• Title/Summary/Keyword: information security system

Search Result 6,591, Processing Time 0.034 seconds

OTP Authentication Protocol using PingPong-128 (PingPong-128을 이용한 OTP 인증 프로토콜)

  • Lee, Jang-Chun;Lee, Hoon-Jae;Lim, Hyo-Taek;Lee, Sang-Gon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.4
    • /
    • pp.661-669
    • /
    • 2008
  • Nowadays, authentication is essential to identify the legal users in a network communication. Usually, there are few wars to achieve authentication over a publicly accessible network system in order to protect certain private data from the unauthorized users, ranging from simple ID/Password to Biometrics System. One of the most active areas in OTP(One Time Password) research today aims at exploiting OTP to provide authentication in the finance and security industry. OTP is usually discarded once it has been used. this prevents huge loophole of traditional authentication system which employs the same ID and Password every time. However this OTP system also has its weaknesses in surviving some attacks. this paper proposes an advanced OTP protocol using PingPong-128 without loop hole of pre-existing OTP.

Design and Implementation of a Smart Tag System for Ubiquitous Port Logistics (유비쿼터스 항만 물류 환경을 위한 스마트 태그 시스템의 설계 및 구현)

  • Cho, Hyun-Tae;Baek, Yun-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.8
    • /
    • pp.1500-1510
    • /
    • 2007
  • In recent, rapid and accurate processing for logistics have been required, according as logistics has grown dramatically. Especially, identifying, locating, or tracking objects in ports are important, because ports are gateways to extended markets. In this paper, we describe the design and implementation of a smart tag system for ubiquitous port logistics. Our solution consists of three parts: an active RFID to identify objects, an electronic container seal to charge with security of containers, and a RTLS system to locate objects. Because identification technology for logistics can be read by heterogenous systems, compliance with the international standard is one of the most critical issues. This paper introduces the method to maintain compliance with ISO, and conducts some verifications. In addition, we analyze the system performance such as lifetime, identification rate, and time for multiple tag identification.

Design and Implementation of a Web-Based Toy Trading System (웹 기반 장난감 거래 시스템 설계 및 구현)

  • Lim, Jongtae;Lim, Yunsoo;Lee, Dong-Geun;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.10
    • /
    • pp.45-58
    • /
    • 2019
  • As modern people's daily lives are becoming more harsh in Korea, the so-called Kidults generation has appeared since a few years ago as adults have come back to their childhood sensibility and are exposed to various cultures online, and there are many people who have a hobby for collecting toys. However, as there is currently no formalized system for individual toy trade online, it is difficult to acquire expertise and share information with each other through a major portal site's $caf{\acute{e}}$, and is exposed to security or fraud while trading toys. In this paper, we design and implementation of a web-based toy trading system. Analyzing the advantages and disadvantages of the various trading and relay systems currently in use, it will provide opportunities for professional toy knowledge and information exchange to many users who have a hobby of collecting toys, and will greatly help vitalize the toy market through a secure and convenient trading environment between individuals.

Case Analysis for Introduction of Machine Learning Technology to the Mining Industry (머신러닝 기술의 광업 분야 도입을 위한 활용사례 분석)

  • Lee, Chaeyoung;Kim, Sung-Min;Choi, Yosoon
    • Tunnel and Underground Space
    • /
    • v.29 no.1
    • /
    • pp.1-11
    • /
    • 2019
  • This study investigated use cases of machine learning technology in domestic medical, manufacturing, finance, automobile, urban sectors and those in overseas mining industry. Through a literature survey, it was found that the machine learning technology has been widely utilized for developing medical image information system, real-time monitoring and fault diagnosis system, security level of information system, autonomous vehicle and integrated city management system. Until now, the use cases have not found in the domestic mining industry, however, several overseas projects have found that introduce the machine learning technology to the mining industry for improving the productivity and safety of mineral exploration or mine development. In the future, the introduction of the machine learning technology to the mining industry is expected to spread gradually.

Intrusion Situation Classification Model for Intelligent Intrusion Awareness (지능적인 침입 인지를 위한 침입 상황 분류 모델)

  • Hwang, Yoon-Cheol;Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.3
    • /
    • pp.134-139
    • /
    • 2019
  • As the development of modern society progresses rapidly, the technologies of society as a whole are progressing and becoming more advanced. Especially in the field of security, more sophisticated and intelligent attacks are being created. Meanwhile, damaging situations are becoming several times larger than before Therefore, it is necessary to re-classify and enhance the existing classification system. It is required to minimize the intrusion damage by actively responding to intelligent intrusions by applying this classification scheme to currently operating intrusion detection systems. In this paper, we analyze the intrusion type caused by intelligent attack We propose a new classification scheme for intrusion situations to guarantee the service safety, reliability, and availability of the target system, We use this classification model to lay the foundations for the design and implementation of a smart intrusion cognitive system capable of early detection of intrusion, the damages caused by intrusion, and more collections active response.

Method on DTN Performance Acceleration and Packet Loss Minimization for Transfer Efficiency Maximizing (전송효율성 극대화를 위한 DTN 성능 가속 및 병목구간 패킷손실 최소화 방안)

  • Park, Jong-Seon;Noh, Min-Ki
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.11
    • /
    • pp.37-43
    • /
    • 2018
  • Science DMZ is a network architecture that considers complicated network components such as dedicated network, DTN, and minimum security policy to maximize transfer efficiency. And DTN tuning is an essential component to take full advantage of Science DMZ's available bandwidth. In addition, tuning of network system should be performed concurrently to minimize packet loss due to network bottleneck. In this paper, we propose a tuning method of data transfer node and network system for maximizing transfer efficiency in Science DMZ network architecture. As a result of the performance measurement using the KREONET, the network performance after the DTN tuning shows 180% improvement than that of existing method without DTN tuning. In addition, performance of 9.4Gb/s was shown without loss of performance measurement after tuning network system applying shaping policy.

Study on Device Monitoring using SNMP (SNMP를 이용한 장비 모니터링에 관한 연구)

  • Park, Mi Jeong;Lee, Dong Hoon;Lee, Jeong Han
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.561-564
    • /
    • 2014
  • The Rare Isotope Science Project (RISP) at the Institute for Basic Science (IBS) constructs the rare isotope accelerator facility in South Korea. Since the accelerator control system uses various Ethernet-based devices and equipment, it is essential to build a unified Network-based control system. Because of the complexity of the accelerator facility, it will be a challenge to install a device in a proper location where the device could react quickly and exactly with respect to network security. In this report, we will present early study on Simple Network Management Protocol (SNMP) that tests various Ethernet-based devices out on an ideal network configuration in order to find an optimal location for each Ethernet-based device. Moreover, we will discuss future plan to integrate SNMP into Experimental Physics and Industrial Control System (EPICS) that is distributed soft real-time control systems for scientific instruments such as a particle accelerators, telescopes and other large scientific experiments.

  • PDF

A study on the application of mission-based weapon system cybersecurity test and evaluation (임무 기반의 무기체계 사이버보안 시험평가 적용 연구)

  • Kim, Ik-jae;Kang, Ji-won;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.71-81
    • /
    • 2021
  • This paper examines the ongoing research on ways to improve cybersecurity during the entire life cycle of weapons systems applied in advanced countries such as the United States, analyzes restrictions on obtaining domestic weapons systems, and presents effective security evaluation measures. By consistently performing mission-based risk assessment in the cybersecurity test and evaluation plan suitable for domestic circumstances at all stages of acquisition, important information is provided to major decision-making organizations in a timely manner to support decision-making, and to respond to identified vulnerabilities in cybersecurity. It is proposed to set the rules of engagement so that the protection measures can be verified, and a simulated invasion is proposed. In addition, the proposed cybersecurity test and evaluation system was compared with the domestic weapon system test and evaluation. Through this, the mission-based risk assessment element was grafted into the cybersecurity test and evaluation system research conducted so far to identify risks in a timely manner between acquisition projects, thereby supplementing the capability to support major decision-making.

A Study on the controversial Issues of the Private Investigator System (공인탐정제도 도입에 따른 주요 쟁점 논의)

  • Jaemin Lee
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.2
    • /
    • pp.254-261
    • /
    • 2023
  • Purpose: With the diversification of modern society, it is difficult to predict crime types, and the limitations of the state's functions, such as human limitations and lack of budget, are increasing. Method: However, as the number of private investigation companies that do not use illegal means to solve the request increased, attempts were made to introduce a public detective system that would manage and supervise it and compensate for the gap in public power. Result: However, due to the nature of the Private Investigator system, legislation has not progressed as the National Police Agency and the Ministry of Justice are at odds with existing laws that guarantee existing jobs such as lawyers and credit research. Conclusion: Therefore, this study analyzes the bills related to the authorized detective to the National Assembly, examines major issues such as the scope of work of the authorized detective business, the selection of management and supervisory authorities, and suggests ways to improve the successful settlement of the Private Investigator system.

Cyber Attack Detection Using Message Authentication for Controller Area Networks (차량 내부 네트워크에서 메세지 인증을 이용한 사이버 공격 탐지)

  • Lee, Suyun;Park, Seo-Hee;Song, Ho-Jin;Beak, Youngmi
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.107-109
    • /
    • 2022
  • This paper proposes a new security system to detect cyber-attacks based on message authentication in a in-vehicle network. In the in-vehicle network, when a sending node transmits messages in a broadcast manner, it only uses a message identifier, rather than a node's identifier. It leads to a problem not identifying the source. In the proposed system, the sending node generates a message authentication code (MAC) using a cryptographic hash function to the control data and transmits it with the control data. When generating the MAC for each message, a multidimensional chaotic map is applied to increase the randomness of the result. The receiving node compares its MAC generated from the control data in the received message with the MAC of the received message to detect whether the message transmitted from the sending node is forged or not. We evaluate the performance of the proposed system by using CANoe and CAPL (Communication Access Programming Language). Our system shows a 100% of detection rate against cyber-attacks injected.

  • PDF