• Title/Summary/Keyword: ID factor

Search Result 136, Processing Time 0.028 seconds

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.

Effect of Recombinant Human Epidermal Growth Factor(DWP 401) on Gastric Secretion and Ulcers in Rats (재조합 인간 상피세포 성장인자(DWP 401)의 흰쥐 위액분비 및 궤양에의 작용)

  • Lee, Eun-Bang;Cheon, Seon-A;Lee, Eun-Sim;Kim, Ok-Gyeong
    • YAKHAK HOEJI
    • /
    • v.40 no.4
    • /
    • pp.456-461
    • /
    • 1996
  • The effects of human epidermal growth factor(EGF) which was produced by recombinant DNA technique was investigated on gastric secretion, gastric lesion and ulcer models in rats. The EGF showed significant inhibition of secretion of gastric juice and total acid output, at 0.4mg/kg, id and also inhibited Shay ulceration at 0.4mg/kg, id in rats. The lesion induced by absolute ethanol was significantly reduced by oral administration of EGF at 0.4mg/kg. Likewise, EGF caused significant inhibition of indomethacin induced gastric ulcer at oral doses of 0.2 and 0.4mg/kg. The EGF produced dose-dependent inhibition of gastric ulcer induced by acidified aspirin, but showed no significant inhibition at oral doses of 0.1, 0.2 and 0.4mg/kg. The chronic gastric ulcer induced by injection of 20% acetic acid solution was significantly reduced by oral doses of 0.1 and 0.4mg/kg of EGF. Duodenal ulcer induced by mepirizole was dose-dependently inhibited by oral doses of 0.1, 0.2 and 0.4mg/kg of EGF. These data suggest that EGF possesses pronounced inhibitory action in gastric ulcer and duodenal ulcer of rats.

  • PDF

Determination of output factors by 1D method for 6MeV electron (1D 방법에 의한 6MeV 전자선의 output 인자 결정)

  • 유명진
    • Progress in Medical Physics
    • /
    • v.13 no.1
    • /
    • pp.27-31
    • /
    • 2002
  • Output factors for 6MeV electron were directly measured under the condition of an individual beam cutout and these factors were compared with the output factors by 1D method which is an easy means to predict the output factors of electron beam. Output factors by 1D method are defined as output factors of rectangular fields where one side is always equal to the side of the square reference field and the output of an arbitrary rectangular field X, Y is given by the product of the 1D output factors. The output of very large square fields is overestimated using 1D method for the 6MeV electron, but it results in agreement with measured data under the condition of an individual cutout within 1% error adopting a correction factor $CF=C\times$[(X-10)(Y-10)/$\mid$(X-10)(Y-10)$\mid^{1/2}]$.

  • PDF

Technology Trends, Research and Design of AIM Framework for Authentication Information Management (인증 정보 관리를 위한 기술 동향과 AIM 프레임워크 연구 및 설계)

  • Kim, Hyun-Joong;Cha, Byung-Rae;Pan, Sung-Bum
    • Journal of Digital Convergence
    • /
    • v.14 no.7
    • /
    • pp.373-383
    • /
    • 2016
  • With mobile-epoch and emerging of Fin-tech, Bio-recognition technology utilizing bio-information in secure method has spread. Specially, In order to change convenient payment services and transportation cards, the combination of biometrics and mobile services are being expanded. The basic concept of authentication such as access control, IA&A, OpenID, OAuth 1.0a, SSO, and Biometrics techniques are investigated, and the protocol stack for security API platform, FIDO, SCIM, OAuth 2.0, JSON Identity Suite, Keystone of OpenStack, Cloud-based SSO, and AIM Agent are described detailed in aspect of application of AIM. The authentication technology in domestic and foreign will accelerate technology development and research of standardization centered in the federated FIDO Universal Authentication Framework(UAF) and Universal 2 Factor Framework(U2F). To accommodate the changing needs of the social computing paradigm recently in this paper, the trends of various authentication technology, and design and function of AIM framework was defined.

Negative regulators in RANKL-induced osteoclastogenesis

  • Lee, Jun-Won;Kim, Kab-Sun;Kim, Nack-Sung
    • International Journal of Oral Biology
    • /
    • v.32 no.1
    • /
    • pp.1-5
    • /
    • 2007
  • Receptor activator of nuclear factor ${\kappa}B$ ligand (RANKL) induces osteoclast formation from hematopoietic cells via up-regulation of positive regulators, including $NF-{\kappa}B$, c-Fos, microphthalmia transcription factor (Mitf), PU.1, and nuclear factor of activated T cells (NFAT) c1. In addition to the positive regulation by these transcription factors, RANKL appears to regulate negative regulators such as MafB and inhibitors of differentiation (Ids). Ids and MafB are abundantly expressed in osteoclast precursors, bone marrowderived monocyte/macrophage lineage cells (BMMs). Expression levels of these genes are significantly reduced by RANKL during osteoclastogenesis. Overexpression of these genes in BMMs inhibits the formation of tartarate-resistant acid phosphatase (TRAP)-positive multinuclear osteoclasts by down-regulation of NFATc1 and osteoclast-associated receptor (OSCAR), which are important for osteoclast differentiation. Furthermore, reduced expression of these genes enhances osteoclastogenesis and increases expression of NFATc1 and OSCAR. Taken together, RANKL induces osteoclastogenesis via up-regulation of positive regulators as well as down-regulation of negative regulators.

Design the Autopilot System of using GA Algorithm

  • Lee, Sang-Min;Choo, Yeon-Gyu;Lim, Young-Do
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.699-703
    • /
    • 2004
  • The autopilot system targets decreasing labor, working environment, service safety security and elevation of service efficiency. Ultimate purpose is minimizing number of crew for guarantee economical efficiency of shipping service. Recently, being achieving research about Course Keeping Control, Track Keeping Control, Roll-Rudder Stabilization, Dynamic ship Positioning and Automatic Mooring Control etc. which compensate nonlinear characteristic using optimizing control technique. And application research is progressing using real ship on actual field. Relation of Rudder angle which adjusted by Steering Machine and ship-heading angle are non-linear. And, Load Condition of ship acts as non-linear element that influence to Parameter of ship. Also, because the speed of a current and direction of waves, velocity and quantity of wind etc. that id disturbance act in non-linear form, become factor who make service of shipping painfully. Therefore, service system of shipping requires robust control algorithm that can overcome nonlinearity. In this paper, Using GA algorithm,design autopilot system of ship that could overcome the non-linear factor of ship and disturbance and examined result through simulation.

  • PDF

A Study on Fracture Parameters for PVC/MBS Composites under Low Velocity Impact (저속 충격시 PVC/MBS재료의 파괴특성에 관한 연구)

  • 최영식;박명균;박세만
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2002.10a
    • /
    • pp.837-840
    • /
    • 2002
  • An analysis method for rubber toughened PVC is suggested to evaluate critical dynamic strain energy release rates($G_c$) from the Charpy impact energy measurements. An instrumented Charpy impact tester was used to extract ancillary information concerning fracture parameters in addition to total fracture energies and maximum critical loads. The dynamic stress intensity factor $K_{Id}$ was computed for varying amounts of rubber contents from the obtained maximum critical loads and also toughening effects were investigated as well. The fracture surfaces produced under low velocity impact fur PVC/MBS composites were investigated by SEM. The results show that MBS rubber is very effective reinforcement material for toughening PVC.C.

  • PDF

A Generalized Least Square Method using Dead Zone (불감대를 사용한 최소자승법의 일반화)

  • 이하정;최종호
    • The Transactions of the Korean Institute of Electrical Engineers
    • /
    • v.37 no.10
    • /
    • pp.727-732
    • /
    • 1988
  • In this paper, a parameter estimation method of linear systems with bounded output disturbances is studied. The bound of the disturbances is assumed to known Weighting factors are proposed to modify LS(Least Square) algorithm in the parameter estimation method. The conditions of weighting factors are given so that the estimation method has good convergence properties. This condition is more relaxed form than other known conditions. The compensation term in the estimation equations is represented by a function of the output prediction error and this function should lie in a specified region on x-y plane to satisfy these conditions of weighting factors. A set of weighting factor is selected and an algorithm is proposed using this set of weighting factor. The proposed algorithm is compared with another existing algorithm by simulation and its performance in parameter estimation id discussed.

  • PDF

Plugboard type air-conditioner source system with power factor correction circuit (역률 개선회로를 갖는 배전반용 에어컨 시스템)

  • 문상필;서기영;이현우;권순걸;김영문
    • Proceedings of the IEEK Conference
    • /
    • 2001.06e
    • /
    • pp.241-244
    • /
    • 2001
  • This paper proposes a nonlinear impedance circuit composed by diodes and inductors or capacitors. This circuit needs no control circuits and switches, and the impedance value is changed by the polarity of current or voltage, This paper presents one of these applications to improve the input current of capacitor input diode rectifiers. The rectifier using the nonlinear impedance circuit id constructed with four diodes and four capacitors in addition to the conventional rectifiers, that is it has eight diodes and five capacitors, including a DC link capacitor. It makes harmonic components of the input current reduce and the power factor improve. A circuit design method is shown by experimentation and confirmed simulation. It explained that compared conventional pulse-width modulated (PWM)inverter with half pulse-width modulated (HPWM) inverter. Proposed HPWM inverter eliminated dead-time by lowering switching loss and holding over-shooting.

  • PDF

Improved 2-factor authentication scheme using mobile messenger (모바일 메신저를 이용한 개선된 2-Factor 인증기법)

  • Hong, Ki-Dae;Lee, Sang-Tae;Hur, Jun-Beom
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.676-679
    • /
    • 2013
  • 최근 피싱과 파밍으로 인한 사용자들의 피해가 속출하고 있다. 또, OTP(One Time Password)의 MITM 공격에 대한 취약성이 밝혀지면서 기존의 인증기법을 개선할 필요가 있다. 그러므로 피싱과 파밍 공격을 방지하고 OTP의 취약점을 개선한 인증기법을 제안하는 것은 매우 중요한 문제이다. 본 논문에서는 메신저를 이용한 피싱/파밍 방지기능을 제안한다. 또한 제안하는 기법은 1차로 기존과 같은 ID / PWD 방식 인증과 2차로 모바일 메신저 상에서의 인증시작버튼, 3차로 물리적인 QR코드 인식 후 인증을 하는 3단계 인증을 통해 개선한다. 제안하는 인증기법은 일상생활 속에서 많이 사용하는 메신저와 카메라 기능을 통해 진행되므로 사용자는 추가적인 기능을 배울 필요가 없으며, 친숙하게 사용할 수 있다. 피싱/파밍 공격은 물론 MITM공격에 대한 취약점을 메신저의 특징과 2차, 3차 인증단계를 이용해 막아낼 수 있을 것으로 기대된다.