• 제목/요약/키워드: Comprehensive Security

검색결과 454건 처리시간 0.029초

B-Corr Model for Bot Group Activity Detection Based on Network Flows Traffic Analysis

  • Hostiadi, Dandy Pramana;Wibisono, Waskitho;Ahmad, Tohari
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권10호
    • /
    • pp.4176-4197
    • /
    • 2020
  • Botnet is a type of dangerous malware. Botnet attack with a collection of bots attacking a similar target and activity pattern is called bot group activities. The detection of bot group activities using intrusion detection models can only detect single bot activities but cannot detect bots' behavioral relation on bot group attack. Detection of bot group activities could help network administrators isolate an activity or access a bot group attacks and determine the relations between bots that can measure the correlation. This paper proposed a new model to measure the similarity between bot activities using the intersections-probability concept to define bot group activities called as B-Corr Model. The B-Corr model consisted of several stages, such as extraction feature from bot activity flows, measurement of intersections between bots, and similarity value production. B-Corr model categorizes similar bots with a similar target to specify bot group activities. To achieve a more comprehensive view, the B-Corr model visualizes the similarity values between bots in the form of a similar bot graph. Furthermore, extensive experiments have been conducted using real botnet datasets with high detection accuracy in various scenarios.

An Overview of Mobile Edge Computing: Architecture, Technology and Direction

  • Rasheed, Arslan;Chong, Peter Han Joo;Ho, Ivan Wang-Hei;Li, Xue Jun;Liu, William
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권10호
    • /
    • pp.4849-4864
    • /
    • 2019
  • Modern applications such as augmented reality, connected vehicles, video streaming and gaming have stringent requirements on latency, bandwidth and computation resources. The explosion in data generation by mobile devices has further exacerbated the situation. Mobile Edge Computing (MEC) is a recent addition to the edge computing paradigm that amalgamates the cloud computing capabilities with cellular communications. The concept of MEC is to relocate the cloud capabilities to the edge of the network for yielding ultra-low latency, high computation, high bandwidth, low burden on the core network, enhanced quality of experience (QoE), and efficient resource utilization. In this paper, we provide a comprehensive overview on different traits of MEC including its use cases, architecture, computation offloading, security, economic aspects, research challenges, and potential future directions.

농촌지역 중심지 기능 및 시설에 대한 주민 인식도 조사 - 전라남도 화순군 면소재지를 중심으로 - (A study on residents' awareness of functions and facilities of the rural centers - Myeon locations in Hwasun-gun, Jeollanam-do Province-)

  • 박성진;김정규
    • 한국농촌건축학회논문집
    • /
    • 제18권2호
    • /
    • pp.19-27
    • /
    • 2016
  • This study typified the rural centers with myeon locations in Hwasun-gun which showed comprehensive and various class types through settlement class structure analysis. It is also for establishing the awareness of strengthening functions and facilities of the centers and the directions of strengthening it. Subjects of the study could be classified into three types including base type (Neungju-myeon), general type (Nam-myeon) and decline type (Dongbok-myeon) through the analysis of settlement class structure. Neungju-myeon location as the base type could function as the myeon location by itself and tended to serve education, health and welfare functions through the strengthening of central living functions. Nam-myeon location as the general type required sports facilities management based on the vicinity and accessibility to the senior's welfare functions. Dongbok-myeon location as the decline type required the accessibility to public health facilities and the security of vicinity to the facilities because of its high population of the aged.

목조 문화재 건축물의 화재 방재를 위한 조사 연구 (A Study on the Methods of Fire-Safety in Cultural Property Wooden Buildings)

  • 장형순;조원석;김흥기
    • 한국농촌건축학회논문집
    • /
    • 제10권4호
    • /
    • pp.25-32
    • /
    • 2008
  • The prevention of disasters in cultural property is very important management and historical duties. The reason can't be measured values with monetary scale of our contemporary. Therefore, this paper was considered fire-safety as one of terrible threat-disasters about the wooden buildings. This research deal with 47 cases cultural property wooden building by whole investigation(field survey and interview) in Gangnung province. The most buildings have basic fire extinguisher; ABC powder. A few buildings are rarely installed fire extinguishing equipments; outdoor fire hydrant, heat sensor, ground sprinkler, CO2-hose-reel. But these state is very insufficient for the fire-safety in cultural property wooden buildings. Specially as particular attention in province, forest fire of regional characteristic have close relation with cultural property fire. The majority of factor against forest and building fire is to provide monitoring and security system; CCTV, Fence, Sensor, Alarm and paid guard man against incendiary. Ultimately it is necessary to construct comprehensive disaster prevention system with the organic cooperation such as National Emergency Management Agency, Cultural Heritage Administration, Forest Service, local government officials and regional citizen.

  • PDF

Flexural performance of fire damaged and rehabilitated two span reinforced concrete slabs and beams

  • Yu, Jiang-Tao;Liu, Yuan;Lu, Zhou-Dao;Xiang, Kai
    • Structural Engineering and Mechanics
    • /
    • 제42권6호
    • /
    • pp.799-813
    • /
    • 2012
  • Five two-span reinforced concrete (RC) slabs and seven two-span RC beams were tested under the ISO 834 standard fire with different durations. CFRP strengthening was then applied to some of the specimens after the damaged concrete was removed from the specimens and replaced with polymer mortar. All the specimens were loaded to failure to investigate the influence of fire-damage and the effectiveness of strengthening methods. Test results indicated that the flexural capacities of specimens decrease with the fire duration increases. Moreover, fire exposure had more significant effect on the flexural rigidity than on the bearing capacity of the specimens. After rehabilitation, the bearing capacities of specimens reached or even exceeded that of the reference RC specimen, and the strengthening methods seemed to have limited effect on flexural rigidity recovery. From the analysis of moment redistribution of tested beams, elevated temperature is found having different impacts on sagging moment region and hogging moment region. The damage of RC continuous member is definitely a comprehensive response of different regions.

Facilitating the Usage of Value Management Processes by Charactering Capital Facility Projects

  • 차희성
    • 한국건설관리학회논문집
    • /
    • 제5권2호
    • /
    • pp.144-152
    • /
    • 2004
  • Defining value as a measure of how well the project value objectives are met, Value Management Process (VMP) is considered to be any management effort or process that can proactively pursue one or more project objectives (i.e., security/safety, cost effectiveness, schedule optimization, and risk containment). The collection of 44 VMPs has been established based on a rigorous effort conducted by Construction Industry Institute (CII). Because varying circumstances on each project determine the level of suitability, it is crucial to identify which VMP should be implemented on a particular project. The current VMP selection process is primarily based on human intuition. The main objective of this paper is to provide a systematic method to facilitate the usage of VMPs on a particular project. This paper identified and quantified the selection principles (i.e., targeted value objectives, timing of initiation, project characteristics, and relative impact). The data collected from industry practitioners and VMP experts characterized each VMP in terms of the magnitude of benefit. An automated selection tool by Visual Basic Application (VBA) on MS Excel TM, was developed and proved its validity. As a pioneering study, this paper provides a comprehensive and structured knowledge on the subject of VMPs. From the industry's perspective, the automated selection tool, the premier of this study, contributes the facilitation of the VMP implementations in the construction industry thereby maximizing the potential benefits to a particular project.

Unethical Network Attack Detection and Prevention using Fuzzy based Decision System in Mobile Ad-hoc Networks

  • Thanuja, R.;Umamakeswari, A.
    • Journal of Electrical Engineering and Technology
    • /
    • 제13권5호
    • /
    • pp.2086-2098
    • /
    • 2018
  • Security plays a vital role and is the key challenge in Mobile Ad-hoc Networks (MANET). Infrastructure-less nature of MANET makes it arduous to envisage the genre of topology. Due to its inexhaustible access, information disseminated by roaming nodes to other nodes is susceptible to many hazardous attacks. Intrusion Detection and Prevention System (IDPS) is undoubtedly a defense structure to address threats in MANET. Many IDPS methods have been developed to ascertain the exceptional behavior in these networks. Key issue in such IDPS is lack of fast self-organized learning engine that facilitates comprehensive situation awareness for optimum decision making. Proposed "Intelligent Behavioral Hybridized Intrusion Detection and Prevention System (IBH_IDPS)" is built with computational intelligence to detect complex multistage attacks making the system robust and reliable. The System comprises of an Intelligent Client Agent and a Smart Server empowered with fuzzy inference rule-based service engine to ensure confidentiality and integrity of network. Distributed Intelligent Client Agents incorporated with centralized Smart Server makes it capable of analyzing and categorizing unethical incidents appropriately through unsupervised learning mechanism. Experimental analysis proves the proposed model is highly attack resistant, reliable and secure on devices and shows promising gains with assured delivery ratio, low end-to-end delay compared to existing approach.

Black Hole along with Other Attacks in MANETs: A Survey

  • Tseng, Fan-Hsun;Chiang, Hua-Pei;Chao, Han-Chieh
    • Journal of Information Processing Systems
    • /
    • 제14권1호
    • /
    • pp.56-78
    • /
    • 2018
  • Security issue in mobile ad hoc network (MANET) is a promising research. In 2011, we had accomplished a survey of black hole attacks in MANETs. However network technology is changing with each passing day, a vast number of novel schemes and papers have been proposed and published in recent years. In this paper, we survey the literature on malicious attacks in MANETs published during past 5 years, especially the black hole attack. Black hole attacks are classified into non-cooperative and collaborative black hole attacks. Except black hole attacks, other attacks in MANET are also studied, e.g., wormhole and flooding attacks. In addition, we conceive the open issues and future trends of black hole detection and prevention in MANETs based on the survey results of this paper. We summarize these detection schemes with three systematic comparison tables of non-cooperative black hole, collaborative black hole and other attacks, respectively, for a comprehensive survey of attacks in MANETs.

한전계통의 송전망 고장확률 산정을 위한 상정고장 DB 관리시스텀(ezCas) 개발 (Development of Outage Data Management System to Calculate the Probability for KEPCO Transmission Systems)

  • 차승태;전동훈;김태균;전명렬;추진부;김진오;이승혁
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2004년도 하계학술대회 논문집 A
    • /
    • pp.88-90
    • /
    • 2004
  • Data are a critical utility asset. Collecting correct data on site leads to accurate information. Data, when gathered with foresight & properly formatted, are useful to both existing database and easily transferable to newer, more comprehensive historical outage data. However, when investigating data items options, the task, can be an arduous one, often requiring the efforts of entire committees. This paper firstly discusses the KEPCO's past 10 years of historical outage data which include meterological data, and also by several elements of the National Weather Service, failure rate, outage duration, and probability classification, etc. Then, these collected data are automatically stored in an Outage Data Management System (ODMS), which allows for easy access and display. ODMS has a straight-forward and easy-to-use interface. It lets you to navigate through modules very easily and allows insertion, deletion or editing of data. In particular, this will further provide the KEPCO that not only helps with probabilistic security assessment but also provides a platform for future development of Probability Estimation Program (PEP).

  • PDF

Exploring the dynamic knowledge structure of studies on the Internet of things: Keyword analysis

  • Yoon, Young Seog;Zo, Hangjung;Choi, Munkee;Lee, Donghyun;Lee, Hyun-woo
    • ETRI Journal
    • /
    • 제40권6호
    • /
    • pp.745-758
    • /
    • 2018
  • A wide range of studies in various disciplines has focused on the Internet of Things (IoT) and cyber-physical systems (CPS). However, it is necessary to summarize the current status and to establish future directions because each study has its own individual goals independent of the completion of all IoT applications. The absence of a comprehensive understanding of IoT and CPS has disrupted an efficient resource allocation. To assess changes in the knowledge structure and emerging technologies, this study explores the dynamic research trends in IoT by analyzing bibliographic data. We retrieved 54,237 keywords in 12,600 IoT studies from the Scopus database, and conducted keyword frequency, co-occurrence, and growth-rate analyses. The analysis results reveal how IoT technologies have been developed and how they are connected to each other. We also show that such technologies have diverged and converged simultaneously, and that the emerging keywords of trust, smart home, cloud, authentication, context-aware, and big data have been extracted. We also unveil that the CPS is directly involved in network, security, management, cloud, big data, system, industry, architecture, and the Internet.