• Title/Summary/Keyword: Cooperate Security

Search Result 52, Processing Time 0.027 seconds

An Application of RETE Algorithm for Improving the Inference Performance in the Coordination Architecture (연동 구조 내의 추론 성능 향상을 위한 RETE 알고리즘의 적용)

  • 서희석
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.12
    • /
    • pp.965-974
    • /
    • 2003
  • Today's network consists of a large number of routers and servers running a variety of applications. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSs agent and a firewall agent which coordinate by CNP (Contract Net Protocol). The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls the execution of agents or a contractee, who performs intrusion detection. In the knowledge-based network security model, each model of simulation environment is hierarchically designed by DEVS (Discrete Event system Specification) formalism. The purpose of this simulation is the application of rete pattern-matching algorithm speeding up the inference cycle phases of the intrusion detection expert system. we evaluate the characteristics and performance of CNP architecture with rete pattern-matching algorithm.

  • PDF

A New Bot Disinfection Method Based on DNS Sinkhole (DNS 싱크홀에 기반한 새로운 악성봇 치료 기법)

  • Kim, Young-Baek;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.107-114
    • /
    • 2008
  • The Bot is a kind of worm/virus that can be used to launch the distributed denial-of-service(DDoS) attacks or send massive amount of spam e-mails, etc. A lot of organizations make an effort to counter the Botnet's attacks. In Korea, we use DNS sinkhole system to protect from the Botnet's attack, while in Japan "so called" CCC(Cyber Clean Center) has been developed to protect from the Botnet's attacks. But in case of DNS sinkhole system, there is a problem since it cannot cure the Bot infected PCs themselves and in case of CCC there is a problem since only 30% of users with the Botnet-infected PCs can cooperate to cure themself. In this paper we propose a new method that prevent the Botnet's attacks and cure the Bot-infected PCs at the same time.

Formation of Research Competence Using Innovative Technologies to Improve the Quality of Training Future Specialists

  • Olena, Dobosh;Daria, Koval;Natalya, Paslavska;Natalia, Cherednichenko;Iryna, Bondar;Oksana, Vytrykhovska;Olena, Bida
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.91-97
    • /
    • 2022
  • Analyzing the psychological and pedagogical literature, we showed the interest of researchers in the problem posed. The concept of competence is considered, which is interpreted as giving the key to solving a wide range of educational and life tasks. Research competence implies the ability to cooperate, enter into contacts, readiness for changes, for self-determination and is an integral quality of the individual, expressed in the readiness and ability to independently search for solutions to new problems and creative transformation of reality based on a set of personal and meaningful knowledge, skills, methods of activity and value attitudes.The article offers conditions that certify the improvement of forms and methods of training students in the formation of research competence of future specialists. The use of innovative technologies contributes to improving the level of training of future specialists: students are better prepared for classes, take an active part in the assimilation of program material in laboratory classes. It is noted that this creates a subject-subject relationship between the student and the teacher, and changes the attitude of students to classes. In the process of such organization of educational activities, students are convinced of the need for knowledge and its effectiveness, learn to compare, generalize, classify, establish cause-and-effect relationships, express opinions, defend their point of view, they ensure success in their studies, and develop research competence. It is proved that in order to apply the latest technologies, the teacher himself must know them well, that is, constantly improve himself, master new methods, techniques, ideas, which will help him create new pedagogical technologies and implement them in the educational process.

Improving Security and Privacy-Preserving in Multi-Authorities Ciphertext-Policy Attribute-Based Encryption

  • Hu, Shengzhou;Li, Jiguo;Zhang, Yichen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.10
    • /
    • pp.5100-5119
    • /
    • 2018
  • Most of existing privacy-preserving multi-authorities attribute-based encryption schemes (PP-MA-ABE) only considers the privacy of the user identity (ID). However, in many occasions information leakage is caused by the disclosing of his/her some sensitive attributes. In this paper, we propose a collusion-resisting ciphertext-policy PP-MA-ABE (CRPP-MACP-ABE) scheme with hiding both user's ID and attributes in the cloud storage system. We present a method to depict anonymous users and introduce a managerial role denoted by IDM for the management of user's anonymous identity certificate ($AID_{Cred}$). The scheme uses $AID_{Cred}$ to realize privacy-preserving of the user, namely, by verifying which attribute authorities (AAs) obtain the blinded public attribute keys, pseudonyms involved in the $AID_{Cred}$ and then distributes corresponding private keys for the user. We use different pseudonyms of the user to resist the collusion attack launched by viciousAAs. In addition, we utilize IDM to cooperate with multiple authorities in producing consistent private key for the user to avoid the collusion attack launched by vicious users. The proposed CRPP-MACP-ABE scheme is proved secure. Some computation and communication costs in our scheme are finished in preparation phase (i.e. user registration). Compared with the existing schemes, our scheme is more efficient.

A Study on the Factors Influencing the Intention to Use Bio Pass at Airports through Innovation Resistance (혁신저항을 매개로 공항에서 바이오 패스의 사용의도에 영향을 미치는 요인분석)

  • Sung-Hoon Park;Jin-Woo Park
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.31 no.2
    • /
    • pp.7-17
    • /
    • 2023
  • In the era of the 4th industrial revolution, airports around the world are rapidly pushing for smart airports. One ID service based on biometric technology to eliminate congestion and improve airport operation efficiency is one of them. In particular, biopass, which allows you to use the entire journey with one single token without an ID card or boarding pass from arrival at the airport to boarding an aircraft, is emerging as an important technology for smart airports. This study conducted an empirical analysis to identify factors that affect the intention to use in two aspects: the acceptance, and rejection of bio-pass by combining UTAUT and the innovative resistance model. As a result of the study, it was found that the relative advantages and compatibility had a positive effect on the intention to use, and the perceived risk had a negative effect on the intention to use through innovation resistance. This suggests that infrastructure expansion and usage expansion are needed to use time more efficiently at airports, and that the government, airlines, and airport operators need to cooperate to strengthen the security system to relieve users' psychological anxiety.

A Study on the Institutional Improvement Directions of Industrial Security Programs: Focused upon Policies and Practices in the U.S. (산업보안의 제도적 발전방안 연구: 미국 사례를 중심으로)

  • Choi, Justin Jin-Hyuk
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.197-230
    • /
    • 2010
  • This study examined the institutional improvement directions of industrial security programs, particularly focusing upon policies and practices in the U.S., to enhance the effectiveness of industrial security programs in Korea. This study also aimed to investigate the significance of institutional and/or policy implementations in preventing economic espionage attempt. Data leakage and/or loss of trade secrets in corporations has been a scary proposition and a serious headache to both the CEOs and the CSOs(Chief Security Officers). Security professionals or practitioners have always had to deal with data leakage issues that arise from e-mail, instant messaging(IM), and other Internet communication channels. In addition, with the proliferation of wireless and mobile technology, it's now much easier than ever for loss by data breaches to occur, whether accidentally or maliciously or even by an economic espionage attempt. The researcher in this study used both a case study and a comparative research to analyze the different strategies and approaches between the U.S. and Korea in regard of implementing policies to mitigate damages by economic espionage attempts and prevent them from occurring. The researcher first examined the current policies and practices in the U.S. in terms of federal government's and agencies' approach and strategies on industrial security programs and their partnerships with private-commercial-sectors. The purpose of this paper is to explain and suggest selected findings, and a discussion of actions to be taken on implementing a proactive and tactical approach to enhance the effectiveness of industrial security programs to fight against information loss or data leaks. This study used case reviews, literatures, newspapers, articles, and Internet resources relating to the subject of this study for triangulation of data. The findings during this research are as follows. This research suggests that both the private and the governmental sector should closely cooperate in the filed of industrial security to strengthen its traditional prevention strategies and reduce opportunities of economic espionage as well. This study finally recognizes both the very importance of institutional development led by the Government in preventing economic espionage attempts and its effectiveness when properly united with effective industrial security programs.

  • PDF

A Study on the Objective Opinion of Private Investigation Service (민간조사제도 도입 반대 의견에 대한 고찰)

  • Jeng, Il-Seok;Park, Jun-Seok;Suh, Sang-Yul
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.465-484
    • /
    • 2007
  • Our society's modernization created many opportunities for us to need a private investigation service system. Variation of international environment due to joining in the OECD, opportunity of individual legal, collect evidence during judgement, prevention of damage criminal, security of business in company, free trade economy's system etc and don't need to enumerate how important of introduction of private investigation service system. In addition to there are lots of objection opinions, such as possibility of person's private life, invade of lawyer's area, confliction with investigation team, gap of wealth and poverty that make preponderance of information. So this research can be considerate from objective opinion, and can obtain conclusion just like below. First, private detective agencies that encroach on the individual rights will naturally deteriorate after the implementation of private investigation service system. Through this, the probability of civil rights encroachment will be lower, and for this to happen there needs to be a thorough maintenance of the system. Secondly, mutually beneficial solution should be found not by a conflict between two sides. Detective business sector should not cause social confusion from conflicts with other investigation organization such as police, or investigators, rather, it must get on the demand of the diversified citizen and maintain the diverse sector inter-cooperate right, and to do that law and institution must be made for the base. Thirdly, investigation used depending on the gap between wealth and poverty does not mean the actualization of the rights and interests of the citizen. If the duty of investigation sector is to find the evidence and collect or manufacture of the evidence, then the problems which the nation can't handle will be more enlarged and then finally end up with strengthening the capability of national public security demand.

  • PDF

Phenomenological Study of Guard's Recognition for Organization and Vocation (경호원의 조직 및 직업인식에 관한 현상학적 연구)

  • Song, Gyu-Geun;Lee, Ki-Se
    • Korean Security Journal
    • /
    • no.32
    • /
    • pp.123-150
    • /
    • 2012
  • The purpose of this study was to seek practical intelligences for certain persons who wish to be a guard by studying for what practical public guards' recognition of organization and vocation is. The results of this study were as follows. First, Six study participants presented 'Respect within members', 'Atmosphere like family', 'Premium members', and 'Economic compensation & wealth of budget' as essential requirements for the best guard organization. Second, they also presented 'Systematic daily task & training', 'Exact selection system', and 'Strong cohesion & teamwork' as strong points of their organization. Third, they mentioned 'Internal evaluation system', 'Lack of education contents', and 'Limited position circulation' as weak points of their organization. Fourth, they mentioned that they feel encouraged itself as they work in the best guard organization, while they were skeptical when the citizens did not cooperate with them and they were not fully rewarded for their injury. Fifth, they expressed 'Difficulty of business cooperation', 'Unstable living patterns', 'Inconsistent assessment', and 'Continuing tension' as difficulties for performing the duties and stress causes. Lastly, they recognized of job security and self-esteem as they work in the best guard organization as advantages of a job, while they recognized of controlled life, low salaries and welfare level compared to duty importance and risks as disadvantages of a job. Consequently, students who wish to be a guard should consider job and organization attributes and set their career goals refer to these results.

  • PDF

Russia-Central Asia relations -Focusing on the period after the establishment of the EAEU in 2015- (러시아·중앙아시아 관계 -2015년 EAEU 창설 이후를 중심으로-)

  • Sang Nam Park
    • Analyses & Alternatives
    • /
    • v.7 no.3
    • /
    • pp.85-114
    • /
    • 2023
  • The purpose of this study is to analyze Russia-Central Asia relations since the launch of the EAEU in 2015 and forecast the future from a structural realism perspective. Bilateral relations have both elements of close cooperation and elements of conflict. Russia and Central Asia, which have the characteristics of an authoritarian alliance, also have a symbiotic relationship in which they have no choice but to cooperate with each other to maintain the regime. Based on this, Russia has made various efforts to reunify Central Asia. Central Asia also has no choice but to cooperate with Russia for its survival, but at the same time, it has expanded its scope of cooperation in the international community to avoid being subjugated to Russia again. However, as China's power expands, Russia's relative weakness, and wariness toward Russia increases after the Ukraine War, the gap in bilateral relations is widening. In particular, as China's influence grows, Russia's nervousness also increases. This is why Putin visits Central Asia and holds active summit talks even during the war in Ukraine. If competition between Russia and China surfaces, there is a high possibility that the international order in Central Asia will become unstable. However, it is still unlikely that the power of Russia and China will reverse in Central Asia. Above all, the security, historical, and cultural connections between Russia and Central Asia are areas that are difficult for China to catch up with. Therefore, a weakening of Russia's influence compared to the past is inevitable, but its superiority is expected to continue. If Russia breaks away from belligerence and transforms into an attractive cooperative partner, there is a possibility that bilateral relations will take an upward turn again. However, it seems unlikely that such changes and innovations will occur under the Putin regime. Therefore, the biggest obstacle to realizing Putin's goal of reunifying Central Asia is Putin himself.

Meaning and Conceptual Tension Contained in the Definition of Social Services Prescribed by Recently Amended Framework Act on Social Security (개정 사회보장기본법의 사회서비스의 의미와 개념적 긴장)

  • Nam, Chan-Seob
    • Korean Journal of Social Welfare
    • /
    • v.64 no.3
    • /
    • pp.79-100
    • /
    • 2012
  • This paper aims to analyze the meaning and conceptual tension contained in the definition of social services prescribed by recently amended Framework Act on Social Security(FASS) by examining various terminologies of social services in Korea. In Korea the term of social services has had at least four meanings since it has begun to be used during Participatory Government. Of these, the meaning of social services in FASS is closest to 'social serives as social-jobs'. While, as has this meaning, social services in FASS is defined as very comprehensive one, it also has its conceptual tension. On the one hand, FASS comes to have the orientation to include immensely wide fields such as welfare, health, employment, housing, culture and environment within social service. However on the other hand FASS still has the orientation to limit social services to traditional social welfare services. Unless re-amending the recently amended FASS, the conceptual tension resulted from these two conflicting orientations will be likely to continue. And this might raise the need both to reform the organization of Ministry of Health and Welfare and exiting delivery systems of social services and to develop theoretical and practical principles providing basis for tailored social services, which in turn poses important challenges to social welfare discipline. To meet these challenges it is necessary to cooperate between micro and macro approaches.

  • PDF