• Title/Summary/Keyword: Emerging Security

Search Result 351, Processing Time 0.027 seconds

Study on Emerging Security Threats and National Response

  • Il Soo Bae;Hee Tae Jeong
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.4
    • /
    • pp.34-41
    • /
    • 2023
  • The purpose of this paper is to consider the expansion of non-traditional security threats and the national-level response to the emergence of emerging security threats in ultra-uncertain VUCA situations. As a major research method for better analysis, the theoretical approach was referred to papers published in books and academic journals, and technical and current affairs data were studied through the Internet and literature research. The instability and uncertainty of the international order and security environment in the 21st century brought about a change in the security paradigm. Human security emerged as the protection target of security was expanded to individual humans, and emerging security was emerging as the security area expanded. Emerging security threatsthat have different characteristicsfrom traditionalsecurity threats are expressed in various ways, such as cyber threats, new infectious disease threats, terrorist threats, and abnormal climate threats. First, the policy and strategic response to respond to emerging security threats is integrated national crisis management based on artificial intelligence applying the concept of Foresight. Second, it is to establish network-based national crisis management smart governance. Third, it is to maintain the agile resilience of the concept of Agilience. Fourth, an integrated response system that integrates national power elements and national defense elements should be established.

Emerging Image Cue CAPTCHA Resisting Automated and Human-Solver-Based Attacks (자동화 공격과 릴레이 공격에 저항하는 Emerging Image Cue CAPTCHA 연구)

  • Yang, Wonseok;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.531-539
    • /
    • 2017
  • CAPTCHA is a verification scheme whether or not a human user has made a service request. Most CAPTCHAs that are based on text, image, or simple game suffer from vulnerability that can be compromised by automated attacks and stream relay attacks. To resist such attacks, CAPTCHA that utilizes human recognition as been suggested but it show poor usability for deploying in the Internet. We propose an Emerging Image Cue CAPTCHA that offers improved usability and resists stream relay attacks, as well. We also examine the usability of the proposed CAPTCHA and investigate the attack resistance by conducting user study and experiments on simulated network environment.

A Comparative Study on Deepfake Detection using Gray Channel Analysis (Gray 채널 분석을 사용한 딥페이크 탐지 성능 비교 연구)

  • Son, Seok Bin;Jo, Hee Hyeon;Kang, Hee Yoon;Lee, Byung Gul;Lee, Youn Kyu
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.9
    • /
    • pp.1224-1241
    • /
    • 2021
  • Recent development of deep learning techniques for image generation has led to straightforward generation of sophisticated deepfakes. However, as a result, privacy violations through deepfakes has also became increased. To solve this issue, a number of techniques for deepfake detection have been proposed, which are mainly focused on RGB channel-based analysis. Although existing studies have suggested the effectiveness of other color model-based analysis (i.e., Grayscale), their effectiveness has not been quantitatively validated yet. Thus, in this paper, we compare the effectiveness of Grayscale channel-based analysis with RGB channel-based analysis in deepfake detection. Based on the selected CNN-based models and deepfake datasets, we measured the performance of each color model-based analysis in terms of accuracy and time. The evaluation results confirmed that Grayscale channel-based analysis performs better than RGB-channel analysis in several cases.

Malware Classification using Dynamic Analysis with Deep Learning

  • Asad Amin;Muhammad Nauman Durrani;Nadeem Kafi;Fahad Samad;Abdul Aziz
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.49-62
    • /
    • 2023
  • There has been a rapid increase in the creation and alteration of new malware samples which is a huge financial risk for many organizations. There is a huge demand for improvement in classification and detection mechanisms available today, as some of the old strategies like classification using mac learning algorithms were proved to be useful but cannot perform well in the scalable auto feature extraction scenario. To overcome this there must be a mechanism to automatically analyze malware based on the automatic feature extraction process. For this purpose, the dynamic analysis of real malware executable files has been done to extract useful features like API call sequence and opcode sequence. The use of different hashing techniques has been analyzed to further generate images and convert them into image representable form which will allow us to use more advanced classification approaches to classify huge amounts of images using deep learning approaches. The use of deep learning algorithms like convolutional neural networks enables the classification of malware by converting it into images. These images when fed into the CNN after being converted into the grayscale image will perform comparatively well in case of dynamic changes in malware code as image samples will be changed by few pixels when classified based on a greyscale image. In this work, we used VGG-16 architecture of CNN for experimentation.

Modelling Civic Problem-Solving in Smart City Using Knowledge-Based Crowdsourcing

  • Syed M. Ali Kamal;Nadeem Kafi;Fahad Samad;Hassan Jamil Syed;Muhammad Nauman Durrani
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.146-158
    • /
    • 2023
  • Smart City is gaining attention with the advancement of Information and Communication Technology (ICT). ICT provides the basis for smart city foundation; enables us to interconnect all the actors of a smart city by supporting the provision of seamless ubiquitous services and Internet of Things. On the other hand, Crowdsourcing has the ability to enable citizens to participate in social and economic development of the city and share their contribution and knowledge while increasing their socio-economic welfare. This paper proposed a hybrid model which is a compound of human computation, machine computation and citizen crowds. This proposed hybrid model uses knowledge-based crowdsourcing that captures collaborative and collective intelligence from the citizen crowds to form democratic knowledge space, which provision solutions in areas of civic innovations. This paper also proposed knowledge-based crowdsourcing framework which manages knowledge activities in the form of human computation tasks and eliminates the complexity of human computation task creation, execution, refinement, quality control and manage knowledge space. The knowledge activities in the form of human computation tasks provide support to existing crowdsourcing system to align their task execution order optimally.

A Study on the Metaverse Framework Security Service (메타버스 서비스를 위한 보안 모델 연구 )

  • Do-Eun Cho
    • Journal of Platform Technology
    • /
    • v.10 no.4
    • /
    • pp.82-90
    • /
    • 2022
  • emerging. And it shows numerous possibilities and tremendous potentials in the virtual world. This metaverse is not limited to one type, but it is evolving and developing into a service in the form of a virtual convergence economy by breaking down boundaries. As a result, various security issues in metaverse are emerging. Metaverse performs all activities in the virtual space, so various problems such as privacy infringement, virtual asset theft, or fraud can occur. In this paper, a service security model is proposed to provide safe services on metaverse. To this end, we analyze security threats in the metaverse framework and propose a security service model to prevent threats. By evaluating the security of the proposed model, it was shown that safe services are effectively possible on the metaverse.

Vulnerabilities, Threats and Challenges on Cyber Security and the Artificial Intelligence based Internet of Things: A Comprehensive Study

  • Alanezi, Mohammed Ateeq
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.153-158
    • /
    • 2022
  • The Internet of Things (IoT) has gotten a lot of research attention in recent years. IoT is seen as the internet's future. IoT will play a critical role in the future, transforming our lifestyles, standards, and business methods. In the following years, the use of IoT in various applications is likely to rise. In the world of information technology, cyber security is critical. In today's world, protecting data has become one of the most difficult tasks. Different type of emerging cyber threats such as malicious, network based and abuse of network have been identified in the IoT. These can be done by virus, Phishing, Spam and insider abuse. This paper focuses on emerging threats, various challenges and vulnerabilities which are faced by the cyber security in the field of IoT and its applications. It focuses on the methods, ethics, and trends that are reshaping the cyber security landscape. This paper also focuses on an attempt to classify various types of threats, by analyzing and characterizing the intruders and attacks facing towards the IoT devices and its services.

Emerging Technologies for Sustainable Smart City Network Security: Issues, Challenges, and Countermeasures

  • Jo, Jeong Hoon;Sharma, Pradip Kumar;Sicato, Jose Costa Sapalo;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.15 no.4
    • /
    • pp.765-784
    • /
    • 2019
  • The smart city is one of the most promising, prominent, and challenging applications of the Internet of Things (IoT). Smart cities rely on everything connected to each other. This in turn depends heavily on technology. Technology literacy is essential to transform a city into a smart, connected, sustainable, and resilient city where information is not only available but can also be found. The smart city vision combines emerging technologies such as edge computing, blockchain, artificial intelligence, etc. to create a sustainable ecosystem by dramatically reducing latency, bandwidth usage, and power consumption of smart devices running various applications. In this research, we present a comprehensive survey of emerging technologies for a sustainable smart city network. We discuss the requirements and challenges for a sustainable network and the role of heterogeneous integrated technologies in providing smart city solutions. We also discuss different network architectures from a security perspective to create an ecosystem. Finally, we discuss the open issues and challenges of the smart city network and provide suitable recommendations to resolve them.

Theoretical Background and Critical Discussion about Securitzation Trend of Cyber Threat (사이버 위협의 안보화 동향에 대한 이론적 배경과 비판적 논의)

  • Lee, Kwangho;Lee, Swengkyu;Kim, Hokil
    • Convergence Security Journal
    • /
    • v.19 no.5
    • /
    • pp.99-105
    • /
    • 2019
  • In this study present the theoretical background and major trends in which cyber threats are securitization through the discourse process. In particular, this study explained based on the theory of Copenhagen school, which is critical of the security of cyber threats. And presented the security of non-traditional threats and the security of emerging security issues, which explained the process of security for cyber threats, based on existing research, and explained the limitations to this. And tried to provide a cautious point of view that the militarization phenomenon of cyber threats that is currently displayed is a phenomenon that is displayed through the combination of technical discourse and military discourse. Through this study, we aim to show the military the limits of universal solution presentation and the borderline perspective of militarization based on objective insights into the cyber threat security process.

Development Strategy on the Risk Rating Method for Nationwide Emerging IT Infrastructure (국가단위 신규 IT인프라의 위험도 등급화 기법 개발 방향 연구)

  • Kim, Sangkyun
    • Journal of Industrial Technology
    • /
    • v.30 no.B
    • /
    • pp.11-16
    • /
    • 2010
  • To provide a development strategy on the method which assesses a potential risk of nationwide emerging IT infrastructure in planning and design phase, and to classify the assessment result into 5 levels is the goal of this research. The development strategy provided in this paper could improve a benefit-cost-ratio of investments on emerging IT infrastructure. With a premature assessment of the potential risks of a nationwide emerging IT infrastructure which needs astronomical amount of public funds, it could show a way of systematic investments on security systems and improve a benefit-cost-ratio of investments on emerging IT infrastructure. Also, this approach might improve the safety of nationwide IT infrastructure. It could identify and provide an optimized solution for the potential risks of nationwide IT infrastructure.

  • PDF