• Title/Summary/Keyword: 정보보안성과

Search Result 1,100, Processing Time 0.027 seconds

Study on Threshold Scheme based Secure Secret Sharing P2P System (임계 방식 기반 안전 비밀조각 공유 P2P 시스템 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.23 no.3
    • /
    • pp.21-33
    • /
    • 2022
  • This paper is to suggest the secure secret sharing system in order to outstandingly reduce the damage caused by the leakage of the corporate secret. This research system is suggested as efficient P2P distributed system kept from the centrally controlled server scheme. Even the bitcoin circulation system is also based on P2P distribution scheme recenly. This research has designed the secure circulation of the secret shares produced by Threshold Shamir Secret Sharing scheme instead of the shares specified in the torrent file using the simple, highly scalable and fast transferring torrent P2P distribution structure and its protocol. In addition, this research has studied to apply both Shamir Threshold Secret Sharing scheme and the securely strong multiple user authentication based on Collaborative Threshold Autentication scheme. The secure transmission of secret data is protected as using the efficient symmetric encryption with the session secret key which is safely exchanged by the public key encryption. Also it is safer against the leakage because the secret key is effectively alive only for short lifetime like a session. Especially the characteristics of this proposed system is effectively to apply the threshold secret sharing scheme into efficient torrent P2P distributed system without modifying its architecture of the torrent system. In addition, this system guaranttes the confidentiality in distributing the secret file using the efficient symmetric encryption scheme, which the session key is securely exchanged using the public key encryption scheme. In this system, the devices to be taken out can be dynamically registered as an user. This scalability allows to apply the confidentiality and the authentication even to dynamically registerred users.

Detecting Adversarial Examples Using Edge-based Classification

  • Jaesung Shim;Kyuri Jo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.10
    • /
    • pp.67-76
    • /
    • 2023
  • Although deep learning models are making innovative achievements in the field of computer vision, the problem of vulnerability to adversarial examples continues to be raised. Adversarial examples are attack methods that inject fine noise into images to induce misclassification, which can pose a serious threat to the application of deep learning models in the real world. In this paper, we propose a model that detects adversarial examples using differences in predictive values between edge-learned classification models and underlying classification models. The simple process of extracting the edges of the objects and reflecting them in learning can increase the robustness of the classification model, and economical and efficient detection is possible by detecting adversarial examples through differences in predictions between models. In our experiments, the general model showed accuracy of {49.9%, 29.84%, 18.46%, 4.95%, 3.36%} for adversarial examples (eps={0.02, 0.05, 0.1, 0.2, 0.3}), whereas the Canny edge model showed accuracy of {82.58%, 65.96%, 46.71%, 24.94%, 13.41%} and other edge models showed a similar level of accuracy also, indicating that the edge model was more robust against adversarial examples. In addition, adversarial example detection using differences in predictions between models revealed detection rates of {85.47%, 84.64%, 91.44%, 95.47%, and 87.61%} for each epsilon-specific adversarial example. It is expected that this study will contribute to improving the reliability of deep learning models in related research and application industries such as medical, autonomous driving, security, and national defense.

Unsupervised Learning-Based Threat Detection System Using Radio Frequency Signal Characteristic Data (무선 주파수 신호 특성 데이터를 사용한 비지도 학습 기반의 위협 탐지 시스템)

  • Dae-kyeong Park;Woo-jin Lee;Byeong-jin Kim;Jae-yeon Lee
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.147-155
    • /
    • 2024
  • Currently, the 4th Industrial Revolution, like other revolutions, is bringing great change and new life to humanity, and in particular, the demand for and use of drones, which can be applied by combining various technologies such as big data, artificial intelligence, and information and communications technology, is increasing. Recently, it has been widely used to carry out dangerous military operations and missions, such as the Russia-Ukraine war and North Korea's reconnaissance against South Korea, and as the demand for and use of drones increases, concerns about the safety and security of drones are growing. Currently, a variety of research is being conducted, such as detection of wireless communication abnormalities and sensor data abnormalities related to drones, but research on real-time detection of threats using radio frequency characteristic data is insufficient. Therefore, in this paper, we conduct a study to determine whether the characteristic data is normal or abnormal signal data by collecting radio frequency signal characteristic data generated while the drone communicates with the ground control system while performing a mission in a HITL(Hardware In The Loop) simulation environment similar to the real environment. proceeded. In addition, we propose an unsupervised learning-based threat detection system and optimal threshold that can detect threat signals in real time while a drone is performing a mission.

2013, 달라지는 클라우드 컴퓨팅

  • Yang, Hui-Dong;Hwang, Se-Un
    • Information and Communications Magazine
    • /
    • v.30 no.4
    • /
    • pp.23-28
    • /
    • 2013
  • 개념적으로 존재하던 클라우드 컴퓨팅의 사용이 본격적으로 심화되면서 기업들의 클라우드 컴퓨팅에 대한 개념과 생각에도 많은 변화가 생기게 되었다. 클라우드 컴퓨팅 구축이 더욱 가속화되는 가운데, 그로 인한 비용절감이나 투자수익 창출 효과에 대한 검증이 활발해질 것으로 예측됐다. 시대를 뒤바꾸는 혁신적인 기술도 잇달아 등장할 것이란 기대도 높다. 2013년은 클라우드 컴퓨팅의 발전에 또 한번의 변곡점이 될 것으로 전망된다. 본 고에서는 2013년 클라우드 컴퓨팅에 관한 예측 몇 가지를 살펴보고자 한다. 첫째, 중소기업에서의 클라우드 컴퓨팅 사용 및 정착이 가속화될 것으로 보인다. 대기업의 경우에는 기존에 구축되어 있는 IT 시스템에 대한 거버넌스 체계를 완성해 나가고 있는 상황 속에서 중앙집중형과 사용자 편의성이 강화된 클라우드 컴퓨팅을 도입하기 위해서는 아직 추구 해야 할 과제가 많다. 하지만 중소기업은 예산을 문제로 대기업과 같은 수준의 IT 인프라를 갖추지 못하고 있기 때문에 클라우드 컴퓨팅 도입으로 비용대비 고효율의 IT 인프라를 갖출 수 있다. 둘째, CSP, CSB와 통합허브가 성장할 것이다. 플랫폼 전쟁이 시장 점유율 '횡령' 싸움임을 CSP들이 깨닫게 됨에 따라 이러한 가격 경쟁들은 더 잦아질 것으로 전망된다. 그리고 2013년 클라우드 벤더들은 클라우드 가격 책정이 비용-수익 관리(costyield management)의 연장선에 있음도 알게 될 것이다. 핵심은 효율적 설계와 저비용 운영, 그리고 무엇보다 높은 사용률에 있다. 또한 기업들이 점점 많은 애플리케이션을 소프트웨어 형태로 구매하고 있기 때문에 애플리케이션 자체를 통합하는 문제, 애플리케이션에 대한 보안과 감사 프로세스개발 등의 문제가 제기되고 있다. 시스템 통합 서비스와 통합 허브는 이런 문제를 해결하기 위해 노력하게 될 것이다 셋째, 2013년은 하이브리드 클라우드 컴퓨팅이 급부상할 것으로 전망된다. 앞으로는 클라우드 컴퓨팅 시장에서 공급업체끼리 경쟁하는 것은 의미가 없으며 기업들은 절대 한 가지 클라우드 기술이나 공급자에 안주하지 않을 것이다. 이것은 곧 2013년에는 하이브리드 및 이종 클라우드 컴퓨팅이 각광 받을 것을 의미한다. 이러한 하이브리드 클라우드 컴퓨팅을 도입하기 위해서는 클라우드 컴퓨팅의 단점과 문제 해결을 위해 하나의 목적을 가지고 다양한 산업체들이 모여 경쟁업체이면서도 협력관계를 이루는 것이 중요하다. 넷째, 멀티 디바이스를 이용한 클라우드 사용이 폭발적으로 증가될 것으로 보인다. 1인당 여러 대의 단말 보유, 이동성 향상 요구, 4G 확산 등 모바일 시장을 중심으로 한 환경 변화로 인해 이전보다 한층 진화된 클라우드 기반의 서비스가 다양하게 등장할 것으로 예상된다. 또한 4G 시대가 본격적으로 개막되면서 데이터 및 앱을 저장하는 것뿐만 아니라 앱을 실행하는 프로세싱까지도 모두 인터넷 상의 서버에서 이루어지는 방식인 클라우드 스트리밍(Cloud Streaming)이라는 신기술이 상용화될 것으로 기대된다. 다섯째, 2013년에는 'XaaS(Everything as a Service)' 개념이 보다 확장될 것이다. 클라우드 컴퓨팅의 사용이 확산됨에 따라 하드웨어의 도입, 소프트웨어 및 데이터베이스 개발과 구축, IT 서비스 등 IT 인프라 스트럭처의 토대에 많은 변화가 생겼다. 인프라스트럭처는 더 이상 고정불변의 자산으로서가 아니라 유연성과 확장성을 강조하는 서비스로서의 특징으로 점점 부각되고 있다. 따라서 모든 IT 인프라스트럭처가 Ondemand화 서비스로 제공되는 비즈니스 모델들이 부상하고 있으며 플랫폼, 하드웨어 데이터베이스 등 모든 IT 요소를 서비스 형태로 제공하는 XaaS가 2013년 새로운 개념으로 떠오를 것으로 기대된다. 여섯번째로 스토리지를 둘러싼 가격 경쟁이 더욱 심화될 것으로 보인다. 업체들의 가격 인하는 앞으로도 계속될 것이며 사용자들에게도 큰 혜택으로 돌아갈 것이지만 사람들은 가격만으로 서비스를 선택하지 않을 것이기 때문에 가격보다는 차별화된 기능 및 서비스 전략이 필요할 것이다.

Effect of Mobile Devices on the Use Intention and Use of Mobile Banking Service in Myanmar (미얀마에서의 모바일기기 특성이 모바일 뱅킹 서비스 사용의도와 실제 사용에 미치는 영향 연구)

  • Myo, Salai Thar Kei;Hwang, Gee-Hyun
    • Journal of Digital Convergence
    • /
    • v.15 no.6
    • /
    • pp.71-82
    • /
    • 2017
  • Most banks in Myanmar have begun to provide their services via mobile phones. However, few studies investigated the factors that may help to set mobile services from a customer perspective. So, this study aims to propose and test a conceptual research model to predict the user's intention to use and actual use level of mobile banking service by combining UTAUT and DeLone-Mclean IS model. Data were collected from 206 citizens who had experienced mobile banking in various regions of Myanmar. The study found that performance expectancy, effort expectancy, information quality and service quality influence the user 's intention to adopt mobile banking services which directly affects the user's actual use of them. However, social influence, facilitating condition and system quality don't influence the user's intention. The study results contribute to meeting customer's needs and reducing customer risk in Myanmar's mobile banking industry, suggesting to seamlessly provide the necessary resources like technology improvements, organizational infrastructure and service centers. Another future study are required to include service's security and trust factors so that the service providers could gain their customers' reliability and trust.

Exploring the Effects of the Antecedents to Flow Experience and the Characteristics of War Simulation Systems on Soldiers' Intentions to Use the War Simulation Systems (플로우 경험의 선행요인들과 시뮬레이션 시스템의 특성이 군(軍)전투시뮬레이션 시스템 사용 의도에 미치는 영향에 관한 실증 분석)

  • Baek, Dae Kwan;Hau, Yong Sauk;Kim, Young-Gul
    • Information Systems Review
    • /
    • v.16 no.1
    • /
    • pp.89-106
    • /
    • 2014
  • The war simulation systems in Republic of Korea Army have been getting more and more important because soldiers can effectively and efficiently learn and share their war-related knowledge based on the interactions through the systems. But, up to now, the access to the war simulation systems has been limited to only soldiers. So, little research on them has been conducted. This study explores the effects of the antecedents to the flow experience and the characteristics of the systems on soldiers' intentions to use them. Based on the 118 samples collected from officers in Republic of Korea Army, this study empirically shows the logical reality of the war simulation systems and the flow experience positively influence soldiers' intentions to use the systems and the clarified goals, feedbacks, and the levels of the missions in the systems are significant antecedents to the flow experience. Useful implications are presented and discussed based on the new findings.

Dynamic States Consideration for Next Hop Nodes Selection Method to Improve Energy Efficiency in LEAP based Wireless Sensor Networks (LEAP기반의 무선 센서 네트워크에서 가변적 상태를 고려한 에너지 효율적 다음 홉 노드 선택 기법)

  • Nam, Su-Man;Cho, Tae-Ho
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.23 no.6
    • /
    • pp.558-564
    • /
    • 2013
  • Wireless sensor networks (WSNs) contain limited energy resources and are left in open environments. Since these sensor nodes are self-operated, attacks such as sinkhole attacks are possible as they can be compromised by an adversary. The sinkhole attack may cause to change initially constructed routing paths, and capture of significant information at the compromised node. A localized encryption and authentication protocol (LEAP) has been proposed to authenticate packets and node states by using four types of keys against the sinkhole attack. Even though this novel approach can securely transmits the packets to a base station, the packets are forwarded along the constructed paths without checking the next hop node states. In this paper, we propose the next hop node selection method to cater this problem. Our proposed method evaluates the next hop node considering three factors (i.e., remaining energy level, number of shared keys, and number of filtered false packets). When the suitability criterion for next hop node selection is satisfied against a fix threshold value, the packet is forwarded to the next hop node. We aim to enhance energy efficiency and a detour of attacked areas to be effectively selected Experimental results demonstrate validity of the proposed method with up to 6% energy saving against the sinkhole attack as compared to the LEAP.

Effect of Smart Life on Politics, Society, Culture, and Economy (스마트라이프가 정치.사회.문화.경제에 미치는 영향)

  • Kim, Man-Ki
    • Journal of Digital Convergence
    • /
    • v.9 no.6
    • /
    • pp.91-102
    • /
    • 2011
  • Smart work is deeply embedded in our contemporary lives. This is called Smart Life. The expansion of communication, caused by smart life is utilized for the political purposes of politicians, political candidates, and political policies. Chiefly, smart life includes improvement in awareness, personal relations, and policy advocacy. Socially, smart life leads the proliferation of issues and civil movement. In particular, smart life has a significant effect on culture. In the case of K-POP, it is disseminated going beyond space time. It enhances economic value added by joining and sharing at the same time. Smart life has numerous advantages such as improving the quality of life, but it might cause inconvenience depending on users because there are differences in acceptance according to generations. Due to the heavy weight on the device, there are some side-effects such as lacking in human thinking, disclosure in private life, lacking in basic securities, increase in information addicts who are anxious when they do not get on the Internet or SNS, and interference with work. However, this inconvenience can change into convenience when users are accustomed to it. Like this, smart life influences politics, economy, society, and culture a lot. Working environment of smart life is a new paradigm, which can generate high performance through working in an exciting and bright atmosphere with easy economy and putting value on results.

Evaluation of Access Control Function of the Standard Records Management System (표준기록관리시스템 기능 평가 접근관리 기능을 중심으로)

  • Park, Min-Yung
    • The Korean Journal of Archival Studies
    • /
    • no.38
    • /
    • pp.3-35
    • /
    • 2013
  • The physical access or control of records with material entities is relatively easy. However, in the case of electronic records, due to its heightened applicative aspect that allows anyone with the authority to have access over the data, it requires an appropriate standard and stability to ensure the authenticity and integrity of electronic records. This study performed functional evaluation by extracting the minimum critical items from the national functional requirements documents and standards to explore the access control function that play an important role for the standard records management system to maintain quality requirements of electronic records. Based on this checklist, it evaluates whether the standard records management system properly carries out the access control function and investigates the current condition of application to practical records management work. Records managers generally do not use access control function, which may be because they do not feel the necessity, since the application of records management system is not yet actively promoted. In order for the standard records management system to be developed to become a more active system, it requires system improvement as well as considerations for below factors: First, although the necessity of establishing access control conditions is already recognized, it requires a clear stipulation of the regulation. Second, measures must be taken to implement access control in the records management system through document security solution. Third, it requires self-reflection of records manager, who utilizes the records management system. Instead of placing all responsibility on the National Archives, which established the system, professionals must further develop the system through continuous evaluation and improvement. Finally, a general discussion is required to publicize the issue of functional improvement of records management system. Although there is a bulletin board already created for this purpose, its users are extremely limited and it only deals with current problems. A space in online as well as in offline is required to solve the fundamental problems and exchange opinions.

Development on Early Warning System about Technology Leakage of Small and Medium Enterprises (중소기업 기술 유출에 대한 조기경보시스템 개발에 대한 연구)

  • Seo, Bong-Goon;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.1
    • /
    • pp.143-159
    • /
    • 2017
  • Due to the rapid development of IT in recent years, not only personal information but also the key technologies and information leakage that companies have are becoming important issues. For the enterprise, the core technology that the company possesses is a very important part for the survival of the enterprise and for the continuous competitive advantage. Recently, there have been many cases of technical infringement. Technology leaks not only cause tremendous financial losses such as falling stock prices for companies, but they also have a negative impact on corporate reputation and delays in corporate development. In the case of SMEs, where core technology is an important part of the enterprise, compared to large corporations, the preparation for technological leakage can be seen as an indispensable factor in the existence of the enterprise. As the necessity and importance of Information Security Management (ISM) is emerging, it is necessary to check and prepare for the threat of technology infringement early in the enterprise. Nevertheless, previous studies have shown that the majority of policy alternatives are represented by about 90%. As a research method, literature analysis accounted for 76% and empirical and statistical analysis accounted for a relatively low rate of 16%. For this reason, it is necessary to study the management model and prediction model to prevent leakage of technology to meet the characteristics of SMEs. In this study, before analyzing the empirical analysis, we divided the technical characteristics from the technology value perspective and the organizational factor from the technology control point based on many previous researches related to the factors affecting the technology leakage. A total of 12 related variables were selected for the two factors, and the analysis was performed with these variables. In this study, we use three - year data of "Small and Medium Enterprise Technical Statistics Survey" conducted by the Small and Medium Business Administration. Analysis data includes 30 industries based on KSIC-based 2-digit classification, and the number of companies affected by technology leakage is 415 over 3 years. Through this data, we conducted a randomized sampling in the same industry based on the KSIC in the same year, and compared with the companies (n = 415) and the unaffected firms (n = 415) 1:1 Corresponding samples were prepared and analyzed. In this research, we will conduct an empirical analysis to search for factors influencing technology leakage, and propose an early warning system through data mining. Specifically, in this study, based on the questionnaire survey of SMEs conducted by the Small and Medium Business Administration (SME), we classified the factors that affect the technology leakage of SMEs into two factors(Technology Characteristics, Organization Characteristics). And we propose a model that informs the possibility of technical infringement by using Support Vector Machine(SVM) which is one of the various techniques of data mining based on the proven factors through statistical analysis. Unlike previous studies, this study focused on the cases of various industries in many years, and it can be pointed out that the artificial intelligence model was developed through this study. In addition, since the factors are derived empirically according to the actual leakage of SME technology leakage, it will be possible to suggest to policy makers which companies should be managed from the viewpoint of technology protection. Finally, it is expected that the early warning model on the possibility of technology leakage proposed in this study will provide an opportunity to prevent technology Leakage from the viewpoint of enterprise and government in advance.