• Title/Summary/Keyword: 정보 메시지

Search Result 3,591, Processing Time 0.036 seconds

Using the SIEM Software vulnerability detection model proposed (SIEM을 이용한 소프트웨어 취약점 탐지 모델 제안)

  • Jeon, In-seok;Han, Keun-hee;Kim, Dong-won;Choi, Jin-yung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.961-974
    • /
    • 2015
  • With the advancement of SIEM from ESM, it allows deep correlated analysis using huge amount of data. By collecting software's vulnerabilities from assessment with certain classification measures (e.g., CWE), it can improve detection rate effectively, and respond to software's vulnerabilities by analyzing big data. In the phase of monitoring and vulnerability diagnosis Process, it not only detects predefined threats, but also vulnerabilities of software in each resources could promptly be applied by sharing CCE, CPE, CVE and CVSS information. This abstract proposes a model for effective detection and response of software vulnerabilities and describes effective outcomes of the model application.

Improving Security Awareness about Smishing through Experiment on the Optimistic Bias on Risk Perception (위험인식의 낙관적 편향 실험을 통한 스미싱 보안인식 개선)

  • Kang, Ji Won;Lee, Ae Ri;Kim, Beomsoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.475-487
    • /
    • 2016
  • Recently, various risks of smartphone hacking are emerging. Smishing crime techniques become more cunning and its damage has been increasing, thereby requiring effective ways of preventing and coping with smishing. Especially, it is emphasized the need for smartphone users' security awareness and training besides technological approach. This study investigates the effective method for providing news messages in order to improve the perception of risk from smishing. This research empirically examines that the degree of optimistic bias on risk perception can vary depending on news frame, topic type, and involvement regarding smishing. Based on the findings, it identifies the factors influencing risk perception and verifies effective ways of promoting individual security awareness on smishing. The results of this study provide implications that assist in educating, campaigning and promoting information security awareness for smart device users.

Optimized implementation of HIGHT algorithm for sensor network (센서네트워크에 적용가능한 HIGHT 알고리즘의 최적화 구현 기법)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.7
    • /
    • pp.1510-1516
    • /
    • 2011
  • As emergence of the ubiquitous society, it is possible to access the network for services needed to us in anytime and anywhere. The phenomena has been accelerated by revitalization of the sensor network offering the sensing information and data. Currently, sensor network contributes the convenience for various services such as environment monitoring, health care and home automation. However, sensor network has a weak point compared to traditional network, which is easily exposed to attacker. For this reason, messages communicated over the sensor network, are encrypted with symmetric key and transmitted. A number of symmetric cryptography algorithms have been researched. Among of them HIGHT algorithm in hardware and software implementation are more efficient than tradition AES in terms of speed and chip size. Therefore, it is suitable to resource constrained devices including RFID tag, Sensor node and Smart card. In the paper, we present the optimized software implementation on the ultra-light symmetric cryptography algorithm, HIGHT.

A Study on System for Environmental Control in the Greenhouse using Internet (인터넷 기반의 온실 환경 제어 시스템에 관한 연구)

  • Kim, Dae-Eop;Park, Heung-Bok
    • The KIPS Transactions:PartD
    • /
    • v.8D no.4
    • /
    • pp.427-438
    • /
    • 2001
  • Recently, Environmental Control Devices of Green House for Protected Cultivation is composed of on/off-type Controller to control each device using timer in equipment of intensive Labor. In case of system, it is difficult to grasp condition of the greenhouse about errors when this system has defect of a hardware, and it operates in the remote place or at night. In this paper, we developed a system that capable of replacing the existing control method of on/off with display panel in the greenhouse, monitoring data aquisition and status in the greenhouse using client computer based on internet. Also this system can communicate with each local greenhouse, and send alarm message about error. And we constructed web server to manage efficient informations for environmental control and corps cultivation in the greenhouse.

  • PDF

A Study on Ticket-Based AAA Mechanism Including Time Synchronization OTP in Global Roaming Environment (글로벌 로밍 환경에서 시간 동기화 OTP를 포함한 티켓 기반 AAA 메커니즘에 관한 연구)

  • Moon, Jong-Sik;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.14C no.2
    • /
    • pp.129-138
    • /
    • 2007
  • AAA(Aluthentieation, Authorization, Accounting) protocol is an information securitv technology that offer secure and reliable user Authentication, Authorization, Accounting function systematically in various services. protocol and wireless network work as well as win network. Currently IETF(Internet Engineering Task Force) AAA Working Group deal with about AAA protocol and studying with activity, But, recently it exposing much problems side to user's anonymity and privacv violation. Therefore, in this paper, AAAH(Home Authentication Server) authenticaters Mobile device, after that, use ticket that is issued from AAAH even if move to outside network and can be serviced offering authentication in outside network without approaching by AAAH, Also, we study mechanism that can offer user's privacy and anonymousness to when use service. Our mechanism is using Time Synchronization OTP and focusing authentication and authorization. Therefore, our mechanism is secure from third party attack and offer secure and effective authentication scheme. Also only right user can offer services by using ticket. can reduce signal and reduce delay of message exchanged, can offer persistent service and beighten security and efficiency.

An AODV-Based Two Hops Dynamic Route Maintenance in MANET (MANET에서의 AODV 기반 2홉 동적 경로유지 기법 연구)

  • Moon, Dae-Keun;Kim, Hag-Bae
    • The KIPS Transactions:PartC
    • /
    • v.14C no.2
    • /
    • pp.191-198
    • /
    • 2007
  • A mobile ad-hoc network (MANET) is an autonomous, infrastructure-less system that consists of mobile nodes. In MANET, on demand routing protocols are usually used because network topology changes frequently. AODV, which is a representative on demand routing protocol, operates using the routing table of each node that includes next hop of a route for forwarding packets. It maintains the established route if there is not an expiration of route or any link break. In the paper, we propose a partially adaptive route maintenance scheme (AODV-PA) based on AODV, which provides dynamic route modification of initial route for selecting the effective route using not only next hop but also next-hop of next-hop (i.e. 2-hop next node) acquired through route discovery process. In addition, the proposed scheme additionally manages the routing table for preventing exceptional link breaks by route modification using HELLO messages. We use NS 2 for the computer simulation and validate that the proposed scheme is better than general AODV in terms of packet delivery ratio, latency, routing overhead.

An Adaptive Vehicle Platoon Formation Mechanism for Road Capacity Improvement (도로 용량 증대를 위한 적응적 차량 플라툰 형성 기법)

  • Su, Dongliang;Ahn, Sanghyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.10
    • /
    • pp.327-330
    • /
    • 2016
  • In the road environment with lots of vehicles, we can increase the number of vehicles on the road (i.e., road capacity) and enhance the comfortability of drivers if vehicles are organized into platoons. In the traditional vehicle platooning mechanisms, a pre-determined set of vehicles are allowed to form a platoon and, among them, a specific vehicle is designated as the platoon leader. In this type of platoon mechanisms, platoon is limited in improving the road capacity because the vehicles allowed to involve into platooning are restricted. Therefore, in this paper, we propose an adaptive platoon formation mechanism that allows any vehicle to be a platoon leader from which a platoon is formed. In the proposed mechanism, a platoon leader is elected based on the relative velocity and location information of neighboring vehicles obtained through the periodic exchange of beacon messages among vehicles. Through the NS-3 based simulations, we show the performance of our proposed mechanism in terms of road capacity improvement.

A Method of Performance Improvement for AAA Authentication using Fast Handoff Scheme in Mobile IPv6 (Mobile IPv6에서 Fast Handoff기법을 이용한 AAA 인증 성능 향상 방안)

  • Kim Changnam;Mun Youngsong;Huh Eui-Nam
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.6
    • /
    • pp.566-572
    • /
    • 2004
  • In this paper, we define the secure authentication model to provide a mobile node with global roaming service and integrate the Fast Handoff scheme with our approach to minimize the service latency. By starting the AAA(Authentication, Authorization and Account) procedure with Fast Handoff simultaneously when a roaming occurs, authentication latency is reduced significantly and provision of fast and seamless service is possible. The previous works such as IPsec(Internet Protocol Security), RR (Return Routability) and AAA define the procedures performed after the completion of Layer2 Handoff which leads us to study a way of providing the real time and QoS guaranteed service during this period. The proposed scheme is for this goal and when appling it to roaming environment it shows the cost reduction up to 55% and 17% for the case of the MN receiving the FBACK and not respectively before L2 Handoff occurs.

The Distributed Transport Platform for Real-Time Multimedia Stream (실시간 멀티미디어 스트림을 위한 분산 전송 플랫폼)

  • 송병훈;정광수;정형석
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.260-269
    • /
    • 2003
  • The traditional distributed object middleware platform is not suitable for the transmission of stream data, because RPC(Remote Procedure Call)-based message transmission have a great overhead. Therefore, the OMG(Object Management Group) proposes the AV(Audio and Video) stream reference model for streaming on the distributed object middleware platform. But, this reference model has not a detail of implementation. Particularly it also has not congestion control scheme for improvement of network efficiency on the real network environment. It is a very important and difficult technical issue to provide the stream transmission platform with advanced congestion control scheme. In this paper, we propose an architecture of a distributed stream transport platform and deal with the design and implementation concept of our proposed platform. Also, we present a mechanism to improve streaming utilization by SRTP(Smart RTP). SRTP is our proposed TCP-Friendly scheme.

A Location-based Highway Safety System using Smart Mobile Devices (스마트 모바일 장치를 이용한 위치기반 고속도로 안전시스템)

  • Lee, Jaehyun;Park, Sungjin;Yoo, Joon
    • Journal of KIISE
    • /
    • v.43 no.3
    • /
    • pp.389-397
    • /
    • 2016
  • In this paper, we propose a highway safety system that comprises a small number of central servers and smart mobile devices. To implement this system, we constructed a central server that collects GPS location information on cars, whose update messages are decreased via the car location estimation algorithm. The in-car mobile devices use the accelerometer sensors to detect hazardous situations; this information is updated to the central server that relays the information to the corresponding endangered cars via location-based unicast using LTE communication. To evaluate the proposed algorithm, we equipped a mobile device app on a real car and conducted real experiments in various environments such as city streets, rural areas, and highway roads. Furthermore, we conducted simulations to evaluate the propagation of danger information. Finally, we conducted simulated experiments to detect car collisions as well as exceptions, such as falling of the mobile device from the cradle.