• Title/Summary/Keyword: 네트워크 위험도

Search Result 705, Processing Time 0.03 seconds

Traffic Attributes Correlation Mechanism based on Self-Organizing Maps for Real-Time Intrusion Detection (실시간 침입탐지를 위한 자기 조직화 지도(SOM)기반 트래픽 속성 상관관계 메커니즘)

  • Hwang, Kyoung-Ae;Oh, Ha-Young;Lim, Ji-Young;Chae, Ki-Joon;Nah, Jung-Chan
    • The KIPS Transactions:PartC
    • /
    • v.12C no.5 s.101
    • /
    • pp.649-658
    • /
    • 2005
  • Since the Network based attack Is extensive in the real state of damage, It is very important to detect intrusion quickly at the beginning. But the intrusion detection using supervised learning needs either the preprocessing enormous data or the manager's analysis. Also it has two difficulties to detect abnormal traffic that the manager's analysis might be incorrect and would miss the real time detection. In this paper, we propose a traffic attributes correlation analysis mechanism based on self-organizing maps(SOM) for the real-time intrusion detection. The proposed mechanism has three steps. First, with unsupervised learning build a map cluster composed of similar traffic. Second, label each map cluster to divide the map into normal traffic and abnormal traffic. In this step there is a rule which is created through the correlation analysis with SOM. At last, the mechanism would the process real-time detecting and updating gradually. During a lot of experiments the proposed mechanism has good performance in real-time intrusion to combine of unsupervised learning and supervised learning than that of supervised learning.

Effective Parent-Child Key Establishment Algorithm used ZigBee Sensor Network (ZigBee 센서네트워크에서 효율적인 Parent - Child 키 연결 알고리즘)

  • Seo, Dae-Youl;Kim, Jin-Chul;Kim, Kyoung-Mok;Oh, Young-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.10 s.352
    • /
    • pp.35-45
    • /
    • 2006
  • Coordinator is defining so that function as most trust center that is point in security in ZigBee Alliance. Because must do height connection with coordinator in device signing to PAN newly, coordinator has shortcoming that subordinate is revealed to danger directly to Centered and cattish device. When do height connection some device, do not become problem, but if network is huge, coordinator's subordinate shall increase as traffic quantity which happen in coordinator increases. Also, in ZigBee security to link network kina of transmission and mutually certification in ZigBee Alliance standard include, but I do not provide method to deliver master key in each node safely. Because process that transmit master key passes through channel that do not secure, master key has shortcoming that is revealed directly. In this paper, I suggested Parent-Child key establishment algorithm to solve these problem. Proposed algorithm consists of two structures. Master key establishment algorithm and device that sign to PAN newly that can use one-way Hash chain and transmit master key safety are consisted of Parent-Child network key establishment algorithm that do child node and parent node key establishment as can do key establishment efficiently. Method that device proposes in case method that propose in case have master key establishment time was shown better performance $200{\sim}1300ms$ than existing method, and device does not have master key than existing method height connect time about $400{\sim}500ms$ better performance see.

Analysis of the Vulnerability of the IoT by the Scenario (시나리오 분석을 통한 사물인터넷(IoT)의 취약성 분석)

  • Hong, Sunghyuck;Sin, Hyeon-Jun
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.9
    • /
    • pp.1-7
    • /
    • 2017
  • As the network environment develops and speeds up, a lot of smart devices is developed, and a high-speed smart society can be realized while allowing people to interact with objects. As the number of things Internet has surged, a wide range of new security risks and problems have emerged for devices, platforms and operating systems, communications, and connected systems. Due to the physical characteristics of IoT devices, they are smaller in size than conventional systems, and operate with low power, low cost, and relatively low specifications. Therefore, it is difficult to apply the existing security solution used in the existing system. In addition, IoT devices are connected to the network at all times, it is important to ensure that personal privacy exposure, such as eavesdropping, data tampering, privacy breach, information leakage, unauthorized access, Significant security issues can arise, including confidentiality and threats to facilities. In this paper, we investigate cases of security threats and cases of network of IoT, analyze vulnerabilities, and suggest ways to minimize property damage by Internet of things.

Control Networks for Information Systems Development : Organizational and Agency Theory Perspectives (조직 이론과 대리 이론 관점에서 본 정보시스템 개발의 통제 네트워크에 관한 연구)

  • Hong, Sa-Neung
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.71-90
    • /
    • 2012
  • Although it has been studied for a long time in various disciplines, most of control theories remain being developed by analyzing relatively simple tasks. Even recent research on control of information systems development explains only a small part of control phenomena observed in the real world projects. This research focuses on identifying and analyzing the concepts and structures in order to make them useful for understanding and explaining control of information systems development comprehensively This investigation utilizes the complementary relationship between views on control from organizational and economic perspectives. A conceptual framework developed by integrating previous research on control allows us to analyze the development of information systems for control purposes. The results of discussion about control mechanisms and network can be used as guidelines for designing control systems in real projects. Analysis of control networks shows that control of development projects requires quite complex networks intertwining a variety of controllers and controlees. The results of this research are expected to contribute to correcting the unbalanced status of IS research which has emphasized too heavily on planning and implementation, and deepening and widening our understanding about controlling development projects. Practitioners can use the results as guidelines for designing control mechanisms and networks, and get alerted by them about the agency risks inherent in outsourced developments.

Performance Analysis of Docker Container Migration Using Secure Copy in Mobile Edge Computing (모바일 엣지 컴퓨팅 환경에서 안전 복사를 활용한 도커 컨테이너 마이그레이션 성능 분석)

  • Byeon, Wonjun;Lim, Han-wool;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.901-909
    • /
    • 2021
  • Since mobile devices have limited computational resources, it tends to use the cloud to compute or store data. As real-time becomes more important due to 5G, many studies have been conducted on edge clouds that computes at locations closer to users than central clouds. The farther the user's physical distance from the edge cloud connected to base station is, the slower the network transmits. So applications should be migrated and re-run to nearby edge cloud for smooth service use. We run applications in docker containers, which is independent of the host operating system and has a relatively light images size compared to the virtual machine. Existing migration studies have been experimented by using network simulators. It uses fixed values, so it is different from the results in the real-world environment. In addition, the method of migrating images through shared storage was used, which poses a risk of packet content exposure. In this paper, Containers are migrated with Secure CoPy(SCP) method, a data encryption transmission, by establishing an edge computing environment in a real-world environment. It compares migration time with Network File System, one of the shared storage methods, and analyzes network packets to verify safety.

An Emergency Message Propagation Method with Stem and Branch Structure for Vehicle Safety Communication (차량안전통신을 위한 줄기와 가지 구조를 이용한 긴급 메시지 전파 방법)

  • Yu, Suk-Dea;Cho, Gi-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.2A
    • /
    • pp.203-212
    • /
    • 2007
  • An advanced vehicle safety system can be constructed by exchanging danger-related information ,such as urgency stop, traffic accident, obstacle, and car trouble, among the vehicles. However, because network topology changes rapidly and frequently due to the mobility of vehicles, it is impossible to configure the network for information forwarding in this environment. In the most of vehicle safety communication applications, an emergency message is propagated in a form of broadcasting. The simple broadcasting causes a lot of problems in terms of efficiency due to multi-hop area and radio collision problem. This paper proposes a method of selective message forwarding with stem and branch structure for propagating the emergency messages. However, the proposed method raise the efficiency of message transmission with the selective forwarding based on the priority assignment as its location. We analyze and evaluate the performance by comparing the proposed scheme with other schemes that are presented in the paper.

A Probabilistic Approach for Robust Anonymous Authentication Protocol in VANETs (차량 네트워크에서 강한 익명성이 지원되는 인증 프로토콜을 위한 확률론적 접근방식)

  • Kim, Tae-Yeon;An, Do-Sik;Cho, Gi-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.10
    • /
    • pp.2309-2315
    • /
    • 2013
  • VANET(Vehicular Ad-hoc Network) is getting attention as an application to improve driver safety through inter-vehicle communication. For activation of VANET, privacy-preserving mutual authentication has to be guaranteed. In previous works, authors proposed various group-based authentication protocols. However, risks on ID exposure due to repeated use of group key and RSU(Road Side Unit) DoS attack were not considered. In this paper, we propose a probabilistic approach for robust anonymous authentication protocol. We evaluated our proposed method in a sets of criteria in VANET and verified it is an efficient solution for enhancing privacy.

False Alarm Minimization Technology using SVM in Intrusion Prevention System (SVM을 이용한 침입방지시스템 오경보 최소화 기법)

  • Kim Gill-Han;Lee Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.7 no.3
    • /
    • pp.119-132
    • /
    • 2006
  • The network based security techniques well-known until now have week points to be passive in attacks and susceptible to roundabout attacks so that the misuse detection based intrusion prevention system which enables positive correspondence to the attacks of inline mode are used widely. But because the Misuse detection based Intrusion prevention system is proportional to the detection rules, it causes excessive false alarm and is linked to wrong correspondence which prevents the regular network flow and is insufficient to detect transformed attacks, This study suggests an Intrusion prevention system which uses Support Vector machines(hereinafter referred to as SVM) as one of rule based Intrusion prevention system and Anomaly System in order to supplement these problems, When this compared with existing intrusion prevention system, show performance result that improve about 20% and could through intrusion prevention system that propose false positive minimize and know that can detect effectively about new variant attack.

  • PDF

An Analysis of Packet Collision Probability due to Inter-piconet Interference in the Bluetooth Low Energy Networks (저전력 블루투스 네트워크에서 피코넷 간 간섭으로 인한 패킷충돌 확률 분석)

  • Kim, Myoung Jin
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.8
    • /
    • pp.3-11
    • /
    • 2017
  • Research and development are being conducted to apply low-power Bluetooth (BLE) technology to IoT (Internet of Things) applications. The characteristic of this application environment is that many piconets can operate in the same space. Therefore, interference between homogeneous networks is likely to occur. In the BLE data channel, adaptive frequency hopping (AFH) scheme is used among the 37 frequency channels, and the master and the slave communicate while changing the carrier frequency. If there are multiple BLE piconets in the same space, there is a risk of frequency collision and packet errors will occur. In this paper, we analyze the packet collision probability due to cochannel interference in multiple asynchronous BLE piconet environments. Specifically, we analyzed packet collision probability according to the number of concurrently operating BLE piconets with the ratio of connection interval to connection event length as the main parameters. The analysis result can be used to set connection event related parameters for a desired packet collision probability according to the number of users having BLE devices in a given space.

A Study on the Development of Pavement Crack Recognition Algorithm Using Artificial Neural Network (신경망 학습 기법을 이용한 도로면 크랙 인식 알고리즘 개발에 관한 연구)

  • Yoo Hyun-Seok;Lee Jeong-Ho;Kim Young-suk;Sung Nak-won
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2004.11a
    • /
    • pp.561-564
    • /
    • 2004
  • Crack sealing automation machines' have been continually developed since the early 1990's because of the effectiveness of crack sealing that would be able to improve safety, quality and productivity. It has been considered challenging problem to detect crack network in pavement which includes noise (oil marks, skid marks, previously sealed cracks and inherent noise). It is required to develop crack network mapping and modeling algorithm in order to accurately inject sealant along to the middle of cut crack network. The primary objective of this study is to propose a crack network mapping and modeling algorithm using neural network for improving the accuracy of the algorithm used in the APCS. It is anticipated that the effective use of the proposed algorithms would be able to reduce error rate in image processing for detecting, mapping and modeling crack network as well as improving quality and productivity compared to existing vision algorithms.

  • PDF