• Title/Summary/Keyword: 보안인식

Search Result 1,361, Processing Time 0.03 seconds

Phishing Detection Methodology Using Web Sites Heuristic (웹사이트 특징을 이용한 휴리스틱 피싱 탐지 방안 연구)

  • Lee, Jin Lee;Park, Doo Ho;Lee, Chang Hoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.10
    • /
    • pp.349-360
    • /
    • 2015
  • In recent year, phishing attacks are flooding with services based on the web technology. Phishing is affecting online security significantly day by day with the vulnerability of web pages. To prevent phishing attacks, a lot of anti-phishing techniques has been made with their own advantages and dis-advantages respectively, but the phishing attack has not been eradicated completely yet. In this paper, we have studied phishing in detail and categorize a process of phishing attack in two parts - Landing-phase, Attack-phase. In addition, we propose an phishing detection methodology based on web sites heuristic. To extract web sites features, we focus on URL and source codes of web sites. To evaluate performance of the suggested method, set up an experiment and analyze its results. Our methodology indicates the detection accuracy of 98.9% with random forest algorithm. The evaluation of proof-of-concept reveals that web site features can be used for phishing detection.

An XML Access Control Method through Filtering XPath Expressions (XPath 표현식의 필터링을 통한 XML 접근 제어 기법)

  • Jeon Jae-myeong;Chung Yon Dohn;Kim Myoung Ho;Lee Yoon Joon
    • Journal of KIISE:Databases
    • /
    • v.32 no.2
    • /
    • pp.193-203
    • /
    • 2005
  • XML (extensible Markup Language) is recognized as a standard of data representation and transmission on Internet. XPath is a standard for specifying parts of XML documents anda suitable language for both query processing and access control of XML. In this paper, we use the XPath expression for representing user queries and access control for XML. And we propose an access control method for XML, where we control accesses to XML documents by filtering query XPath expressions through access control XPath expressions. In the proposed method, we directly search XACT (XML Access Control Tree) for a query XPath expression and extract the access-granted parts. The XACT is our proposedstructure, where the edges are structural summary of XML elements and the nodes contain access-control information. We show the query XPath expressions are successfully filtered through the XACT by our proposed method, and also show the performance improvement by comparing the proposed method with the previous work.

The data transmission of the of u-ID sensor networks configuration with a Bluetooth (Bluetooth를 이용한 u-ID센서네트워크 구성에서의 데이터 전송)

  • 김영길;박지훈
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.45-48
    • /
    • 2004
  • RFID(Radio Frequency Identification) which is emerging from a change in digital convergence paradigm and recently rapidly advancing throughout the overall society is the core technology based on Ubiquitous network. In other words, This is a technology to identify the information of the object and recognize the situation by attaching electrical tag to an object and using Reader that can read the information of the object. With the emergence of the technology, it has turned the existing maintenance of the product into the network and intelligence of the product control by using the bar cord to maintain the product and will lead a revolution throughout overall society by affecting the fields of distribution and product maintenance as well as those of medicines, chemicals and food which the electrical tag can be attached to. this paper shows that utilizing the Bluetooth which is a local wireless telecommunication in the standalone imbedded system can implement the piconet configuration among the Readers and the data telecommunication with the main server

  • PDF

A Method of Establishing the National Cyber Disaster Management System (국가 사이버재난관리 시스템 구축 방안)

  • Kim, Sang-Wook;Shin, Yong-Tae
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.5
    • /
    • pp.351-362
    • /
    • 2010
  • In Korea, national information infrastructure has been grown well because of the rapid growth and supply of Internet, but threats of cyber terror and cyber war are also increasing. Cyber attacks on knowledge information society threaten industry, economy and security. Major countries realize that cyber attacks can cause national heavy loss. So, they are trying to adopt policy on their cyber safe. And natural environmental crisises are increasing around the world. Countries such as India and Philippine in which tsunami, typhoon and earthquake are often occurring have national systematic disaster management system that can prevent and recover. We need systematic management for prevention and recovery from cyber terror, and need to establish national cyber disaster management system. Therefore, in this paper, we analyze major countries's cyber security policy and suggest a method of establishing the national cyber disaster management system.

(A New Key Recovery Protocol of Wireless Authentication Key Establishment for the M-Commerce) (M-Commerce상에서 키 복구를 지원하는 무선 인증 및 키 설립 프로토콜)

  • 이용호;이임영
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.371-376
    • /
    • 2003
  • As Mobile Internet gets more popular, the switchover of E-Commerce to M-Commerce gets faster and many service providers offer diverse M-Commerce service by using mobile technology. Also, as M-Commerce makes rapid progress, the security protocol gets more widely recognized for its significance. In particular, WAKE(Wireless Authentication and Key Establishment) protocol carried out wirelessly is of great importance, since the user and service provider must get through to carry out the M-Commerce. Key recovery method is a part of the key management in order to provide an emergency recovery of key whenever necessary, like when the user lost the key or the cryptosystem was illegally used. The ASPeCT project first tried to support the key recovery function in WAKE Protocol Since then, a variety of WAKE Key Recovery protocols have been proposed. In this thesis, problems of WAKE Key Recovery protocols proposed so far are analyzed and new WAKE Key Recovery protocol is suggested to solve those problems.

A Study on Median Filter using Directional Mask in Salt & Pepper Noise Environments (Salt & Pepper 잡음 환경에서 방향성 마스크를 이용한 메디안 필터에 관한 연구)

  • Hong, Sang-Woo;Kim, Nam-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.1
    • /
    • pp.230-236
    • /
    • 2015
  • In these digital times, the image signal processing is being used in various areas like vehicle recognition, security, and robotics. Generally, the image deterioration occurs by salt & pepper noise in the procedures of image transmission, storage, and processing. Methods to remove this noise are SMF, CWMF, and SWMF and these methods have few unsatisfactory noise reduction characteristics in salt & pepper noise environment. Therefore, in order to mitigate salt & pepper noise which is added in the image, this study suggested an algorithm which subdivides the masks in the image into four areas and processes using non-noise pixel numbers in each area. Additionally, in order to prove the excellence of the proposed algorithm, relevant performances were compared with existing methods using PSNR.

Effectiveness of Situational Crime Prevention Methods to Deter Shoplifting in the Private Security (상점절도 방지를 위한 상황적 경비기법의 효과성)

  • Kang, Min-Wan
    • Korean Security Journal
    • /
    • no.27
    • /
    • pp.7-30
    • /
    • 2011
  • Shoplifting causes serious losses to not only stores but also to consumers and society as a whole. There need to be effective society-wide measures to control shoplifting due to its characteristic of playing the role as a stepping stone to induce more serious crimes. However, there is a lack of research on shoplifting in Korea, especially the research analyzing situational factors to suggest effective alternative measures for shoplifting prevention. Therefore, the current study surveyed teenagers, the group known to be the most frequent shoplifters, to see their perception of effectiveness of the situational crime prevention methods used in stores. The result showed that the teenagers found only some of the prevention methods effective, including CCTV, Electronic Article Surveillance(EAS), minimization of blind areas, and watchful clerks. However, factors such as the number of doors and their accessibility and presence of security guards were not perceived to be very effective. Using the result of the survey, this study suggests ways to utilize situational crime prevention methods more effectively to deter shoplifting.

  • PDF

Landuse Mapping using KOMPSAT-2 Satellite Image in River Basin Flood Mitigation Planning (유역 홍수계획수립에서 KOMPSAT-2 영상을 이용한 토지이용도 제작)

  • Shin, Hyoung-Sub;Kim, Kyu-Ho;Jung, Sang-Hwa;Na, Sang-Il
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2012.05a
    • /
    • pp.635-635
    • /
    • 2012
  • 최근 공공분야 및 민간분야에서 고해상도 위성영상의 활용이 높아짐에 따라 이를 이용하여 수자원 분야의 치수계획 및 안전도 평가, 유역 홍수대응기술 분야에서의 다양한 활용이 비약적으로 증대되고 있는 실정이다. 고해상도 위성영상의 활용은 국지적 규모의 토지이용 변화 및 대기 상태의 모니터링을 위한 효과적인 기술로 인식되어 왔다. 우리나라의 KOMPSAT-2 위성은 GSD(Ground Sample Distance) 1m급의 전정색 영상과 4m급의 다중분광 영상을 동시에 제공하는 고해상도 위성이다. 그러나 다중분광센서의 복잡성과 보안성에 의해 영상이 제한적으로 제공되고 있어 KOMPSAT-2 위성영상을 이용한 다양한 연구가 미흡한 실정이다. 한편, 토지이용도의 제작은 다중분광 영상을 제공하는 위성영상을 이용하여 제작된다. 다중분광 영상이 제공하는 분광정보 및 공간정보 등으로 토지이용분류를 수행하거나 멀티센서 자료의 통합을 통한 토지이용분류 기법을 개발하여 제작하였다. 그러나 대부분 GSD 10m급 이상의 중 저해상도 위성영상을 이용하여 제작이 이루어져 수평위치 정확도 및 세부정보의 제공이 낮으며, 정보의 최신성이 결여되어 있다. 특히, 유역 치수안전도 평가를 위한 토지이용도 작성은 매우 중요한 부분을 차지하고 있으므로 이에 대한 연구가 필요하다. 이에 본 연구에서는 섬강유역을 대상으로 KOMPSAT-2 영상을 이용하여 유역 치수안전도 평가 및 치수계획 수립기술을 위한 토지이용도를 작성하고자 한다. 토지이용 분류방법은 감독분류와 무감독분류 방법을 조합하여 분류정확도를 개선시키는 하이브리드분류(hybrid classification) 방법을 이용하였으며, 분류기준의 선정은 환경부 토지이용분류 기준을 참고하여 1단위와 2단위 분류체계를 혼용하였다. 또한, 분류 후 후처리를 통하여 잡음을 제거하고 환경부의 토지이용도를 참조하여 육안판독으로 오분류된 지역을 보정하였다. 새롭게 작성된 토지이용도는 기존의 토지이용도와 비교 분석하여 토지이용변화 상황을 파악하고, 이를 통하여 KOMPSAT-2 영상의 토지이용도 개선 가능성을 검토하였다.

  • PDF

The Authentication System in Real-Time using Face Recognition and RFID (얼굴 인식과 RFID를 이용한 실시간 인증 시스템)

  • Jee, Jeong-Gyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.263-272
    • /
    • 2008
  • The proposed system can achieve more safety of RFID system with the 2-step authentication procedures for the enhancement about the security of general RFID systems. After it has authenticated RFID tag, additionally, the proposed system extract the characteristic information in the user image for acquisition of the additional authentication information of the user with the camera. In this paper, the system which was proposed more enforce the security of the automatic entrance and exit authentication system with the cognitive characters of RFID tag and the extracted characteristic information of the user image through the camera. The RFID system which use the active tag and reader with 2.4GHz bandwidth can recognize the tag of RFID in the various output manner. Additionally, when the RFID system have errors. the characteristic information of the user image is designed to replace the RFID system as it compare with the similarity of the color, outline and input image information which was recorded to the database previously. In the experimental result, the system can acquire more exact results as compared with the single authentication system when it using RFID tag and the information of color characteristics.

  • PDF

An Approach of Hiding Hangul Secret Message in Image using XNOR-XOR and Fibonacci Technique (XNOR-XOR과 피보나치 기법을 이용하여 이미지에서 한글 비밀 메시 지를 은닉하는 방법)

  • Ji, Seon-su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.2
    • /
    • pp.109-114
    • /
    • 2021
  • As various users increase in a network environment, it is difficult to protect sensitive and confidential information transmitted and received from attackers. Concealing bitwise secret data in an image using the LSB technique can be very vulnerable to attack. To solve this problem, a hybrid method that combines encryption and information hiding is used. Therefore, an effective method for users to securely protect secret messages and implement secret communication is required. A new approach is needed to improve security and imperceptibility to ensure image quality. In this paper, I propose an LSB steganography technique that hides Hangul messages in a cover image based on MSB and LSB. At this time, after separating Hangul into chosung, jungsung and jongsung, the secret message is applied with Exclusive-OR or Exclusive-NOR operation depending on the selected MSB. In addition, the calculated secret data is hidden in the LSB n bits of the cover image converted by Fibonacci technique. PSNR was used to confirm the effectiveness of the applied results. It was confirmed 41.517(dB) which is suitable as an acceptable result.