• Title/Summary/Keyword: Securing web application

Search Result 8, Processing Time 0.025 seconds

Web Monitoring based Encryption Web Traffic Attack Detection System (웹 모니터링 기반 암호화 웹트래픽 공격 탐지 시스템)

  • Lee, Seokwoo;Park, Soonmo;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.3
    • /
    • pp.449-455
    • /
    • 2021
  • This paper proposes an encryption web transaction attack detection system based on the existing web application monitoring system. Although there was difficulty in detecting attacks on the encrypted web traffic because the existing web traffic security systems detect and defend attacks based on encrypted packets in the network area of the encryption section between the client and server, by utilizing the technology of the web application monitoring system, it is possible to detect various intelligent cyber-attacks based on information that is already decrypted in the memory of the web application server. In addition, since user identification is possible through the application session ID, statistical detection of attacks such as IP tampering attacks, mass web transaction call users, and DDoS attacks are also possible. Thus, it can be considered that it is possible to respond to various intelligent cyber attacks hidden in the encrypted traffic by collecting and detecting information in the non-encrypted section of the encrypted web traffic.

On Securing Web-based Educational Online Gaming: Preliminary Study

  • Yani, Kadek Restu;Prihatmanto, Ary Setijadi;Rhee, Kyung-Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.767-770
    • /
    • 2015
  • With the deployment of web-based educational game over the internet, the user's registration becomes a critical element. The user is authenticated by the system using username, password, and unique code. However, it cannot be handled properly because the data is transmitted through insecure channel on the network. Hence, security requirement is needed to avoid identity leakage from malicious user. In this paper, we propose a secure communication approach using SSL protocol for an online game. We also describe the security requirements for our approach. In future work, we intend to configure and implement the SSL protocol by enabling HTTPS in web-based online game.

A Study on The e-Business Strategy and Corporate Performance (e-비즈니스 전략유형과 기업성과에 관한 연구)

  • Kim, Hee-Cheol;Moon, Young-Ja
    • International Commerce and Information Review
    • /
    • v.9 no.3
    • /
    • pp.33-57
    • /
    • 2007
  • This study tests e-business performance difference of the inter group by strategy type through the cluster analysis, after confirming the linear relationship between the e-business strategy type and its performance. According to the result of the study the effect on the e-business performance reveals to differ by the e-business strategy type. That is to say, while the firm's information system performance, e-business realization and the inter group competition dominance are affected positively by the e-process strategy, web application strategy and customer attracting strategy. This confirms that the information system performance, the realization performance and the competition dominance are affected by e - business strategy type. The key factor leading to the success of e-business is the commitment of e-process strategy and web application strategy. For the case of the customer attracting strategy the result shows the importance of the strategy. In the cluster group analysis, the additional analysis, the effect is seen to be more powerful in the firm's information system performance, e - business realization and securing the competition advantage for the case of the multiple strategy than that of single one. Accordingly, the firm needs to adopt the multiple strategy suited for the characteristic of the firm rather than the single strategy.

  • PDF

Pi Logger : Low-cost Greenhouse Image and Environmental Data Collection System for Invigorating Smart Farm Propagation (Pi Logger : 스마트 팜 보급 확대를 위한 저가형 온실 영상 및 환경 데이터 수집 시스템)

  • Seong, Gi-Cheon;Kim, Young-Geun;Yang, Won-Mo;Kim, Won-Jung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.11
    • /
    • pp.1121-1128
    • /
    • 2016
  • Our country of agriculture suffers problems such as aging, population decline, agricultural decline etc. To solve this problem, in the country, it is interest in Smart Farm System, a convenient and efficient system for the production through the convergence of ICT technology and agriculture. However, because of expensive construction costs and difficulty in securing human resources and training for Operating system, they are struggling to spread the actual farmers. Therefore, it is necessary to develop smart farm techniques suitable for such customized domestic environment. This study designed a system for collecting environment date in a greenhouse based on the low-cost embedded devices, and designed and implemented for the Web application that a user can easily use system. The implementation of the system lowers deployment costs and is expected to increase largely the spread of Smart Farm it can be easily accessed by using the smart phone.

Development of Standard Protocol-based Healthcare Services for Optimized Health Management (최적화된 건강관리를 위한 표준 프로토콜 기반 헬스케어 서비스 개발)

  • Park, Hyun-Sang;Kim, Hyun-Young;Kim, Hwa-Sun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.67 no.7
    • /
    • pp.969-975
    • /
    • 2018
  • The purpose of this study is to develop a healthcare service based on standard protocol and information communication technology for mother's sustainable postpartum care. The developed service was consisted of a client area where mothers measure, manage and transmit their vital signs using their own smartphone and personal health devices, and a server area that manages and shares with the received mother's vital signs and the results of examination results and personal health records. The client area collects vital signs through the IEEE 11073 Personal Health Device (PHD) using the m-health application of the previous study and Continua Health alliance certified personal health devices and transfers to Health Level Seven (HL7) V2.4, Continuity of Care Record (CCR) and Continuity of Care Document (CCD). The server area consists of a mobile web that manages and shares the HL7 Fast Healthcare Interoperability Resources (FHIR)-compliant personal health records to ensure interoperability of examination results, and a mobile web where the postpartum caregiver enters and manages the results of the mother's examination results and provides it to the mother. In this way, the healthcare service of this study securing continued exchanges between the mother and postpartum caregiver improves the quality of life of the mother not only to satisfy the needs of the mother who was discharged but also through self-management and postpartum. In the future, we will conduct a study applying mothers and postpartum caregiver after approval of a clinical trail at a university hospital to evaluate developed healthcare services.

Comparative Reliability Evaluation on Semantic Service Platforms (시맨틱 서비스 플랫폼상에서의 신뢰성 비교 평가)

  • Jung, Han-Min;Lee, Mi-Kyoung;You, Beom-Jong;Kim, Do-Wan
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.1
    • /
    • pp.105-109
    • /
    • 2010
  • While numerous information services are provided on the Web as a core infrastructure of information society, semantic services using the Semantic Web technologies still stay deployed number and application range. This situation would be mainly originated from the failure of securing reliability to the user. Thus, this paper introduces an evaluation method for measuring reliabilities of the semantic services comparatively. To measure the reliability of the compared systems, the observer assesses 'precision in task performance' as a quantitative analysis and 'reliability of expectation-result' as a qualitative analysis described by the test persons. On the other hand, the test person should rate the functional reliability and reliability of the served information on the vector graph by himself with a scale from 0 to 5. Experimental results show that assessment by the observer is very similar to rating value by test persons, and that the accuracy of the served information has a close effect on the functional reliability. Through this paper, we can verify the essential factors for evaluating the reliability of semantic service systems. These are functional reliability and reliability of served information resulting from function execution. In particular, it has been proven that the reliability of the semantic information services largely influences the "Quality in Use" and therefore determines the major factors of the semantic service reliability.

Efficient Authorization Conflict Detection Using Prime Number Graph Labeling in RDF Access Control (RDF 접근 제어에서 소수 그래프 레이블링을 사용한 효율적 권한 충돌 발견)

  • Kim, Jae-Hoon;Park, Seog
    • Journal of KIISE:Databases
    • /
    • v.35 no.2
    • /
    • pp.112-124
    • /
    • 2008
  • RDF and OWL are the primary base technologies for implementing Semantic Web. Recently, many researches related with them, or applying them into the other application domains, have been introduced. However, relatively little work has been done for securing the RDF and OWL data. In this article, we briefly introduce an RDF triple based model for specifying RDF access authorization related with RDF security. Next, to efficiently find the authorization conflict by RDF inference, we introduce a method using prime number graph labeling in detail. The problem of authorization conflict by RDF inference is that although the lower concept is permitted to be accessed, it can be inaccessible due to the disapproval for the upper concept. Because by the RDF inference, the lower concept can be interpreted into the upper concept. Some experimental results show that the proposed method using the prime number graph labeling has better performance than the existing simple method for the detection of the authorization conflict.

Effects of firm strategies on customer acquisition of Software as a Service (SaaS) providers: A mediating and moderating role of SaaS technology maturity (SaaS 기업의 차별화 및 가격전략이 고객획득성과에 미치는 영향: SaaS 기술성숙도 수준의 매개효과 및 조절효과를 중심으로)

  • Chae, SeongWook;Park, Sungbum
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.3
    • /
    • pp.151-171
    • /
    • 2014
  • Firms today have sought management effectiveness and efficiency utilizing information technologies (IT). Numerous firms are outsourcing specific information systems functions to cope with their short of information resources or IT experts, or to reduce their capital cost. Recently, Software-as-a-Service (SaaS) as a new type of information system has become one of the powerful outsourcing alternatives. SaaS is software deployed as a hosted and accessed over the internet. It is regarded as the idea of on-demand, pay-per-use, and utility computing and is now being applied to support the core competencies of clients in areas ranging from the individual productivity area to the vertical industry and e-commerce area. In this study, therefore, we seek to quantify the value that SaaS has on business performance by examining the relationships among firm strategies, SaaS technology maturity, and business performance of SaaS providers. We begin by drawing from prior literature on SaaS, technology maturity and firm strategy. SaaS technology maturity is classified into three different phases such as application service providing (ASP), Web-native application, and Web-service application. Firm strategies are manipulated by the low-cost strategy and differentiation strategy. Finally, we considered customer acquisition as a business performance. In this sense, specific objectives of this study are as follows. First, we examine the relationships between customer acquisition performance and both low-cost strategy and differentiation strategy of SaaS providers. Secondly, we investigate the mediating and moderating effects of SaaS technology maturity on those relationships. For this purpose, study collects data from the SaaS providers, and their line of applications registered in the database in CNK (Commerce net Korea) in Korea using a questionnaire method by the professional research institution. The unit of analysis in this study is the SBUs (strategic business unit) in the software provider. A total of 199 SBUs is used for analyzing and testing our hypotheses. With regards to the measurement of firm strategy, we take three measurement items for differentiation strategy such as the application uniqueness (referring an application aims to differentiate within just one or a small number of target industry), supply channel diversification (regarding whether SaaS vendor had diversified supply chain) as well as the number of specialized expertise and take two items for low cost strategy like subscription fee and initial set-up fee. We employ a hierarchical regression analysis technique for testing moderation effects of SaaS technology maturity and follow the Baron and Kenny's procedure for determining if firm strategies affect customer acquisition through technology maturity. Empirical results revealed that, firstly, when differentiation strategy is applied to attain business performance like customer acquisition, the effects of the strategy is moderated by the technology maturity level of SaaS providers. In other words, securing higher level of SaaS technology maturity is essential for higher business performance. For instance, given that firms implement application uniqueness or a distribution channel diversification as a differentiation strategy, they can acquire more customers when their level of SaaS technology maturity is higher rather than lower. Secondly, results indicate that pursuing differentiation strategy or low cost strategy effectively works for SaaS providers' obtaining customer, which means that continuously differentiating their service from others or making their service fee (subscription fee or initial set-up fee) lower are helpful for their business success in terms of acquiring their customers. Lastly, results show that the level of SaaS technology maturity mediates the relationships between low cost strategy and customer acquisition. That is, based on our research design, customers usually perceive the real value of the low subscription fee or initial set-up fee only through the SaaS service provide by vender and, in turn, this will affect their decision making whether subscribe or not.