• Title/Summary/Keyword: Active Security

Search Result 677, Processing Time 0.035 seconds

Design of Network-based Real-time Connection Traceback System with Connection Redirection Technology

  • Choi, Yang-Sec;Kim, Hwan-Guk;Seo, Dong-Il;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2101-2105
    • /
    • 2003
  • Recently the number of Internet users has very sharply increased, and the number of intrusions has also increased very much. Consequently, security products are being developed and adapted to prevent systems and networks from being hacked and intruded. Even if security products are adapted, however, hackers can still attack a system and get a special authorization because the security products cannot prevent a system and network from every instance of hacking and intrusion. Therefore, the researchers have focused on an active hacking prevention method, and they have tried to develop a traceback system that can find the real location of an attacker. At present, however, because of the characteristics of Internet - diversity, anonymity - the real-time traceback is very difficult. To over-come this problem the Network-based Real-Time Connection Traceback System (NRCTS) was proposed. But there is a security problem that the victim system can be hacked during the traceback. So, in this paper, we propose modified NRCTS with connection redirection technique. We call this traceback system as Connection Redirected Network-based Real-Time Connection Traceback System (CR-NRCTS).

  • PDF

Survey on Physical Layer Security in Downlink Networks

  • Abbas, Mohammed Adil;Hong, Jun-Pyo
    • Journal of information and communication convergence engineering
    • /
    • v.15 no.1
    • /
    • pp.14-20
    • /
    • 2017
  • In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the availability of CSI of eavesdroppers significantly affects not only the beamforming strategy but also the user scheduling. Eventually, we provide intuitive information on the effect of CSI on the secrecy performance by considering three scenarios: perfect, imperfect, and absence of eavesdropper's CSI at the BS.

Improved Multi-layer Authentication Scheme by Merging One-time Password with Voice Biometric Factor

  • ALRUWAILI, Amal;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.346-353
    • /
    • 2021
  • In this proposal, we aim to enhance the security of systems accounts by improving the authentication techniques. We mainly intend to enhance the accuracy of the one-time passwords via including voice biometric and recognition techniques. The recognition will be performed on the server to avoid redirecting voice signatures by hackers. Further, to enhance the privacy of data and to ensure that the active user is legitimate, we propose to periodically update the activated sessions using a user-selected biometric factor. Finally, we recommend adding a pre-transaction re-authentication which will guarantee enhanced security for sensitive operations. The main novelty of this proposal is the use of the voice factor in the verification of the one-time password and the various levels of authentications for a full-security guarantee. The improvement provided by this proposal is mainly designed for sensitive applications. From conducted simulations, findings prove the efficiency of the proposed scheme in reducing the probability of hacking users' sessions.

A Case Study on Application of Flipped Learning in Timeliness Security Theory Class (시의성의 보안이론 수업 대상의 플립드러닝 적용 사례 연구)

  • Yu, Harang;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.3
    • /
    • pp.189-206
    • /
    • 2018
  • As the era of $4^{th}$ Industrial Revolution has arrived, education systems are changing in order to prepare for the changes on technological environment. Recently in the education field, flipped learning, which focus on learner-centered with an active communication is suggested, rather than the existing teaching method, which had the characteristic of simply delivering a knowledge. In this research, case study of analyzing a learning effect done by applying a flipped learning on the study of Industrial Security which has the characteristics of timeliness and can accordingly reflect the characteristics of $4^{th}$ Industrial Revolution. In detail, the concept of the study of Industrial Security and flipped learning was arranged, analyzed a current state of education on the study of Industrial Security and exemplary of flipped learning applied class and designed the methodology of flipped learning of this research. Nextly, designed flipped learning method was applied in the actual class of the study of Industrial Security. Lastly, survey and interview was conducted targeting a learner and deducted an implications. The results of survey showed that class participation has increased through active interactions between learners, and flexible learning environments was created which is appropriate for the characteristics of industrial security, which is in need of timeliness response against to diverse security threats of $4^{th}$ Industrial Revolution, and regarded a flipped learning to be appropriate for the study of Industrial security.

A Study of Job Involvement and oranization Commitment on Job Form of Security Guard (민간경호원의 직무형태가 직무몰입과 조직헌신도에 관한 연구)

  • Yang, Dok -yeol;Lee, Hyun-hee;Park, Jun -seok
    • Journal of the Society of Disaster Information
    • /
    • v.5 no.1
    • /
    • pp.104-119
    • /
    • 2009
  • The purpose of this study is to examine the effects of job involvement and organization commitment on job form of security guard. The total 260 subjects are composed of 50 women and 210 men who work at security company for security guards in Seoul and Gyonggi province. First, according to the populational and social character, job involvement was higher in women security guards than men, higher in 'above 41' for age, higher in 'university' for educational level, and higher in '300-400' for incomes. Second, according to the populational and social character, organization commitment was higher in men security guards than women, higher in 'above 41 ' for age, higher in 'graduate school of university' for educational level, and higher in '300-400' for incomes. Third, according to the form of the job, the job involvement was higher in 'under 10' for their career, higher in 'manager' for their responsibilities of work, higher in 'afternoon working' for the time schedules, and higher in 'field service' for the kind of working. Fourth, according to the form of the job, the organization commitment was higher in 'under 10' for their career and higher in 'field service' for the kind of working. However, there was no difference between the responsibilities of work and the time schedules. Fifth, it increases the organization, when the job involvement of the security guards such as work attachment, active performance, and the pursuit of job achievement.

  • PDF

The Effect of Reward and Security Awareness on User Intention of Knowledge Portal Service for ROK Army (보상과 보안의식이 육군지식포탈 사용자 의도에 미치는 영향)

  • Lee, Jong-Gill;Ku, Xyle
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.42 no.2
    • /
    • pp.36-48
    • /
    • 2019
  • As the importance of Knowledge Management System (KMS) in the military increases, Republic of Korea Army (ROK Army) developed Army Knowledge Portal. Although the members in the military are encouraged to use the portal, few members currently use it. This study was conducted to find variables to predict the user's intention to use the portal, which contributes to activating the use of Army Knowledge Portal in the army. On the basis of Technology Acceptance Model (TAM), ten variables such as perceived ease of use, general information security awareness, information security awareness, expectation for external rewards, expectation for relationships, sense of self-worth, attitude toward compliance with security policy, attitude toward knowledge sharing, intention of non-combat knowledge sharing, and intention of combat knowledge sharing were considered as independent variables. 105 participants on active duty who currently use or have experience to use the portal participated in this study. The results indicated that general information security awareness and information security awareness increases compliance with the information security policy. In addition, the attitude toward knowledge sharing is enhanced by expectations for relationship and sense of self-worth. Based on the results, the authors propose the need for policy alternatives to reinforce the reward system and security policy, which activates the use of Knowledge Portal Service for ROK Army.

An Economic Perspective on Food Security

  • Seung-Ryong Yang
    • Proceedings of the Korean Society of Crop Science Conference
    • /
    • 2022.10a
    • /
    • pp.9-9
    • /
    • 2022
  • The concept of food security has gained increasing attention during the food crisis period between 2006 and 2011. According to the FAO, food security is defined as an access by all people at all times to the food needed for healthy and active life. Achieving food security means that sufficient food is available, food supply is relatively stable, and those in need of food can afford food at a reasonable cost. After a short period of stable food prices the world is facing another food crisis due mainly to the COVID-19 pandemic and the Russian invasion over Ukraine. Food security has re-emerged as an urgent problem to the world. There have been two conflicting opinions about how to achieve food security. Agricultural exporting countries insist diversification of food sources and freer trade on the top of domestic self-reliance. On the other hand, food importing countries emphasize self-sufficiency of major food crops. This study investigates whether domestic agricultural production contributes to strengthening food security. The panel data analysis shows that the increase in food self-sufficiency raises the Global Food Security Index and lessens the probability of food riots, while lower import tariffs (implying freer trade) do not. Some related issues are discussed accordingly.

  • PDF

Strategy based PSO for Dynamic Control of UPFC to Enhance Power System Security

  • Mahdad, Belkacem;Bouktir, T.;Srairi, K.
    • Journal of Electrical Engineering and Technology
    • /
    • v.4 no.3
    • /
    • pp.315-322
    • /
    • 2009
  • Penetration and installation of a new dynamic technology known as Flexible AC Transmission Systems (FACTS) in a practical and dynamic network requires and force expert engineer to develop robust and flexible strategy for planning and control. Unified Power Flow Controller (UPFC) is one of the recent and effective FACTS devices designed for multi control operation to enhance the power system security. This paper presents a dynamic strategy based on Particle Swarm Optimization (PSO) for optimal parameters setting of UPFC to enhance the system loadability. Firstly, we perform a multi power flow analysis with load incrementation to construct a global database to determine the initial efficient bounds associated to active power and reactive power target vector. Secondly a PSO technique applied to search the new parameters setting of the UPFC within the initial new active power and reactive power target bounds. The proposed approach is implemented with Matlab program and verified with IEEE 30-Bus test network. The results show that the proposed approach can converge to the near optimum solution with accuracy, and confirm that flexible multi-control of this device coordinated with efficient location enhance the system security of power system by eliminating the overloaded lines and the bus voltage violation.

An Active Planning of the Information Security and Technology (정보보호와 기술의 활성화 방안)

  • 장우권
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.11 no.2
    • /
    • pp.83-112
    • /
    • 2000
  • In the 21st Century of the Knowledge-based Economy Internet's Openness, Globality, and Ease to access is the central axis to construct the new melting down and the development of the technology, industry. and culture. However it takes place the disordered ability in the information society. That is, to intrude personal privacy, unlawful actions, to circulate an illegal information, to encroach and to destroy information system, even to, to be in confusion society, national strategy, administration, economy, and military action. As conclusion, first, in this article it looks into and analyzes the information security technology and paradigm to prevent and to stop up criminal actions in the cyberspace. Second, this author propose an active planning of the information security and technology.

  • PDF

Design and Performance Analysis of Electronic Seal Protection Systems Based on AES

  • Kim, Dong-Kyue;Lee, Mun-Kyu;Kang, You-Sung;Chung, Sang-Hwa;Yoon, Won-Ju;Min, Jung-Ki;Kim, Ho-Won
    • ETRI Journal
    • /
    • v.29 no.6
    • /
    • pp.755-768
    • /
    • 2007
  • A very promising application of active RFID systems is the electronic seal, an electronic device to guarantee the authenticity and integrity of freight containers. To provide freight containers with a high level of tamper resistance, the security of electronic seals must be ensured. In this paper, we present the design and implementation of an electronic seal protection system. First, we propose the eSeal Protection Protocol (ePP). Next, we implement and evaluate various cryptographic primitives as building blocks for our protocol. Our experimental results show that AES-CBC-MAC achieves the best performance among various schemes for message authentication and session key derivation. Finally, we implement a new electronic seal system equipped with ePP, and evaluate its performance using a real-world platform. Our evaluation shows that ePP guarantees a sufficient performance over an ARM9-based interrogator.

  • PDF