• Title/Summary/Keyword: Authorized access point

Search Result 24, Processing Time 0.027 seconds

Exploring the Revision Direction and Scope of the Korean Cataloging Rules for Religious Works (종교 저작에 대한 한국목록규칙의 개정 방향과 범위 탐색)

  • Rho, Jee-Hyun
    • Journal of Korean Library and Information Science Society
    • /
    • v.52 no.4
    • /
    • pp.153-177
    • /
    • 2021
  • The revision of the Korean Cataloging Rules (KCR) is in progress in order to conform IFLA LRM conceptual model and to strengthen its internal stability. Religious works, along with musical works and legal works, have been treated as special and important in cataloging rules. This trend continues in the new cataloging rules that seek a bibliographic model that interconnects related materials. However since KCR2(1966), there are no rules for access points or specific rules on religious works. Under the circumstances, this study analyzed (1) the contents of religious works in the recently revised cataloging rules, (2) the access points and their functions for religious works implemented in online catalogs and authority system, and finally (3) the direction and scope of KCR revision. As a result of the study, this study suggested that it is necessary to prepare detailed rules for preferred title and authorized access points for various religious works in KCR. In conclusion, some issues for further discussion were summarized.

Enhancing the Reliability of Wi-Fi Network Using Evil Twin AP Detection Method Based on Machine Learning

  • Seo, Jeonghoon;Cho, Chaeho;Won, Yoojae
    • Journal of Information Processing Systems
    • /
    • v.16 no.3
    • /
    • pp.541-556
    • /
    • 2020
  • Wireless networks have become integral to society as they provide mobility and scalability advantages. However, their disadvantage is that they cannot control the media, which makes them vulnerable to various types of attacks. One example of such attacks is the evil twin access point (AP) attack, in which an authorized AP is impersonated by mimicking its service set identifier (SSID) and media access control (MAC) address. Evil twin APs are a major source of deception in wireless networks, facilitating message forgery and eavesdropping. Hence, it is necessary to detect them rapidly. To this end, numerous methods using clock skew have been proposed for evil twin AP detection. However, clock skew is difficult to calculate precisely because wireless networks are vulnerable to noise. This paper proposes an evil twin AP detection method that uses a multiple-feature-based machine learning classification algorithm. The features used in the proposed method are clock skew, channel, received signal strength, and duration. The results of experiments conducted indicate that the proposed method has an evil twin AP detection accuracy of 100% using the random forest algorithm.

Mobile Malicious AP Detection and Cut-off Mechanism based in Authentication Network (인증 네트워크 상의 비 인가된 모바일 AP 탐지 및 차단 기법)

  • Lim, Jae-Wan;Jang, Jong-Deok;Yoon, Chang-Pyo;Ryu, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.55-61
    • /
    • 2012
  • Owing to the development of wireless infrastructure and mobile communication technology, There is growing interest in smart phone using it. The resulting popularity of smart phone has increased the Mobile Malicious AP-related security threat and the access to the wireless AP(Access Point) using Wi-Fi. mobile AP mechanism is the use of a mobile device with Internet access such as 3G cellular service to serve as an Internet gateway or access point for other devices. Within the enterprise, the use of mobile AP mechanism made corporate information management difficult owing to use wireless system that is impossible to wire packet monitoring. In this thesis, we propose mobile AP mechanism-based mobile malicious AP detection and prevention mechanism in radius authentication server network. Detection approach detects mobile AP mechanism-based mobile malicious AP by sniffing the beacon frame and analyzing the difference between an authorized AP and a mobile AP mechanism-based mobile malicious AP detection.

A Secure License Sharing Scheme for Domain DRM System Against Replay Attack (재생 공격에 안전한 Domain DRM 시스템을 위한 License 공유 방식)

  • Choi, Dong-Hyun;Lee, Yun-Ho;Kang, Ho-Gab;Kim, Seung-Joo;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.97-101
    • /
    • 2007
  • The purpose of DRM is to protect the copyrights of content providers and to enable only designated users to access digital contents. From the consumers' point of view, they have a tendency to go against complex and confusing limitations. Moreover, consumers' rights of use of the content obtained legally were frequently harmed by arbitrary limitations. The concept of Authorized Domain (AD) was presented to remove such problems. However, the previous work on authorized domain has two problems. The first is that it requires a rather expensive revocation mechanism for withdraw process. The second is that the modules still can play contents which are previously obtained even though they are currently out of the authorized domain. On the contrary, our scheme presents the content from being played by modules which are out of the domain for better security. Furthermore our scheme does not need to maintain a revocation list and prevent replay attack.

Secure Contents Access Control System in IPTV Flexible-PPC Model (IPTV Flexible-PPC 환경에서의 안전한 콘텐츠 접근 제어 시스템)

  • Kang, Yong-Goo;Lim, Ji-Hwan;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.93-104
    • /
    • 2011
  • A conditional access system is an essential element in IPTV services enabling service providers to allow authorized access to their services only to paid subscribers. Currently, there are two types of IPTV service models, namely PPC (pay-per-channel) and PPV (pay-per-view). However, a more desirable model would be the flexible PPC model, in which subscribers are free to choose any combination of preferred channels and add/remove channels independently. In this paper, we first point out that a previously proposed key management scheme for F-PPC is not secure. We then propose a new conditional access system using 4-level key hierarchy to realize secure F-PPC services. Compared to existing schemes, the proposed system is very efficient, just requiring O(1) communication for key update.

Detecting Rogue AP using k-SVM method (k-SVM을 이용한 Rogue AP 탐지 기법 연구)

  • Lee, Jae-Wook;Lee, Si-Young;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.87-95
    • /
    • 2014
  • Under only authorized AP is allowable environment, rogue AP which is generated by a smartphone tethering can be a serious security breach. To solve rogue AP problem, this paper proposes classifying algorithm of Kernel Support Vector Machine using features of RTT data. Through our experiment, we can detect rogue AP from LTE mobile network.

Evil-Twin Detection Scheme Using SVM with Multi-Factors (다중 요소를 가지는 SVM을 이용한 이블 트윈 탐지 방법)

  • Kang, SungBae;Nyang, DaeHun;Lee, KyungHee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.2
    • /
    • pp.334-348
    • /
    • 2015
  • Widespread use of smart devices accompanies increase of use of access point (AP), which enables the connection to the wireless network. If the appropriate security is not served when a user tries to connect the wireless network through an AP, various security problems can arise due to the rogue APs. In this paper, we are going to examine the threat by evil-twin, which is a kind of rogue APs. Most of recent researches for detecting rogue APs utilize the measured time difference, such as round trip time (RTT), between the evil-twin and authorized APs. These methods, however, suffer from the low detection rate in the network congestion. Due to these reasons, in this paper, we suggest a new factor, packet inter-arrival time (PIAT), in order to detect evil-twins. By using both RTT and PIAT as the learning factors for the support vector machine (SVM), we determine the non-linear metric to classify evil-twins and authorized APs. As a result, we can detect evil-twins with the probability of up to 96.5% and at least 89.75% even when the network is congested.

The Study on the Directions of KCR4 under the New ICP 2009 (국제목록원칙 2009 제정에 따른 한국목록규칙의 방향성에 관한 연구)

  • Lee, Mi-Hwa
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.46 no.2
    • /
    • pp.261-280
    • /
    • 2012
  • This study seeks to replace PaRIS Principles and find directions of revising KCR4 by analyzing the international Cataloging Principles 2009(ICP 2009) established in the environment of Machine Readable Cataloging. ICP 2009 was reflected in cataloging rules such as RDA and ISBD 2010 as the minimal principles for uniformity in establishing each nation's cataloging rules. In contrary, KCR4 needs to be revised because it has never been changed after 2003, and has only description rules without any rules for the choice and forms of access points. Therefore, this study aims to grasp requirements that should be reflected in KCR4 through analyzing ICP 2009. In first step, it is to grasp the features of ICP 2009 by comparing PaRIS Principle and ICP 2009 and to compare KCR4 in aspects of ICP 2009. The detailed elements for comparison between ICP 2009 and KCR4 are scope, general principles, entitles, attributes, and relationships, objectives and functions of the catalogue, bibliographic description, access points, foundations for search capabilities as the contents of ICP 2009. As a result, this study could give some directions of KCR4 in the future. First, ISBD 2010 and conceptual models should be reflected in KCR4 in description. Second, it should regulate the authority access points in KCR4 based on ICP 2009. Third, it will describe essential access points of work and expression attributes in bibliographic records and authority records to find works and expression. This study will contribute to guide the national cataloging rules.

A Study on the Adoption of the FRBR According to the Bibliographic Relationships of Five Classics and Four Books (사서오경의 서지적 관계 특성에 따른 FRBR 적용에 관한 연구)

  • Kim, Jeong-Hyen
    • Journal of Korean Library and Information Science Society
    • /
    • v.46 no.2
    • /
    • pp.317-336
    • /
    • 2015
  • This paper provides a brief overview of bibliographic relationships, a analysis of bibliographic relationships' characteristics of 2,940 bibliographic records on the Five Classics and Four Books taken from Korean National Bibliography, and a methodology for applying the FRBR model based on analysis of the samples. As results of analysis, the work type ranked high particularly in the commentary, translation with notes, and translation on the original works etc. I suggested adopting conception of supper works, that is, family of works and using uniform title as a connective device between the works, that is, an authorized access point of RDA to apply FRBR model of the Five Classics and Four Books. Also I exemplified the description of uniform title in 630 field as subject added entry.

A Study on the Development Plan for Nationwide Authority Control System based on National Authority Sharing System (국가전거공동활용시스템 기반의 국가 전거제어 체계 발전방안에 관한 연구)

  • Mihwa Lee;Sung Sook Lee
    • Journal of Korean Library and Information Science Society
    • /
    • v.54 no.1
    • /
    • pp.25-44
    • /
    • 2023
  • This study was to prepare a development plan for nationwide authority control system based on national authority sharing system of NLK through the survey targeting on libraries which do not participate in the system. Six plans were suggested to establish a nationwide authority control system based on this survey. First, an authority data construction module and a module linked to the national authority sharing system should be developed. Second, describing external identifiers such as ISNI to the national authority sharing system is to provides reliability of data and to utilizes to build linked data. Third, it is necessary to prepare strategies for promoting the national authority sharing system and diversifying services. Fourth, both authority establishment and non-establishment show difficulties and diversity in the selection and description of authorized access point, so it is necessary to prepare rules related to authorized access points. Fifth, since the data described in authority records is not enough, it is necessary to improve and upgrade authority records by using bibliographic records. Sixth, it is necessary to educate librarians about the necessity and function of authority control. As such, this study is meaningful in that it investigated the current status and requirements of libraries that do not participate in the nationwide authority system and sought ways to establish a nationwide cooperative authority control system.