• Title/Summary/Keyword: information security system

Search Result 6,591, Processing Time 0.037 seconds

The Extended TCP for Preventing from SYN Flood DoS Attacks (SYN Flood DoS 공격을 차단하기 위한 확장 TCP)

  • Park Zin-Won;Kim Myung-Kyun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.10
    • /
    • pp.491-498
    • /
    • 2005
  • The Denial of Service(DoS) attacks, which are done by consuming all of the computing or communication resources necessary for the services, are known very difficult to be protected from. TCP has drawbacks in its connection establishment for possible DoS attacks. TCP maintains the state of each partly established connection in the connection queue until it is established completely and accepted by the application. The attackers can make the queue full by sending connection requests repeatedly and not completing the connection establishment steps for those requests. In this paper, we have designed and implemented the extended TCP for preventing from SYN Flood DoS attacks. In the extended TCP, the state of each partly established connection is not maintained in the queue until the connection is established completely. For the extended TCP, we have modified the 3-way handshake procedure of TCP and implemented the extended TCP in the Linux operating system. The test result shows $0.05\%$ delay more than original TCP, but it shows that the extended TCP is strong for SYN Flood attacks.

A Study on Application of Internet-based Personal Health Record(PHR) System: Using Google Health (인터넷기반의 개인전자건강기록 시스템 적용사례 연구: 구글헬스를 중심으로)

  • Jeong, Seong-Hee
    • Journal of Digital Contents Society
    • /
    • v.10 no.3
    • /
    • pp.433-439
    • /
    • 2009
  • With the help of fast growing popularization of internet, all areas of e-Health have expanded rapidly; such that people have become interested in digital personal health record and its management. This paper examined the characteristics of personal health record and made the analysis of the structure of Google Health, the internet-based personal health record system. Google Health allows you to store and manage all of your health information, import medical records from hospitals and pharmacies, share your health records, and explore online health services. This examples represents not only a significant change of current medical systems but also enables to estimate the future stream of it. As a result, this paper, in the areas of e-Health which will be expanded in various service areas, may give you a greater sense of importance of personal health record and will eventually provide more complemental structure of future personal health record through comparative studies on the strength and weakness of it.

  • PDF

AMI Network Failure Analysis based on Graph Database (그래프 데이터베이스 기반 AMI 네트워크 장애 분석)

  • Jeong, Woo-Cheol;Jun, Moon-Seog;Choi, Do-Hyeon
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.7
    • /
    • pp.41-48
    • /
    • 2020
  • Recently, the spreading business of AMI (Advanced Metering Infrastructure) remote metering systems in various regions of the country has been activated, and it provides various metering functions such as two-way communication and security plan functions for power demand management. Current AMI system is difficult to analyze based on the existing RDB(Relational Database) due to the increase in the size of new internal IoT devices and networks. This study proposes a new GDB(Graph Database) based failure analysis method that utilizes existing RDB data. It analyzes the correlation of new failure patterns through accumulated data such as internal thresholds and status values. As a result of GDB-based simulation, it was confirmed that RDB can predict to a new obstacle pattern that was difficult to analyze.

Generation of Changeable Face Template by Combining Independent Component Analysis Coefficients (독립성분 분석 계수의 합성에 의한 가변 얼굴 생체정보 생성 방법)

  • Jeong, Min-Yi;Lee, Chel-Han;Choi, Jeung-Yoon;Kim, Jai--Hie
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.44 no.6
    • /
    • pp.16-23
    • /
    • 2007
  • Changeable biometrics has been developed as a solution to problem of enhancing security and privacy. The idea is to transform a biometric signal or feature into a new one for the purposes of enrollment and matching. In this paper, we propose a changeable biometric system that can be applied to appearance based face recognition system. In the first step when using feature extraction, ICA(Independent Component Analysis) coefficient vectors extracted from an input face image are replaced randomly using their mean and variation. The transformed vectors by replacement are scrambled randomly and a new transformed face coefficient vector (transformed template) is generated by combination of the two transformed vectors. When this transformed template is compromised, it is replaced with new random numbers and a new scrambling rule. Because e transformed template is generated by e addition of two vectors, e original ICA coefficients could not be easily recovered from the transformed coefficients.

Development of Operating Guidelines of a Multi-reservoir System Using an Artificial Neural Network Model (인공 신경망 모형을 활용한 저수지 군의 연계운영 기준 수립)

  • Na, Mi-Suk;Kim, Jae-Hee;Kim, Sheung-Kown
    • IE interfaces
    • /
    • v.23 no.4
    • /
    • pp.311-318
    • /
    • 2010
  • In the daily multi-reservoir operating problem, monthly storage targets can be used as principal operational guidelines. In this study, we tested the use of a simple back-propagation Artificial Neural Network (ANN) model to derive monthly storage guideline for daily Coordinated Multi-reservoir Operating Model (CoMOM) of the Han-River basin. This approach is based on the belief that the optimum solution of the daily CoMOM has a good performance, and the ANN model trained with the results of daily CoMOM would produce effective monthly operating guidelines. The optimum results of daily CoMOM is used as the training set for the back-propagation ANN model, which is designed to derive monthly reservoir storage targets in the basin. For the input patterns of the ANN model, we adopted the ratios of initial storage of each dam to the storage of Paldang dam, ratios of monthly expected inflow of each dam to the total inflow of the whole basin, ratios of monthly demand at each dam to the total demand of the whole basin, ratio of total storage of the whole basin to the active storage of Paldang dam, and the ratio of total inflow of the whole basin to the active storage of the whole basin. And the output pattern of ANN model is the optimal final storages that are generated by the daily CoMOM. Then, we analyzed the performance of the ANN model by using a real-time simulation procedure for the multi-reservoir system of the Han-river basin, assuming that historical inflows from October 1st, 2004 to June 30th, 2007 (except July, August, September) were occurred. The simulation results showed that by utilizing the monthly storage target provided by the ANN model, we could reduce the spillages, increase hydropower generation, and secure more water at the end of the planning horizon compared to the historical records.

MPICH-GP : An MPI Extension to Supporting Private IP Clusters in Grid Environments (MPICH-GP : 그리드 상에서 사설 IP 클러스터 지원을 위한 MPI 확장)

  • Park, Kum-Rye;Yun, Hyun-Jun;Park, Sung-Yong;Kwon, Oh-Young;Kwon, Oh-Kyoung
    • The KIPS Transactions:PartA
    • /
    • v.14A no.1 s.105
    • /
    • pp.1-14
    • /
    • 2007
  • MPICH-G2 is an MPI implementation to solve complex computational problems by utilizing geographically dispersed computing resources in grid environments. However, the computation nodes in MPICH-G2 are exposed to the external network due to the lack of supporting the private IP clusters, which raises the possibility of malicious security attacks. In order to address this problem, we propose MPICH-GP with a new relay scheme combining NAT(Network Address Translation) service and an user-level proxy. The proxy running on the front-end system of private IP clusters forwards the incoming connection requests to the systems inside the clusters. The outgoing connection requests out of the cluster are forwarded through the NAT service on the front-end system. Through the connection path between the pair of processes, the requested MPI jobs can be successfully executed in grid environments with various clusters including private IP clusters. By simulations, we show that the performance of MPICH-GP reaches over 80% of the performance of MPICH-G2, and over 95% in ease of using RANK management method.

Efficient Source Authentication Protocol for IPTV Based on Hash Tree Scheme (해쉬 트리 기반의 효율적인 IPTV 소스 인증 프로토콜)

  • Shin, Ki-Eun;Choi, Hyoung-Kee
    • The KIPS Transactions:PartC
    • /
    • v.16C no.1
    • /
    • pp.21-26
    • /
    • 2009
  • Presently, the demand for IPTV, to satisfy a variety of goals, is exploding. IPTV is coming into the spotlight as a killer application in upcoming IP convergence networks such as triple play which is the delivery of voice, internet, and video service to a subscriber. IPTV utilizes CAS, which controls the subscriber access to content for a profit. Although the current CAS scheme provides access control via subscriber authentication, there is no authentication scheme for the content transmitted from service providers. Thus, there is a vulnerability of security, through which an adversary can forge content between the service provider and subscribers and distribute malicious content to subscribers. In this paper, based on a hash tree scheme, we proposed efficient and strong source authentication protocols which remove the vulnerability of the current IPTV system. We also evaluate our protocol from a view of IPTV requirements.

A study on stock price prediction system based on text mining method using LSTM and stock market news (LSTM과 증시 뉴스를 활용한 텍스트 마이닝 기법 기반 주가 예측시스템 연구)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.18 no.7
    • /
    • pp.223-228
    • /
    • 2020
  • The stock price reflects people's psychology, and factors affecting the entire stock market include economic growth rate, economic rate, interest rate, trade balance, exchange rate, and currency. The domestic stock market is heavily influenced by the stock index of the United States and neighboring countries on the previous day, and the representative stock indexes are the Dow index, NASDAQ, and S & P500. Recently, research on stock price analysis using stock news has been actively conducted, and research is underway to predict the future based on past time series data through artificial intelligence-based analysis. However, even if the stock market is hit for a short period of time by the forecasting system, the market will no longer move according to the short-term strategy, and it will have to change anew. Therefore, this model monitored Samsung Electronics' stock data and news information through text mining, and presented a predictable model by showing the analyzed results.

Performance Comparison of EFTS According by Modulations and Channel Codes (변조 방식과 채널 코드에 따른 EFTS 성능 비교)

  • Kang, Sanggee
    • Journal of Satellite, Information and Communications
    • /
    • v.8 no.2
    • /
    • pp.94-98
    • /
    • 2013
  • A report of security problems and simultaneous operation limits of Standard tone currently used for FTS introduces the development of a next generation FTS. In this paper, BER performance by modulations and channel coding methods for EFTS are compared. Simulation results show that coherent modulations have better BER performance than noncoherent modulations. However the environments of a lunching vehicle may cause serious problems in achieving and maintaining synchronization and the increasing complexity of coherent systems also increases reliability problems. Therefore noncoherent systems are suitable for FTS even though BER performace of noncoherent systems is lower than coherent systems. Noncoherent DPSK has better BER performance than noncoherent CPFSK. However the PEP of noncoherent DPSK is 0.8dB higher than noncoherent CPFSK. Therefore a transmitter of noncoherent DPSK has more output power than noncoherent CPFSK. Convoltional code has better BER performance than RS code. However RS code has a tendency of steeply decreasing BER near the wanted $E_b/N_0$.

Health Problems and Coping of Workers under Special Employment Relationships: Home-visit Tutors, Insurance Salespersons, and Credit Card Recruiters (특수고용형태근로종사자들의 건강문제와 대처: 학습지 교사, 보험설계사, 신용카드회원모집인을 중심으로)

  • Park, Bohyun;Jo, Yeonjae;Oh, Sangho
    • Korean Journal of Occupational Health Nursing
    • /
    • v.28 no.4
    • /
    • pp.208-220
    • /
    • 2019
  • Purpose: This study aimed to determine health problems experienced by workers in special employment relationships (WSER) and identify coping strategies used when such problems occur. Methods: This qualitative study used the focus group interview method. Thirteen study participants included five home-visit tutors, five insurance salespersons, and three credit card recruiters. The interviews were conducted from November 2018 through January 2019, with each occupational group interview lasting about 2 hours. Analysis based on phenomenological research was independently performed by two researchers. Results: Most participants had common health problems involving vocal cord symptoms, and stress related to emotional labor and traffic accidents. The unique health problems included cystitis, musculoskeletal, and digestive symptoms in home-visit tutors; reduced vision and hearing in insurance salespersons; and mental distress in credit card recruiters. There was no protection system for their health coverage, and the company emphasized their self-employed status to avoid taking responsibility for them. Twelve participants did not purchase occupational accident insurance owing to both not having adequate information and economic burden concerning premium status. Conclusion: WSER experienced both physical and mental health problems. These problems were caused by their unstable employment status, and the social security system for their coverage being non-functioning.