• Title/Summary/Keyword: mitigate

Search Result 2,580, Processing Time 0.031 seconds

Development of CC Based Security Risk Analysis Tool (CC(Common Criteria) 기반 보안위험분석 도구 개발)

  • Kim In-Jung;Chung Yoon-Jung;Koh Jae-Young;Won Dong-Ho
    • Journal of Internet Computing and Services
    • /
    • v.7 no.1
    • /
    • pp.31-38
    • /
    • 2006
  • The importance of the Security Risk Analysis has emerged as security breaches and information leaks has occurred in the companies and organization: threats toward information system and its vulnerabilities has grown up as the dependence on the information-communication systems goes higher as a result of technological advances in IT industry, A Risk Analysis Tool helps to mitigate overall risk of an organization by analysing and evaluating critical information systems and providing security measures against threats to systems and its vulnerabilities as a means to identify the inherent dangers and prevent security intrusion incident, This paper defines risk analysis process by introducing Common Criteria Scheme and suggest a risk analysis tool that can be easily implemented by an information security manager.

  • PDF

Supporting Trusted Soft Decision Scheme Using Volatility Decay in Cooperative Spectrum Sensing

  • Zhao, Feng;Feng, Jingyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2067-2080
    • /
    • 2016
  • Cooperative spectrum sensing (CSS) for vacant licensed bands is one of the key techniques in cognitive radio networks. Currently, sequential probability ratio test scheme (SPRT) is considered as a powerful soft decision approach to improve the sensing result for CSS. However, SPRT assumes all secondary users (SU) are honest, and thus offering opportunities for malicious SUs to launch the spectrum sensing data falsification attack (SSDF attack). To combat such misbehaved behaviors, recent efforts have been made to trust mechanism. In this paper, we argue that powering SPRT with traditional trust mechanism is not enough. Dynamic SSDF attackers can maintain high trust in an alternant process of submitting honest or false sensing data, resulting in difficultly detecting them. Noting that the trust value of dymamic SSDF attackers behave highly volatile, a novel trusted SPRT scheme (VSPRT) based on volatility decay analysis is proposed in this paper to mitigate the harmful effect of dynamic SSDF attackers in the process of the soft-decision data fusion, and thus improving the accuracy of the final sensing result. Simulation results show that the VSPRT scheme outperforms the conventional SPRT schemes.

A Dynamic Channel Switching Policy Through P-learning for Wireless Mesh Networks

  • Hossain, Md. Kamal;Tan, Chee Keong;Lee, Ching Kwang;Yeoh, Chun Yeow
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.608-627
    • /
    • 2016
  • Wireless mesh networks (WMNs) based on IEEE 802.11s have emerged as one of the prominent technologies in multi-hop communications. However, the deployment of WMNs suffers from serious interference problem which severely limits the system capacity. Using multiple radios for each mesh router over multiple channels, the interference can be reduced and improve system capacity. Nevertheless, interference cannot be completely eliminated due to the limited number of available channels. An effective approach to mitigate interference is to apply dynamic channel switching (DCS) in WMNs. Conventional DCS schemes trigger channel switching if interference is detected or exceeds a predefined threshold which might cause unnecessary channel switching and long protocol overheads. In this paper, a P-learning based dynamic switching algorithm known as learning automaton (LA)-based DCS algorithm is proposed. Initially, an optimal channel for communicating node pairs is determined through the learning process. Then, a novel switching metric is introduced in our LA-based DCS algorithm to avoid unnecessary initialization of channel switching. Hence, the proposed LA-based DCS algorithm enables each pair of communicating mesh nodes to communicate over the least loaded channels and consequently improve network performance.

Self-organized Spectrum Access in Small-cell Networks with Dynamic Loads

  • Wu, Ducheng;Wu, Qihui;Xu, Yuhua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.1976-1997
    • /
    • 2016
  • This paper investigates the problem of co-tier interference mitigation for dynamic small- cell networks, in which the load of each small-cell varies with the number of active associated small-cell users (SUs). Due to the fact that most small-cell base stations (SBSs) are deployed in an ad-hoc manner, the problem of reducing co-tier interference caused by dynamic loads in a distributed fashion is quite challenging. First, we propose a new distributed channel allocation method for small-cells with dynamic loads and define a dynamic interference graph. Based on this approach, we formulate the problem as a dynamic interference graph game and prove that the game is a potential game and has at least one pure strategy Nash equilibrium (NE) point. Moreover, we show that the best pure strategy NE point minimizes the expectation of the aggregate dynamic co-tier interference in the small-cell network. A distributed dynamic learning algorithm is then designed to achieve NE of the game, in which each SBS is unaware of the probability distributions of its own and other SBSs' dynamic loads. Simulation results show that the proposed approach can mitigate dynamic co-tier interference effectively and significantly outperform random channel selection.

Optimal Power Allocation for Wireless Uplink Transmissions Using Successive Interference Cancellation

  • Wu, Liaoyuan;Wang, Yamei;Han, Jianghong;Chen, Wenqiang;Wang, Lusheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2081-2101
    • /
    • 2016
  • Successive interference cancellation (SIC) is considered to be a promising technique to mitigate multi-user interference and achieve concurrent uplink transmissions, but the optimal power allocation (PA) issue for SIC users is not well addressed. In this article, we focus on the optimization of the PA ratio of users on an SIC channel and analytically obtain the optimal PA ratio with regard to the signal-to-interference-plus-noise ratio (SINR) threshold for successful demodulation and the sustainable demodulation error rate. Then, we design an efficient resource allocation (RA) scheme using the obtained optimal PA ratio. Finally, we compare the proposal with the near-optimum RA obtained by a simulated annealing search and the RA scheme with random PA. Simulation results show that our proposal achieves a performance close to the near-optimum and much higher performance than the random scheme in terms of total utility and Jain's fairness index. To demonstrate the applicability of our proposal, we also simulate the proposal in various network paradigms, including wireless local area network, body area network, and vehicular ad hoc network.

Seamless Mobility Management in IP-based Wireless/Mobile Networks with Fast Handover

  • Park, Byung-Joo;Hwang, Eun-Sang;Park, Gil-Cheol
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.3
    • /
    • pp.266-284
    • /
    • 2009
  • The challenges of rapidly growing numbers of mobile nodes in IPv6-based networks are being faced by mobile computing researchers worldwide. Recently, IETF has standardized Mobile IPv6 and Fast Handover for Mobile IPv6(FMIPv6) for supporting IPv6 mobility. Even though existing literatures have asserted that FMIPv6 generally improves MIPv6 in terms of handover speed, they did not carefully consider the details of the whole handover procedures. Therefore, in conventional protocols, the handover process reveals numerous problems manifested by a time-consuming network layer based movement detection and latency in configuring a new care of address with confirmation. In this article, we study the impact of the address configuration and confirmation procedure on the IP handover latency. To mitigate such effects, we propose a new scheme which can reduce the latency taken by the movement detection, address configuration and confirmation from the whole handover latency. Furthermore, a mathematical analysis is provided to show the benefits of our scheme. In the analysis, various parameters are used to compare our scheme with the current procedures, while our approach is focused on the reduction of handover latency. Finally, we demonstrate total handover scenarios for the proposed techniques and discussed the major factors which contribute to the handover latency.

A Moving Window Principal Components Analysis Based Anomaly Detection and Mitigation Approach in SDN Network

  • Wang, Mingxin;Zhou, Huachun;Chen, Jia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.8
    • /
    • pp.3946-3965
    • /
    • 2018
  • Network anomaly detection in Software Defined Networking, especially the detection of DDoS attack, has been given great attention in recent years. It is convenient to build the Traffic Matrix from a global view in SDN. However, the monitoring and management of high-volume feature-rich traffic in large networks brings significant challenges. In this paper, we propose a moving window Principal Components Analysis based anomaly detection and mitigation approach to map data onto a low-dimensional subspace and keep monitoring the network state in real-time. Once the anomaly is detected, the controller will install the defense flow table rules onto the corresponding data plane switches to mitigate the attack. Furthermore, we evaluate our approach with experiments. The Receiver Operating Characteristic curves show that our approach performs well in both detection probability and false alarm probability compared with the entropy-based approach. In addition, the mitigation effect is impressive that our approach can prevent most of the attacking traffic. At last, we evaluate the overhead of the system, including the detection delay and utilization of CPU, which is not excessive. Our anomaly detection approach is lightweight and effective.

Job Burnout of Restaurant Employees in Daegu City - With a Focus on 'Family-Work Conflict', 'Work-Family Conflict', Job Satisfaction, and Individual Job Performance - (대구 외식업 종사원의 직무소진에 관한 연구 - '가족-일 갈등', '일-가족 갈등', 직무만족 및 개인직무성과를 중심으로 -)

  • Ha, Dong-Hyun
    • Journal of the Korean Society of Food Culture
    • /
    • v.26 no.3
    • /
    • pp.261-270
    • /
    • 2011
  • The purpose of this study was to investigate the relationship between 'family-work conflict/work-family conflict', job burnout, job satisfaction, and individual job performance in the employees at the restaurants in Daegu City. The sample of this study consisted of employees at the restaurants in Daegu City who visited the 2010 Daegu Food Tour Expo between October 7 and October 10. A total of 302 questionnaires were analyzed using statistical methods of factor analysis, reliability test, and covariance structural analysis. The research findings were as follows; firstly, work-family conflict was positively related to job burnout, secondly, job burnout was negatively related to job satisfaction and individual job performance and thirdly, job satisfaction was positively related to individual job performance. However, there was no relationship between family-work conflict and job burnout. The reason for rejection of the relationship between family-work conflict and job burnout was that family-related affairs were not important enough to affect job burnout among restaurant employees in Korea. This phenomenon happened differently in the US. Therefore, currently, restaurant managers in Daegu City should pay much attention to work-related affairs so as to mitigate job burnout as much as possible among their employees.

Study on the Development of the Life Cycle Assessment Program in the Apartment Housing (공동주택 전과정평가 프로그램(SUSB-LCA ver1.0) 개발에 관한 연구)

  • Lee, Ha-Shik;Jung, Bo-Ra;Choi, Young-O;Chae, Chang-U;Lee, Kang-Hee
    • Proceeding of Spring/Autumn Annual Conference of KHA
    • /
    • 2008.04a
    • /
    • pp.393-398
    • /
    • 2008
  • The environment is the important resource to use as well as to conserve for the development. Since 1990s, it has accentuated the importance of the environment and tried to conserve the environment in many areas. Among many area, the building industry has played a role to destruct the environment for providing the living decent space and brought the environmental affect. Therefore, the building industry should endeavor to mitigate the environmental affect. In building life cycle, it consumes the energy and natural resources. But it is difficult to evaluate the environmental affect during the whole building life. It is impossible to calculate the environmental affect without the much time and effort. Therefore. it requires the easy and handing program to calculate the affect to environment in each building life cycle. Until now, many program for assessing the affect to the environment have been developed and limitedly used because of the assessment scope and contents. In this paper, it aimed at developing the assessment program of LCA, focused on the energy consumption and carbon-dioxide emission compared with the domestic and foreign concerned programs. The developed program is divided into 3 areas; construction, maintenance, demolition.

  • PDF

The Performance Improvement of MIM0-UWB Systems with Multiband Scheme (멀티밴드 방식을 적용한 MIM0-UWB 시스템의 성능 개선)

  • Lee, Jun-Haeng;Kim, Su-Nam;Kim, Ki-Doo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.9C
    • /
    • pp.1306-1315
    • /
    • 2004
  • UWB, which is now in a process of being standardized in WPAN communication, has some problems such as difficulty of implementation and interference with existing systems. To overcome these problems we will explain the MIMO structure to alleviate difficulties of implementation. In this paper we propose the UWB transceiver structure using multiband scheme to mitigate narrow band interference from PCS Of WLAN which is widely used these days and analyze the effect of noise and narrow band interference by simulation based on numerical analysis.