• Title/Summary/Keyword: information security system

Search Result 6,591, Processing Time 0.036 seconds

Private Key Management Scheme Using Secret Sharing and Steganography (비밀 분산 및 스테가노그래피를 이용한 개인 키 보관 기법)

  • Lee, Jaeheung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.35-41
    • /
    • 2017
  • This paper introduces a new method for storing a private key. This method can be achieved by dividing the private key into "n" pieces by a (k, n) secret sharing method, and then storing each piece into photo files utilizing a steganography method. In this way, a user can restore a private key as long as he can remember the locations of "k" photos among the entire photo files. Attackers, meanwhile, will find it extremely difficult to extract the private key if a user has hidden the pieces of the private key into numerous photo files stored in the system. It also provides a high degree of user convenience, as the user can restore the private key from his memory of k positions among n photo files. Coupled with this, a certain level of security can be guaranteed because the attacker cannot restore a private key, even if he knows k-1 photo file locations.

Design and Implementation of the Sinkhole Traceback Protocol against DDoS attacks (DDoS 공격 대응을 위한 Sinkhole 역추적 프로토콜 설계 및 구현)

  • Lee, Hyung-Woo;Kim, Tae-Su
    • Journal of Internet Computing and Services
    • /
    • v.11 no.2
    • /
    • pp.85-98
    • /
    • 2010
  • An advanced and proactive response mechanism against diverse attacks on All-IP network should be proposed for enhancing its security and reliability on open network. There are two main research works related to this study. First one is the SPIE system with hash function on Bloom filter and second one is the Sinkhole routing mechanism using BGP protocol for verifying its transmission path. Therefore, advanced traceback and network management mechanism also should be necessary on All-IP network environments against DDoS attacks. In this study, we studied and proposed a new IP traceback mechanism on All-IP network environments based on existing SPIE and Sinkhole routing model when diverse DDoS attacks would be happen. Proposed mechanism has a Manager module for controlling the regional router with using packet monitoring and filtering mechanism to trace and find the attack packet's real transmission path. Proposed mechanism uses simplified and optimized memory for storing and memorizing the packet's hash value on bloom filter, with which we can find and determine the attacker's real location on open network. Additionally, proposed mechanism provides advanced packet aggregation and monitoring/control module based on existing Sinkhole routing method. Therefore, we can provide an optimized one in All-IP network by combining the strength on existing two mechanisms. And the traceback performance also can be enhanced compared with previously suggested mechanism.

Design of Automatic Database Schema Generator Based on XML Schema (XML 스키마 기반의 데이터베이스 스키마 생성기 설계)

  • Lim, Jong-Seon;Kim, Kyung-Soo
    • Convergence Security Journal
    • /
    • v.7 no.3
    • /
    • pp.79-86
    • /
    • 2007
  • B2B e-business is an economic transaction formed between companies through various networks including internet. At present, e-business between companies partly applies information distribution between companies, but many enterprises expect that a corporate basic system will be gradually changed into XML basis if web service is earnestly materialized, so they are competing with each other in developing XML DBMS. Existing XML DBMS studies used XML DTD in order to represent the structure of XML document. Such XML DTD defines the expression of a simple type, so there are many difficulties in defining the structure of XML document. To cope with this, in this paper, the author will develop database schema generator utilizing relational database generally used in storing contents of data, on the basis of XML schema selected as a standard of W3C. Also, to store XML data, the author proposed the automatic conversion method of relational database schema that used XML schema.

  • PDF

A Plagiarism Detection Technique for Java Program Using Bytecode Analysis (바이트코드 분석을 이용한 자바 프로그램 표절검사기법)

  • Ji, Jeong-Hoon;Woo, Gyun;Cho, Hwan-Gue
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.7
    • /
    • pp.442-451
    • /
    • 2008
  • Most plagiarism detection systems evaluate the similarity of source codes and detect plagiarized program pairs. If we use the source codes in plagiarism detection, the source code security can be a significant problem. Plagiarism detection based on target code can be used for protecting the security of source codes. In this paper, we propose a new plagiarism detection technique for Java programs using bytecodes without referring their source codes. The plagiarism detection procedure using bytecode consists of two major steps. First, we generate the token sequences from the Java class file by analyzing the code area of methods. Then, we evaluate the similarity between token sequences using the adaptive local alignment. According to the experimental results, we can find the distributions of similarities of the source codes and that of bytecodes are very similar. Also, the correlation between the similarities of source code pairs and those of bytecode pairs is high enough for typical test data. The plagiarism detection system using bytecode can be used as a preliminary verifying tool before detecting the plagiarism by source code comparison.

The Vulnerability Analysis for Virtualization Environment Risk Model Management Systematization (가상화 환경 위험도 관리체계화를 위한 취약점 분석)

  • Park, Mi-Young;Seung, Hyen-Woo;Lim, Yang-Mi
    • Journal of Internet Computing and Services
    • /
    • v.14 no.3
    • /
    • pp.23-33
    • /
    • 2013
  • Recently in the field of IT, cloud computing technology has been deployed rapidly in the current society because of its flexibility, efficiency and cost savings features. However, cloud computing system has a big problem of vulnerability in security. In order to solve the vulnerability of cloud computing systems security in this study, impact types of virtual machine about the vulnerability were determined and the priorities were determined according to the risk evaluation of virtual machine's vulnerability. For analyzing the vulnerability, risk measurement standards about the vulnerability were defined based on CVSS2.0, which is an open frame work; and the risk measurement was systematized by scoring for relevant vulnerabilities. Vulnerability risk standards are considered to suggest fundamental characteristics of vulnerability and to provide the degree of risks and consequently to be applicable to technical guides to minimize the vulnerability. Additionally, suggested risk standard of vulnerability is meaningful as the study content itself and could be used in technology policy project which is to be conducted in the future.

Design and Implementation of Multimedia CAI Program for Learning about Electricity in the Mechanics Curriculum (기술과 전기 학습을 위한 멀티미디어 CAI 프로그램 설계 및 구현)

  • Lee, Hyae-Joung;Shin, Hyun-Cheul;Joung, Suck-Tae
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.9-16
    • /
    • 2007
  • In today's society, the paradigm is converted to information where both this and knowledge become the source of value added. In order to answer societies' needs school education is subject to a large change, that is 'from supplier-centered learners to demand-centered learners'. This study is the design and implementation of multimedia CAI program for learning about electricity in the meddle school the mechanics curriculum with a focus in generating electricity. Based on multimedia, software, educational utilization of the multimedia, CAI, learning theory and form, both technology and multimedia elements related to curriculum are analyzed. This title is composed of object, contents, evaluation and related sites every chapter for students to study. Also, it is designed for students to take interest and participate in the learning process actively by combining lots of media such as characters, sound, images and animation. Specially it is composed in a way of repetition according to the student's level.

  • PDF

A Development of Intelligent Pumping Station Operation System Using Deep Reinforcement Learning (심층 강화학습을 이용한 지능형 빗물펌프장 운영 시스템 개발)

  • Kang, Seung-Ho;Park, Jung-Hyun;Joo, Jin-Gul
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.33-40
    • /
    • 2020
  • The rainwater pumping station located near a river prevents river overflow and flood damages by operating several pumps according to the appropriate rules against the reservoir. At the present time, almost all of rainwater pumping stations employ pumping policies based on the simple rules depending only on the water level of reservoir. The ongoing climate change caused by global warming makes it increasingly difficult to predict the amount of rainfall. Therefore, it is difficult to cope with changes in the water level of reservoirs through the simple pumping policy. In this paper, we propose a pump operating method based on deep reinforcement learning which has the ability to select the appropriate number of operating pumps to keep the reservoir to the proper water level using the information of the amount of rainfall, the water volume and current water level of the reservoir. In order to evaluate the performance of the proposed method, the simulations are performed using Storm Water Management Model(SWMM), a dynamic rainfall-runoff-routing simulation model, and the performance of the method is compared with that of a pumping policy being in use in the field.

Development Software to Select Boundary Manikins for Product Evaluation: Applied to an Automobile Case (사용성 평가 전용 인체모델 선정 소프트웨어 개발 및 자동차 적용사례)

  • Lim, Young-Jae;Park, Sung-Joon;Park, Woo-Jin;Park, Jun-Soo;Jung, Eui-S.;Lim, Ik-Sung
    • Journal of the Ergonomics Society of Korea
    • /
    • v.29 no.6
    • /
    • pp.831-841
    • /
    • 2010
  • Usability evaluation of physical products involves characterizing complex physical interactions between humans and products. Human models known as manikins have been widely utilized as usability evaluation tools for automobile interior package design. When combined with computer-aided design software programs, such manikins can be used to simulate driving postures and evaluate driver-interior fits early in the design process, and therefore, may greatly facilitate achieving high-quality design in a cost-efficient manner. The purpose of this study was to define a set of manikins for designing automobile interior packages for the South Korean male population. These manikins were conceptualized as "boundary" manikins, which represent individuals lacking in certain physical capacities or having usability-related issues (e.g., an individual with the 5th percentile forward reach capability, an individual with the 95th percentile shoulder width). Such boundary manikins can serve as an efficient tool for determining if an automobile interior design accommodates the majority of the population. The boundary manikins were selected from the large sample of Korean males whose anthropometric dimensions were described in the recent Size Korea anthropometric database. For each male in the database, his comfortable driving posture was represented using a kinematic body linkage model and various physical capacity measured and usability-related characteristics relevant to driver accommodation were evaluated. For each such measure, a boundary manikin was selected among the Korean males. The manikins defined in this study are expected to serve as tools for ergonomic design of automobile interior packages. The manikin selection method developed in this study was implemented as a generic software program useful for various product design applications.

Mobile exercise monitoring for personalized exercise prescription (맞춤형 운동처방을 위한 모바일 운동 모니터링)

  • Kang, Sunyoung;Kang, Seungae
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.23-28
    • /
    • 2015
  • This study was carried out the exercise monitoring utilizing mobile device which is easily accessible and personalized exercise prescription based on it. For this, a variety of exercise monitoring and status of those were investigated and suggested the potential of personalized exercise prescription. If individual users send their body and vital informations using a mobile device, all informations are collected in u-Fitness center. After then exercise expert provide a customized prescription based on the collected information and feed data into database of u-Fitness center. System of U-Fitness center will provide the best personalized exercise prescription by automatically connecting to the content providers. In the future, a variety of mobile devices and services will work together and it can be evolved as an open platform that can be used for multiple services according to the needs of individual users on a single platform.

Fingerprint Identification Algorithm using Pixel Direction Factor in Blocks (블록별 화소방향성분을 이용한 지문의 동일성 판별 알고리즘)

  • Cho Nam-Hyung;Lee Joo-Shin
    • The KIPS Transactions:PartB
    • /
    • v.12B no.2 s.98
    • /
    • pp.123-130
    • /
    • 2005
  • In this paper, fingerprint identification algorithm using pixel direction factor in blocks is proposed to minimize false acceptance ratio and to apply security system. The proposed algorithm is that a fingerprint image is divided by 16 blocks, then feature parameters which have direct factors of $0^{\circ},\;45^{\circ},\;90^{\circ}\;and\;135^{\circ}$ is extracted for each block. Membership function of a reference fingerprint and an input fingerprint for the extracted parameters is calculated, then identification of two fingerprint is distinguished using fuzzy inference. False acceptance ratio is evaluated about different fingerprints of In kinds regardless of sex and shape which are obtained from adults, and false rejection ratio is evaluated about fingerprints which are obtained by adding fingerprints of 10 kinds on different fingerprints of 100 kinds. The experiment results is that false acceptance ratio is average $0.34\%$ about experiment of 4,950 times, and false rejection ratio is average $3.7\%$ about experiment of 1,000 times. The proposed algerian is excellent for recognition rate and security.