• Title/Summary/Keyword: Expected Attack

Search Result 215, Processing Time 0.034 seconds

A Study on Authentication Method for Secure Payment in Fintech Environment (핀테크 환경의 안전한 결제를 위한 인증 기법에 관한 연구)

  • Park, Jung-Oh;Jin, Byung-Wook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.25-31
    • /
    • 2015
  • FinTech(Financial Technology) is defined as the technique to create efficient financial services using IT technologies. FinTech is an innovative technology through IT platform and big data, and is expected to improve the security and problems of the conventional banking system. Domestic financial institutions has introduced the technologies and investment in order to provide safe and effective services to users. However, In the financial environment, information disclosure and security incident has occurred so they has lost the trust from their customers. Moreover new variant of the security threats and attack techniques have occurred. Therefore, in this paper, we designed a authentication scheme for secure payment system in FinTech environment. The proposed study evaluated the stability of the existing security systems with respect to attack methods occurred in the financial environment.

Trust-Based Filtering of False Data in Wireless Sensor Networks (신뢰도 평가를 통한 무선 센서 네트워크에서의 거짓 데이타 제거)

  • Hur, Jun-Beom;Lee, Youn-Ho;Yoon, Hyun-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.1
    • /
    • pp.76-90
    • /
    • 2008
  • Wireless sensor networks are expected to play a vital role in the upcoming age of ubiquitous computing such as home environmental, industrial, and military applications. Compared with the vivid utilization of the sensor networks, however, security and privacy issues of the sensor networks are still in their infancy because unique challenges of the sensor networks make it difficult to adopt conventional security policies. Especially, node compromise is a critical threat because a compromised node can drain out the finite amount of energy resources in battery-powered sensor networks by launching various insider attacks such as a false data injection. Even cryptographic authentication mechanisms and key management schemes cannot suggest solutions for the real root of the insider attack from a compromised node. In this paper, we propose a novel trust-based secure aggregation scheme which identifies trustworthiness of sensor nodes and filters out false data of compromised nodes to make resilient sensor networks. The proposed scheme suggests a defensible approach against the insider attack beyond conventional cryptographic solutions. The analysis and simulation results show that our aggregation scheme using trust evaluation is more resilient alternative to median.

Adaptive Intrusion Detection Algorithm based on Artificial Immune System (인공 면역계를 기반으로 하는 적응형 침입탐지 알고리즘)

  • Sim, Kwee-Bo;Yang, Jae-Won
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.13 no.2
    • /
    • pp.169-174
    • /
    • 2003
  • The trial and success of malicious cyber attacks has been increased rapidly with spreading of Internet and the activation of a internet shopping mall and the supply of an online, or an offline internet, so it is expected to make a problem more and more. The goal of intrusion detection is to identify unauthorized use, misuse, and abuse of computer systems by both system insiders and external penetrators in real time. In fact, the general security system based on Internet couldn't cope with the attack properly, if ever. other regular systems have depended on common vaccine softwares to cope with the attack. But in this paper, we will use the positive selection and negative selection mechanism of T-cell, which is the biologically distributed autonomous system, to develop the self/nonself recognition algorithm and AIS (Artificial Immune System) that is easy to be concrete on the artificial system. For making it come true, we will apply AIS to the network environment, which is a computer security system.

Study on the Physical vulnerability factors of network and the Countermeasure technology (네트워크의 물리적 취약요인과 대응기술에 관한 연구)

  • Jeon, Jeong Hoon;Ahn, Chang Hoon;Kim, Sang Choon
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.139-145
    • /
    • 2016
  • Recently, The attack on the USB and network are increasing in many domestic infrastructure. These attacks are the most independent of insider intention, caused by the Anthropogenic Manipulation. These attacks are Anthropogenic Response Measures for Physical Security. and Representative Technology has CCTV, Access Control System, Sensor Technology. However, Physical Security, it is represented by several Product family according to the Market, has become an obstacle but rather a variety of Physical Security Technology Development and Application. As the Anthropogenic Attacks have occur continually in the network, it need to the proper Physical Response Techniques in this situation. Therefore, In this paper, we will find out about the awareness and demand trends of Physical Security. And The Physical Vulnerable Factors of Network. Thereby this is expected to be utilized as a basis for the domestic Physical Security Technology development and deployment Road-map in a future.

A Design of Network Management System for Efficiently Isolating Devices Infected with ARP Spoofing Virus (ARP spoofing 바이러스에 감염된 단말을 효율적으로 분리하기 위한 네트워크 관리시스템의 설계)

  • Ko, Bong-Koo;Chung, Seung-Jong;Cho, Gi-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.3
    • /
    • pp.641-648
    • /
    • 2013
  • ARP spoofing is a typical Internet attack, in which an attacker sends data by changing his's MAC address with the other's one. Currently, this attack is usually dealt with separating the attacking PCs infected with ARP spoofing virus, by keeping network devices investigating by the network manager. However, this manual process has some limitations in time and accuracy. This paper proposes a new network management system to replace the effort of network manager who has to keep on inspecting the network. Along with designing an ARP analyzer and a disconnection notifier and adding them into the existing network management system, the proposed system provides a basement to identify and notify the PC infected by an ARP spoofing virus with fast and high accuracy. As a result, it is expected to minimize the network break off and to make easy the network management.

A Study on the Costs Factors of an being additional Budget by the Security System (보안시스템으로 인해 추가되는 예산 외 비용의 요인에 관한 연구)

  • Jeon, Jeong-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1481-1488
    • /
    • 2011
  • Recently, Hacking Attacks are appearing as a various Attack techniques with evolution of the Network. and most of the network through a Various Security Systems are responding to an attack. In addition, it should be placed adding the Security Systems to protect the Internal Network's Information assets from External attacks. But, The use of Security Systems inside the network makes a significant impact on Security and Performance, as well as a result causes Economic Additional Costs. Therefore, In this paper, it will be to analyze by associated a case study and experimental results about the Additional Costs Factors(Variable situations difficult to predict and Information Security Recognition levels, Security Systems, Information Asset Assessment). This is expected to serve as a valuable Information for the Reduction of an Costs in a Network deployment and Design in a future.

Web Services-Adaptable Privacy-Aware Digital Rights Management Architecture (웹서비스 환경에서의 프라이버시를 보호하는 디지털 저작권 관리 아키텍쳐)

  • Song, You-Jin;Lee, Dong-Hyeok
    • The Journal of Society for e-Business Studies
    • /
    • v.10 no.4
    • /
    • pp.53-81
    • /
    • 2005
  • Current DRM system has limitation in protection of user's privacy Therefore, many troubles are expected in service providing if it comes into the ubiquitous times of context-aware environment. HKUST Proposed a watermark-based web service DRM system. However, the relevant study does not consider ubiquitous environment and cannot provide service that considered a context. And privacy protection of a user is impossible. On the other hand, Netherlands Phillips laboratory indicated a privacy problem of a DRM system and they proposed an alternative method about this. However, in relevant study, a Sniffing/Replay attack is possible if communicated authentication information are exposed between a user and device. We designed web services adaptable privacy-aware DRM architecture which supplements these disadvantages. Our architecture can secure user authentication mechanism for sniffing/Replay attack and keep anonymity and protect privacy Therefore , we can implement the privacy-aware considered web service DRM system in Context-Aware environment.

  • PDF

Intrusion Detection System of Network Based on Biological Immune System (생체 면역계를 이용한 네트워크 침입탐지 시스템)

  • Sim, Kwee-Bo;Yang, Jae-Won;Lee, Dong-Wook;Seo, Dong-Il;Choi, Yang-Seo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.12 no.5
    • /
    • pp.411-416
    • /
    • 2002
  • Recently, the trial and success of malicious cyber attacks has been increased rapidly with spreading of Internet and the activation of a internet shopping mall and the supply of an online internet, so it is expected to make a problem more and more. Currently, the general security system based on Internet couldn't cope with the attack properly, if ever, other regular systems have depended on common softwares to cope with the attack. In this paper, we propose the positive selection mechanism and negative selection mechanism of T-cell, which is the biological distributed autonomous system, to develop the self/non-self recognition algorithm, the anomalous behavior detection algorithm, and AIS (Artificial Immune System) that is easy to be concrete on the artificial system. The proposed algorithm can cope with new intrusion as well as existing one to intrusion detection system in the network environment.

Factors Associated with Fruit and Vegetable Consumption of Subjects Having a History of Stroke: Using 5th Korea National Health and Nutrition Examination Survey (2010, 2011) (제5기 국민건강영양조사(2010년, 2011년) 자료를 이용한 뇌졸중 유병 경험자들의 과일 및 채소 섭취 관련 요인 분석)

  • Kim, Sung Je;Choi, Mi-Kyung
    • Korean Journal of Community Nutrition
    • /
    • v.19 no.5
    • /
    • pp.468-478
    • /
    • 2014
  • Objectives: Intake of fruits and vegetables has protective effects against stroke attack. This study intended to examine the status of consuming fruits and vegetables and to find out which factors may influence the frequency of consumption of fruits and vegetables in individuals with a history of stroke. Methods: The data of 208 subjects from 5th (2010, 2011) Korea National Health and Nutrition Examination Survey (KNHNES) who reported a stroke diagnosis was used for analysis. To identify major factors influencing the consumption of fruits and vegetables, a classification-tree analysis was carried out. Results: Among those who reported a stroke diagnosis, the frequencies of consumption of fruits and vegetables were influenced by their age, place of residence (urban or rural), economic status, educational level, occupation, number of family members, frequency of eating out, and having meals (breakfast or lunch) with family members. Two factors from fruits and three factors from vegetables were generated by exploratory factor analyses. Urban residents ate fruits and vegetables more frequently in all factors than rural residents. Eating frequencies of 'seasonal fruits (orange, apple, strawberry, melon, pear and watermelon)', 'easily-accessible fruits (persimmon, tangerine, grape, peach, banana)', and 'Western-style vegetables (cabbage, mushroom, carrot, tomato, spinach)' were influenced by the socioeconomic status. Eating frequencies of 'Korean-style vegetables (bean sprout, radish leaves, pumpkin/squash, sea weed)', 'preserved vegetables (Korean cabbage, radish, laver, cucumber)' were influenced by having breakfast with family members. Conclusions: The results of this study suggested that by eating more fruits and vegetables, more preventive effects against secondary stroke attack are expected in stroke patients who live in the rural areas and who do not eat breakfast with family members. In addition, more outreach and education programs are needed for them.

A Performance Evaluation of Concrete for Low-carbon Eco-friendly PC Box for Near-surface Transit System (저심도 철도시스템 구축을 위한 저탄소 친환경 PC 박스용 콘크리트의 성능 평가)

  • Koh, Tae-Hoon;Ha, Min-Kook;Jung, Ho-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.5
    • /
    • pp.3587-3595
    • /
    • 2015
  • Low-carbon eco-friendly precast concrete (PC) box structure has been recently was developed as an low-cost infrastructure of near-surface transit system. The concrete of PC box was manufactured by industrial byproducts such as ground granulated blast furnace (GGBF) slag, flyash and rapid-cooling electric arc furnace (EAF) oxidizing slag, its mechanical property and durability were estimated in this study. Based on the mechanical and durability tests, it is found that low-carbon eco-friendly concrete shows high initial compressive strength, more than 90% of design strength (35MPa), and high resistance to salt-attack, chemical- attack and freeze-thaw. Therefore, low-carbon eco-friendly PC box concrete technology is expected to contribute to the railway with low environmental impact.