Olha;Lebid, Oksana;Fadyeyeva, Kateryna;Udalova, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.99-102
    • /
    • 2021
  • The article considers one of the areas of development of artificial intelligence where there is the development of computer intelligent systems capable of performing functions traditionally considered intelligent - language comprehension, inference, use of accumulated knowledge, learning, pattern recognition, as well as learn and explain their decisions. It is found that informational intellectual systems are promising in their development. The article is devoted to intelligent information systems and technologies in educational activities, ie issues of organization, design, development and application of systems designed for information processing, which are based on the use of artificial intelligence methods.

An Intelligent Gold Price Prediction Based on Automated Machine and k-fold Cross Validation Learning

  • Baguda, Yakubu S.;Al-Jahdali, Hani Meateg
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.65-74
    • /
    • 2021
  • The rapid change in gold price is an issue of concern in the global economy and financial markets. Gold has been used as a means for trading and transaction around the world for long period of time and it plays an integral role in monetary, business, commercial and financial activities. More importantly, it is used as economic measure for the global economy and will continue to play an important economic vital role - both locally and globally. There has been an explosive growth in demand for efficient and effective scheme to predict gold price due its volatility and fluctuation. Hence, there is need for the development of gold price prediction scheme to assist and support investors, marketers, and financial institutions in making effective economic and monetary decisions. This paper primarily proposed an intelligent based system for predicting and characterizing the gold market trend. The simulation result shows that the proposed intelligent gold price scheme has been able to predict the gold price with high accuracy and precision, and ultimately it has significantly reduced the prediction error when compared to baseline neural network (NN).

Pedagogical Analysis Of The Phenomenon Of Digital Competence

  • Yovenko, Larysa;Novakivska, Lyudmyla;Sanivskyi, Oleksandr;Sherman, Mykhailo;Vysochan, Lesia;Hnedko, Natalia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.7-10
    • /
    • 2021
  • The article analyzes and concretizes the understanding of the differences between the concepts of competence / competence according to the criterion general - personal. Based on the identified characteristics of competence (completed personal quality, activity character, educational result, successful implementation of professional and educational activities), the concept of competence as an integrative dynamic quality of a person, manifested in effective activity in a specific area, is defined. The structure of the IC has been substantiated, including motivational and value; information technology; communicative and reflective components. The content of the named IC components is disclosed. The article analyzes the essence of the characteristics of basic concepts (competence / competence), consideration of information competence in the research of famous scientists in order to concretize the studied phenomenon; concretization of the identified pedagogical conditions in educational process.

IoT-Based Health Big-Data Process Technologies: A Survey

  • Yoo, Hyun;Park, Roy C.;Chung, Kyungyong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.3
    • /
    • pp.974-992
    • /
    • 2021
  • Recently, the healthcare field has undergone rapid changes owing to the accumulation of health big data and the development of machine learning. Data mining research in the field of healthcare has different characteristics from those of other data analyses, such as the structural complexity of the medical data, requirement for medical expertise, and security of personal medical information. Various methods have been implemented to address these issues, including the machine learning model and cloud platform. However, the machine learning model presents the problem of opaque result interpretation, and the cloud platform requires more in-depth research on security and efficiency. To address these issues, this paper presents a recent technology for Internet-of-Things-based (IoT-based) health big data processing. We present a cloud-based IoT health platform and health big data processing technology that reduces the medical data management costs and enhances safety. We also present a data mining technology for health-risk prediction, which is the core of healthcare. Finally, we propose a study using explainable artificial intelligence that enhances the reliability and transparency of the decision-making system, which is called the black box model owing to its lack of transparency.