• 제목/요약/키워드: Enhanced security

검색결과 578건 처리시간 0.019초

Enhanced CNN Model for Brain Tumor Classification

  • Kasukurthi, Aravinda;Paleti, Lakshmikanth;Brahmaiah, Madamanchi;Sree, Ch.Sudha
    • International Journal of Computer Science & Network Security
    • /
    • 제22권5호
    • /
    • pp.143-148
    • /
    • 2022
  • Brain tumor classification is an important process that allows doctors to plan treatment for patients based on the stages of the tumor. To improve classification performance, various CNN-based architectures are used for brain tumor classification. Existing methods for brain tumor segmentation suffer from overfitting and poor efficiency when dealing with large datasets. The enhanced CNN architecture proposed in this study is based on U-Net for brain tumor segmentation, RefineNet for pattern analysis, and SegNet architecture for brain tumor classification. The brain tumor benchmark dataset was used to evaluate the enhanced CNN model's efficiency. Based on the local and context information of the MRI image, the U-Net provides good segmentation. SegNet selects the most important features for classification while also reducing the trainable parameters. In the classification of brain tumors, the enhanced CNN method outperforms the existing methods. The enhanced CNN model has an accuracy of 96.85 percent, while the existing CNN with transfer learning has an accuracy of 94.82 percent.

안드로이드 시스템 하에서의 SEAndroid 정책 보호 기법 설계 및 구현 (SEAndroid Policy Protection Architecture Design and Implementation in Android)

  • 유석만;박진형;이동훈
    • 정보보호학회논문지
    • /
    • 제26권5호
    • /
    • pp.1105-1119
    • /
    • 2016
  • SEAndroid(Security-Enhanced Android)는 안드로이드(Android) 운영체제의 핵심 보안 요소로 적용되어있다. 리눅스와 안드로이드의 구조적 차이점이 존재함에 따라 SELinux(Security-Enhanced Linux)를 SEAndroid로서 안드로이드에 적용하고 있는데, SEAndroid의 보안은 신뢰성 있는 정책에 기반하므로 이러한 정책이 변조되는 경우에는 심각한 보안 문제가 발생할 수 있다. 따라서 SEAndroid의 가장 중요한 요소인 정책을 안전하기 보호하기 위한 방법에 관한 연구는 반드시 필요하다. 본 논문에서는 안드로이드에 현재 적용되어 있는 SEAndroid 정책 업데이트 프로세스를 분석하여 보안 취약점을 파악하고, 정책 변조 공격이 가능한 다양한 경로에 대해 분석한다. 그리고 이러한 변조 공격으로부터 정책을 보호할 수 있는 기법인 SPPA(SEAndroid Policy Protection Architecture)를 제안한다. SPPA는 개별 정책에 대한 검증 과정을 통해 정책의 신뢰성과 무결성을 보장하며, PWRM(Policy Writing Rule Monitoring)을 이용하여 버전 다운그레이드 공격을 방지한다. 마지막으로 모바일 디바이스에서 제안한 기법을 구현하여 기기에 미치는 영향 및 성능을 검증한다.

Enhanced Security Scheme to Support Secure and Fast ASN-anchored Mobility in Mobile WiMAX

  • Park, Chang-Seop;Kang, Hyun-Sun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권11호
    • /
    • pp.2204-2220
    • /
    • 2011
  • Without providing a proper security measure to the handover procedure in Mobile WiMAX, several security attacks can be mounted. Even though security schemes have been previously proposed for this purpose, they are still vulnerable to several security attacks due to fatal design flaws. A newly proposed security scheme in this paper is based on the framework of authentication domain and concept of handover ticket. A method of establishing security associations within the authentication domain is proposed, and a lightweight security measure to protect the management messages associated with the handover is also proposed. Especially, using the handover ticket, the new security scheme can defend against a Redirection Attack arising from a compromised base station. The new security scheme is comparatively analyzed with the previous security schemes in terms of Replay, Session Hijacking, Man-In-The-Middle, and Redirection attacks.

Efficient and Security Enhanced Evolved Packet System Authentication and Key Agreement Protocol

  • Shi, Shanyu;Choi, Seungwon
    • 디지털산업정보학회논문지
    • /
    • 제13권1호
    • /
    • pp.87-101
    • /
    • 2017
  • As people increasingly rely on mobile networks in modern society, mobile communication security is becoming more and more important. In the Long Term Evolution/System Architecture Evolution (LTE/SAE) architecture, the 3rd Generation Partnership (3GPP) team has also developed the improved Evolved Packet System Authentication and Key Agreement (EPS AKA) protocol based on the 3rd Generation Authentication and Key Agreement (3G AKA) protocol in order to provide mutual authentication and secure communication between the user and the network. Unfortunately, the EPS AKA also has several vulnerabilities such as sending the International Mobile Subscriber Identity (IMSI) in plain text (which leads to disclosure of user identity and further causes location and tracing of the user, Mobility Management Entity (MME) attack), man-in-middle attack, etc. Hence, in this paper, we analyze the EPS AKA protocol and point out its deficiencies and then propose an Efficient and Security Enhanced Authentication and Key agreement (ESE-EPS AKA) protocol based on hybrid of Dynamic Pseudonym Mechanism (DPM) and Public Key Infrastructure (PKI) retaining the original framework and the infrastructure of the LTE network. Then, our evaluation proves that the proposed new ESE-EPS AKA protocol is relatively more efficient, secure and satisfies some of the security requirements such as confidentiality, integrity and authentication.

효율적인 공급망 관리를 위한 강화된 RFID 상호 인증 프로토콜 (Enhanced RFID Mutual Authentication Protocol on Efficient Supply Chain Management)

  • 전준철
    • 한국항행학회논문지
    • /
    • 제13권5호
    • /
    • pp.691-698
    • /
    • 2009
  • Chen 등은 위조 방지와 프라이버시 보호를 위한 RFID 인증 프로토콜을 제안하였다. 제안된 스킴은 저비용의 RFID 태그 보안을 위하여 XOR 연산과 시프트(shift) 연산을 이용하였다. 그러나, 실제적인 응용 환경을 고려하지 않았기 때문에 보안상의 문제점을 비롯하여 몇 가지 취약점을 보인다. 본 논문에서는 Chen 등의 프로토콜을 분석하고 취약점에 대한 의견을 제시한다. 또한, 기존의 스킴을 보완한 RFID 양방향 인증 프로토콜과 효율적인 공급망 관리를 위한 갱신 프로토콜을 제안한다. 제안된 프로토콜은 기존의 XOR 연산 기반의 RFID 인증 프로토콜과 안전성 및 효율성면에서 비교, 분석하였으며, 높은 안전성과 적은 통신 비용이 요구됨을 확인하였다.

  • PDF

An Enhanced Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services

  • Xiong, Ling;Peng, Daiyuan;Peng, Tu;Liang, Hongbin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권12호
    • /
    • pp.6169-6187
    • /
    • 2017
  • With the fast growth of mobile services, Mobile Cloud Computing(MCC) has gained a great deal of attention from researchers in the academic and industrial field. User authentication and privacy are significant issues in MCC environment. Recently, Tsai and Lo proposed a privacy-aware authentication scheme for distributed MCC services, which claimed to support mutual authentication and user anonymity. However, Irshad et.al. pointed out this scheme cannot achieve desired security goals and improved it. Unfortunately, this paper shall show that security features of Irshad et.al.'s scheme are achieved at the price of multiple time-consuming operations, such as three bilinear pairing operations, one map-to-point hash function operation, etc. Besides, it still suffers from two minor design flaws, including incapability of achieving three-factor security and no user revocation and re-registration. To address these issues, an enhanced and provably secure authentication scheme for distributed MCC services will be designed in this work. The proposed scheme can meet all desirable security requirements and is able to resist against various kinds of attacks. Moreover, compared with previously proposed schemes, the proposed scheme provides more security features while achieving lower computation and communication costs.

Enhanced MPR Selection Strategy for Multicast OLSR

  • Matter, Safaa S.;Al Shaikhli, Imad F.;Hashim, Aisha H.A.;Ahmed, Abdelmoty M.;Khattab, Mahmoud M.
    • International Journal of Computer Science & Network Security
    • /
    • 제22권10호
    • /
    • pp.137-144
    • /
    • 2022
  • Wireless community networks (WCNs) are considered another form of ownership of internet protocol (IP) networks, where community members manage and own every piece of equipment in a decentralized way, and routing for traffic is done in a cooperative manner. However, the current routing protocols for WCNs suffer from stability and scalability issues. In this paper, an enhanced routing protocol is proposed based on the optimized link state routing (OLSR) protocol to meet the standards of efficiency in terms of stability and scalability. The proposed routing protocol is enhanced through two phases: multicasting expansion and multipoint relay (MPR) selection based on an analytical hierarchical process (AHP). The experimental results demonstrate that the proposed routing protocol outperforms the OLSR protocol in terms of network control overhead and packet delivery ratio by 18% and 1% respectively.

정보보호 시스템 보안성 자동 분석 방법 연구 (A Study on Scheme of Automatical Security Analysis Tools for Information Security System)

  • 김점구;김태은
    • 융합보안논문지
    • /
    • 제8권1호
    • /
    • pp.117-127
    • /
    • 2008
  • 국내 보안관리 시스템의 후진성은 선진기술을 가진 외국 보안업체에 의존하는 현상을 낳았고, 이는 국내 기업은 물론 공공기관의 기밀사항이 외국에 유출될 위험을 내포하고 있다. 따라서 본 논문은 국내 공공망의 안전성 유지를 위한 자동화 보안분석 시스템을 설계 구현함으로서 보안성 분석기술을 확보하고, 이를 이용 공공기관의 보안수준을 높이며 외국업체에 대한 의존도를 줄여 국가 보안 안전성 확보에 기여하고자 한다.

  • PDF

전방향 안전성을 제공하는 개선된 대칭키 기반 원격 사용자 인증 방식 (An Enhanced Symmetric Key-Based Remote User Authentication Scheme with Forward Secrecy)

  • 문종호;원동호
    • 한국멀티미디어학회논문지
    • /
    • 제20권3호
    • /
    • pp.500-510
    • /
    • 2017
  • Recently Lee et al. proposed an improved symmetric key-based remote user authentication scheme to eliminate the security weaknesses of Kumari et al.'s scheme. They hence claimed that their scheme is secure to various well-known attacks. However, we found that Lee et al.'s scheme is still insecure against outsider attack, smart card stolen and off-line password guessing attack. To overcome these security vulnerabilities, we propose an enhanced authentication scheme with key-agreement which is based on the fuzzy-extractor. Furthermore, we prove that the proposed scheme is more secure, and that it serves to gratify all of the required security properties. Finally, we compare the performance and functionality of the proposed scheme with those of previous schemes.

Preparation and Holographic Recording of Fluorescent Photopolymer Films Containing Anthracene Polymer for Security

  • Park, Tea-Hoon;Kim, Yoon-Jung;Kim, Jeong-Hun;Kim, Eun-Kyoung
    • Journal of the Optical Society of Korea
    • /
    • 제14권4호
    • /
    • pp.305-309
    • /
    • 2010
  • Photopolymer films containing fluorescent anthracene polymer, polymethyleneanthracene (PMAn), were prepared with different concentrations of PMAn for holographic recording useful for security documents. The fluorescent photopolymer film showed enhanced fluorescent intensity due to the micro-separation which arose from grating formation and diffusion during photopolymerization. Experimental values of diffraction efficiency were well matched to the simulated values for photopolymers having different PMAn concentrations. Holography patterning was carried out using the fluorescent photopolymer under a photo-mask. A grating was confirmed using microscope techniques in the recorded area under the pattern. Importantly the recorded area showed enhanced fluorescence compared to the unrecorded part, allowing fluorescence patterns at micro scale along with the submicron grating pattern. The fluorescence pattern recorded on the photopolymer film provides additional readability of holographic reading and thus is useful for secure recording and reading of information.