• Title/Summary/Keyword: Prevention Information Communication

Search Result 556, Processing Time 0.026 seconds

Intelligent Intrusion Detection and Prevention System using Smart Multi-instance Multi-label Learning Protocol for Tactical Mobile Adhoc Networks

  • Roopa, M.;Raja, S. Selvakumar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2895-2921
    • /
    • 2018
  • Security has become one of the major concerns in mobile adhoc networks (MANETs). Data and voice communication amongst roaming battlefield entities (such as platoon of soldiers, inter-battlefield tanks and military aircrafts) served by MANETs throw several challenges. It requires complex securing strategy to address threats such as unauthorized network access, man in the middle attacks, denial of service etc., to provide highly reliable communication amongst the nodes. Intrusion Detection and Prevention System (IDPS) undoubtedly is a crucial ingredient to address these threats. IDPS in MANET is managed by Command Control Communication and Intelligence (C3I) system. It consists of networked computers in the tactical battle area that facilitates comprehensive situation awareness by the commanders for timely and optimum decision-making. Key issue in such IDPS mechanism is lack of Smart Learning Engine. We propose a novel behavioral based "Smart Multi-Instance Multi-Label Intrusion Detection and Prevention System (MIML-IDPS)" that follows a distributed and centralized architecture to support a Robust C3I System. This protocol is deployed in a virtually clustered non-uniform network topology with dynamic election of several virtual head nodes acting as a client Intrusion Detection agent connected to a centralized server IDPS located at Command and Control Center. Distributed virtual client nodes serve as the intelligent decision processing unit and centralized IDPS server act as a Smart MIML decision making unit. Simulation and experimental analysis shows the proposed protocol exhibits computational intelligence with counter attacks, efficient memory utilization, classification accuracy and decision convergence in securing C3I System in a Tactical Battlefield environment.

Factors Influencing University Students' Infection Prevention Behaviors Compliance in the Early Stage of COVID-19 (코로나19 초기 유행 시기에서 대학생의 감염예방행위 수행도에 미치는 영향 요인)

  • Lee, Hyunju;Park, Jinhee;Kim, Jihye;Kang, Purum
    • Journal of the Korean Society of School Health
    • /
    • v.34 no.3
    • /
    • pp.190-199
    • /
    • 2021
  • Purpose: The study aims to identify factors that influence university students' compliance with infection prevention behaviors in the early stage of COVID-19. Methods: A survey was conducted online from July 29 to August 2, 2020, involving 261 students enrolled in general universities. Frequency analysis, descriptive statistics, t-test, ANOVA, correlation, and multiple regression analysis were carried out on the collected data using SPSS 24.0. Results: The average score of university students' risk perception of COVID-19 was 3.80, while the average score of health risk communication was 3.92. The average score of efficacy beliefs was 4.42 and the average score of practicing infection prevention behaviors was 4.54. Factors influencing the level of infection prevention behaviors were efficacy of preventive behaviors (β=.48 p<.001), health risk communication (β=.16, p=.003), subjective health status (β=.12, p=.015), and the type of college (β=.11, p=.041). Conclusion: In order to improve college students' infection prevention behaviors related to COVID-19, consideration should be given to providing interventions that focus on accurate knowledge and dissemination of accurate information about new infectious diseases and effectiveness of infection preventive behaviors.

A Study on Construction of Crime Prevention System using Big Data in Korea (한국에서 빅데이터를 활용한 범죄예방시스템 구축을 위한 연구)

  • Kim, SungJun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.5
    • /
    • pp.217-221
    • /
    • 2017
  • Proactive prevention is important for crime. Past crimes have focused on coping after death and punishing them. But with Big Data technology, crime can be prevented spontaneously. Big data can predict the behavior of criminals or potential criminals. This article discusses how to build a big data system for crime prevention. Specifically, it deals with the way to combine unstructured data of big data with basic form data, and as a result, designs crime prevention system. Through this study, it is expected that the possibility of using big data for crime prevention is described through fingerprints, and it is expected to help crime prevention program and research in future.

A Study on the DHCP Supporting Network Attack Prevention (네트워크 공격 방지를 지원하는 DHCP에 관한 연구)

  • Kim, Moon-Gi;Jeong, Da-Hye;Lee, Jae-Won;Yoo, Kwon-Jeong;Kim, Eun-Gi
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.640-642
    • /
    • 2015
  • DHCP(Dynamic Host Configuration Protocol)는 TCP/IP 통신을 실행하기 위해 필요한 IP 주소 및 관련된 세부 구성 정보를 자동적으로 할당한다. 기존의 DHCP는 서버와 클라이언트 간 상호 인증 체계가 없어서 다양한 네트워크 공격에 취약하다. 본 논문에서는 기존 DHCP 메시지 옵션에 네트워크 공격을 방지할 수 있도록 지원하는 옵션을 추가하였다. DHCP 통신 과정에서 ECDSA와 HMAC 알고리즘 등을 이용하여 메시지의 무결성을 보장하고 서버와 클라이언트 간 상호 인증을 수행한다.

Drowsiness detection and prevention with RaspberryPi (라즈베리파이를 이용한 졸음운전 감지 및 예방)

  • Seo, Ju-Won;Roh, Wan-Tae;Lee, Sang-Rak;Jeong, Rae-Hoon;Kim, Woongsup
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.220-223
    • /
    • 2020
  • 한국도로공사가 제공하는 자료에 따르면 운전자 4명 중 1명은 졸음운전을 경험해 보았다고 말한다. 또한, 졸음운전 사고의 치사율은 건당 4명으로 전체 교통사고 치사율의 2배이며, 그 위험성은 음주운전보다 크다고 알려져 있다. 이러한 문제를 해결하기 위해 졸음운전 감지 시스템이 국내외에서 활발히 연구되고 있다. 본 논문에서는 졸음운전 감지 시스템과 더불어 졸음운전을 예방하는 시스템을 제안하고자 한다.

Determinants of Health Information-Seeking Behavior: Implications for Post-Treatment Cancer Patients

  • Jung, Minsoo
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.16
    • /
    • pp.6499-6504
    • /
    • 2014
  • Health information-seeking behavior (HISB) is active need-fulfillment behavior whereby health information is obtained from diverse sources, such as the media, and has emerged as an important issue within the transforming medical environment and the rise of medical consumers. However, little is known about the factors that affect HISB and its associations, and the health outcome of HISB. The aim of this study was to examine individual and social contextual factors associated with HISB and to systematically review their effects on health status among post-treatment cancer patients. Individual determinants of HISB included demographic factors, psychosocial factors, perceived efficacy and norms, and health beliefs. Contextual determinants of HISB encompassed community characteristics, neighborhood social capital, and media advocacy. Improving through factors on these two levels, HISB raised individuals' self-care management skills and medical treatment compliance, and enhanced shared decision-making and medical treatment satisfaction. Moreover, because HISB can differ according to individuals' social contextual conditions, it can give rise to communication inequalities. Because these can ultimately lead to health disparities between groups, social interest in HISB and balanced HISB promotion strategies are necessary.

A Study on Lost Child Prevention Service Using LBS and Map Information (LBS와 지도 정보를 이용한 미아방지 서비스에 관한 연구)

  • Kim, Seung-Jae;Jung, Chai-Yeoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.6
    • /
    • pp.181-186
    • /
    • 2017
  • Child crimes such as child abduction and lost children(MIA) have long been pointed out as social problems. However, there are few ways to solve these problems. According to MIA statistics, about 3,000 babies are lost each year. This paper presents a study on prevention of lost children ratio using mobile LBS in order to reduce the incidence of lost children ratio in dense space. First, we input the personal information of the child and the contact information of the parent. Second, we use the Google Maps API to get the location (parent's location, child's location) information. Third, the personal information of the child and the parent is indicated in the obtained location information. In future research, based on SNS, we will carry out research on sending child location information and parent location information via SMS. It is expected that the prevention system of lost child using LBS and SNS will make a great contribution to reduce the lost children ratio in the ubiquitous society.

A Study on Correlation Analysis of Smart Phone Addiction and Age Groups in Korea

  • Jun, Woochun
    • International journal of advanced smart convergence
    • /
    • v.9 no.4
    • /
    • pp.106-114
    • /
    • 2020
  • As information and communication technology develops, it brings various benefits to our lives. However, information and communication technology has had various side effects in our lives. Representative side effects include internet addiction, smartphone addiction, copyright violation, personal information infringement, cyber bullying and hacking. Recently, smart phone addiction rate is increasing with the spread of smart devices in Korea. In this study, we analyze the correlation between age group and smartphone addiction. In order to obtain fair and objective results, statistical analysis was performed based on the national statistical data of the National Information Society Agency. The results showed that the infant group and the adult group were correlated with the smartphone addiction rate. In this study, we analyzed the causes of smartphone addiction for different age groups. We also discuss dangers of smartphone addiction for different age groups. In additions, we proposed various ways to prevent and cure smartphone addiction for infants, adults, and senior citizen group. The results of this study are expected to be widely used as a remedy for smartphone addiction and future smartphone addiction research works.

ARP Modification for Prevention of IP Spoofing

  • Kang, Jung-Ha;Lee, Yang Sun;Kim, Jae Young;Kim, Eun-Gi
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.3
    • /
    • pp.154-160
    • /
    • 2014
  • The address resolution protocol (ARP) provides dynamic mapping between two different forms of addresses: the 32-bit Internet protocol (IP) address of the network layer and the 48-bit medium access control (MAC) address of the data link layer. A host computer finds the MAC address of the default gateway or the other hosts on the same subnet by using ARP and can then send IP packets. However, ARP can be used for network attacks, which are one of the most prevalent types of network attacks today. In this study, a new ARP algorithm that can prevent IP spoofing attacks is proposed. The proposed ARP algorithm is a broadcast ARP reply and an ARP notification. The broadcast ARP reply was used for checking whether the ARP information was forged. The broadcast ARP notification was used for preventing a normal host's ARP table from being poisoned. The proposed algorithm is backward compatible with the current ARP protocol and dynamically prevents any ARP spoofing attacks. In this study, the proposed ARP algorithm was implemented on the Linux operating system; here, we present the test results with respect to the prevention of ARP spoofing attacks.

Design and Implementation of The Spam E-Mail filtering System (스팸메일 차단 시스템 설계 및 구현)

  • 김진만;장종욱
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.413-417
    • /
    • 2002
  • E-mail was very particular way of communication in the past, but it becomes one of daily communication methods now. Due to E-mail has a property which is not complete for security, sometimes it is used for purpose of commercial or badthings, therefore it becomes the latest problem to keep off a Spam-mail and commercial advertising E-mail, many ways to keep off were perposed for it. In this paper, I explained how to sort and keep off these Spam-mail and commercial advertising E-mail with three way, prevention by server level, prevention by construction of network level, prevention by client level. we designed a prevention system for Spam-mail and implemented it by Visual Basic.

  • PDF