• Title/Summary/Keyword: security rule

Search Result 286, Processing Time 0.022 seconds

A Method of Generating Changeable Face Template for Statistical Appearance-Based Face Recognition (통계적 형상 기반의 얼굴인식을 위한 가변얼굴템플릿 생성방법)

  • Lee, Chul-Han;Jung, Min-Yi;Kim, Jong-Sun;Choi, Jeung-Yoon;Kim, Jai-Hie
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.44 no.2 s.314
    • /
    • pp.27-36
    • /
    • 2007
  • Changeable biometrics identify a person using transformed biometric data instead of original biometric data in order to enhance privacy and security in biometrics when biometric data is compromised. In this paper, a novel scheme which generates changeable face templates for statistical appearance-based face recognition is proposed. Two different original face feature vectors are extracted from two different appearance-based approaches, respectively, each original feature vector is normalized, and its elements are re-ordered. Finally a changeable face template is generated by weighted addition between two normalized and scrambled feature vectors. Since the two feature vectors are combined into one by a two to one mapping, the original two feature vectors are not easily recovered from the changeable face template even if the combining rule is known. Also, when we need to make new changeable face template for a person, we change the re-ordering rule for the person and make a new feature vector for the person. Therefore, the security and privacy in biometric system can be enhanced by using the proposed changeable face templates. In our experiments, we analyze the proposed method with respect to performance and security using an AR-face database.

A Study on Detection of Malicious Android Apps based on LSTM and Information Gain (LSTM 및 정보이득 기반의 악성 안드로이드 앱 탐지연구)

  • Ahn, Yulim;Hong, Seungah;Kim, Jiyeon;Choi, Eunjung
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.5
    • /
    • pp.641-649
    • /
    • 2020
  • As the usage of mobile devices extremely increases, malicious mobile apps(applications) that target mobile users are also increasing. It is challenging to detect these malicious apps using traditional malware detection techniques due to intelligence of today's attack mechanisms. Deep learning (DL) is an alternative technique of traditional signature and rule-based anomaly detection techniques and thus have actively been used in numerous recent studies on malware detection. In order to develop DL-based defense mechanisms against intelligent malicious apps, feeding recent datasets into DL models is important. In this paper, we develop a DL-based model for detecting intelligent malicious apps using KU-CISC 2018-Android, the most up-to-date dataset consisting of benign and malicious Android apps. This dataset has hardly been addressed in other studies so far. We extract OPcode sequences from the Android apps and preprocess the OPcode sequences using an N-gram model. We then feed the preprocessed data into LSTM and apply the concept of Information Gain to improve performance of detecting malicious apps. Furthermore, we evaluate our model with numerous scenarios in order to verify the model's design and performance.

Implementation of Analyzer of the Alert Data using Data Mining (데이타마이닝 기법을 이용한 경보데이타 분석기 구현)

  • 신문선;김은희;문호성;류근호;김기영
    • Journal of KIISE:Databases
    • /
    • v.31 no.1
    • /
    • pp.1-12
    • /
    • 2004
  • As network systems are developed rapidly and network architectures are more complex than before, it needs to use PBNM(Policy-Based Network Management) in network system. Generally, architecture of the PBNM consists of two hierarchical layers: management layer and enforcement layer. A security policy server in the management layer should be able to generate new policy, delete, update the existing policy and decide the policy when security policy is requested. And the security policy server should be able to analyze and manage the alert messages received from Policy enforcement system in the enforcement layer for the available information. In this paper, we propose an alert analyzer using data mining. First, in the framework of the policy-based network security management, we design and implement an alert analyzes that analyzes alert data stored in DBMS. The alert analyzer is a helpful system to manage the fault users or hosts. Second, we implement a data mining system for analyzing alert data. The implemented mining system can support alert analyzer and the high level analyzer efficiently for the security policy management. Finally, the proposed system is evaluated with performance parameter, and is able to find out new alert sequences and similar alert patterns.

A Study of the Intelligent Connection of Intrusion prevention System against Hacker Attack (해커의 공격에 대한 지능적 연계 침입방지시스템의 연구)

  • Park Dea-Woo;Lim Seung-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.2 s.40
    • /
    • pp.351-360
    • /
    • 2006
  • Proposed security system attacks it, and detect it, and a filter generation, a business to be prompt of interception filtering dates at attack information public information. inner IPS to attack detour setting and a traffic band security, different connection security system, and be attack packet interceptions and service and port interception setting. Exchange new security rule and packet filtering for switch type implementation through dynamic reset memory by real time, and deal with a packet. The attack detection about DDoS, SQL Stammer, Bug bear, Opeserv worm etc. of the 2.5 Gbs which was an attack of a hacker consisted in network performance experiment by real time. Packet by attacks of a hacker was cut off, and ensured the normal inside and external network resources besides the packets which were normal by the results of active renewal.

  • PDF

Designing a system to defend against RDDoS attacks based on traffic measurement criteria after sending warning alerts to administrators (관리자에게 경고 알림을 보낸 후 트래픽 측정을 기준으로 RDDoS 공격을 방어하는 시스템 설계)

  • Cha Yeansoo;Kim Wantae
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.20 no.1
    • /
    • pp.109-118
    • /
    • 2024
  • Recently, a social issue has arisen involving RDDoS attacks following the sending of threatening emails to security administrators of companies and institutions. According to a report published by the Korea Internet & Security Agency and the Ministry of Science and ICT, survey results indicate that DDoS attacks are increasing. However, the top response in the survey highlighted the difficulty in countering DDoS attacks due to issues related to security personnel and costs. In responding to DDoS attacks, administrators typically detect anomalies through traffic monitoring, utilizing security equipment and programs to identify and block attacks. They also respond by employing DDoS mitigation solutions offered by external security firms. However, a challenge arises from the initial failure in early response to DDoS attacks, leading to frequent use of detection and mitigation measures. This issue, compounded by increased costs, poses a problem in effectively countering DDoS attacks. In this paper, we propose a system that creates detection rules, periodically collects traffic using mail detection and IDS, notifies administrators when rules match, and Based on predefined threshold, we use IPS to block traffic or DDoS mitigation. In the absence of DDoS mitigation, the system sends urgent notifications to administrators and suggests that you apply for and use of a cyber shelter or DDoS mitigation. Based on this, the implementation showed that network traffic was reduced from 400 Mbps to 100 Mbps, enabling DDoS response. Additionally, due to the time and expense involved in modifying detection and blocking rules, it is anticipated that future research could address cost-saving through reduced usage of DDoS mitigation by utilizing artificial intelligence for rule creation and modification, or by generating rules in new ways.

Standards on the Effectiveness of the Rights to Social Security of People with Disability (장애인 사회보장수급권의 실효성 기준에 관한 연구)

  • Seo, Jeong-Hee
    • Korean Journal of Social Welfare
    • /
    • v.62 no.1
    • /
    • pp.211-235
    • /
    • 2010
  • This study attempts to examine standards on the effectiveness of the rights to social security of people with disability. The current research makes the standards on effectiveness of social security rights to the disabled. This standards draw four right areas and five general principles from debates about effectiveness of general social security rights and extend for applying three social area to the disabled. Four right areas are benefit coverage, benefit structure, benefit restriction and rights relief. Five general principles are enforceable rule principle, national finance principle, unconditional principle, adequacy principle and penalties principle. These four right areas and five general principles apply to three social security areas of income support, employment security and medical security. Measurement values are 'high' and 'low'. These measurement values divided into two that are used to ensure same intervals. This study on standards to the effectiveness of the rights to social security of people with disability has political and theoretical implications. First, in political aspects, these standards provide objective understanding of the present level of social security policies for the disabled. Second, theoretically the current study expands debates about the effectiveness of general social security through multi-disciplined research. At once this study is significant to establish empirical research foundation.

  • PDF

The Systematic Structure of the Customs Act and Criminal Sanctions (관세법과 형벌체계의 구조)

  • 이경호
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.5 no.2
    • /
    • pp.141-165
    • /
    • 1999
  • The Customs Act provides for a general rule all goods entering Korea shall be subject to customs duties as set in the customs tariff schedules as other fees and taxes determined except those excluded by virtue of the Customs Act or intentional agreements. Importation begins from the time carrying vessel or aircraft enters Korea territorial jurisdiction with the intention to unload the same until the time the goods are released or withdrawn from the customhouse upon payment of the appropriate duties. Imported articles may be categorized into prohibited importations, dutiable importations and conditionally free importation. Some other articles are qualifiedly prohibited, meaning they can enter the country after compliance with certain conditions. If there is any conduct violating these act, criminal sanctions may be imposed for the prevention and suppression of smuggling and other frauds, and the enforcement of tariff and customs act. As a result importers who intentionally violates Korea Customs Act may be subject to criminal prosecution. Many major provisions of customs act have imposed severe sanctions for customs crimes in comparison with other crimes due to general rule of criminal law. There is a great deal of activity in Pusan area relating to smuggling of narcotics and prohibited drugs, obscene articles and weapons. On one side, criminals who seek to profit by narcotics or drug threaten public health and human environment, On other side, weapon smuggling is a significant threat to our national security. However the studies on customs crime and customs act have not been viewed. Thus this Article overviews especially the customs crime and criminal sanction focused on domestic customs act.

  • PDF

Synthesis of 90/150 Uniform CA and Computation of Characteristic Polynomial corresponding to uniform CA (90/150 Uniform CA의 합성 및 특성다항식 계산)

  • Choi, Un-Sook;Cho, Sung-Jin;Yim, Ji-Mi
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.1
    • /
    • pp.10-16
    • /
    • 2010
  • 90/150 CA is a CA completely specified by using rule 90 and rule 150. Since 90/150 CA whose minimal and characteristic polynomials are identical has outstanding randomness, this CA is more attractive than LFSR. Sarkar proposed a scheme based on the 90 uniform CA and the 150 uniform CA. That scheme provided authentication by digital signature and other basic security requirements like confidentiality. In this paper we analyze 90 or 150 uniform CA and give a synthesis method of 2n-cell uniform CA and (2n+1)-cell uniform CA using a special n-cell 90/150 CA. And we propose an effective method of computation of characteristic polynomial corresponding to uniform CA.

The Moderating Effects of Display Rule Fairness Perception and Problem-Focused Stress Coping on Emotional Labor (감정 노동에서 표현 규칙의 공정성에 대한 지각과 문제 중심 스트레스 대처의 조절효과에 관한 연구)

  • Kang, Won-Kyung;Kim, Min-Soo;Oh, Won-Kyung
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.37 no.2
    • /
    • pp.57-72
    • /
    • 2012
  • The moderators that relieve negative effects of emotional labor have been studied such as job characteristics and situational variables. But as reviewing these studies, they focused on the degree of emotional on certain condition, there's no distinction between that degree and moderating effects. So we should focus on the moderating variables as a organizational involvement. In this study, I hypnotized the mediating effect of job stress between emotional labor and organizational effectiveness. Then I explored moderating role of 'fairness perception of emotional labor' and 'problem-focused stress coping'. This study tested these relationships using data from 166 employees of domestic security service company. From this data, I found that emotional labor increases job stress and job stress fully mediates the relationship between individual attitude(job satisfaction, turnover intention). And one who perceives display rule fairer, feels less job stress than who is not. Lastly, one who copes more problem-focused when he/she experiences job stress, have less negative effect on turnover intention.

A Study on Performance Assessment Methods by Using Fuzzy Logic

  • Kim, Kwang-Baek;Kim, Cheol-Ki;Moon, Jung-Wook
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.3 no.2
    • /
    • pp.138-145
    • /
    • 2003
  • Performance assessment was introduced to improvement of self-directed learning and method of assessment for differenced learning as the seventh educational curriculum is enforced. Performance assessment is overcoming limitation about problem solving ability and higher thinking abilities assessment that is problem of a written examination and get into the spotlight by way for quality of class and school normalization. But, performance assessment has problems about possibilities of assessment fault by appraisal, fairness, reliability, and validity of grading, ambiguity of grading standard, difficulty about objectivity security etc. This study proposes fuzzy performance assessment system to solve problem of the conventional performance assessment. This paper presented an objective and reliable performance assessment method through fuzzy reasoning, design fuzzy membership function and define fuzzy rule analyzing factor that influence in each sacred ground of performance assessment to account principle subject. Also, performance assessment item divides by formation estimation and subject estimation and designed membership function in proposed performance assessment method. Performance assessment result that is worked through fuzzy performance assessment system can pare down burden about appraisal's fault and provide fair and reliable assessment result through grading that have correct standard and consistency to students.