• 제목/요약/키워드: Logical security

검색결과 115건 처리시간 0.027초

Knowledge Representation Using Fuzzy Ontologies: A Survey

  • V.Manikandabalaji;R.Sivakumar
    • International Journal of Computer Science & Network Security
    • /
    • 제23권12호
    • /
    • pp.199-203
    • /
    • 2023
  • In recent decades, the growth of communication technology has resulted in an explosion of data-related information. Ontology perception is being used as a growing requirement to integrate data and unique functionalities. Ontologies are not only critical for transforming the traditional web into the semantic web but also for the development of intelligent applications that use semantic enrichment and machine learning to transform data into smart data. To address these unclear facts, several researchers have been focused on expanding ontologies and semantic web technologies. Due to the lack of clear-cut limitations, ontologies would not suffice to deliver uncertain information among domain ideas, conceptual formalism supplied by traditional. To deal with this ambiguity, it is suggested that fuzzy ontologies should be used. It employs Ontology to introduce fuzzy logical policies for ambiguous area concepts such as darkness, heat, thickness, creaminess, and so on in a device-readable and compatible format. This survey efforts to provide a brief and conveniently understandable study of the research directions taken in the domain of ontology to deal with fuzzy information; reconcile various definitions observed in scientific literature, and identify some of the domain's future research-challenging scenarios. This work is hoping that this evaluation can be treasured by fuzzy ontology scholars. This paper concludes by the way of reviewing present research and stating research gaps for buddy researchers.

Towards a Scalable SDN Hypervisors Framework

  • Aamir Hussain;Sajid Ali;Mubashir Ali;Sarfraz Hashim
    • International Journal of Computer Science & Network Security
    • /
    • 제24권2호
    • /
    • pp.67-78
    • /
    • 2024
  • Software-Defined Networking (SDN) is a new emerging networking paradigm that has adopted a logically centralized architecture to increase overall network performance agility and programmability. Combining network virtualization with SDN will guarantees for combined advantages of improved flexibility and network performance. Combining SDN with hypervisors divides the network physical resources into several logical transparent and isolated virtual SDN network (vSDN), where each has its virtual controller. However, SDN hypervisors bring several advantages as well as several challenges to its network operators as for the virtual appliances, their efficient placement, assurance of network performance is mandatory, and their dynamic instantiation with their migration. In this article, we provide a brief and concise review of network virtualization along with its implementation in the SDN network. SDN hypervisors types are discussed, and taxonomy is provided to demonstrate the importance of hypervisors in SDN. A comparison of SDN hypervisors is performed to elaborate on the vital hypervisor software along with their features, and different challenges are discussed faced by the SDN network. A framework is proposed to add combined functionalities of hypervisors to create a more effective and efficient virtual system. The purpose of the framework is to increase network performance through proper configuration of resources, software, control plane isolation functions with defined rules and policies.

한국형 선박통제의 발전방향에 관한 연구 (Future Development of Republic of Korea NCAGS)

  • 김성해;정효섭
    • Strategy21
    • /
    • 통권44호
    • /
    • pp.352-376
    • /
    • 2018
  • Through this research, the current state of naval coordination and guidance of shipping is reviewed whereupon which a suggestion is made for a novel role which satisfies the needs of the people and the country asked of the Navy. Taking into consideration the dynamic security environment, the developing relationship between the two nations on the Korean peninsula, and the influence that the Republic of Korea has on maritime security, it is made more urgent that the Navy takes a proactive course of action in terms of naval coordination and guidance of shipping. The current form of Korean naval coordination and guidance of shipping is adapted from the logical and flexible concepts of NCAPS and NCAGS and is one of many tasks that the Republic of Korea Navy must perform. However, when the Republic of Korea Navy develops blue-water capabilities with the ambitions of protecting its people and their way of life, naval coordination and guidance of shipping could potentially become one of the primary functions of the Republic of Korea Navy that the it must champion. Already, there are indications that foreign navies are, through many developments and commitment towards naval coordination and guidance of shipping, protecting its people and states' interests wherever is necessary. In the case of Chile, its Navy has taken the helm of naval coordination and guidance of shipping and has integrated various maritime organizations including the coast guard and the National Customs Service for the sake of maintaining regional maritime security, showing immediate force if necessary. Presently, as the Republic of Korea Navy looks to be a global naval power, it is important that a reprioritization of the Navy's mission is undertaken, all the while sustaining military readiness posture on the Northern Limit Line. It cannot be any more emphasized how crucial thorough military readiness posture is as a natural stance against the enemy. That being said, contributing towards international maritime security is consistent with the nation's standing. It is a fact that maritime security has been conceptualized and developed merely as a study within the Ministry of Maritime Affairs and Fisheries, the Republic of Korea Navy, and other governmental organizations, forces, and academia. Naval cooperation and guidance of shipping suggested by this research as a practical operational field is a concrete solution to what once was an abstract concept. To stand firm on its status as a maritime nation, the Republic of Korea must establish a Maritime Security Organization within its Navy and develop the appropriate doctrines. Attaining experts, developing doctrines, and cultivating the capability to deploy maritime forces will allow for the Republic of Korea to execute a primary role in keeping international maritime security and naval coordination and guidance of shipping. To fully achieve its latent potential necessitates the Republic of Korea Navy to expedite the introduction of naval coordination and guidance of shipping concepts and to establish the appropriate doctrines, operation plans, and organizations.

Mobile Subscriber Roaming n Different Mobile Networks Using UIM and PASM

  • Park, Jeong-Hyun;Yang, Jeong-Mo
    • 한국멀티미디어학회:학술대회논문집
    • /
    • 한국멀티미디어학회 2003년도 추계학술발표대회(상)
    • /
    • pp.445-448
    • /
    • 2003
  • During a time when cellular systems are being deployed in massive scale worldwide, international roaming is becoming increasingly important. This paper presents UIM (User Identification Module) for mobility support, authentication, and service portability between different mobile systems. We also introduce network model based on PASM(Portable Authentication and Mobility Service Machine) which will support signaling protocol and user information conversions with database for roaming between different mobile networks. Stored data types and elements in UIM, logical data structure and configuration, and registration procedures are described here in the case of DCN (Digital CDMA (Code Division Multiple Access) Network System) and GSM (Global System for Mobile Communications).

  • PDF

ON MULTI-AUTHORITY CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION

  • Muller, Sascha;Katzenbeisser, Stefan;Eckert, Claudia
    • 대한수학회보
    • /
    • 제46권4호
    • /
    • pp.803-819
    • /
    • 2009
  • In classical encryption schemes, data is encrypted under a single key that is associated with a user or group. In Ciphertext-Policy Attribute-Based Encryption(CP-ABE) keys are associated with attributes of users, given to them by a central trusted authority, and data is encrypted under a logical formula over these attributes. We extend this idea to the case where an arbitrary number of independent parties can be present to maintain attributes and their corresponding secret keys. We present a scheme for multi-authority CP-ABE, propose the first two constructions that fully implement the scheme, and prove their security against chosen plaintext attacks.

한전(韓電)EMS의 데이터베이스 및 정보교환체제(情報交換體制) (Database Structure and Information Exchange System of KEPCO's EMS SYSTEM)

  • 이경재;유승철;김영한;이효상
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1988년도 추계학술대회 논문집 학회본부
    • /
    • pp.87-91
    • /
    • 1988
  • For the electric power system operation, the information to monitor the operation status of power plants and transmission lines is very important factor in the view point of system security and economic operation. This paper presents the logical and physical structures of database used by KEPCO's EMS. The adopted DataBase Management System (DBMS) of a relational model type offers many advantages such as easy maintenance of database. In addition, this paper briefly introduces the data exchange system between application programs and database.

  • PDF

Bitmap Intersection Lookup (BIL);A Packet Classification's Algorithm with Rules Updating

  • Khunkitti, Akharin;Promrit, Nuttachot
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2005년도 ICCAS
    • /
    • pp.767-772
    • /
    • 2005
  • The Internet is a packet switched network which offers best-effort service, but current IP network provide enhanced services such Quality of Services, Virtual Private Network (VPN) services, Distribute Firewall and IP Security Gateways. All such services need packet classification for determining the flow. The problem is performing scalable packet classification at wire speeds even as rule databases increase in size. Therefore, this research offer packet classification algorithm that increase classifier performance when working with enlarge rules database by rearrange rule structure into Bitmap Intersection Lookup (BIL) tables. It will use packet's header field for looking up BIL tables and take the result with intersection operation by logical AND. This approach will use simple algorithm and rule structure, it make classifier have high search speed and fast updates.

  • PDF

Key Infection의 보안성 향상을 위한 개선된 키 설정 방법 (Security-Enhanced Key Establishment Scheme for Key Infection)

  • 황영식;한승완;남택용
    • 대한전자공학회논문지TC
    • /
    • 제43권7호
    • /
    • pp.24-31
    • /
    • 2006
  • 기존의 보안 메커니즘들은 센서 노드의 자원의 제약 사항들로 인해 센서 네트워크 분야에서는 적용하기 쉽지 않다. 따라서 센서 네트워크상의 보안 이슈들은 센서 네트워크의 구현에 있어서 선행적으로 해결되어야 하는 문제로 인식된다. 이런 보안 이슈들 중 키 설정은 두 노드들 간의 보안 통신을 위해 초기 단계에서 해결되어야 하는 매우 중요한 보안 요소이다. 최근 R. Anderson 등에 의해 Key Infection이라는 commodity sensor network 상의 키 설정 방법이 제안되었지만 key infection의 경우 공격자가 초기 키 설정 시간에 전송되는 키 정보를 감청할 수 있는 영역이 존재하는 본질적인 취약점을 가지고 있다. 따라서 본 논문에서는 key infection의 위험 영역을 효율적으로 줄이는 보안 메커니즘을 제안함으로써 key infection의 보안성 향상을 위한 키 설정 방법을 제안한다. 제안된 보안 메커니즘은 key infection의 위험 영역을 줄이기 위해 초기 키 설정 시에 다른 이웃 노드의 정보를 추가적으로 이용하여 공유키 쌍(pair-wise key)을 생성한다. 추가적인 키 정보를 이용함으로써 새로운 위험 영역을 얻을 수 있으며 이 영역은 기존 key infection의 위험 영역보다 면적이 감소하였기 때문에 보다 보안이 향상된 키 설정을 할 수 있다. 또한 제안된 보안 메커니즘의 안전성 평가를 위해 논리적, 수학적 관점에서 비교 평가한다.

통합보안관리 에이전트를 확장한 웹 어플리케이션 공격 탐지 연구 (A Study of Web Application Attack Detection extended ESM Agent)

  • 김성락
    • 한국컴퓨터정보학회논문지
    • /
    • 제12권1호
    • /
    • pp.161-168
    • /
    • 2007
  • 웹에 대한 공격은 웹 서버 자체의 취약점 보다 웹 어플리케이션의 구조, 논리, 코딩상의 오류를 이용한다. OWASP에서 웹 어플리케이션 취약점을 10가지로 분류하여 발표한 자료에 의하면 웹 해킹의 위험성과 피해가 심각함을 잘 알 수 있다. 이에 따라 웹 해킹에 대한 탐지능력 및 대응이 절실히 요구된다. 이러한 웹 공격을 방어하기 위해 패턴 매칭을 이용한 필터링을 수행하거나 코드를 수정하는 방법이 있을 수 있지만 새로운 공격에 대해서는 탐지 및 방어가 어렵다. 또한 침입탐지시스템이나 웹 방화벽과 같은 단위보안 제품을 도입할 수 있지만 운영과 지속적인 유지를 위해서는 많은 비용과 노력이 요구되며 많은 탐지의 오류를 발생한다. 본 연구에서는 웹 어플리케이션의 구조와 파라미터 입력 값에 대한 타입, 길이와 같은 특성 값들을 추출하는 프로파일링 기법을 이용하여 사전에 웹 어플리케이션 구조 데이터베이스를 구축함으로서 사용자 입력 값 검증의 부재에 대한 해결과 비정상적인 요청에 대해 데이터베이스의 프로파일 식별자를 이용하여 검증하고 공격 탐지가 가능하다. 통합보안관리시스템은 현재 대부분 조직에서 도입하여 운영하고 있으며 일반화 되어있다. 그래서 통합보안관리시스템의 보안 감사 로그 수집 에이전트에 웹 어플리케이션 공격 탐지 기능을 추가한 모델을 제시함으로서 추가 단위보안제품을 도입하지 않고서도 웹 어플리케이션 공격을 탐지할 수 있도록 하였다.

  • PDF

Key-Value Solid State Device 기반의 저장 및 검색 아키텍처 (Storage and Retrieval Architecture based on Key-Value Solid State Device)

  • 순위샹;이용주
    • 한국전자통신학회논문지
    • /
    • 제15권1호
    • /
    • pp.45-52
    • /
    • 2020
  • 본 논문에서는 저장 및 검색 성능과 보안을 고려하여 key-value 형태의 SSD를 활용한 RDF 데이터 저장 및 검색 문제에 대한 해결책을 제안한다. Key-value SSD를 사용한 RDF 데이터 셋으로 부터 논리 관계와 실제 값을 분리하기 위한 2단계 압축 알고리즘을 제안한다. 이는 압축 및 저장 성능뿐만 아니라 보안도 향상시킨다. 우리는 또한 검색 성능 향상과 병합정렬 조인 알고리즘 구현을 위한 R∗-tree 기반 하이브리드 검색 구조를 제안했으며, R∗-tree 검색 효율성에 영향을 미치는 요인들에 대해 설명한다. 논문에서 제안된 방식은 기존의 압축 및 저장 그리고 검색 접근 방식보다 저장 공간을 적게 차지하면서 더 빠른 결과를 얻을 수 있으며, 다양성, 유연성, 그리고 보안 측면에서 더 우수한 경쟁력을 가진다.