• Title/Summary/Keyword: File Integrity

Search Result 91, Processing Time 0.018 seconds

Designing Reliable P2P Transmission Mechanism Against MITM Attack (MITM 공격에 안전한 P2P 신뢰전송 메커니즘의 설계)

  • Kim, Sang-Choon;Kwon, Hyeonk-Chan;Nah, Jae-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.103-109
    • /
    • 2008
  • Many Internet application provide the PKI(public key infrastructure)-based service to provide authentication and message integrity. Several researchers proposed PKI-based p2p network framework. However, in the real world, the use of PKI is not suitable for peer to peer network, because the peer-to-peer network is an open and dynamic network. Moreover, currently there is no nation-to-nation interoperable certificate. In this paper, we designed reliable p2p file sharing application without public key infrastructure. To do this we propose reliable public key distribution mechanism to distribute public key safely without PKI infrastructure for two-tier super-peer architecture. In our system, each peer generates and distributes its public/private key pairs, and the public key is securely distributed without PKI. The proposed mechanism is safe against MITM attack. This mechanism can be applied various P2P applications such as file sharing, IPTV, distributed resource sharing and so on

Design and Implementation of a ML-based Detection System for Malicious Script Hidden Corrupted Digital Files (머신러닝 기반 손상된 디지털 파일 내부 은닉 악성 스크립트 판별 시스템 설계 및 구현)

  • Hyung-Woo Lee;Sangwon Na
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.6
    • /
    • pp.1-9
    • /
    • 2023
  • Malware files containing concealed malicious scripts have recently been identified within MS Office documents frequently. In response, this paper describes the design and implementation of a system that automatically detects malicious digital files using machine learning techniques. The system is proficient in identifying malicious scripts within MS Office files that exploit the OLE VBA macro functionality, detecting malicious scripts embedded within the CDH/LFH/ECDR internal field values through OOXML structure analysis, and recognizing abnormal CDH/LFH information introduced within the OOXML structure, which is not conventionally referenced. Furthermore, this paper presents a mechanism for utilizing the VirusTotal malicious script detection feature to autonomously determine instances of malicious tampering within MS Office files. This leads to the design and implementation of a machine learning-based integrated software. Experimental results confirm the software's capacity to autonomously assess MS Office file's integrity and provide enhanced detection performance for arbitrary MS Office files when employing the optimal machine learning model.

Enhancing Installation Security for Naval Combat Management System through Encryption and Validation Research

  • Byeong-Wan Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.1
    • /
    • pp.121-130
    • /
    • 2024
  • In this paper, we propose an installation approach for Naval Combat Management System(CMS) software that identifies potential data anomalies during installation. With the popularization of wireless communication methods, such as Low Earth Orbit(LEO) satellite communications, various utilization methods using wireless networks are being discussed in CMS. One of these methods includes the use of wireless network communications for installation, which is expected to enhance the real-time performance of the CMS. However, wireless networks are relatively more vulnerable to security threats compared to wired networks, necessitating additional security measures. This paper presents a method where files are transmitted to multiple nodes using encryption, and after the installation of the files, a validity check is performed to determine if there has been any tampering or alteration during transmission, ensuring proper installation. The feasibility of applying the proposed method to Naval Combat Systems is demonstrated by evaluating transmission performance, security, and stability, and based on these evaluations, results sufficient for application to CMS have been derived.

e-Forensic Tool Research for Obtaining Legal Evidence Ability of Digital Evidence by Intelligence Inspection (디지털 증거물의 법적능력 확보를 위한 정보감사용 e-Forensic 툴 연구)

  • Kim, Seungyong;Kim, Gyeongyong;Hwang, Incheol;Kim, Dongsik
    • Journal of the Society of Disaster Information
    • /
    • v.13 no.2
    • /
    • pp.267-275
    • /
    • 2017
  • This research is about the development of e-forensic tool that extract & analyze different forms of digital evidence that individuals come across in a disaster scene. The tool utilizes digital forensic techniques which makes the tool efficient in any disaster analysis situation. In order for the forensic evidence to be selected as legal evidence, the evidence needs to be proven that it is in its original state with no forgery involved. This is where the e-forensic tool comes in, as its ability to collect digital evidence during investigation has proven; that the tool can keep the evidence in its original state and increase the integrity by generating hash TAG and adding the forensic evidence to a password encoded file.

Development of the Digital Map Updating System using CAD Object Extracted from As-Built Drawings (준공도면에서 추출된 CAD 객체를 이용한 수치지형도의 갱신 시스템 개발)

  • Yang, Sung-Chul;Choi, Jae-Wan;Yu, Ki-Yun
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.17 no.3
    • /
    • pp.13-21
    • /
    • 2009
  • Digital map should have the up-to-dateness as well as the accuracy to perform a role as the national spatial data. As digital mapping process require aerial photograph, surveying, and field working, it consumes a lot of time and cost. So there is a limit to maintain the up-to-dateness. If we updates the digital map frequently by using the as-built drawings, we can prevent the waste of national budget by reuse of existing drawings and make accuracy updates from existing survey results. In spite of this advantages, due to insufficiency of CAD drawing standard, inconsistency of file types of as-built drawings and digital maps, and topology relations between input features and original features, so the frequent updates using the as-built drawings is on the difficult situation to perform. In this research, first, CAD features extracted from as-built drawings land the new/update whether original features exist or not and generate topology from spatial relation of features. Second, suggest the efficient partial-update-plan performing integrity test. As a result, guarantee the accuracy and the up-to-dateness of digital map.

  • PDF

Development of Nuclear Piping Integriry Expert System (II) -System Development and Case Studies- (원자력배관 건전성평가 전문가시스템 개발(II) -시스템 개발 및 사례해석-)

  • Jeon, Hyeon-Gyu;Heo, Nam-Su;Kim, Yeong-Jin;Park, Yun-Won;Choe, Yeong-Hwan
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.25 no.6
    • /
    • pp.1015-1022
    • /
    • 2001
  • The objective of this paper is to develop an expert system called NPIES for nuclear piping integrity. This paper describes the structure and the development strategy of the NPIES system. The NPIES system consists of 3 part; the data input part, the analysis part and the output part. The data input part consists of the material properties database module and the suer interface module. The analysis part consists of the LEFM, CDFD, J/T, limit load modules and the 12 analysis routines for different cracks and loading conditions are provided respectively. Analysis results are presented to screen, printer and text file in the output part. Several case studies on circumferentially cracked piping were performed to evaluate the accuracy and the usefulness of the code. Maximum piping loads predicted by the NPIES system agreed well with those by the 3-dimensional finite element analysis. In addition, even if the material properties were not fully given, the NPIES system provided reasonable evaluation results with the predicted material properties inferred from the material properties database module.

Integrity Assessment and Verification Procedure of Angle-only Data for Low Earth Orbit Space Objects with Optical Wide-field PatroL-Network (OWL-Net)

  • Choi, Jin;Jo, Jung Hyun;Kim, Sooyoung;Yim, Hong-Suh;Choi, Eun-Jung;Roh, Dong-Goo;Kim, Myung-Jin;Park, Jang-Hyun;Cho, Sungki
    • Journal of Astronomy and Space Sciences
    • /
    • v.36 no.1
    • /
    • pp.35-43
    • /
    • 2019
  • The Optical Wide-field patroL-Network (OWL-Net) is a global optical network for Space Situational Awareness in Korea. The primary operational goal of the OWL-Net is to track Low Earth Orbit (LEO) satellites operated by Korea and to monitor the Geostationary Earth Orbit (GEO) region near the Korean peninsula. To obtain dense measurements on LEO tracking, the chopper system was adopted in the OWL-Net's back-end system. Dozens of angle-only measurements can be obtained for a single shot with the observation mode for LEO tracking. In previous work, the reduction process of the LEO tracking data was presented, along with the mechanical specification of the back-end system of the OWL-Net. In this research, we describe an integrity assessment method of time-position matching and verification of results from real observations of LEO satellites. The change rate of the angle of each streak in the shot was checked to assess the results of the matching process. The time error due to the chopper rotation motion was corrected after re-matching of time and position. The corrected measurements were compared with the simulated observation data, which were taken from the Consolidated Prediction File from the International Laser Ranging Service. The comparison results are presented in the In-track and Cross-track frame.

CCTV Cooperation Authentication Model Using Block Chain (블록체인을 이용한 CCTV 협력 검증 모델)

  • Kwon, Yong-Been;An, Kyu-Hwang;Kwon, Hyeok-Dong;Seo, Hwa-Jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.4
    • /
    • pp.462-469
    • /
    • 2019
  • According to the survey of Ministry of the Interior and Safety in Korea, The number of public and private CCTV reached over ten million and is still increasing. Also with improving Image Processing Technology, it is possible to obtain diverse information. Recently, various services using CCTV are being provided. Therefore it is necessary to ensure CCTV image integrity. However there is no system to prove events in film yet. In this paper, we suggest system model that can manage, use and authenticate CCTV. This model allows a CCTV film to be verified by other nearby CCTVs' data. This model ensures film's integrity by using blockchain. And also, It addresses privacy problem in CCTV and file size problem in blockchain by using not large film data but much smaller analyzed data.

Androfilter: Android Malware Filter using Valid Market Data (Androfilter: 유효마켓데이터를 이용한 안드로이드 악성코드 필터)

  • Yang, Wonwoo;Kim, Jihye
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1341-1351
    • /
    • 2015
  • As the popularization of smartphone increases the number of various applications, the number of malicious applications also grows rapidly through the third party App Market or black market. This paper suggests an investigation filter, Androfilter, that detects the fabrication of APK file effectively. Whereas the most of antivirus software uses a separate server to collect, analyze, and update malicious applications, Androfilter assumes Google Play as the trusted party and verifies integrity of an application through a simple query to Google Play. Experiment results show that Androfilter blocks brand new malicious applications that have not been reported yet as well as known malicious applications.

Development of Mesh Generation Program for the Primary System of Nuclear Power Plant (원자력 주요기기 해석을 위한 자동요소망 생성프로그램 개발)

  • Jang, Dong-Min;Kim, Yeong-Jin;Choe, Seong-Nam;Seo, Myeong-Won;Jang, Gi-Sang
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.24 no.2 s.173
    • /
    • pp.386-393
    • /
    • 2000
  • Fracture mechanics analysis (FMA) is an essential work for integrity evaluation of nuclear power plant. The flaws inspected by In-Service Inspection(ISI) should be confirmed by FMA for the decision of the operation status of stop or continuance. The basic data for FMA are the stress of the interested area. The purpose of this research is to develop a system which can obtain stress data efficiently based on various database. Mesh generation program generates mesh using MSC/PATRAN and provides input file for finite element analysis according to the databases (shape, dimension, transient and material). The stress data from the finite element analysis are stored to be stress database so that it can be applied to FMA. As an example, the system developed by this study is applied to pressurizer nozzle and confirmed to be a useful tool for efficient FMA.