• Title/Summary/Keyword: Association ID

Search Result 210, Processing Time 0.021 seconds

Study on Battery Power based IoT Device Lightweight Authentication Protocol (베터리 전력 환경 IoT 디바이스 경량 인증 프로토콜 연구)

  • Sung-Hwa Han
    • Convergence Security Journal
    • /
    • v.24 no.3
    • /
    • pp.165-171
    • /
    • 2024
  • Due to the IT convergence trend, many industrial domains are developing their own IoT services. With batteries and lightweight devices, IoT could expand into various fields including smart farms, smart environments, and smart energy. Many battery-powered IoT devices are passive in enforcing security techniques to maintain service time. This is because security technologies such as cryptographic operations consume a lot of power, so applying them reduces service maintenance time. This vulnerable IoT device security environment is not stable. In order to provide safe IoT services, security techniques considering battery power consumption are required. In this study, we propose an IoT device authentication technology that minimizes power consumption. The proposed technology is a device authentication function based on the Diffie-Hell man algorithm, and has the advantage that malicious attackers cannot masquerade the device even if salt is leaked during the transmission section. The battery power consumption of the authentication technology proposed in this study and the ID/PW-based authentication technology was compared. As a result, it was confirmed that the authentication technique proposed in this study consumes relatively little power. If the authentication technique proposed in this study is applied to IoT devices, it is expected that a safer IoT security environment can be secured.

Microbial Evaluation of Fodder Tree Leaves as Ruminant Feed

  • Odenyo, A.A.;Osuji, P.O.;Negassa, D.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.12 no.5
    • /
    • pp.708-714
    • /
    • 1999
  • Fermentation of legume fodder tree leaves by rumen microorganisms was evaluated. The substrates were sun-dried, ground leaves. Gas and volatile fatty acid (VFAs) production were estimated. Using gas production as an index of fermentation at 12 h, the leaves tested ranked as follows; Chamaecytisus palmensis>Gliricidia sepium>Sebania sesban>Tephrosia bracteolate>Leucaena pallida>Vernonia amygdalina>Acacia sieberiana>Sesbania goetzei>Acacia angustissima. Using VFA production, the ranking was a follows; G. sepium>S. sesban>S. goetzei>L. pallida>C. palmensis/V. amygdalina>T. bracteolate> A. sieberiana>A. angustissima. Absolute gas or VFA production rates, were also used to rank the leaves. Extracts (70% acetone) of A. angustissima inhibited the growth of Ruminococcus albus 8, R. flavefaciens FD-1, Prevotella ruminicola D3ID and Streptococcus bovis JBI while the trowth of Selenomonas ruminantium D was depressed when 0.6 ml exracts were added. C. palmensis water extracts enhanced cellulose hydrolysis by R. flavefaciens FD-1. All extracts reduced celluloysis by R. albus 8. R. flavefaciens FD-1 hydrolyzed more (p<0.001) cellulose than R. albus 8.

A Study on Real-Time Web-Server Intrusion Detection using Web-Server Agent (웹 서버 전용 에이전트를 이용한 실시간 웹 서버 침입탐지에 관한 연구)

  • 진홍태;박종서
    • Convergence Security Journal
    • /
    • v.4 no.2
    • /
    • pp.17-25
    • /
    • 2004
  • As Internet and Internet users are rapidly increasing and getting popularized in the world the existing firewall has limitations to detect attacks which exploit vulnerability of web server. And these attacks are increasing. Most of all, intrusions using web application's programming error are occupying for the most part. In this paper, we introduced real-time web-server agent which analyze web-server based log and detect web-based attacks after the analysis of the web-application's vulnerability. We propose the method using real-time agent which remove Process ID(pid) and block out attacker's If if it detects the intrusion through the decision stage after judging attack types and patterns.

  • PDF

A Designing Method of Digital Forensic Snort Application Model (Snort 침입탐지 구조를 활용한 디지털 Forensic 응용모델 설계방법)

  • Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.10 no.2
    • /
    • pp.1-9
    • /
    • 2010
  • Snort is an open source network intrusion prevention and detection system (IDS/IPS) developed by Sourcefire. Combining the benefits of signature, protocol and anomaly-based inspection, Snort is the most widely deployed IDS/IPS technology worldwide. With millions of downloads and approximately 300,000 registered users. Snort identifies network indicators by inspecting network packets in transmission. A process on a host's machine usually generates these network indicators. This means whatever the snort signature matches the packet, that same signature must be in memory for some period (possibly micro seconds) of time. Finally, investigate some security issues that you should consider when running a Snort system. Paper coverage includes: How an IDS Works, Where Snort fits, Snort system requirements, Exploring Snort's features, Using Snort on your network, Snort and your network architecture, security considerations with snort under digital forensic windows environment.

GoBean: a Java GUI application for visual exploration of GO term enrichments

  • Lee, Sang-Hyuk;Cha, Ji-Young;Kim, Hyeon-Jin;Yu, Ung-Sik
    • BMB Reports
    • /
    • v.45 no.2
    • /
    • pp.120-125
    • /
    • 2012
  • We have developed a biologist-friendly, Java GUI application (GoBean) for GO term enrichment analysis. It was designed to be a comprehensive and flexible GUI tool for GO term enrichment analysis, combining the merits of other programs and incorporating extensive graphic exploration of enrichment results. An intuitive user interface with multiple panels allows for extensive visual scrutiny of analysis results. The program includes many essential and useful features, such as enrichment analysis algorithms, multiple test correction methods, and versatile filtering of enriched GO terms for more focused analyses. A unique graphic interface reflecting the GO tree structure was devised to facilitate comparisons of multiple GO analysis results, which can provide valuable insights for biological interpretation. Additional features to enhance user convenience include built in ID conversion, evidence code-based gene-GO association filtering, set operations of gene lists and enriched GO terms, and user -provided data files. It is available at http://neon.gachon.ac.kr/GoBean/.

A Study on the Performance Improvement of Anomaly-Based IDS Through the Improvement of Training Data (학습 데이터 개선을 통한 Anomaly-based IDS의 성능 향상 방안)

  • Moon, Sang Tae;Lee, Soo Jin
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.181-188
    • /
    • 2019
  • Recently, attempts to apply artificial intelligence technology to create the normal profile in Anomaly-based intrusion detection systems have been made actively. But existing studies that proposed the application of artificial intelligence technology mostly focus on improving the structure of artificial neural networks and finding optimal hyper-parameter values, and fail to address various problems that may arise from the misconfiguration of learning data. In this paper, we identify the main problems that may arise due to the misconfiguration of learning data through experiment. And we also propose a novel approach that can address such problems and improve the detection performance through reconstruction of learning data.

Insertion/Deletion Polymorphism of the Angiotensin Converting Enzyme Gene in Coronary Artery Disease in Southern Turkey

  • Acarturk, Esmeray;Attila, Gulen;Bozkurt, Abdi;Akpinar, Onur;Matyar, Selcuk;Seydaoglu, Gulsah
    • BMB Reports
    • /
    • v.38 no.4
    • /
    • pp.486-490
    • /
    • 2005
  • Genetic factors are important in the pathogenesis of coronary artery disease (CAD). Angiotensin converting enzyme (ACE) gene insertion(I)/deletion(D) polymorphism is one of the genetic factor found to be related with CAD. We investigated the association between I/D polymorphism of the ACE gene and the presence of CAD. Threehundred and seven patients (187 males and 120 females, aged between 35-80, mean $54.3{\pm}9.8$ years) who underwent diagnostic coronary angiography were included in the study. ACE I/D polymorphism was detected by polymerase chain reaction. Of the 307, 176 had CAD. The most frequently observed genotype in all subjects was ID (47.9 %). However, in patients with CAD the frequency of II genotype was lower whereas DD genotype was higher compared to the controls (p < 0.05). The number of D allele carrying subjects were also higher (p < 0.05) in CAD patients. The logistic regression analysis indicated that the ACE D allele is an independent risk factor (odds ratio = 1.48, 95% CI = 1.01-2.18, p < 0.05). In conclusion, the I/D polymorphism of ACE gene (carrying D allele) is an independent risk factor for CAD in the studied Turkish population.

Creating a Workplace Handbook of Biologically Hazardous Agents (사업장의 생물학적 유해인자 편람 작성 연구)

  • Rim, Kyung-Taek
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.24 no.1
    • /
    • pp.14-37
    • /
    • 2014
  • Objectives: Since information on biological factors in the workplace are currently lacking, I wanted to create a handbook of these factors that would be viewable at a glance as a means to more effectively prevent occupationally-infected diseases. Proper information on biological hazards in the workplace allowing the appropriate recognition of the harmful factors is desperately needed. Methods and Results: In this study, I intended to create a high-utility handbook of biologically hazardous agents in the workplace. To ensure its effectiveness, information and references about biologically hazardous agents in the workplace were analyzed and classified and pathogen safety data sheets(PSDS) sourced from the Public Health Agency of Canada were included. I intended to make it accessible from the point of view of workers and their employers. A more effective classification system of occupational infectious diseases is presented, and biologically hazardous agents were classified according to occupations, industries, infectious diseases, and so on. The handbook consists of 60 major kinds of biologically infectious occupational factors that are expected to be generated in workplaces in Korea, and are focused on practical utility. The pathogen safety data sheets(PSDS) of 192 species were also included. To allow more effective management, domestic and foreign laws and regulations are presented. Conclusions: This case report presents general information on the history and contents of the handbook and PSDS, it will also be useful in workplaces if download from the homepage of OSHRI, KOSHA(oshri.kosha.or.kr/bridge?menuID=901).

Countermeasure for Preventing a Secondary Damage of Information Leakage using Financial ISAC (금융 ISAC을 활용한 정보유출 2차피해 방지 방안)

  • Jeong, Gi Seog
    • Convergence Security Journal
    • /
    • v.14 no.5
    • /
    • pp.31-36
    • /
    • 2014
  • As security management center of financial area, financial ISAC monitors financial corporations and provides security services. Financial ISAC minimizes damage by responding quickly to external attack such as hacking, virus but it is poor at handling internal attack. For the efficient management and stable operation of information source, also to respond jointly to online hacking, the necessity of information sharing system increases day by day in and outside country. This paper proposes financial ISAC that can prevent a secondary damage of leakage information as well as providing security services. The proposed financial ISAC provides new password to financial corporation in which the same ID and password as leakage information are used and in case of financial information leakage it warns customers against phishing etc.

A Structure of Personalized e-Learning System Using On/Off-line Mixed Estimations Based on Multiple-Choice Items

  • Oh, Yong-Sun
    • International Journal of Contents
    • /
    • v.5 no.1
    • /
    • pp.51-55
    • /
    • 2009
  • In this paper, we present a structure of personalized e-Learning system to study for a test formalized by uniform multiple-choice using on/off line mixed estimations as is the case of Driver :s License Test in Korea. Using the system a candidate can study toward the license through the Internet (and/or mobile instruments) within the personalized concept based on IRT(item response theory). The system accurately estimates user's ability parameter and dynamically offers optimal evaluation problems and learning contents according to the estimated ability so that the user can take possession of the license in shorter time. In order to establish the personalized e-Learning concepts, we build up 3 databases and 2 agents in this system. Content DB maintains learning contents for studying toward the license as the shape of objects separated by concept-unit. Item-bank DB manages items with their parameters such as difficulties, discriminations, and guessing factors, which are firmly related to the learning contents in Content DB through the concept of object parameters. User profile DB maintains users' status information, item responses, and ability parameters. With these DB formations, Interface agent processes user ID, password, status information, and various queries generated by learners. In addition, it hooks up user's item response with Selection & Feedback agent. On the other hand, Selection & Feedback agent offers problems and content objects according to the corresponding user's ability parameter, and re-estimates the ability parameter to activate dynamic personalized learning situation and so forth.