• Title/Summary/Keyword: security enhance

Search Result 817, Processing Time 0.026 seconds

Activity of Police to Enhance Police Service (치안서비스 제고를 위한 경찰활동)

  • Kim, Kyong-Tae
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.11
    • /
    • pp.263-271
    • /
    • 2008
  • In the outwardly changing environment of public security these days, police administration faces the nation's request for qualitative improvement of police service and the new request of police reformation for changing function of police in Korea. The nation wishes police to provide service fairly. The issue most seriously mentioned in the reliability of police service is very large gap in the recognition of service quality between supplier and consumer. To get the trust of nation in delivering police service, the police must have justness, consistency, punctuality of delivery, propriety and efficiency. However, the recognition of citizen, the consumer of police service is more important. How to correspond to the nation's request to police needs to be decided by evaluating the quality of present police service. It is necessary to be interested in what customer wants so as to evaluate the quality of police activity.

Rising of Integrated Ocean Drilling Program (IODP) and its Scientific Achievement on Earth Science and Role of Korea Integrated Ocean Drilling Program (K-IODP) (국제공동 해양 시추사업(IODP)의 등장과 지구과학에의 학술적 성과 및 한국프로그램(K-IODP)의 역할)

  • Hyun, Sang-Min;Chang, Se-Won;Lee, Young-Joo
    • The Korean Journal of Quaternary Research
    • /
    • v.25 no.2
    • /
    • pp.1-15
    • /
    • 2011
  • The ODP (Ocean Drilling Program) has been greatly contributed to the progress of Earth Science through the strong international cooperation with its name changed from DSDP DSDP(Deep Sea Drilling Program), IPOD (International Phase of Ocean Drilling) to IODP (Integrated Ocean Drilling Program). The IODP program which was launched about ten years ago will continue to develop toward the 2nd phase of scientific targets through the tight international cooperation. Distinguished scientific results from the various expedition as well as new phase of IODP structure and its important role that enhance the new scientific fields are summarized in this study. In particular, Arctic Expedition and deep-biosphere and high resolution climatic study that was not performed in previous ODP stages, will be extensively conducted in coming new 2nd IODP stages. Likewise, through strong international cooperation, it is expected that IODP would play an important role in Earth Science developments.

  • PDF

A Novel Network Anomaly Detection Method based on Data Balancing and Recursive Feature Addition

  • Liu, Xinqian;Ren, Jiadong;He, Haitao;Wang, Qian;Sun, Shengting
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.7
    • /
    • pp.3093-3115
    • /
    • 2020
  • Network anomaly detection system plays an essential role in detecting network anomaly and ensuring network security. Anomaly detection system based machine learning has become an increasingly popular solution. However, due to the unbalance and high-dimension characteristics of network traffic, the existing methods unable to achieve the excellent performance of high accuracy and low false alarm rate. To address this problem, a new network anomaly detection method based on data balancing and recursive feature addition is proposed. Firstly, data balancing algorithm based on improved KNN outlier detection is designed to select part respective data on each category. Combination optimization about parameters of improved KNN outlier detection is implemented by genetic algorithm. Next, recursive feature addition algorithm based on correlation analysis is proposed to select effective features, in which a cross contingency test is utilized to analyze correlation and obtain a features subset with a strong correlation. Then, random forests model is as the classification model to detection anomaly. Finally, the proposed algorithm is evaluated on benchmark datasets KDD Cup 1999 and UNSW_NB15. The result illustrates the proposed strategies enhance accuracy and recall, and decrease the false alarm rate. Compared with other algorithms, this algorithm still achieves significant effects, especially recall in the small category.

Trend and Improvement for Privacy Protection of Future Internet (미래 인터넷 기술의 Privacy 보호 기술 동향 및 개선)

  • Kim, DaeYoub
    • Journal of Digital Convergence
    • /
    • v.14 no.6
    • /
    • pp.405-413
    • /
    • 2016
  • To solve various problems of the Internet as well as to enhance network performance, various future Internet architectures utilize cached data in network nodes or in proxy servers. Named-data networking (NDN), one of future Internet architectures, implements in-network data caching functionality, and then responds itself to request messages. However, it can cause users' privacy invasion that the publisher of data can not engage in the sharing/using process of the data anymore after the data was cached in-network. So NDN implements both encryption-based access control and group access control. But, since such access control schemes need to exchange additional messages in order to search for a proper access control list and keys, it causes inefficiency. This paper surveys the access control schemes of NDN, and then proposes an improved scheme.

A Study on Integrated ID Authentication Protocol for Web User (웹 사용자를 위한 통합 ID 인증 프로토콜에 관한 연구)

  • Shin, Seung-Soo;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.13 no.7
    • /
    • pp.197-205
    • /
    • 2015
  • Existing Web authentication method utilizes the resident registration number by credit rating agencies separating i-PIN authentication method which has been improved authentication using resident registration number via the real name confirmation database. By improving the existing authentication method, and it provides the available integrated ID authentication on Web. In order to enhance safety, the proposed authentication method by encrypting the user of the verification value, and stores the unique identifier in the database of the certificate authority. Then, the password required to log in to the Web is for receiving a disposable random from the certificate authority, the user does not need to remember a separate password and receives the random number by using the smart phone. It does not save the user's personal information in the database, and it is easy to management of personal information. Only the integration ID needs to be remembered with random number on every time. It doesn't need to use various IDs and passwords if you use this proposed authentication methods.

Mapping Tool for Semantic Interoperability of Clinical Terms (임상용어의 의미적 상호운영성을 위한 매핑 도구)

  • Lee, In-Keun;Hong, Sung-Jung;Cho, Hune;Kim, Hwa-Sun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.60 no.1
    • /
    • pp.167-173
    • /
    • 2011
  • Most of the terminologies used in medical domain is not intended to be applied directly in clinical setting but is developed to integrate the terms by defining the reference terminology or concept relations between the terms. Therefore, it is needed to develop the subsets of the terminology which classify categories properly for the purpose of use and extract and organize terms with high utility based on the classified categories in order to utilize the clinical terms conveniently as well as efficiently. Moreover, it is also necessary to develop and upgrade the terminology constantly to meet user's new demand by changing or correcting the system. This study has developed a mapping tool that allows accurate expression and interpretation of clinical terms used for medical records in electronic medical records system and can furthermore secure semantic interoperability among the terms used in the medical information model and generate common terms as well. The system is designed to execute both 1:1 and N:M mapping between the concepts of terms at a time and search for and compare various terms at a time, too. Also, in order to enhance work consistency and work reliability between the task performers, it allows work in parallel and the observation of work processes. Since it is developed with Java, it adds new terms in the form of plug-in to be used. It also reinforce database access security with Remote Method Invocation (RMI). This research still has tasks to be done such as complementing and refining and also establishing management procedures for registered data. However, it will be effectively used to reduce the time and expenses to generate terms in each of the medical institutions and improve the quality of medicine by providing consistent concepts and representative terms for the terminologies used for medical records and inducing proper selection of the terms according to their meaning.

A Study on Secure and Efficient Wireless Network Management Scheme based Multi users for Ubiquitous Environment (유비쿼터스 환경을 위한 다중 사용자 기반의 안전하고 효율적인 무선 네트워크 관리 기법 제안)

  • Seo Dae-Hee;Lee Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.1-10
    • /
    • 2006
  • Ubiquitous computing, a new type of network environment has been generating much interest recently and has been actively studied. In ubiquitous computing, the sensor network which consists of low electric power ad-hoc network-based sensors and sensor nodes, is particularly the most important factor The sensor network serves as the mediator between ubiquitous computing and the actual environment. Related studies are focused on network . management through lightweight hardware using RFID. However, to apply these to actual environment, more practical scenarios as well as more secured studies equipped with secures and efficiency features are needed. Therefore, this study aims to build a wireless network based on PTD for multi users, which provides the largest utility in individual networks, and propose an appropriate management method. The proposed method is designed to enhance security and efficiency related to various services required in wireless networks, based on the reliable peripheral devices for users or pm. using pm, which has been applied to electronic commerce transactions in existing papers, this study also proposed an appropriate management method that is suitable for a dynamic environment and setting a temporary group to provide various services.

Implementation of Secure Keypads based on Tetris-Form Protection for Touch Position in the Fintech (핀테크에서 터치 위치 차단을 위한 테트리스 모양의 보안 키패드의 구현)

  • Mun, Hyung-Jin;Kang, Sin-Young;Shin, ChwaCheol
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.8
    • /
    • pp.144-151
    • /
    • 2020
  • User-authentication process is necessary in Fintech Service. Especially, authentication on smartphones are carried out through PIN which is inputted through virtual keypads on touch screen. Attacker can analogize password by watching touched letter and position over the shoulder or using high definition cameras. To prevent password spill, various research of virtual keypad techniques are ongoing. It is hard to design secure keypad which assures safety by fluctuative keypad and enhance convenience at once. Also, to reconfirm user whether password is wrongly pressed, the inputted information is shown on screen. This makes the password easily exposed through high definition cameras or Google Class during recording. This research analyzed QWERTY based secure keypad's merits and demerits. And through these features, creating Tetris shaped keypad and piece them together on Android environment, and showing inputted words as Tetris shape to users through smart-screen is suggested for the ways to prevent password spill by recording.

Application Areas for Cloud Computing Services using M2M and WoT (클라우드 컴퓨팅 서비스를 위한 M2M과 WoT 활용 방안)

  • Kim, Jangwon;Park, Dae-Ha;Baik, Doo-Kwon
    • Journal of Service Research and Studies
    • /
    • v.2 no.1
    • /
    • pp.61-68
    • /
    • 2012
  • Much technologies building cloud computing environment and supporting sevices on the cloud computing have been developing. Through the environment, accessing new services and sharing knowledge become easy. So far, they have just focused on companies which can support services and people who can use those services. In other words, the environment and models for cloud computing are the most important issue. However, the environment changes rapidly, mobile devices that are connected with each other not only will replace the computing environment based on desktop, but also can create Big data. Therefore, technologies and models are need to follow the trend including mobile based cloud computing environment. In this paper, we explain the cloud computing technologies and trend. Also we address Machine to Machine(M2M) technology and Web of things(WoT) in order to apply those into the cloud computing environment because these two concepts will enhance effectiveness and service reusability in the coming days.

  • PDF

A Comparison Study on Data Caching Policies of CCN (콘텐츠 중심 네트워킹의 데이터 캐시 정책 비교 연구)

  • Kim, Dae-Youb
    • Journal of Digital Convergence
    • /
    • v.15 no.2
    • /
    • pp.327-334
    • /
    • 2017
  • For enhancing network efficiency, various applications/services like CDN and P2P try to utilize content which have previously been cached somewhere. Content-centric networking (CCN) also utilizes data caching functionality. However, dislike CDN/P2P, CCN implements such a function on network nodes. Then, any intermediated nodes can directly respond to request messages for cached data. Hence, it is essential which content is cached as well as which nodes cache transmitted content. Basically, CCN propose for every nodes on the path from the content publisher of transmitted object to a requester to cache the object. However, such an approach is inefficient considering the utilization of cached objects as well as the storage overhead of each node. Hence, various caching mechanisms are proposed to enhance the storage efficiency of a node. In this paper, we analyze the performance of such mechanisms and compare the characteristics of such mechanisms. Also, we analyze content utilization patterns and apply such pattern to caching mechanisms to analyze the practicalism of the caching mechanisms.