• 제목/요약/키워드: Border Security

검색결과 118건 처리시간 0.027초

Hybridized Decision Tree methods for Detecting Generic Attack on Ciphertext

  • Alsariera, Yazan Ahmad
    • International Journal of Computer Science & Network Security
    • /
    • 제21권7호
    • /
    • pp.56-62
    • /
    • 2021
  • The surge in generic attacks execution against cipher text on the computer network has led to the continuous advancement of the mechanisms to protect information integrity and confidentiality. The implementation of explicit decision tree machine learning algorithm is reported to accurately classifier generic attacks better than some multi-classification algorithms as the multi-classification method suffers from detection oversight. However, there is a need to improve the accuracy and reduce the false alarm rate. Therefore, this study aims to improve generic attack classification by implementing two hybridized decision tree algorithms namely Naïve Bayes Decision tree (NBTree) and Logistic Model tree (LMT). The proposed hybridized methods were developed using the 10-fold cross-validation technique to avoid overfitting. The generic attack detector produced a 99.8% accuracy, an FPR score of 0.002 and an MCC score of 0.995. The performances of the proposed methods were better than the existing decision tree method. Similarly, the proposed method outperformed multi-classification methods for detecting generic attacks. Hence, it is recommended to implement hybridized decision tree method for detecting generic attacks on a computer network.

A Computer Oriented Solution for the Fractional Boundary Value Problem with Fuzzy Parameters with Application to Singular Perturbed Problems

  • Asklany, Somia A.;Youssef, I.K.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.223-227
    • /
    • 2021
  • A treatment based on the algebraic operations on fuzzy numbers is used to replace the fuzzy problem into an equivalent crisp one. The finite difference technique is used to replace the continuous boundary value problem (BVP) of arbitrary order 1<α≤2, with fuzzy boundary parameters into an equivalent crisp (algebraic or differential) system. Three numerical examples with different behaviors are considered to illustrate the treatment of the singular perturbed case with different fractional orders of the BVP (α=1.8, α=1.9) as well as the classical second order (α=2). The calculated fuzzy solutions are compared with the crisp solutions of the singular perturbed BVP using triangular membership function (r-cut representation in parametric form) for different values of the singular perturbed parameter (ε=0.8, ε=0.9, ε=1.0). Results are illustrated graphically for the different values of the included parameters.

Real-Time Control System

  • Gharbi, Atef
    • International Journal of Computer Science & Network Security
    • /
    • 제21권4호
    • /
    • pp.19-27
    • /
    • 2021
  • Tasks scheduling have been gaining attention in both industry and research. The scheduling that ensures independent task execution is critical in real-time systems. While task scheduling has gained a lot of attention in recent years, there have been few works that have been implemented into real-time architecture. The efficiency of the classical scheduling strategy in real-time systems, in particular, is still understudied. To reduce total waiting time, we apply three scheduling approaches in this paper: First In/First Out (FIFO), Shortest Execution Time (SET), and Shortest-Longest Execution Time (SLET). Experimental results have demonstrated the efficacy of the SLET in comparison with the others in most cases in a wide range of configurations.

Pedagogical Conditions And Technology Of Formation Of Management Competencies Of Future Specialists Of The System Of Higher Education Institutions

  • Rebryna, Anatolii;Kukin, Igor;Soltyk, Oleksandr;Tashmatov, Viacheslav;Bilanych, Halyna;Kramarenko, Iryna
    • International Journal of Computer Science & Network Security
    • /
    • 제22권8호
    • /
    • pp.217-221
    • /
    • 2022
  • The article analyzes the main theoretical approaches to the formation of managerial competencies and establishes the degree of development of the problem. The content of the concept of "managerial competence" has been clarified, to determine the structure of managerial competencies of a future specialist in the education system and indicators of the formation of managerial competencies. The organizational and pedagogical conditions necessary for the effective process of forming the managerial competencies of future specialists are revealed. The following research methods were used in the work: theoretical (analysis of regulatory documents and scientific literature on the problem under study, comparison, generalization, modeling), empirical (diagnostics of the level of formation of managerial competencies of students of the system, questioning, observation, peer review, comparative qualitative and quantitative analysis of diagnostic results the level of formation of managerial competencies).

Teenagers Consumption Within the Moderating Role of Saudis Habit Through Fuzzy Set Approach

  • Maher Toukabri
    • International Journal of Computer Science & Network Security
    • /
    • 제24권3호
    • /
    • pp.173-181
    • /
    • 2024
  • The healthy products dedicated for young people are qualified as a solution to protect the future generation, especially that most commercial deals do not consider the consumer's health and environment. Therefore, it is crucial to define the antecedent of healthy purchases and to examine their impact on teenagers. This research aims to explore the antecedents and the consequences of the consumption of Saudis teenagers. Therefore, we develop a research model in the conceptual framework and the hypotheses to test. The empirical analysis required two samples from Saudis youth consumers. The first sample was utilized in the exploratory study with SPSS software. Then, the second was employed to the confirmatory part with the Amos software, as well as the validation of the hypotheses, and model with Fuzzy Set approach. The findings of this study have significant insights into the Saudi consumption and implications for both practitioners and researchers. Then, we have particularly strenuous on intention purchase antecedents of organic foods, and their consume habit moderation.

디지털 무역협정의 국경 간 데이터 이전 자유화 연구 (A Study on Liberalization of Cross-Border Data Transfer in Digital Trade Agreements)

  • 정재승
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2022년도 춘계학술대회
    • /
    • pp.627-628
    • /
    • 2022
  • 디지털 무역은 관련 산업 및 거래의 종류가 다양하고 범위도 넓어서 국제적으로 통용되는 명문화된 정의는 없으나, 일반적으로 기존 상품 중심의 전자상거래를 포함, '인터넷과 ICT 등 디지털 기술을 이용한 국가간 교역 활동(상품+서비스+Data) 전반'을 의미한다. 최근에는 4차 산업혁명으로 인한 IT 등 기술의 발전으로 디지털 무역에 혁신적인 변화가 발생하고 있고, 미국, EU, 일본 등 선진국들은 데이터 이동 자유화 등 디지털 무역 이슈를 디지털무역협정의 협상안건에 포함시키고 있다. 국경 간 데이터 이동 자유화에 대한 쟁점은 디지털 무역 활성화를 위해 데이터 이동의 자유가 필요하나, 정보 보안과 사생활 침해의 위험성도 증가한다는 것이다. 선진국들의 방향을 살펴보면, 미국은 규제 최소화, 유럽은 역내 단일시장화는 찬성하나 소극적 대외 개방, 중국은 규제를 통한 독자적 시장육성 입장을 치하고 있다. 따라서 국경간 데이터 이동 제한조치 강화 조치는 최근 국가별로 정책이 시행되고 있거나 조만간 국제적 합의가 예정되어 있는 이슈로 우리나라도 이에 대한 긴밀한 대응이 필요하다.

  • PDF

An Investigative Treatise on the Success Story of Women Entrepreneurs in Tribal Areas of India

  • POTLURI, Rajasekhara Mouly;JOHNSON, Sophia;ULLAH, Rahat
    • 산경연구논집
    • /
    • 제11권9호
    • /
    • pp.17-24
    • /
    • 2020
  • Purpose: The purpose of this research is to explore the continuum of reasons and skills employed by tribal Indian women entrepreneurs to establish their successful businesses in terrorist affected areas. Research design, data and methodology: After an extensive literature review on women's entrepreneurship and their situations in disturbed areas, a qualitative research method was applied, and researchers conducted well-structured personal interviews to collect data from fifty respondents selected by using random and convenience sampling. Results: This study has identified the range of reasons for the successes of tribal women entrepreneurs. These are strict compliance with tribal culture and restrictions imposed by different stakeholders and the establishment of social networks and support from local communities and with their indefatigable and indomitable perseverance to proffer basic sustenance for their families. Conclusions: A minimum sample was selected from the Andhra-Odisha Border (AOB) areas due to security concerns. The research depicts the tribal Indian women entrepreneurs' grit and remorseless nature in overcoming impediments from the socio-cultural, economic, political, and legal framework of the country. This research is a gallant effort taken up by the authors, which is the first of its kind to visit as well as to conduct primary research in disturbed areas like the Andhra-Odisha Border in India.

NetFlow 데이터를 이용한 실시간 네트워크 트래픽 어노멀리 검출 기법 (A Real-Time Network Traffic Anomaly Detection Scheme Using NetFlow Data)

  • 강구홍;장종수;김기영
    • 정보처리학회논문지C
    • /
    • 제12C권1호
    • /
    • pp.19-28
    • /
    • 2005
  • 최근 알려지지 않은 공격(unknown attack)으로부터 네트워크를 보호하기 위한 네트워크 트래픽 어노멀리(anomaly) 검출에 대한 관심이 고조되고 있다. 본 논문에서는 캠퍼스 네트워크의 보드라우터(border router)의 NetFlow 데이터로 제공되는 초당비트수(bits per second)와 초당플로수(flows per second)의 상관관계를 단순회귀분석을 통하여 새로운 어노멀리 검출 기법을 제시하였다. 새로이 제안된 기법을 검증하기 위해 실지 캠퍼스 네트워크에 적용하였으며 그 결과론 Holt-Winters seasonal(HWS) 알고리즘과 비교하였다. 특히, 제안된 기법은 기존 RRDtool에 통합시켜 실시간 검출이 가능하도록 설계하였다.

가로변 건축물 파사드의 관리 방향 설정에 관한 연구 - 광주광역시 문화전당 경계부 가로를 중심으로 - (A Study on Setting Direction of Managing the Building Facade on Street - With the Road on Border of Asian Culture Center in Gwangju -)

  • 박성진;김인호
    • 한국주거학회논문집
    • /
    • 제22권2호
    • /
    • pp.131-139
    • /
    • 2011
  • This study is to examine architectural designers' views on the correlations between components and contextual principle of the roadside building facade with the roadside building facade on the border of Asian Culture Center in Gwangju which is expected to undergo a great change by public policies. For setting direction of the roadside building management at the region examined, height of facade, advertisement/signboard, security of continuity through surface pattern management, nodes building, array of height by story, awning/arcade and locality of advertisement/signboard should be induced to design with locality and consideration of local characteristics with silhouette, window and external colors is needed for discrimination from other cities. Regarding the realization method important thing was found that the planning and implementation of architectural design guidelines, architectural aesthetics of the pre-hearing enhancement, active citizen participation, and then additional landscape screening system, incentive schemes, landscape designation of landscape zone was found to be a major realization system.

국경감시망에서의 협력적 데이터 포워딩 방법 (Cooperative Data Forwarding in Border Surveillance Networks)

  • 오세민;김동완;안순신
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2014년도 추계학술발표대회
    • /
    • pp.196-198
    • /
    • 2014
  • Wireless Sensor Networks(WSN) 기반의 Border Surveillance Networks(BSN)는 다양한 제한조건을 동반하며 침입 혹은 환경 등을 감시함을 목적으로 하고 있기 때문에 이벤트 발생시 신뢰적인 데이터 전송은 매우 중요한 부분을 차치하게 된다. 본 논문에서 적용한 대표적인 요구기반 라우팅 방법인 Ad hoc On-demand Distance Vector Routing(AODV)는 BSN 에 적용하였을 경우 홉 수(Hop Count)를 메트릭으로 최적의 경로를 계산하고 선택하여 Uni-Path 로 데이터를 전송하게 된다. 이때 AODV 는 Uni-path 로 데이터 전송을 진행하게 되며 링크의 단절이 빈번히 발생하는 BSN 의 환경적 요인으로 데이터 전송의 신뢰성이 감소하게 될 것이며 이는 비효과적인 데이터 전송을 야기하게 된다. 따라서 본 논문에서는 Multi-path 개념을 도입하여 데이터 전송 시 링크단절에 의해 발생하는 시간의 지연을 줄이고 더욱 신뢰성 있게 데이터를 전송할 수 있는 방법을 제안한다. 제안하는 방법은 송, 수신하는 두 노드의 전송범위에 공통으로 속한 노드들이 전송되는 데이터를 중복 전송하게 된다. 그리하여 링크의 단절이 일어날 경우 발생하는 경로 재 탐색 및 경로복구의 발생 빈도를 줄이고 동시에 데이터 전송률을 증가시켜 신뢰적인 데이터 전송을 하게 된다.