• 제목/요약/키워드: Reputation based security

검색결과 38건 처리시간 0.02초

공공데이터와 감성분석을 이용한 대학평판시스템 (The College Reputation System using Public Data and Sentiment Analysis)

  • 김은아;이연식
    • 융합보안논문지
    • /
    • 제18권1호
    • /
    • pp.103-110
    • /
    • 2018
  • 현대 사회는 인터넷과 SNS를 통해 발생하는 복합적이며 대량의 데이터를 수집 집계 분석하는 빅데이터 처리 기술이 여러 분야에서 요구되고 있다. 그 중 대표적인 활용분야가 기업이나 대학에 대한 평판을 평가하는 평판시스템이다. 대학평판을 측정하고 수치화하기 위해서는 공정하고 객관적인 자료와 효율적인 데이터 처리가 무엇보다도 중요하다. 이를 위하여 공공데이터 지표를 활용하여 정량지수를 구하였고, 뉴스 기사를 활용한 감성분석을 통해서 정성지수를 구한 후 혼합 대학평판 지수를 산출하였다. 본 논문에서는 대학평판을 측정하기 위하여 정량지수로 객관성을 확보하면서 감성적 평판을 반영한 혼합 대학평판 지수를 산출하였고 이를 바탕으로 혼합 대학평판 시스템을 제안하였다.

  • PDF

P2P환경의 자기 평판 관리 시스템 (Self-Reputation System in P2P Networks)

  • 조남수;김우환;윤효진;이인석;천정희;김태성;진승헌;추경균
    • 정보보호학회논문지
    • /
    • 제14권2호
    • /
    • pp.35-47
    • /
    • 2004
  • 평판 기반 시스템(reputation-based system)은 현재 활발히 사용되고 있는 P2P(Peer-to-Peer) Network System에서 가장 주목받고 있는 인증 방식이다. 본 논문에서는 새로운 평판 기반 시스템인 Self-Reputation system을 제안한다. Self-Reputation system은 사용되어지는 P2P network에 무관하게 적용 가능하기 때문에, 여러 가지 P2P 네트워크에서의 평판을 하나로 통합 관리할 수 있는 방안을 제공한다. 또한, 이 시스템은 기존의 Xrep 방식에서 broadcast를 통해서 평판을 수렴하는 방법 대신 각 사용자들이 자신의 평판 테이블을 관리하도록 하여 평판을 알아보는 과정에서의 통신량을 현격하게 줄였고, 그 결과로 효율성을 크게 향상시켰다.

Palliates the Attack by Hacker of Android Application through UID and Antimalware Cloud Computing

  • Zamani, Abu Sarwar;Ahmad, Sultan;Uddin, Mohammed Yousuf;Ansari, Asrar Ahmad;Akhtar, Shagufta
    • International Journal of Computer Science & Network Security
    • /
    • 제21권8호
    • /
    • pp.182-186
    • /
    • 2021
  • The market for smart phones has been booming in the past few years. There are now over 400,000 applications on the Android market. Over 10 billion Android applications have been downloaded from the Android market. Due to the Android popularity, there are now a large number of malicious vendors targeting the platform. Many honest end users are being successfully hacked on a regular basis. In this work, a cloud based reputation security model has been proposed as a solution which greatly mitigates the malicious attacks targeting the Android market. Our security solution takes advantage of the fact that each application in the android platform is assigned a unique user id (UID). Our solution stores the reputation of Android applications in an anti-malware providers' cloud (AM Cloud). The experimental results witness that the proposed model could well identify the reputation index of a given application and hence its potential of being risky or not.

효과적인 보안관제를 위한 위협정보 우선순위 도출 (Analysis of Threat Information Priorities for Effective Security Monitoring & Control)

  • 강다연
    • 한국산업정보학회논문지
    • /
    • 제26권5호
    • /
    • pp.69-77
    • /
    • 2021
  • 본 논문에서는 기업의 IT시스템에 대한 위협에 대응하고자 하는 기업의 자산을 지켜주는데 매우 중요한 영역인 보안관제 위협정보를 확인하고자 한다. 보안관제는 보안 장비에서 발생한 이벤트, 로그를 중심으로 실시간 분석하여 위협을 판정하고 대응한다. 보안관제 업무에 있어서 우선적으로 위협정보를 평판정보와 분석정보로 구분하여 우선순위를 도출하고자 한다. 평판정보는 Hash, URL, IP, Domain으로 구성하였으며, 분석정보는 E-mail, CMD-Line, CVE, 공격동향정보로 구성하여 분석하였다. 연구결과, 평판정보의 우선순위가 상대적으로 높았으며 위협정보에 대한 정확성과 대응성을 높이는 것에 의의가 있다.

Binomial Distribution Based Reputation for WSNs: A Comprehensive Survey

  • Wei, Zhe;Yu, Shuyan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권10호
    • /
    • pp.3793-3814
    • /
    • 2021
  • Most secure solutions like cryptography are software based and they are designed to mainly deal with the outside attacks for traditional networks, but such soft security is hard to be implemented in wireless sensor networks to counter the inside attacks from internal malicious nodes. To address this issue, reputation has been introduced to tackle the inside malicious nodes. Reputation is essentially a stimulating mechanism for nodes' cooperation and is employed to detect node misbehaviors and improve the trust-worthiness between individual nodes. Among the reputation models, binomial distribution based reputation has many advantages such as light weight and ease of implementation in resource-constraint sensor nodes, and accordingly researchers have proposed many insightful related methods. However, some of them either directly use the modelling results, apply the models through simple modifications, or only use the required components while ignoring the others as an integral part of the whole model, this topic still lacks a comprehensive and systematical review. Thus the motivation of this study is to provide a thorough survey concerning each detailed functional components of binomial distribution based reputation for wireless sensor networks. In addition, based on the survey results, we also argue some open research problems and suggest the directions that are worth future efforts. We believe that this study is helpful to better understanding the reputation modeling mechanism and its components for wireless sensor networks, and can further attract more related future studies.

VANET 환경에서의 협력적 메시지 전달을 위한 블록체인 기반 평판 시스템 (A Reputation System based on Blockchain for Collaborative Message Delivery over VANETs)

  • 이경모;이경현
    • 한국멀티미디어학회논문지
    • /
    • 제21권12호
    • /
    • pp.1448-1458
    • /
    • 2018
  • Vehicular Ad-Hoc Networks (VANETs) have become one of the active areas of research, standardization, and development because they have tremendous potentials to improve vehicle and road safety, traffic efficiency, and convenience as well as comfort to both drivers and passengers. However, message trustfulness is a challenge because the propagation of false message by malicious vehicles induces unreliable and ineffectiveness of VANETs, Therefore, we need a reliable reputation method to ensure message trustfulness. In this paper, we consider a vulnerability against the Sybil attack of the previous reputation systems based on blockchain and suggest a new reputation system which resists against Sybil attack on the previous system. We propose an initial authentication process as a countermeasure against a Sybil attack and provide a reliable reputation with a cooperative message delivery to cope with message omission. In addition, we use Homomorphic Commitment to protect the privacy breaches in VANETs environment.

Trust based Secure Reliable Route Discovery in Wireless Mesh Networks

  • Navmani, TM;Yogesh, P
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권7호
    • /
    • pp.3386-3411
    • /
    • 2019
  • Secured and reliable routing is a crucial factor for improving the performance of Wireless Mesh Networks (WMN) since these networks are susceptible to many types of attacks. The existing assumption about the internal nodes in wireless mesh networks is that they cooperate well during the forwarding of packets all the time. However, it is not always true due to the presence of malicious and mistrustful nodes. Hence, it is essential to establish a secure, reliable and stable route between a source node and a destination node in WMN. In this paper, a trust based secure routing algorithm is proposed for enhancing security and reliability of WMN, which contains cross layer and subject logic based reliable reputation scheme with security tag model for providing effective secured routing. This model uses only the trusted nodes with the forwarding reliability of data transmission and it isolates the malicious nodes from the providing path. Moreover, every node in this model is assigned with a security tag that is used for efficient authentication. Thus, by combining authentication, trust and subject logic, the proposed approach is capable of choosing the trusted nodes effectively to participate in forwarding the packets of trustful peer nodes successfully. The simulation results obtained from this work show that the proposed routing protocol provides optimal network performance in terms of security and packet delivery ratio.

A Security Model based on Reputation and Collaboration through Route-Request in Mobile Ad Hoc Networks

  • Anand, Anjali;Rani, Rinkle;Aggarwal, Himanshu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권11호
    • /
    • pp.4701-4719
    • /
    • 2015
  • A Mobile Ad hoc Network (MANET) consists of mobile nodes which co-operate to forward each other's packets without the presence of any centralized authority. Due to this lack of centralized monitoring authority, MANETs have become vulnerable to various kinds of routing misbehaviour. Sometimes, nodes exhibit non-cooperating behaviour for conserving their own resources and exploiting others' by relaying their traffic. A node may even drop packets of other nodes in the guise of forwarding them. This paper proposes an efficient Reputation and Collaboration technique through route-request for handling such misbehaving nodes. It lays emphasis not only on direct observation but also considers the opinion of other nodes about misbehaving nodes in the network. Unlike existing schemes which generate separate messages for spreading second-hand information in the network, nodes purvey their opinion through route-request packet. Simulation studies reveal that the proposed scheme significantly improves the network performance by efficiently handling the misbehaving nodes in the network.

PRI: A Practical Reputation-based Incentive Scheme for Delay Tolerant Networks

  • Zhang, Xi;Wang, Xiaofei;Liu, Anna;Zhang, Quan;Tang, Chaojing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권4호
    • /
    • pp.973-988
    • /
    • 2012
  • Delay tolerant networks (DTNs) characterized by the lack of guaranteed end-to-end paths exploit opportunistic data forwarding mechanism, which depends on the hypothesis that nodes are willing to store, carry, and forward the in-transit messages in an opportunistic way. However, this hypothesis might easily be violated by the presence of selfish nodes constrained with energy, bandwidth, and processing power. To address this problem, we propose a practical reputation-based incentive scheme, named PRI, to stimulate honest forwarding and discipline selfish behavior. A novel concept of successful forwarding credential and an observation protocol are presented to cope with the detection of nodes' behavior, and a reputation model is proposed to determine egoistic individuals. The simulation results demonstrate the effectiveness and practicality of our proposal.

민간경비업체의 관계적 특성과 구매행동의 관계 (A Study on Correlations between Private Security Enterprise's Relationship Characteristics and Purchasing Behaviors)

  • 김인재;조성진
    • 시큐리티연구
    • /
    • 제29호
    • /
    • pp.35-57
    • /
    • 2011
  • 본 연구는 민간경비업체와 소비자들의 관계적 특성과 구매행동의 인과관계를 규명하여 무한 경쟁에 도립하고 있는 민간경비업체도 소비자의 필요와 욕구를 파악하여 최상의 서비스를 제공할 수 있는 마케팅 전략을 모색하는데 연구의 목적이 있다. 이러한 목적 달성을 위하여 연구대상은 충남 천안시를 동남과 동서로 나누어 민간경비업체를 이용하고 있는 상점 직원을 대상으로 편의표집법으로 236명을 표집하였다. 조사도구는 설문지로서 국내 외 선행연구를 기초로 하여 재구성하여 사용하였으며, 자료 처리는 SPSS version 18.0 통계패키지를 이용하여 빈도분석, 신뢰도분석, 요인분석, 상관관계분석, 회귀분석을 실시하였다. 이상의 연구방법과 절차에 따른 자료 분석을 통하여 다음과 같은 결론을 얻었다. 첫째, 민간경비업체의 관계적 특성과 구매행동 관계는 정(+)의 상관관계를 보이고 있어, 관계적 특성이 높을수록 구매행동은 높아진다. 둘째, 민간경비업체의 관계적 특성과 구매행동의 관계를 분석한 결과 평판, 물리적 특성, 커뮤니케이션은 구전활동에 영향을 미친다. 셋째, 민간경비업체의 관계적 특성과 반복구매의 관계를 분석한 결과 평판과 커뮤니케이션은 반복구매에 영향을 미친다.

  • PDF