• 제목/요약/키워드: Information and Communications security

검색결과 1,069건 처리시간 0.028초

개별 혼돈 시스템을 이용한 USN 통신 프로토콜 설계 (Design of USN Communication Protocol Using Individual Chaotic Systems)

  • 임거수
    • 한국정보전자통신기술학회논문지
    • /
    • 제8권6호
    • /
    • pp.528-533
    • /
    • 2015
  • USN 환경의 구축에 있어서 무선통신을 이용한 안전한 센서 네트워크 구현은 전체 시스템에 있어서 가장 중요한 요소라고 할 수 있다. USN 통신은 접근성, 비접촉성을 높이기 위해 무선통신을 사용하고 있으나 이것으로 인한 보안의 취약성은 시스템을 위험하게 하고 있다. 우리는 이런 다중센서 네트워크인 USN에 효율적으로 적용할 수 있는 보안 프로토콜을 제안한다. 우리가 제안한 프로토콜은 개별 혼돈 시스템을 이용한 방법으로 각각의 센서에 장착된 혼돈시스템을 주 혼돈 시스템과 미리 준비된 킷값을 초깃값으로 동기화시키고, 동기화된 값을 대칭키로 하여 통신하는 보안 프로토콜이다. 본 논문에서 보인 통신 프로토콜은 USN의 취약한 보안 문제와 센서노드의 프로그램 용량 제한 문제점을 해결하기 위한 새로운 방법으로 계속적인 후속 연구가 이루어진다면 좋은 성과를 얻을 수 있을 것으로 생각된다.

Social Networks As A Tool Of Marketing Communications

  • Nataliia Liashuk
    • International Journal of Computer Science & Network Security
    • /
    • 제23권12호
    • /
    • pp.137-144
    • /
    • 2023
  • The relevance of the research topic lies in the necessity to use social networks as innovative tools of marketing communications. A wide audience and the ability to segment the market for a specific consumer determine the construction of a corporate strategy, which will be based on using the social networking approach. The spread of the global coronavirus pandemic has led to the rapid development of remote communication channels between the company and the customer. The issue of using marketing tools in social networks acquires the most urgent importance in the modern world of the introduction and implementation of the company's marketing strategies. The purpose of the academic paper is to study the use of social networks as features of implementing the marketing campaign. Social networks are the result of the development of digital technologies and the processes of creating an information society involved in the digital space. The objectives of the research are to analyse the opportunity of using social networks as a tool for marketing communications and their implementation at the level of its widespread use by enterprises and establishments. It is significant to create an advertising campaign by defining the target audience and outlining the key aspects, on which the company is focused. The research methodology consists in determining the theoretical and methodological approaches to the essence of introducing social networks and their practical importance in the implementation of marketing activities of companies. The obtained results can significantly improve the quality of functioning of modern enterprises and organizations that plan to master a new market segment or gain competitive advantages in the existing one. The academic paper examines the essence of social networks as a tool of marketing communications. The key principles of the development of digital social platforms were revealed. The quality of implementing the advertising campaign in the social network was studied, and further prospects for the development of using social networks as a component of the marketing strategy were outlined. Therefore, the academic paper analyses the problems of using social networks as a marketing tool.

OpenSSL 상에서 LEA 설계 및 구현 (Design and Implementation of Lightweight Encryption Algorithm on OpenSSL)

  • 박기태;한효준;이재훈
    • 한국통신학회논문지
    • /
    • 제39B권12호
    • /
    • pp.822-830
    • /
    • 2014
  • 최근 인터넷 환경에서 보안 서비스가 중요시 되면서 SSL/TLS의 사용은 행정기관뿐만 아니라 개인 홈페이지에서도 증가되고 있는 추세이다. 또한 IETF는 사물인터넷 환경에서도 제한된 성능과 자원을 가진 디바이스들이 보안기능을 위해 사용할 수 있도록 DTLS의 적용을 제안하고 있다. 본 논문에서는 LEA알고리즘을 구현하고 이를 OpenSSL 상에 적용 하였다. 그 결과 구현된 알고리즘은 AES 등과 같은 다른 대칭키 알고리즘들과 비교했을 때 연산 속도에 있어 우수한 성능을 보임을 확인 하였다.

악성코드 동적분석 동향 (Trend and Issue Dynamic Analysis for Malware)

  • 황호;문대성;김익균
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2015년도 춘계학술발표대회
    • /
    • pp.418-420
    • /
    • 2015
  • 인터넷이 발전하면서 사이버 공격이 증가하고 있으며, 사이버 공격에 사용되는 악성코드도 점차 지능화 되고 있다. 악성코드 탐지에는 정적분석을 통해 악성코드의 특정패턴을 비교하는 시그니처 기반 접근법이 널리 사용되고 있으며, 높은 탐지율과 빠른 탐지속도를 보인다. 그러나 알려지지 않은 신종 악성코드(0-day)와 실행압축, 난독화 둥에 의한 변종 악성코드를 분석하기에 한계가 있다. 더욱이 악성코드의 정적분석은 많은 노력과 시간이 소모되는 작업이며, 최근 악성코드들은 대부분 정적분석 우회기술이 적용되어 대량으로 유포되는 실정이다. 그러므로 악성코드를 직접 실행시켜 발생되는 이벤트들을 수집하여 의미를 분석하는 동적분석이 활발하게 연구되고 있다. 본 논문에서는 악성코드에 적용된 동적분석 우회기술에 관하여 기술하고 나아가 동적분석 우회기술이 적용된 악성코드를 탐지하기 위한 방법에 관한 기술동향을 소개한다.

An Enhanced Role-Based Access Control Model using Static Separation of Duty Concept

  • Yenmunkong, Burin;Sathitwiriyawong, Chanboon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2004년도 ICCAS
    • /
    • pp.1350-1354
    • /
    • 2004
  • This paper proposes a simple but practically useful model for preventing fraud of users called "ERBAC03". The new model consists of qualified mandatory and discretionary features for roles and locations, including the assignment of permissions for the appropriate roles and the assignment of roles for the appropriate locations. Moreover, a static separation of duty (SSoD) principle is applied to the new model for integrity requirements of security systems. The paper also explores some extensions of ERBAC03 including the new model using the SSoD concept from some experiments. The experimental results prove the efficiency improvement of the proposed model that can make benefits for large enterprises.

  • PDF

Fast Detection of Distributed Global Scale Network Attack Symptoms and Patterns in High-speed Backbone Networks

  • Kim, Sun-Ho;Roh, Byeong-Hee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제2권3호
    • /
    • pp.135-149
    • /
    • 2008
  • Traditional attack detection schemes based on packets or flows have very high computational complexity. And, network based anomaly detection schemes can reduce the complexity, but they have a limitation to figure out the pattern of the distributed global scale network attack. In this paper, we propose an efficient and fast method for detecting distributed global-scale network attack symptoms in high-speed backbone networks. The proposed method is implemented at the aggregate traffic level. So, our proposed scheme has much lower computational complexity, and is implemented in very high-speed backbone networks. In addition, the proposed method can detect attack patterns, such as attacks in which the target is a certain host or the backbone infrastructure itself, via collaboration of edge routers on the backbone network. The effectiveness of the proposed method are demonstrated via simulation.

Enhanced Role-Based Access Control Administration Tool

  • Yenmunkong, Burin;Sathitwiriyawong, Chanboon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2004년도 ICCAS
    • /
    • pp.1360-1364
    • /
    • 2004
  • This paper propose an extended model for role-permission assignment based on locations called "Enhanced Role-Based Access Control (ERBAC03)". The proposed model is built upon the well-known RBAC model. Assigning permissions to role is considered too complex activity to accomplish directly. Instead we advocate breaking down this process into a number of steps. The concept of jobs and tasks is specifically introduced to facilitate role-permission assignment into a series of smaller steps. This model is suitable for any large organization that has many branches. Each branch consists of many users who work in difference roles. An administration tool has been developed to assist administrators with the administration of separation of duty requirements. It demonstrates how the specification of static requirements can be done based on "conflicting entities" paradigm. Static separation of duty requirements must be enforced in the administration environment. Finally, we illustrate how the ERBAC03 prototype is used to administer the separation of duty requirements.

  • PDF

TSTE: A Time-variant Stochastic Trust Evaluation Model in Social Networks

  • Li, Jingru;Yu, Li;Zhao, Jia;Luo, Chao;Zheng, Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권6호
    • /
    • pp.3273-3308
    • /
    • 2017
  • Building appropriate trust evaluation models is an important research issue for security guarantee in social networks. Most of the existing works usually consider the trust values at the current time slot, and model trust as the stochastic variable. However, in fact, trust evolves over time, and trust is a stochastic process. In this paper, we propose a novel time-variant stochastic trust evaluation (TSTE) model, which models trust over time and captures trust evolution by a stochastic process. Based on the proposed model, we derive the time-variant bound of untrustworthy probability, which provides stochastic trust guarantee. On one hand, the time-variant trust level of each node can be measured by our model. Meanwhile, by tolerating nodes with relatively poor performance, our model can effectively improve the node resource utilization rate. Numerical simulations are conducted to verify the accuracy and consistency of the analytical bounds on distinguishing misbehaved nodes from normal ones. Moreover, simulation results on social network dataset show the tradeoff between trust level and resource utilization rate, and verify that the successful transmission rate can be improved by our model.

A Web-Based IPTV Content Syndication System for Personalized Content Guide

  • Yang, Jinhong;Park, Hyojin;Lee, Gyu Myoung;Choi, Jun Kyun
    • Journal of Communications and Networks
    • /
    • 제17권1호
    • /
    • pp.67-74
    • /
    • 2015
  • In this paper, we propose a web-based content syndication system in which users can easily choose Internet protocol television (IPTV) contents. This system generates personalized content guide to provide a list of IPTV contents with respect to users' interests and statistics information of their online social community. For this, IPTV contents and relevant metadata are collected from various sources and transformed. Then, the service and content metadata are processed by user metadata including audience measurement and community metadata. The metadata flows are separated from content flows of transport network. The implementation of IPTV content syndication system demonstrates how to arrange IPTV contents efficiently from content providers to the end user's screen. We also show that the user metadata including online community information are important for the system's performance and the user's satisfaction.

안전한 보안 감시 시스템을 위한 효율적인 접근 제어 기법 (An Efficient Access Control Mechanism for Secure Surveillance Systems)

  • 양수미;박재성
    • 한국통신학회논문지
    • /
    • 제39B권4호
    • /
    • pp.228-233
    • /
    • 2014
  • 사회 안전 서비스 제공을 위한 보안 감시 시스템이 보편화되어, 보안 감시 시스템에 대한 접근성이 확대되고, 향상되는 만큼 안정성 확보를 위한 접근제어 기법이 요구된다. ONVIF(Open Network Video Interface Forum)에서 제정하는 표준은 보안 감시용 스마트 카메라의 호환성을 목적으로 만든 표준으로, 클라이언트에게 제공될 웹서비스의 프레임워크를 정의하고 있다. 본 논문에서는 ONVIF 표준을 따르는 보안 감시 카메라 네트워크에서 안전한 시스템 접근을 위하여 웹 서비스의 정보 보호 기법을 수용하고, 웹서비스의 안전한 제공을 위한 효율적인 접근 제어 모델을 제안 한다.