• Title/Summary/Keyword: security rule

Search Result 286, Processing Time 0.022 seconds

An Aggregate Detection of Event Correlation using Fuzzy Control (퍼지제어를 이용한 관련성 통합탐지)

  • 김용민
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.3
    • /
    • pp.135-144
    • /
    • 2003
  • An intrusion detection system shows different result over overall detection area according to its detection characteristics of inner detection algorithms or techniques. To expand detection areas, we requires an integrated detection which can be archived both by deploying a few detection systems which detect different detection areas and by combining their results. In addition to expand detection areas, we need to decrease the workload of security managers by false alarms and improve the correctness by minimizing false alerts which happen during the process of integration. In this paper, a method for aggregation detection use fuzzy inference to integrate a vague detection results which imply the characteristics of detection systems. Their analyzed detection characteristics are expressed as fuzzy membership functions and fuzzy rule bases which are applied through the process of fuzzy control. And, it integrate a vague decision results and minimize the number of false alerts by reflecting the characteristics of detection systems. Also it does minimize inference objects by applying thresholds decided through several experiments.

FRChain: A Blockchain-based Flow-Rules-oriented Data Forwarding Security Scheme in SDN

  • Lian, Weichen;Li, Zhaobin;Guo, Chao;Wei, Zhanzhen;Peng, Xingyuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.264-284
    • /
    • 2021
  • As the next-generation network architecture, software-defined networking (SDN) has great potential. But how to forward data packets safely is a big challenge today. In SDN, packets are transferred according to flow rules which are made and delivered by the controller. Once flow rules are modified, the packets might be redirected or dropped. According to related research, we believe that the key to forward data flows safely is keeping the consistency of flow rules. However, existing solutions place little emphasis on the safety of flow rules. After summarizing the shortcomings of the existing solutions, we propose FRChain to ensure the security of SDN data forwarding. FRChain is a novel scheme that uses blockchain to secure flow rules in SDN and to detect compromised nodes in the network when the proportion of malicious nodes is less than one-third. The scheme places the flow strategies into blockchain in form of transactions. Once an unmatched flow rule is detected, the system will issue the problem by initiating a vote and possible attacks will be deduced based on the results. To simulate the scheme, we utilize BigchainDB, which has good performance in data processing, to handle transactions. The experimental results show that the scheme is feasible, and the additional overhead for network performance and system performance is less than similar solutions. Overall, FRChain can detect suspicious behaviors and deduce malicious nodes to keep the consistency of flow rules in SDN.

Normative-Legal and Information Security of Socio-Political Processes in Ukraine: a Comparative Aspect

  • Goshovska, Valentyna;Danylenko, Lydiia;Chukhrai, Ihor;Chukhrai, Nataliia;Kononenko, Pavlo
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.57-66
    • /
    • 2022
  • The aim of the article is to investigate socio-political processes in Ukraine on the basis of institutional and behavioral approaches, in particular their regulatory and informational support. Methodology. To determine the nature and content of sociopolitical processes, the following approaches have been used: 1. Institutional approach in order to analyze the development of Ukraine's political institutions. 2. The behavioral approach has been used for the analysis of socio-political processes in Ukraine in the context of political behavior of citizens, their political activity which forms the political culture of the country. Results. The general features of the socio-political situation in Ukraine are as follows: the formed model of government, which can be conditionally described as "presidential"; public demand for new leaders remains at a high level; the society has no common vision of further development; significant tendency of reduction of real incomes of a significant part of the society and strengthening of fiscal pressure on businessmen will get a public response after some time. Increasing levels of voice, accountability, efficiency of governance and the quality of the regulatory environment indicate a slow change in the political system, which will have a positive impact on public sentiment in the future. At the same time, there has been little change in the quality of Ukraine's institutions to ensure political stability, the rule of law and control of corruption. There are no cardinal changes in the development of the institution of property rights, protection of intellectual rights, changes in the sphere of ethics and control of corruption. Thus, Ukraine's political institutions have not been able to bring about any change in the social-political processes. Accordingly, an average level of trust and confidence of citizens in political institutions and negative public sentiment regarding their perception and future change can be traced in Ukraine.

Determination Method of Security Threshold using Fuzzy Logic for Statistical Filtering based Sensor Networks (통계적 여과 기법기반의 센서 네트워크를 위한 퍼지로직을 사용한 보안 경계 값 결정 기법)

  • Kim, Sang-Ryul;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.2
    • /
    • pp.27-35
    • /
    • 2007
  • When sensor networks are deployed in open environments, all the sensor nodes are vulnerable to physical threat. An attacker can physically capture a sensor node and obtain the security information including the keys used for data authentication. An attacker can easily inject false reports into the sensor network through the compromised node. False report can lead to not only false alarms but also the depletion of limited energy resource in battery powered sensor networks. To overcome this threat, Fan Ye et al. proposed that statistical on-route filtering scheme(SEF) can do verify the false report during the forwarding process. In this scheme, the choice of a security threshold value is important since it trades off detection power and energy, where security threshold value is the number of message authentication code for verification of false report. In this paper, we propose a fuzzy rule-based system for security threshold determination that can conserve energy, while it provides sufficient detection power in the SEF based sensor networks. The fuzzy logic determines a security threshold by considering the probability of a node having non-compromised keys, the number of compromised partitions, and the remaining energy of nodes. The fuzzy based threshold value can conserve energy, while it provides sufficient detection power.

  • PDF

Cellular Automata Transform based Invisible Digital Watermarking in Middle Domain for Gray Images

  • Li, Xiao-Wei;Kim, Seok-Tae
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.6
    • /
    • pp.689-694
    • /
    • 2011
  • Cellular automata are discrete dynamical systems, which provide the basis for the synthesis of complex emergent behavior. This paper proposes a new algorithm of digital watermarking based on cellular automata transform (CAT). The idea of two-dimensional CAT is introduced into the algorithm. After the original image is disassembled with 2D CAT, the watermark information is embedded into the Middle-frequency of the carrier picture. Cellular automata have a huge number of combinations, such as gateway values, rule numbers, initial configuration, boundary condition, etc. Using CAT, the robustness of the watermark will be tremendous strengthened as well as its imperceptibility. Experimental results show that this algorithm can resist some usual attacks such as compression, sharpening and so on. The proposed method is robust to different attacks and is more security.

A DRM Framework for Distributing Digital Contents through the Internet

  • Lee, Jun-Seok;Hwang, Seong-Oun;Jeong, Sang-Won;Yoon, Ki-Song;Park, Chang-Soon;Ryou, Jae-Cheol
    • ETRI Journal
    • /
    • v.25 no.6
    • /
    • pp.423-436
    • /
    • 2003
  • This paper describes our design of a contents distribution framework that supports transparent distribution of digital contents on the Internet as well as copyright protection of participants in the contents distribution value chain. Copyright protection must ensure that participants in the distribution channel get the royalties due to them and that purchasers use the contents according to usage rules. It must also prevent illegal draining of digital contents. To design a contents distribution framework satisfying the above requirements, we first present four digital contents distribution models. On the basis of the suggested distribution models, we designed a contract system for distribution of royalties among participants in the contents distribution channel, a license mechanism for enforcement of contents usage to purchasers, and both a packaging mechanism and a secure client system for prevention of illegal draining of digital contents.

  • PDF

Development of Expert System for Operation in Distribution Systems with Graphic Integrated Environments (그래픽 통합 환경을 갖춘 배전계통 운용 전문가 시스템 개발)

  • Kim, Se-Ho;Seo, Ki-Sung;Kim, Jeong-Keun;Park, Byoung-Youn;Woo, Kwang-Bang
    • The Transactions of the Korean Institute of Electrical Engineers
    • /
    • v.41 no.9
    • /
    • pp.960-972
    • /
    • 1992
  • This paper deals with the development of expert system in distribution system which combined with graphic user interface. The proposed expert system can recognize and adjust to the system change, and includes the rule bases of security monitoring. Also it provides load transfer algorithm for efficient load distribution. The graphic user environment for expert system is implemented in the mouse-oriented user interface with overlapped window functions and pull-down menus. Therefore, the developed graphic integrated expert system can afford to assist system operators very conveniently through the various graphic function in proposing an optimal plan of load transfer for fault restoration and outage schedule.

Design of Fuzzy-Controller for Agent Selection in CNP-applied Security Models (계약망 프로토콜을 적용한 보안 모델에서 에이전트 선택을 위한 퍼지 컨트롤러의 설계)

  • 이진아;조대호
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2004.05a
    • /
    • pp.20-24
    • /
    • 2004
  • 광범위한 네트워크의 연결과 이를 이용하는 조직이나 개인의 증가로 인터넷은 정보를 교환하고 거래를 수행하는 주요한 수단이 된 반면에 해커나 바이러스의 침입 또한 증가하여 공격에 쉽게 노출되어있다. 이러한 보안상의 문제점을 해결하기 위하여 컴퓨터나 네트워크 시스템의 활동을 감시할 수 있는 침입 탐지 시스템(IDS)과 같은 보안 요소를 도입하였으며, 탐지에 대한 성능을 향상시키기 위하여 네트워크를 기반으로 하는 다중 침입 탐지 시스템을 응용하여 네트워크에 분산된 에이전트들 중에서 발생된 침입에 알맞은 에이전트를 선택하도록 하여 침입 탐지를 효과적으로 할 수 있게 하였다. 본 연구에서는 보안 시스템의 연동을 위하여 계약망 프로토콜을 적용하였다. 계약망 프로토콜은 분산된 에이전트들 중에서 입찰과정을 통하여 최상의 에이전트를 선택하는데 이때, 에이전트를 선택하는 과정에 있어서 퍼지 규칙 기반 시스템을 적용한 퍼지 컨트롤러를 설계하여 시뮬레이션 한다.

  • PDF

Implementation of Distributed Intrusion Detection System based on Protocols (프로토콜 기반 분산 침입탐지시스템 설계 및 구현)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.1
    • /
    • pp.81-87
    • /
    • 2012
  • Intrusion Detection System that protects system safely is necessary as network technology is developed rapidly and application division is wide. Intrusion Detection System among others can construct system without participation of other severs. But it has weakness that big load in system happens and it has low efficient because every traffics are inspected in case that mass traffic happen. In this study, Distributed Intrusion Detection System based on protocol is proposed to reduce traffic of intrusion detection system and provide stabilized intrusion detection technique even though mass traffic happen. It also copes to attack actively by providing automatic update of using rules to detect intrusion in sub Intrusion Detection System.

A Study on the Calculation f Maximum Strain of Propeller Shaft Coating Materials (프로펠러축 피복재의 최대 스트레인 계산에 관한 연구)

  • 김윤해
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.22 no.2
    • /
    • pp.219-224
    • /
    • 1998
  • Recently to achieve the anti-corrossive effect in propeller shafts the coating technique with suit-able coating materials is available instead of bronze-sleeved shafts. In this case the coating mate-rials in service must not be delaminated from the shaft and the crack must not be originated. Thus the various performance and security test for coating materials of propeller shaft must be carried out under the real conditions or more severe circumstance. The most important factors effecting on the funtion of coating materials in propeller shaft are the strain and the environment of sea water. In this paper therefore the maximum possible strain which can be occured in real propeller shaft was calculated based on IACA standard classification rule in order to give the proper level of strain to the test samples in performance test of propeller shaft coating materials.

  • PDF