• Title/Summary/Keyword: information weakness

Search Result 789, Processing Time 0.023 seconds

Anomaly Detection Model based on Network using the Session Patterns (세션 패턴을 이용한 네트워크기반의 비정상 탐지 모델)

  • Park Soo-Jin;Choi Yong-Rak
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.719-724
    • /
    • 2004
  • Recently, since the number of internet users is increasing rapidly and, by using the public hacking tools, general network users can intrude computer systems easily, the hacking problem is getting more serious. In order to prevent the intrusion, it is needed to detect the sign in advance of intrusion in a positive prevention by detecting the various foms of hackers' intrusion trials to know the vulnerability of systems. The existing network-based anomaly detection algorithms that cope with port- scanning and the network vulnerability scans have some weakness in intrusion detection. they can not detect slow scans and coordinated scans. therefore, the new concept of algorithm is needed to detect effectively the various forms of abnormal accesses for intrusion regardless of the intrusion methods. In this paper, SPAD(Session Pattern Anomaly Detector) is presented, which detects the abnormal service patterns by comparing them with the ordinary normal service patterns.

A Research on an Email Method based on Sender Mailbox (송신자사서함 기반의 메일 방식에 관한 연구)

  • Kim, Tae-Joon
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.689-696
    • /
    • 2004
  • The conventional email method based on a recipient mailbox has a structural weakness, which may cause the spam message problem and the extreme waste of recipient mailbox space, and also require an explicit recipient notification scheme. This paper proposes a new email method based on a sender mailbox and evaluates its performance. Under the new email method, a message is stored at sender mailbox instead of recipient one until an intended recipient reads the message, so that the burden of mailbox management such as removing spam message is now shifted to sender side. And also a sender can confirm whether an intended recipient has read his or her message by simply rummaging his or her sender mailbox. The results of Performance evaluation show that 75% of mailbox space and 90% of message traffic are reduced in conditions that the portions of spam message and multicasting message are 90% and 80%, respectively.

A Study on the Comparison between an Optical Fiber and a Thermal Sensor Cable for Temperature Monitoring (온도 모니터링을 위한 광섬유 센서와 온도센서 배열 케이블의 비교 연구)

  • Kim, Jung-Yul;Kim, Yoo-Sung;Song, Yoon-Ho
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2006.03a
    • /
    • pp.1100-1109
    • /
    • 2006
  • In this study, two different technologies which can measure temperature simultaneously at many points are introduced. One is to use a thermal sensor cable that is comprised of addressable thermal sensors connected in parallel within a single cable. The other is to use an optic fiber with Distributed Temperature Sensing (DTS) system. The difference between two technologies can be summarized as follows. A thermal sensor cable has a concept of 'point sensing' that can measure temperature at accurate position of a thermal sensor. So the accuracy and resolution of temperature measurement are up to the ability of the thermal sensor. Whereas optic fiber sensor has a concept of 'distributed sensing' because temperature is measured by ratio of Stokes and anti-Stokes component intensities of Raman backscatter that is generated when laser pulse travels along an optic fiber. It's resolution is determined by measuring distance, measuring time and spatial resolution. The purpose of this study is that application targets of two temperature measurement techniques are checked in technical and economical phases by examining the strength and weakness of them. Considering the functions and characteristics of two techniques, the thermal sensor cable will be suitable to apply to the assessment of groundwater flow, geothermal distribution and grouting efficiency within 300m distance. It is expected that the optic fiber sensor can be widely utilized at various fields (for example: pipe line inspection, tunnel fire detection, power line monitoring etc.) which need an information of temperature distribution over relatively long distance.

  • PDF

Study on Elliptic Curve Diffie-Hellman based Verification Token Authentication Implementation (타원곡선 디피헬만 기반 검증 토큰인증방식 구현 연구)

  • Choi, Cheong H.
    • Journal of Internet Computing and Services
    • /
    • v.19 no.5
    • /
    • pp.55-66
    • /
    • 2018
  • Since existing server-based authentications use vulnerable password-based authentication, illegal leak of personal data occurs frequently. Since this can cause illegal ID compromise, alternative authentications have been studied. Recently token-based authentications like OAuth 2.0 or JWT have been used in web sites, however, they have a weakness that if a hacker steals JWT token in the middle, they can obtain plain authentication data from the token, So we suggest a new authentication method using the verification token of authentic code to encrypt authentication data with effective time. The verification is to compare an authentication code from decryption of the verification-token with its own code. Its crypto-method is based on do XOR with ECDH session key, which is so fast and efficient without overhead of key agreement. Our method is outstanding in preventing the personal data leakage.

Empirical Characterization of an Air-cored Induction Coil Sensor using Constructional Parameters (Air-cored induction 코일 센서의 실험 기반 고주파 특성 모델링에 대한 연구)

  • Lim, Han-Sang;Kim, In-Joo
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.47 no.2
    • /
    • pp.1-7
    • /
    • 2010
  • This paper presents empirical equations indicating the high frequency performance characteristics of air-cored induction coil sensors with their constructional parameters. An air-cored induction coil sensor is widely used due to good linearity at low frequency ranges but the sensor has weakness of relatively low sensitivity to the magnetic field. At high frequency ranges, the sensitivity can be dramatically increased, largely depending on the frequency of the injected field, and this property can be a great asset to some electromagnetic inspections, since they utilize the interrogating current with a fixed frequency. The application of this property of the coil sensor requires the estimation of its high frequency performance. We made experiments on the frequency responses of the coil sensors under diverse constructional conditions and, on the basis of the experimental results, the high frequency performance, such as the resonant frequency and the sensitivity at the frequency, was estimated, as a function of the constructional parameters of the coil sensor. The good agreements between experimental and estimated data were reported.

Developing Product Liability Response Strategies of SMEs using PEST-SWOT-AHP analysis (PEST-SWOT-AHP 분석을 이용한 중소제조기업의 제조물책임 대응전략 수립)

  • Seo, JunHyeok;Bae, SungMin
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.39 no.2
    • /
    • pp.11-18
    • /
    • 2016
  • Product liability (PL), which began enforcement in 2002, refers to the legal responsibility of the manufacturers or sellers (wholesales or retailers) for the property damage or bodily harm caused by their product. With a strong enforcement of the Product Liability (PL) Act, companies are required to structure and operate a response system to defend or prevent product accidents efficiently, but small and medium enterprises (SMEs) are unable to respond more aggressively due to limitation of management resources. In this manner, it is important to develop response strategies for SMEs to efficiently cope with the PL Act. In this paper, the PEST (Political, Economic, Social, and Technological) analysis is performed to reveal the impact of the PL Act on SMEs in macro-economic point of view. To formulate SME's PL response strategy, SWOT analysis is performed to categorize each factors from PEST analysis and AHP is applied to identify the intensities of SWOT factors. The prioritized SWOT factor, results of PEST-SWOT-AHP analysis, are used to formulate SME's PL response strategies. The study results are briefly summarized as follows. To reduce product defects, it is necessary for SMEs to formulate PL response strategies for each phase of the product life cycle by continuously collecting and analyzing PL cases in the same industry or for similar products. In addition, SMEs should invest more technological effort to ensure product safety. Further, SMEs should spread PL awareness to all staff members by training internal PL experts. Moreover, a SME should enroll in PL insurance and spread this information to its customers so that they become aware that the company is proactively conforming to the PL law.

Design and Development of Multi-Media Data Download System for GSM Mobile Phones (GSM 휴대단말기를 위한 멀티미디어 데이터의 다운로드 시스템 설계 및 구현)

  • OK Kyoung-Dal;Lee Sang-Bum
    • Journal of Internet Computing and Services
    • /
    • v.5 no.3
    • /
    • pp.63-72
    • /
    • 2004
  • Recently the range of mobile phone's usage has become more widely since phone has the function of data communication and voice communication. In addition, the request of users who wish to represent their identity on their mobile phones by storing some kinds of multimedia data such as images and melody has increased. There are two different methods for downloading the multimedia data; one method accesses a wireless internet server to download the data and another method downloads the data from PC directly. While the first one requires extra fee for downloading the data, the second method has weakness to modify the original data and it cannot be used in GSM phone yet since it is developed for CDMA phone. In this paper, we introduce a PC-based download application system that enables the users to download multimedia data from PC to GSM phone very easily.

  • PDF

Security Improvement of Remote User Authentication Scheme based on Smart Cards (스마트 카드 기반 사용자 인증 스킴의 보안 개선)

  • Joo, Young-Do;An, Young-Hwa
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.5
    • /
    • pp.131-137
    • /
    • 2011
  • Recently Lin et al. proposed a simple remote user authentication scheme using smart cards. But the proposed scheme has not satisfied security requirements which should be considered in the user authentication scheme using the password based smart card. In this paper, we show that Lin et al.'s scheme is insecure against off-line password guessing attack. In their scheme, any legal user's password may be derived from the password guessing when his/her smart card is stolen and the secret information is leaked from the smart card by an attacker. Accordingly, we demonstrate the vulnerability of their scheme and present an enhancement to resolve such security weakness. Our proposed scheme can withstand various possible attacks including password guessing attack. Furthermore, this improved scheme can provide mutual authentication to improve the security robustness. Performance evaluation shows that the proposed scheme is relatively more effective than Lin et al.'s scheme.

Detection Probability Improvement Scheme Optimized for Frequency-Hopping Signal Detection (주파수 도약 신호 탐지에 최적화된 탐지 확률 향상 기법)

  • Lee, In-Seok;Oh, Seong-Jun
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.29 no.10
    • /
    • pp.783-790
    • /
    • 2018
  • The frequency-hopping technique is one of the spread-spectrum techniques. Frequency hopping is a communication system in which the carrier frequency channel is hopped within the wideband. Therefore, a frequency-hopping system has such advantages as antijamming and low probability of intercept. This system is often used in military communications. Because frequency-hopping signal detection is difficult, it is an important research issue. A novel detection technique is proposed that can improve detection probability. When the received signal is transformed to a frequency domain sample by fast Fourier transform, spectral leakage lowers the detection probability. This problem can be solved by using the Hamming window, and the detection probability can be increased. However, in a frequency-hopping environment, the windowing technique lowers the detection probability. The proposed method solves this weakness. The simulation results show that the proposed detection technique improves the detection probability by as much as 13 %.

A Token-based Mutual Exclusion Algorithm in Mobile Computing Environments (모바일 컴퓨팅 환경에서의 토큰기반 상호배제 알고리즘)

  • Yang, Seung-Il;Lee, Tae-Gyu;Park, Sung-Hoon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.3
    • /
    • pp.263-274
    • /
    • 2010
  • Mutual exclusion that applied on existing systems was designed for static distributed systems. but now computing environments are going to mobile computing environments. Therefore a mutual exclusion algorithm in static distributed environments should be designed for new computing environments. So this paper proposes a mobile mutual exclusion algorithm to support the mutual exclusion of shared resources in mobile computer environments. Mobile computing resources as wireless hosts cause new issues because of their mobility and weakness and made mutual exclusion problem more complex than stationary distributed environments. So we proposed a new mobile token mutual exclusion algorithm with deadlock-free and starvation-free in mobile computing environments based on spanning tree topology and extend for mobile computing environments. The proposed algorithm minimizes message complexity in case of free hopping in cellular networks.