• Title/Summary/Keyword: Alert Services

Search Result 43, Processing Time 0.021 seconds

Design and Implementation of Sequential Pattern Miner to Analyze Alert Data Pattern (경보데이터 패턴 분석을 위한 순차 패턴 마이너 설계 및 구현)

  • Shin, Moon-Sun;Paik, Woo-Jin
    • Journal of Internet Computing and Services
    • /
    • v.10 no.2
    • /
    • pp.1-13
    • /
    • 2009
  • Intrusion detection is a process that identifies the attacks and responds to the malicious intrusion actions for the protection of the computer and the network resources. Due to the fast development of the Internet, the types of intrusions become more complex recently and need immediate and correct responses because the frequent occurrences of a new intrusion type rise rapidly. Therefore, to solve these problems of the intrusion detection systems, we propose a sequential pattern miner for analysis of the alert data in order to support intelligent and automatic detection of the intrusion. Sequential pattern mining is one of the methods to find the patterns among the extracted items that are frequent in the fixed sequences. We apply the prefixSpan algorithm to find out the alert sequences. This method can be used to predict the actions of the sequential patterns and to create the rules of the intrusions. In this paper, we propose an extended prefixSpan algorithm which is designed to consider the specific characteristics of the alert data. The extended sequential pattern miner will be used as a part of alert data analyzer of intrusion detection systems. By using the created rules from the sequential pattern miner, the HA(high-level alert analyzer) of PEP(policy enforcement point), usually called IDS, performs the prediction of the sequence behaviors and changing patterns that were not visibly checked.

  • PDF

Vulnerability Analysis using the Web Vulnerability Scanner (Web Vulnerability Scanner를 이용한 취약성 분석)

  • Jang, Hee-Seon
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.71-76
    • /
    • 2012
  • As the use of Mashups, web3.0, JavaScript and AJAX(Asynchronous JavaScript XML) widely increases, the new security threats for web vulnerability also increases when the web application services are provided. In order to previously diagnose the vulnerability and prepare the threats, in this paper, the classification of security threats and requirements are presented, and the web vulnerability is analyzed for the domestic web sites using WVS(Web Vulnerability Scanner) automatic evaluation tool. From the results of vulnerability such as XSS(Cross Site Scripting) and SQL Injection, the total alerts are distributed from 0 to 31,177, mean of 411, and standard deviation of 2,563. The results also show that the web sites of 22.5% for total web sites has web vulnerability, and the previous defenses for the security threats are required.

A WTLS Handshake protocol against Active Attack (능동적 공격에 안전한 WTLS Handshake 프로토콜)

  • Han, Jong-Soo;Jung, Young-Seok;An, Ki-Bum;Kwak, Jin;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.5
    • /
    • pp.113-127
    • /
    • 2003
  • WTLS as secure protocol of WAP makes TLS that is used in wireless Intemet protocol for TCP security be appropriate for wireless environments. And purpose of WTLS is to provide safe and efficient services. WTLS protocol consists of 4 protocols(Handshake, ChangeCipherSpec, Alert, Application Data etc.). In this papers we analyze properties of Handshake protocol and procedures of establishing master secret in detail. And then we analyze securities against several attacker models with them for a basis. Also we propose new Handshake protocol that is secure against active attacker model and can provide various security services.

Global Flood Alert System (GFAS)

  • Umeda, Kazuo
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2006.05a
    • /
    • pp.28-35
    • /
    • 2006
  • Global Flood Alert System (GFAS) is an attempt to make the best use of satellite rainfall data in flood forecasting. The project of GFAS is promoted both by Ministry of Land, Infrastructure and Transport-Japan (MLIT) and Japan Aerospace Exploration Agency (JAXA), under which Infrastructure Development Institute-Japan (IDI) has been working on the development of Internet-based information system and just launched trial run of GFAS in April 2006 on International Flood Network (IFNet) website. The function of GFAS is to connect space agencies and hydrological services/river authorities in charge of flood forecasting and warning by providing global rainfall information in maps, text data e-mails and so on which is produced from binary global rainfall data downloaded from National Aeronautics and Space Administration (NASA) website. Although the effectiveness of satellite rainfall data in flood forecasting and warning has yet to be verified, satellite rainfall is expected to play an important role to strengthen existing flood forecasting systems by diversifying hydrological data source.

  • PDF

Biological Object Downloader (BOD) Service for Easy Download and Management of Biological Databases

  • Park, Dae-Ui;Lee, Jung-Woo;Yoon, Gi-Seok;Gong, Sung-Sam;Bhak, Jong
    • Genomics & Informatics
    • /
    • v.5 no.4
    • /
    • pp.196-199
    • /
    • 2007
  • BOD is an FTP service management tool on the Internet. It was developed for biological researchers in South Korea. It enables easier and faster access of bioinformation without having to go through foreign FTP sites. BOD includes an automatic downloader with a management and email alert service from which the user can easily select and schedule any biological database. Once listed in BOD, the user can check and modify the download status and data from an additional email alert service.

Distributed Denial of Service Defense on Cloud Computing Based on Network Intrusion Detection System: Survey

  • Samkari, Esraa;Alsuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.67-74
    • /
    • 2022
  • One type of network security breach is the availability breach, which deprives legitimate users of their right to access services. The Denial of Service (DoS) attack is one way to have this breach, whereas using the Intrusion Detection System (IDS) is the trending way to detect a DoS attack. However, building IDS has two challenges: reducing the false alert and picking up the right dataset to train the IDS model. The survey concluded, in the end, that using a real dataset such as MAWILab or some tools like ID2T that give the researcher the ability to create a custom dataset may enhance the IDS model to handle the network threats, including DoS attacks. In addition to minimizing the rate of the false alert.

The Design and Implement a Healthcare Alert App to Prevent Dementia (치매예방을 위한 헬스케어 알리미 앱 설계 및 구현)

  • Pi, SU-Young
    • Journal of Digital Convergence
    • /
    • v.16 no.10
    • /
    • pp.59-67
    • /
    • 2018
  • There are not that many m-health related services limited to the elderly. Many of the elderly who are at risk of dementia are unfamiliar to smart devices, so it is required to design an user-customized App. Therefore, I design and embody a mobile voice alert integrated app, which enables voice input to increase the accessibility of the elderly, so as to prevent diseases caused by declined cognitive function such as dementia. I conducted interviews and questionnaire after having the students use the app in Lifelong Education Center in H region of Gyeongbuk, and the analysis result has showed the high satisfaction. It is expected that it will be able to play a key role for M-Health service for the elderly since it is possible to prevent dementia through the voice health care alert app. I would like to learn deep learning in the future to predict the life patterns and the possibility of dementia of the elderly.

Mobile Edge Computing based Building Disaster Alert System Implementation (Mobile Edge Computing을 활용한 건물 재난 알림 시스템 구축 방안)

  • Ha, Taeyoung;Kim, Jungsung;Chung, Jong-Moon
    • Journal of Internet Computing and Services
    • /
    • v.18 no.4
    • /
    • pp.35-42
    • /
    • 2017
  • In this paper, a building disaster notification system with MEC (Mobile Edge Computing) technology is proposed, which informs people in a building about the disaster. The overview of MEC is presented, and the structure and characteristics of network using MEC are described. In addition, the characteristics of a enterprise integration pattern based Apache Camel is described, and how to implement MEC with Apache Camel is presented. Finally, an implementation method of building disaster notification system with Apache Camel based MEC is proposed to quickly recognize disasters through sensors and to rapidly evacuate people from buildings.

Protocol Design and Received Methods of Emergency Broadcasting System for ATSC Mobile DTV (ATSC Mobile DTV에서 적용 가능한 재난방송 프로토콜 설계 및 수신기법)

  • Yu, Saet-Byeol;Cho, Min-Ju;Hwang, Jun
    • Journal of Internet Computing and Services
    • /
    • v.12 no.6
    • /
    • pp.129-137
    • /
    • 2011
  • In this paper, a fast and reliable emergency broadcasting system for Advanced Television System Committee (ATSC) Mobile DTV is proposed. The proposed protocol is based on the Emergency Alert Message (EAM) standard currently used for cable TV emergency broadcasting in the United States. The protocol is implemented and evaluated to enable fast emergency information propagation. ATSC Mobile DTV enables digital mobile broadcasting without affecting the existing ATSC legacy digital TV system. Since ATSC Mobile DTV devices are mobile and self-powered, they can effectively propagate emergency information. The proposed emergency broadcasting protocol can be applied in all countries adopting the ATSC standard.

Non-repudiation Protocol for Efficiency and Fairness in TTP Security Service Level (TTP 보안 서비스 레벨에서 효율성과 공정성을 고려한 부인봉쇄 프로토콜)

  • 박상준;홍충선;이대영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.11C
    • /
    • pp.24-32
    • /
    • 2001
  • Recently, in the case that provides electronic services using Internet, we need the non-repudiation service that supplies a technological evidence about actions between a sender and a receiver that violate the promised protocol. Also, this service offers legal evidences while producing controversy. In this paper, we propose a protocol that improves the efficiency and offers the fairness of non-repudiation service by the extension of ability of TTP (Trusted Third Party). The proposed protocol adds a Time Check function and an Alert Message to extend the ability of TTP. Through the computer simulation, we prove that the proposed protocol has better efficiency than previous protocols.

  • PDF