• Title/Summary/Keyword: online communication

Search Result 1,505, Processing Time 0.028 seconds

Phishing Detection Methodology Using Web Sites Heuristic (웹사이트 특징을 이용한 휴리스틱 피싱 탐지 방안 연구)

  • Lee, Jin Lee;Park, Doo Ho;Lee, Chang Hoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.10
    • /
    • pp.349-360
    • /
    • 2015
  • In recent year, phishing attacks are flooding with services based on the web technology. Phishing is affecting online security significantly day by day with the vulnerability of web pages. To prevent phishing attacks, a lot of anti-phishing techniques has been made with their own advantages and dis-advantages respectively, but the phishing attack has not been eradicated completely yet. In this paper, we have studied phishing in detail and categorize a process of phishing attack in two parts - Landing-phase, Attack-phase. In addition, we propose an phishing detection methodology based on web sites heuristic. To extract web sites features, we focus on URL and source codes of web sites. To evaluate performance of the suggested method, set up an experiment and analyze its results. Our methodology indicates the detection accuracy of 98.9% with random forest algorithm. The evaluation of proof-of-concept reveals that web site features can be used for phishing detection.

Designing an Efficient and Secure Credit Card-based Payment System with Web Services Based on the ANSI X9.59-2006

  • Cheong, Chi Po;Fong, Simon;Lei, Pouwan;Chatwin, Chris;Young, Rupert
    • Journal of Information Processing Systems
    • /
    • v.8 no.3
    • /
    • pp.495-520
    • /
    • 2012
  • A secure Electronic Payment System (EPS) is essential for the booming online shopping market. A successful EPS supports the transfer of electronic money and sensitive information with security, accuracy, and integrity between the seller and buyer over the Internet. SET, CyberCash, Paypal, and iKP are the most popular Credit Card-Based EPSs (CCBEPSs). Some CCBEPSs only use SSL to provide a secure communication channel. Hence, they only prevent "Man in the Middle" fraud but do not protect the sensitive cardholder information such as the credit card number from being passed onto the merchant, who may be unscrupulous. Other CCBEPSs use complex mechanisms such as cryptography, certificate authorities, etc. to fulfill the security schemes. However, factors such as ease of use for the cardholder and the implementation costs for each party are frequently overlooked. In this paper, we propose a Web service based new payment system, based on ANSI X9.59-2006 with extra features added on top of this standard. X9.59 is an Account Based Digital Signature (ABDS) and consumer-oriented payment system. It utilizes the existing financial network and financial messages to complete the payment process. However, there are a number of limitations in this standard. This research provides a solution to solve the limitations of X9.59 by adding a merchant authentication feature during the payment cycle without any addenda records to be added in the existing financial messages. We have conducted performance testing on the proposed system via a comparison with SET and X9.59 using simulation to analyze their levels of performance and security.

Anomaly Intrusion Detection based on Association Rule Mining in a Database System (데이터베이스 시스템에서 연관 규칙 탐사 기법을 이용한 비정상 행위 탐지)

  • Park, Jeong-Ho;Oh, Sang-Hyun;Lee, Won-Suk
    • The KIPS Transactions:PartC
    • /
    • v.9C no.6
    • /
    • pp.831-840
    • /
    • 2002
  • Due to the advance of computer and communication technology, intrusions or crimes using a computer have been increased rapidly while tremendous information has been provided to users conveniently Specially, for the security of a database which stores important information such as the private information of a customer or the secret information of a company, several basic suity methods of a database management system itself or conventional misuse detection methods have been used. However, a problem caused by abusing the authority of an internal user such as the drain of secret information is more serious than the breakdown of a system by an external intruder. Therefore, in order to maintain the sorority of a database effectively, an anomaly defection technique is necessary. This paper proposes a method that generates the normal behavior profile of a user from the database log of the user based on an association mining method. For this purpose, the Information of a database log is structured by a semantically organized pattern tree. Consequently, an online transaction of a user is compared with the profile of the user, so that any anomaly can be effectively detected.

The Interface Design and Development of Learning Management System and Contents for Self-Directed Learning based on Interaction and Usability (상호작용성과 사용편이성에 기초한 자기주도 학습운영시스템과 학습컨텐츠의 인터페이스 설계 및 구현)

  • Baek, Soo-Hee
    • Archives of design research
    • /
    • v.18 no.3 s.61
    • /
    • pp.149-160
    • /
    • 2005
  • The Purpose of this study is to embody self-directed learning management system and contents which are considered of learner's interactivity and usability in e-learning environment; It is based on self directed teaching and learning strategies. It divides type of interaction centering on the learners into four categories: (1) learner and instructor (2) learner and learner (3) learner and contents (4) learner and learning management system. The specific elements of learning management system is set up and embodied to present the interaction strategies according to the above-mentioned patterns, to improve the self-directed learning ability and to facilitate an online communication. The learning contents based on the self directed learning strategies, design the interface in due consideration of the learners' usability based on six strategies such as simple navigation, consistency, intuitive interface, linkage, user supports and immediate feedback. This research makes up for the weak points in the self-directed functions of learning management system and links up with learning contents, therefore it has a value to improve learner's interactivity and usability. It is expected that the research results can be helpful in quality improvement of e-learning environment.

  • PDF

An Inter-Working Method for Mobile Upbringing Game Using WAP Push Technology between WEB and WAP servers (WAP Push 기술을 애용한 모바일 육성 게임을 위한 WEB과 WAP 서버간의 연동 방법)

  • Hwang Doh-Yeun;Lee Nam-Jae;Kwak Hoon-Sung
    • The KIPS Transactions:PartB
    • /
    • v.12B no.2 s.98
    • /
    • pp.137-142
    • /
    • 2005
  • Since wireless communication cost is relatively expensive, the mobile games using cellular phones or PDAs are mostly played after being downloaded unlike more updated types of phone-to-phone or online games. In particular, the upbringing games, in which garners foster virtual companion animals or vegetables as their avata, have been spotlighted. It is essential to supply variety of items for upbringing avatas. However, due to diverse tastes for avatas and limited storage of mobile terminals, game manias must download their desired items from homepages. In addition, game developers must inform users through SMS messages whenever a new item is created. To do so, they must link WEB server and WAP server to Call Back URL or ARS. This paper proposed a linkage method suitable for JAVA-based mobile phone operating system. The proposed method will consequently increase life cycle of a game and reinforce profitability.

Secured Telemedicine Using Whole Image as Watermark with Tamper Localization and Recovery Capabilities

  • Badshah, Gran;Liew, Siau-Chuin;Zain, Jasni Mohamad;Ali, Mushtaq
    • Journal of Information Processing Systems
    • /
    • v.11 no.4
    • /
    • pp.601-615
    • /
    • 2015
  • Region of interest (ROI) is the most informative part of a medical image and mostly has been used as a major part of watermark. Various shapes ROIs selection have been reported in region-based watermarking techniques. In region-based watermarking schemes an image region of non-interest (RONI) is the second important part of the image and is used mostly for watermark encapsulation. In online healthcare systems the ROI wrong selection by missing some important portions of the image to be part of ROI can create problem at the destination. This paper discusses the complete medical image availability in original at destination using the whole image as a watermark for authentication, tamper localization and lossless recovery (WITALLOR). The WITALLOR watermarking scheme ensures the complete image security without of ROI selection at the source point as compared to the other region-based watermarking techniques. The complete image is compressed using the Lempel-Ziv-Welch (LZW) lossless compression technique to get the watermark in reduced number of bits. Bits reduction occurs to a number that can be completely encapsulated into image. The watermark is randomly encapsulated at the least significant bits (LSBs) of the image without caring of the ROI and RONI to keep the image perceptual degradation negligible. After communication, the watermark is retrieved, decompressed and used for authentication of the whole image, tamper detection, localization and lossless recovery. WITALLOR scheme is capable of any number of tampers detection and recovery at any part of the image. The complete authentic image gives the opportunity to conduct an image based analysis of medical problem without restriction to a fixed ROI.

Haum: Educational Mobile Game for Korean Language life Conversation (하움: 한국어 생활회화 교육용 모바일 게임)

  • Yun, Jihye;Lee, hansol;Hong, Jiyeon;Yoon, Daseul;Park, Su e;Park, Jung Kyu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.208-211
    • /
    • 2017
  • The biggest challenge immigrants face is language. We realized that Korean education contents suited for it are lacking more than we thought. To help with the above problems, we decided to make a mobile game for Korean conversation education. The proposed game is based on the online course of Sejonghakdang and is composed of life conversation which can be used immediately in real. We selected female marriage immigrants from China who have a large number of foreign residents and need a lot of Korean education but have a relatively low chance of being contacted. In the case of female marriage immigrants, communication was possible, but it was characterized that the composition of sentences was not smooth. Considering these features, we chose the game method that can match the problem in the unit of the word.

  • PDF

A User Adaptive Mobile Commerce Support System (개인 적응형 모바일 전자상거래 지원 시스템)

  • Lee Eunseok;Jang Sera
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.2
    • /
    • pp.180-191
    • /
    • 2005
  • The rapid growth of mobile communication technology has provided the expansion of mobile internet services, particularly mobile commerce takes much weight among them. Even though current mobile commerce service has serious problems which check its development, such as limited contents, expensive charge system and hardware restriction of mobile device, it is strongly expected as one of the next generation Internet services. In this paper, we summarize the problems like above and provide some total solution to meet them as follows: a function for automatic gathering of product information on online Internet and automatic translation it to data for mobile commerce, a middlelet application which provides functions for product search and order on the mobile device through off-line processing, and a function of user adaptive recommendation. We have actually designed and implemented the proposed system and verified the functions and effectiveness of the system.

Fuzzy Linguistic Recommender Systems for the Selective Diffusion of Information in Digital Libraries

  • Porcel, Carlos;Ching-Lopez, Alberto;Bernabe-Moreno, Juan;Tejeda-Lorente, Alvaro;Herrera-Viedma, Enrique
    • Journal of Information Processing Systems
    • /
    • v.13 no.4
    • /
    • pp.653-667
    • /
    • 2017
  • The significant advances in information and communication technologies are changing the process of how information is accessed. The internet is a very important source of information and it influences the development of other media. Furthermore, the growth of digital content is a big problem for academic digital libraries, so that similar tools can be applied in this scope to provide users with access to the information. Given the importance of this, we have reviewed and analyzed several proposals that improve the processes of disseminating information in these university digital libraries and that promote access to information of interest. These proposals manage to adapt a user's access to information according to his or her needs and preferences. As seen in the literature one of the techniques with the best results, is the application of recommender systems. These are tools whose objective is to evaluate and filter the vast amount of digital information that is accessible online in order to help users in their processes of accessing information. In particular, we are focused on the analysis of the fuzzy linguistic recommender systems (i.e., recommender systems that use fuzzy linguistic modeling tools to manage the user's preferences and the uncertainty of the system in a qualitative way). Thus, in this work, we analyzed some proposals based on fuzzy linguistic recommender systems to help researchers, students, and teachers access resources of interest and thus, improve and complement the services provided by academic digital libraries.

A Study on the Improvement of Warehouse Management System (WMS) in e-Trade (전자무역의 WMS 개선방안에 관한 연구)

  • Jeong, Boon-Do;Kim, Jang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.4
    • /
    • pp.641-647
    • /
    • 2007
  • It has been said that Warehouse Management System(WMS) in e-Trade has considerably contributed to improvement of distribution industry. However, in the aspect of management we have many technical problems such as transportation due to tremendous demands of online data. Therefore, for Korea to be a hub of distribution and information, this is the best time to prepare the foundation of Supply Chain Management(SCM) under Enterprise Resource Planning (ERP) the and make a good use of WMS. The purposes of this study are presented as follows: First, it is to examine the general flow process of WMS in each field of our e-Trade Second, it is to present problems and plans of improvements involved in WMS in e-Trade. In short, this study aims at presenting interpretative foundation of WMS in a practical viewpoint, not presenting technical directions of WMS.