• 제목/요약/키워드: Multi-level Security

Search Result 219, Processing Time 0.02 seconds

A Multi-Stage Approach to Secure Digital Image Search over Public Cloud using Speeded-Up Robust Features (SURF) Algorithm

  • AL-Omari, Ahmad H.;Otair, Mohammed A.;Alzwahreh, Bayan N.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.65-74
    • /
    • 2021
  • Digital image processing and retrieving have increasingly become very popular on the Internet and getting more attention from various multimedia fields. That results in additional privacy requirements placed on efficient image matching techniques in various applications. Hence, several searching methods have been developed when confidential images are used in image matching between pairs of security agencies, most of these search methods either limited by its cost or precision. This study proposes a secure and efficient method that preserves image privacy and confidentially between two communicating parties. To retrieve an image, feature vector is extracted from the given query image, and then the similarities with the stored database images features vector are calculated to retrieve the matched images based on an indexing scheme and matching strategy. We used a secure content-based image retrieval features detector algorithm called Speeded-Up Robust Features (SURF) algorithm over public cloud to extract the features and the Honey Encryption algorithm. The purpose of using the encrypted images database is to provide an accurate searching through encrypted documents without needing decryption. Progress in this area helps protect the privacy of sensitive data stored on the cloud. The experimental results (conducted on a well-known image-set) show that the performance of the proposed methodology achieved a noticeable enhancement level in terms of precision, recall, F-Measure, and execution time.

Visual Monitoring System of Multi-Hosts Behavior for Trustworthiness with Mobile Cloud

  • Song, Eun-Ha;Kim, Hyun-Woo;Jeong, Young-Sik
    • Journal of Information Processing Systems
    • /
    • v.8 no.2
    • /
    • pp.347-358
    • /
    • 2012
  • Recently, security researches have been processed on the method to cover a broader range of hacking attacks at the low level in the perspective of hardware. This system security applies not only to individuals' computer systems but also to cloud environments. "Cloud" concerns operations on the web. Therefore it is exposed to a lot of risks and the security of its spaces where data is stored is vulnerable. Accordingly, in order to reduce threat factors to security, the TCG proposed a highly reliable platform based on a semiconductor-chip, the TPM. However, there have been no technologies up to date that enables a real-time visual monitoring of the security status of a PC that is operated based on the TPM. And the TPB has provided the function in a visual method to monitor system status and resources only for the system behavior of a single host. Therefore, this paper will propose a m-TMS (Mobile Trusted Monitoring System) that monitors the trusted state of a computing environment in which a TPM chip-based TPB is mounted and the current status of its system resources in a mobile device environment resulting from the development of network service technology. The m-TMS is provided to users so that system resources of CPU, RAM, and process, which are the monitoring objects in a computer system, may be monitored. Moreover, converting and detouring single entities like a PC or target addresses, which are attack pattern methods that pose a threat to the computer system security, are combined. The branch instruction trace function is monitored using a BiT Profiling tool through which processes attacked or those suspected of being attacked may be traced, thereby enabling users to actively respond.

A Validation of Effectiveness for Intrusion Detection Events Using TF-IDF (TF-IDF를 이용한 침입탐지이벤트 유효성 검증 기법)

  • Kim, Hyoseok;Kim, Yong-Min
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1489-1497
    • /
    • 2018
  • Web application services have diversified. At the same time, research on intrusion detection is continuing due to the surge of cyber threats. Also, As a single-defense system evolves into multi-level security, we are responding to specific intrusions by correlating security events that have become vast. However, it is difficult to check the OS, service, web application type and version of the target system in real time, and intrusion detection events occurring in network-based security devices can not confirm vulnerability of the target system and success of the attack A blind spot can occur for threats that are not analyzed for problems and associativity. In this paper, we propose the validation of effectiveness for intrusion detection events using TF-IDF. The proposed scheme extracts the response traffics by mapping the response of the target system corresponding to the attack. Then, Response traffics are divided into lines and weights each line with an TF-IDF weight. we checked the valid intrusion detection events by sequentially examining the lines with high weights.

An Intelligent Game Theoretic Model With Machine Learning For Online Cybersecurity Risk Management

  • Alharbi, Talal
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.390-399
    • /
    • 2022
  • Cyber security and resilience are phrases that describe safeguards of ICTs (information and communication technologies) from cyber-attacks or mitigations of cyber event impacts. The sole purpose of Risk models are detections, analyses, and handling by considering all relevant perceptions of risks. The current research effort has resulted in the development of a new paradigm for safeguarding services offered online which can be utilized by both service providers and users. customers. However, rather of relying on detailed studies, this approach emphasizes task selection and execution that leads to successful risk treatment outcomes. Modelling intelligent CSGs (Cyber Security Games) using MLTs (machine learning techniques) was the focus of this research. By limiting mission risk, CSGs maximize ability of systems to operate unhindered in cyber environments. The suggested framework's main components are the Threat and Risk models. These models are tailored to meet the special characteristics of online services as well as the cyberspace environment. A risk management procedure is included in the framework. Risk scores are computed by combining probabilities of successful attacks with findings of impact models that predict cyber catastrophe consequences. To assess successful attacks, models emulating defense against threats can be used in topologies. CSGs consider widespread interconnectivity of cyber systems which forces defending all multi-step attack paths. In contrast, attackers just need one of the paths to succeed. CSGs are game-theoretic methods for identifying defense measures and reducing risks for systems and probe for maximum cyber risks using game formulations (MiniMax). To detect the impacts, the attacker player creates an attack tree for each state of the game using a modified Extreme Gradient Boosting Decision Tree (that sees numerous compromises ahead). Based on the findings, the proposed model has a high level of security for the web sources used in the experiment.

Management and Control Scheme for Next Generation Packet-Optical Transport Network (차세대 패킷광 통합망 관리 및 제어기술 연구)

  • Kang, Hyun-Joong;Kim, Hyun-Cheol
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.35-42
    • /
    • 2012
  • Increase of data traffic and the advent of new real-time services require to change from the traditional TDM-based (Time Division Multiplexing) networks to the optical networks that soft and dynamic configuration. Voice and lease line services are main service area of the traditional TDM-based networks. This optical network became main infrastructure that offer many channel that can convey data, video, and voice. To provide high resilience against failures, Packet-optical networks must have an ability to maintain an acceptable level of service during network failures. Fast and resource optimized lightpath restoration strategies are urgent requirements for the near future Packet-optical networks with a Generalized Multi-Protocol Label Switching(GMPLS) control plane. The goal of this paper is to provide packet-optical network with a hierarchical multi-layer recovery in order to fast and coordinated restoration in packet-optical network/GMPLS, focusing on new implementation information. The proposed schemes do not need an extension of optical network signaling (routing) protocols for support.

Multi Area Power Dispatch using Black Widow Optimization Algorithm

  • Girishkumar, G.;Ganesan, S.;Jayakumar, N.;Subramanian, S.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.113-130
    • /
    • 2022
  • Sophisticated automation-based electronics world, more electrical and electronic devices are being used by people from different regions across the universe. Different manufacturers and vendors develop and market a wide variety of power generation and utilization devices under different operating parameters and conditions. People use a variety of appliances which use electrical energy as power source. These appliances or gadgets utilize the generated energy in different ratios. Night time the utilization will be less when compared with day time utilization of power. In industrial areas especially mechanical industries or Heavy machinery usage regions power utilization will be a diverse at different time intervals and it vary dynamically. This always causes a fluctuation in the grid lines because of the random and intermittent use of these apparatus while the power generating apparatus is made to operate to provide a steady output. Hence it necessitates designing and developing a method to optimize the power generated and the power utilized. Lot of methodologies has been proposed in the recent years for effective optimization and economical load dispatch. One such technique based on intelligent and evolutionary based is Black Widow Optimization BWO. To enhance the optimization level BWO is hybridized. In this research BWO based optimize the load for multi area is proposed to optimize the cost function. A three type of system was compared for economic loads of 16, 40, and 120 units. In this research work, BWO is used to improve the convergence rate and is proven statistically best in comparison to other algorithms such as HSLSO, CGBABC, SFS, ISFS. Also, BWO algorithm best optimize the cost parameter so that dynamically the load and the cost can be controlled simultaneously and hence effectively the generated power is maximum utilized at different time intervals with different load capacity in different regions of utilization.

A Hybrid Multi-Level Feature Selection Framework for prediction of Chronic Disease

  • G.S. Raghavendra;Shanthi Mahesh;M.V.P. Chandrasekhara Rao
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.101-106
    • /
    • 2023
  • Chronic illnesses are among the most common serious problems affecting human health. Early diagnosis of chronic diseases can assist to avoid or mitigate their consequences, potentially decreasing mortality rates. Using machine learning algorithms to identify risk factors is an exciting strategy. The issue with existing feature selection approaches is that each method provides a distinct set of properties that affect model correctness, and present methods cannot perform well on huge multidimensional datasets. We would like to introduce a novel model that contains a feature selection approach that selects optimal characteristics from big multidimensional data sets to provide reliable predictions of chronic illnesses without sacrificing data uniqueness.[1] To ensure the success of our proposed model, we employed balanced classes by employing hybrid balanced class sampling methods on the original dataset, as well as methods for data pre-processing and data transformation, to provide credible data for the training model. We ran and assessed our model on datasets with binary and multivalued classifications. We have used multiple datasets (Parkinson, arrythmia, breast cancer, kidney, diabetes). Suitable features are selected by using the Hybrid feature model consists of Lassocv, decision tree, random forest, gradient boosting,Adaboost, stochastic gradient descent and done voting of attributes which are common output from these methods.Accuracy of original dataset before applying framework is recorded and evaluated against reduced data set of attributes accuracy. The results are shown separately to provide comparisons. Based on the result analysis, we can conclude that our proposed model produced the highest accuracy on multi valued class datasets than on binary class attributes.[1]

Security Level Decision Problem in MLP-based Secure OS (다중등급 보안 운영체제에서의 보안 등급 결정 문제)

  • Kang, Jung-Min;Shin, Wook;Park, Chun-Gu;Lee, Dong-Ik;Lee, Kyeong-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.943-946
    • /
    • 2001
  • 대부분의 안전한 운영체제는 주체와 객체에 보안 등급을 부여하여 운영하는 다중등급 정책(MLP: Multi-Level Policy)을 수용하고 있으며, BLP 모델은 이 정책을 표현하는 검증된 대표적인 모델이다. 하지만 이러한 다중 등급 보안 운영체제들은 접근 주체인 프로세스가 접근 객체로서 존재하는 등급화 된 프로그램을 실행 시 새로운 프로세스를 위한 보안 등급을 부여해야 하는데, 접근 주체와 접근 객체의 보안 등급이 다를 경우 보안 등급 결정 문제가 발생하며 정보보호의 목적에 위배되는 결과가 발생한다. 이에 본 논문에서는 위에 언급된 문제를 해결할 수 있는 방안을 BLP 모델 측면에서 고찰한다.

  • PDF

Efficient Peer-to-Peer Lookup in Multi-hop Wireless Networks

  • Shin, Min-Ho;Arbaugh, William A.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.1
    • /
    • pp.5-25
    • /
    • 2009
  • In recent years the popularity of multi-hop wireless networks has been growing. Its flexible topology and abundant routing path enables many types of applications. However, the lack of a centralized controller often makes it difficult to design a reliable service in multi-hop wireless networks. While packet routing has been the center of attention for decades, recent research focuses on data discovery such as file sharing in multi-hop wireless networks. Although there are many peer-to-peer lookup (P2P-lookup) schemes for wired networks, they have inherent limitations for multi-hop wireless networks. First, a wired P2P-lookup builds a search structure on the overlay network and disregards the underlying topology. Second, the performance guarantee often relies on specific topology models such as random graphs, which do not apply to multi-hop wireless networks. Past studies on wireless P2P-lookup either combined existing solutions with known routing algorithms or proposed tree-based routing, which is prone to traffic congestion. In this paper, we present two wireless P2P-lookup schemes that strictly build a topology-dependent structure. We first propose the Ring Interval Graph Search (RIGS) that constructs a DHT only through direct connections between the nodes. We then propose the ValleyWalk, a loosely-structured scheme that requires simple local hints for query routing. Packet-level simulations showed that RIGS can find the target with near-shortest search length and ValleyWalk can find the target with near-shortest search length when there is at least 5% object replication. We also provide an analytic bound on the search length of ValleyWalk.

Standards on the Effectiveness of the Rights to Social Security of People with Disability (장애인 사회보장수급권의 실효성 기준에 관한 연구)

  • Seo, Jeong-Hee
    • Korean Journal of Social Welfare
    • /
    • v.62 no.1
    • /
    • pp.211-235
    • /
    • 2010
  • This study attempts to examine standards on the effectiveness of the rights to social security of people with disability. The current research makes the standards on effectiveness of social security rights to the disabled. This standards draw four right areas and five general principles from debates about effectiveness of general social security rights and extend for applying three social area to the disabled. Four right areas are benefit coverage, benefit structure, benefit restriction and rights relief. Five general principles are enforceable rule principle, national finance principle, unconditional principle, adequacy principle and penalties principle. These four right areas and five general principles apply to three social security areas of income support, employment security and medical security. Measurement values are 'high' and 'low'. These measurement values divided into two that are used to ensure same intervals. This study on standards to the effectiveness of the rights to social security of people with disability has political and theoretical implications. First, in political aspects, these standards provide objective understanding of the present level of social security policies for the disabled. Second, theoretically the current study expands debates about the effectiveness of general social security through multi-disciplined research. At once this study is significant to establish empirical research foundation.

  • PDF