• Title/Summary/Keyword: Artificial Intelligent Security

Search Result 86, Processing Time 0.023 seconds

Efficient hardware implementation and analysis of true random-number generator based on beta source

  • Park, Seongmo;Choi, Byoung Gun;Kang, Taewook;Park, Kyunghwan;Kwon, Youngsu;Kim, Jongbum
    • ETRI Journal
    • /
    • v.42 no.4
    • /
    • pp.518-526
    • /
    • 2020
  • This paper presents an efficient hardware random-number generator based on a beta source. The proposed generator counts the values of "0" and "1" and provides a method to distinguish between pseudo-random and true random numbers by comparing them using simple cumulative operations. The random-number generator produces labeled data indicating whether the count value is a pseudo- or true random number according to its bit value based on the generated labeling data. The proposed method is verified using a system based on Verilog RTL coding and LabVIEW for hardware implementation. The generated random numbers were tested according to the NIST SP 800-22 and SP 800-90B standards, and they satisfied the test items specified in the standard. Furthermore, the hardware is efficient and can be used for security, artificial intelligence, and Internet of Things applications in real time.

An Intelligent CCTV-Based Emergency Detection System for Rooftop Access Control Problems (옥상 출입 통제 문제 해결을 위한 지능형 CCTV 기반 비상 상황 감지 시스템 제안)

  • Yeeun Kang;Soyoung Ham;Seungchae Joa;Hani Lee;Seongmin Kim;Hakkyong Kim
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.59-68
    • /
    • 2024
  • With advancements in artificial intelligence technology, intelligent CCTV systems are being deployed across various environments, such as river bridges and construction sites. However, a conflict arises regarding the opening and closing of rooftop access points due to concerns over potential accidents and crime incidents and their role as emergency evacuation spaces. While the relevant law typically mandates the constant opening of designated rooftop access points, closures are often tacitly permitted in practice for security reasons, with a lack of appropriate legal measures. In this context, this study proposes a detection system utilizing intelligent CCTV to respond to emergencies that may occur on rooftops. We develop a system based on the YOLOv5 object detection model to detect assault and suicide attempts by jumping, introducing a new metric to assess them. Experimental results demonstrate that the proposed system rapidly detects assault and suicide attempts with high accuracy. Additionally, through a legal analysis of rooftop access point management, deficiencies in the legal framework regarding rooftop access and CCTV installation are identified, and improvement measures are proposed. With technological and legal improvements, we believe that crime and accident incidents in rooftop environments will decrease.

Development of a Non-contact Input System Based on User's Gaze-Tracking and Analysis of Input Factors

  • Jiyoung LIM;Seonjae LEE;Junbeom KIM;Yunseo KIM;Hae-Duck Joshua JEONG
    • Korean Journal of Artificial Intelligence
    • /
    • v.11 no.1
    • /
    • pp.9-15
    • /
    • 2023
  • As mobile devices such as smartphones, tablets, and kiosks become increasingly prevalent, there is growing interest in developing alternative input systems in addition to traditional tools such as keyboards and mouses. Many people use their own bodies as a pointer to enter simple information on a mobile device. However, methods using the body have limitations due to psychological factors that make the contact method unstable, especially during a pandemic, and the risk of shoulder surfing attacks. To overcome these limitations, we propose a simple information input system that utilizes gaze-tracking technology to input passwords and control web surfing using only non-contact gaze. Our proposed system is designed to recognize information input when the user stares at a specific location on the screen in real-time, using intelligent gaze-tracking technology. We present an analysis of the relationship between the gaze input box, gaze time, and average input time, and report experimental results on the effects of varying the size of the gaze input box and gaze time required to achieve 100% accuracy in inputting information. Through this paper, we demonstrate the effectiveness of our system in mitigating the challenges of contact-based input methods, and providing a non-contact alternative that is both secure and convenient.

Protection System Against The Infringement of Information Signals in Fiber Communication System (광섬유 통신 시스템의 정보 신호 침해에 대한 보호 시스템)

  • Ugli, Sobirov Asilzoda Alisher;Umaralievich, Nishonov Ilhomjon;Kim, Daeik
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.2
    • /
    • pp.219-228
    • /
    • 2022
  • One of the most pressing and demanding issues today in the conditions of widespread transformation and digitalization of spheres of human activity is information security and ensuring the integrity of data. The main research and development in the field of information security is aimed at improving efficiency and rationalization. One of the main means of data transmission and operation of information complexes are fiber-optic systems. To date, there have been incidents of illegal intrusion and theft of information, passing through this type of communication. Thus, today there is a problem associated with insufficient information security in fiber-optic data transmission systems. One of the most effective tools to counter acts of illegal interference in systems are artificial intelligence and cryptographic algorithms of information protection. It is the symbiosis of these two tools that can qualitatively improve the level of information security in fiber-optic data transmission systems. Thus, the authors of this article pursue the goal associated with the description of an innovative system for protecting information from violations in fiber-optic data transmission systems based on the integration of intelligent cryptographic algorithms.

A Prediction Model for studying the Impact of Separated Families on Students using Decision Tree

  • Ourida Ben boubaker;Ines Hosni;Hala Elhadidy
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.79-84
    • /
    • 2023
  • Social studies show that the number of separated families have lately increased due to different reasons. Despite the causes for family rift, many problems are resulted which affected the children physically and psychologically. This effect may cause them fail in their life especially at school. This paper focuses on the negative reaction of the parents' separation with other factors from the computer science prospective. Since the artificial intelligent field is the most common widespread in computer science, a predictive model is built to predict if a specific child whose parents separated, may complete the school successfully or fail to continue his education. This will be done using Decision Tree that have proved their effectiveness on the predication applications. As an experiment, a sample of individuals is randomly chosen and applied on our prediction model. As a result, this model shows that the separation may cause the child success at school if other factors are satisfied; the intelligent of the guardian, the relation between the parents after the separation, his age at the separation time, etc.

Development of an intelligent edge computing device equipped with on-device AI vision model (온디바이스 AI 비전 모델이 탑재된 지능형 엣지 컴퓨팅 기기 개발)

  • Kang, Namhi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.5
    • /
    • pp.17-22
    • /
    • 2022
  • In this paper, we design a lightweight embedded device that can support intelligent edge computing, and show that the device quickly detects an object in an image input from a camera device in real time. The proposed system can be applied to environments without pre-installed infrastructure, such as an intelligent video control system for industrial sites or military areas, or video security systems mounted on autonomous vehicles such as drones. The On-Device AI(Artificial intelligence) technology is increasingly required for the widespread application of intelligent vision recognition systems. Computing offloading from an image data acquisition device to a nearby edge device enables fast service with less network and system resources than AI services performed in the cloud. In addition, it is expected to be safely applied to various industries as it can reduce the attack surface vulnerable to various hacking attacks and minimize the disclosure of sensitive data.

A Conceptual Study on the Development of Intelligent Detection Model for the anonymous Communication bypassing the Cyber Defense System (사이버 방어체계를 우회하는 익명통신의 지능형 탐지모델개발을 위한 개념연구)

  • Jung, Ui Seob;Kim, Jae Hyun;Jeong, Chan Ki
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.77-85
    • /
    • 2019
  • As the Internet continues to evolve, cyber attacks are becoming more precise and covert. Anonymous communication, which is used to protect personal privacy, is also being used for cyber attacks. Not only it hides the attacker's IP address but also encrypts traffic, which allows users to bypass the information protection system that most organizations and institutions are using to defend cyber attacks. For this reason, anonymous communication can be used as a means of attacking malicious code or for downloading additional malware. Therefore, this study aims to suggest a method to detect and block encrypted anonymous communication as quickly as possible through artificial intelligence. Furthermore, it will be applied to the defense to detect malicious communication and contribute to preventing the leakage of important data and cyber attacks.

Artificial Intelligence Inspired Intelligent Trust Based Routing Algorithm for IoT

  • Kajol Rana;Ajay Vikram Singh;P. Vijaya
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.149-161
    • /
    • 2023
  • Internet of Things (IoT) is a relatively new concept that has gained immense popularity in a short period of time due to its wide applicability in making human life more convenient and automated. As an illustration: the development of smart homes, smart cities, etc. However, it is also accompanied by a substantial number of risks and flaws. IoT makes use of low-powered devices, so secure, less time-consuming and energy-intensive transmission (routing) of messages due to the limited availability of energy is one of the many and most significant concerns for IoT developers. The following paper presents a trust-based routing scenario for the Internet of Things (IoT) that exploits the past transmission record from the cupcarbon simulator's log files. Artificial Neural Network is used to quantify knowledge of trust, calculate the value of trust, and share this information with other network devices. As a human behavioural pattern, trust provides a superior method for making routing decisions. If there is a tie in the trust values and no other path is available, the remaining battery power is used to break the tie and make a forwarding decision; this is also seen as a more efficient use of the available resources. The proposed algorithm is observed to have superior energy consumption and routing decisions compared to conventional routing algorithms, and it improves the communication pattern.

Analysis on the Perception of the Cyber Dysfunction in the Intelligent Information Society According to the Introduction of the Bright Internet Trust Network (Bright Internet 신뢰네트워크 도입에 따른 지능정보사회의 사이버 역기능 해소에 대한 인식 분석)

  • Gyoo Gun Lim;Jae Ik Ahn
    • Information Systems Review
    • /
    • v.22 no.3
    • /
    • pp.99-118
    • /
    • 2020
  • At present, our society is developing into the intelligent information society in the wave of the 4th industrial revolution, and this change will have the positive effect of innovating all industry fields. However, due to the duality of technology, there will be positive and negative effects. With intelligence, threats to cyber dysfunction such as hacking, terrorism, privacy infringement, and illegal content distribution will become more serious. Until now, the security system of the Internet has been a proactive security system, but in recent years, a proposal for a trust network, a preventive security system, has been introduced. Therefore, this study aims to analyze the possibility of resolving cyber dysfunction of intelligent information society about Bright Internet, one of trust network technologies. This study defines the cyber dysfunction of the intelligent information society and analyzes the perceptions of changes in the cyber dysfunction of the intelligent information society on the introduction of the five principles of the Bright Internet. The change of cyber dysfunction severity of the intelligent information society due to the introduction of the trust network is analyzed to reflect the technical and social demands. This work will guide the structure of the trust network and the direction of practical technological introduction and its influence.

A Study on Mechanism of Intelligent Cyber Attack Path Analysis (지능형 사이버 공격 경로 분석 방법에 관한 연구)

  • Kim, Nam-Uk;Lee, Dong-Gyu;Eom, Jung-Ho
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.93-100
    • /
    • 2021
  • Damage caused by intelligent cyber attacks not only disrupts system operations and leaks information, but also entails massive economic damage. Recently, cyber attacks have a distinct goal and use advanced attack tools and techniques to accurately infiltrate the target. In order to minimize the damage caused by such an intelligent cyber attack, it is necessary to block the cyber attack at the beginning or during the attack to prevent it from invading the target's core system. Recently, technologies for predicting cyber attack paths and analyzing risk level of cyber attack using big data or artificial intelligence technologies are being studied. In this paper, a cyber attack path analysis method using attack tree and RFI is proposed as a basic algorithm for the development of an automated cyber attack path prediction system. The attack path is visualized using the attack tree, and the priority of the path that can move to the next step is determined using the RFI technique in each attack step. Based on the proposed mechanism, it can contribute to the development of an automated cyber attack path prediction system using big data and deep learning technology.