• Title/Summary/Keyword: Security Agents

Search Result 212, Processing Time 0.025 seconds

A PKI-based Secure Multiagent Engine (PKI 기반의 보안 다중 에이전트 엔진)

  • 장혜진
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.3 no.4
    • /
    • pp.319-324
    • /
    • 2002
  • The Integration of agent technology and security technology is needed to many application areas like electronic commerce. This paper suggests a model of extended multi-agent engine which supports privacy, integrity, authentication and non-repudiation on agent communication. Each agent which is developed with the agent engine is composed of agent engine layer and agent application layer. We describe and use the concepts self-to-self messages, secure communication channel, and distinction of KQML messages in agent application layer and messages in agent engine layer. The suggested agent engine provides an agent communication language which is extended to enable secure communication between agents without any modifications or restrictions to content layer and message layer of KQML. Also, in the model of our multi-agent engine, secure communication is expressed and processed transparently on the agent communication language.

  • PDF

The survey on the use of firearms & equipment in police and the protection of citizens' rights (경찰의 총기·장구 사용과 국민의 인권보호에 대한 실태연구)

  • Jeong, Jeong-ile
    • Convergence Security Journal
    • /
    • v.16 no.3_2
    • /
    • pp.43-54
    • /
    • 2016
  • Korea's police force has successfully performed its difficult mission of maintaining public order while overcoming difficulties at home and abroad during the past half century. However, the environment in which the forces of law a nd order operate has exponentially increased the demand for, and difficulties faced by, the agents of law enforcement in recent years because of the country's rapid globalization, as well as the move to democracy and localization, and the extensive developments in industrialization and information technology diffusion. This study also intends to investigate the appropriate limits of law enforcement and the use of force by policemen, and the general public's perception of the police as they fulfill their duty of protecting citizens' rights.

An Embedded Multi-Agent Based Healthcare Service with Two-way Handshaking Mode (무선 및 유선환경에서 임베디드 멀티에이전트 기반의 쌍방향 건강관리 서비스)

  • Md, Amiruzzaman;Kim, Hyoung-Joong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.5
    • /
    • pp.155-161
    • /
    • 2008
  • An automated healthcare monitoring is demand of time, lot of problems occurring just because of less monitoring of patients health condition on time. In this paper an embedded healthcare service is proposed by an iSCSI protocol on an automated multi-agent coordination by resource-constrained devices controlled system for healthcare service. The coordination between the resource constrained devices (e.g. PDA, SmartPhone, Tablet PC), and automated agents are maintained by a two-way handshaking mode iSCSI protocol. The automated health care control could be useable, and beneficial in the repetitive way. A fully centralized control is not applicable for this kind of approach.

GT-PSO- An Approach For Energy Efficient Routing in WSN

  • Priyanka, R;Reddy, K. Satyanarayan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.17-26
    • /
    • 2022
  • Sensor Nodes play a major role to monitor and sense the variations in physical space in various real-time application scenarios. These nodes are powered by limited battery resources and replacing those resource is highly tedious task along with this it increases implementation cost. Thus, maintaining a good network lifespan is amongst the utmost important challenge in this field of WSN. Currently, energy efficient routing techniques are considered as promising solution to prolong the network lifespan where multi-hop communications are performed by identifying the most energy efficient path. However, the existing scheme suffer from performance related issues. To solve the issues of existing techniques, a novel hybrid technique by merging particle swarm optimization and game theory model is presented. The PSO helps to obtain the efficient number of cluster and Cluster Head selection whereas game theory aids in finding the best optimized path from source to destination by utilizing a path selection probability approach. This probability is obtained by using conditional probability to compute payoff for agents. When compared to current strategies, the experimental study demonstrates that the proposed GTPSO strategy outperforms them.

R2NET: Storage and Analysis of Attack Behavior Patterns

  • M.R., Amal;P., Venkadesh
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.295-311
    • /
    • 2023
  • Cloud computing has evolved significantly, intending to provide users with fast, dependable, and low-cost services. With its development, malicious users have become increasingly capable of attacking both its internal and external security. To ensure the security of cloud services, encryption, authorization, firewalls, and intrusion detection systems have been employed. However, these single monitoring agents, are complex, time-consuming, and they do not detect ransomware and zero-day vulnerabilities on their own. An innovative Record and Replay-based hybrid Honeynet (R2NET) system has been developed to address this issue. Combining honeynet with Record and Replay (RR) technology, the system allows fine-grained analysis by delaying time-consuming analysis to the replay step. In addition, a machine learning algorithm is utilized to cluster the logs of attackers and store them in a database. So, the accessing time for analyzing the attack may be reduced which in turn increases the efficiency of the proposed framework. The R2NET framework is compared with existing methods such as EEHH net, HoneyDoc, Honeynet system, and AHDS. The proposed system achieves 7.60%, 9.78%%, 18.47%, and 31.52% more accuracy than EEHH net, HoneyDoc, Honeynet system, and AHDS methods.

Critical Assessment on Performance Management Systems for Health and Fitness Club using Balanced Score Card

  • Samina Saleem;Hussain Saleem;Abida Siddiqui;Umer Sheikh;Muhammad Asim;Jamshed Butt;Ali Muhammad Aslam
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.177-185
    • /
    • 2024
  • Web science, a general discipline of learning is presently at high demand of expertise with ideas to develop software-based WebApps and MobileApps to facilitate user or customer demand e.g. shopping etc. electronically with the access at their smartphones benefitting the business enterprise as well. A worldwide-computerized reservation network is used as a single point of access for reserving airline seats, hotel rooms, rental cars, and other travel related items directly or via web-based travel agents or via online reservation sites with the advent of social-web, e-commerce, e-business, from anywhere-on-earth (AoE). This results in the accumulation of large and diverse distributed databases known as big data. This paper describes a novel intelligent web-based electronic booking framework for e-business with distributed computing and data mining support with the detail of e-business system flow for e-Booking application architecture design using the approaches for distributed computing and data mining tools support. Further, the importance of business intelligence and data analytics with issues and challenges are also discussed.

A Study on the Protective Countermeasures through the Assassination Accident Analysis of Israeli Premier Yitzhak Rabin (라빈수상 위해사건 분석을 통한 경호적 대응방안)

  • Lee, Doo-Suck
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.221-242
    • /
    • 2008
  • Protection is to maximize the protectee's physical security by minimizing the threats and minimizing the damages caused by the threats. From this point of view, the assassination case of Israel's former Premier Yitzhak Rabin who devoted himself to proceed peace process in Middle East, on November 4, 1995, gives us a lot of lessons on protection. At that time, Israeli society was chaotic with anti-Rabin and anti-government demonstrations which is against Rabin's peace process, and they openly threatened to assassinate Premier Rabin. However, Shin Bet, Israeli Protective Agency, didn't reacted against the assassination threats effectively. Also they have to try to secure friendly public to widen the width of selection in case of crisis and to secure the credibility of the organization. They have to prevent harmful activities in advance by securing wide intelligence networks to collect and analyze various protective intelligences and preparing proper protective countermeasures. Intelligence is a basic element in protection and any protective measures not supported by intelligence activities are not useful and effective. Potential attackers study their target thoroughly and make an elaborate plan before their attack. Advance team is required to conduct security measures on a basis of analysis of vulnerability and threat factors, and close protection team should be prepared for the changing situations with crisis-consciousness. Is security, 100% perfection is not possible. However, Shin Bet failed to analyze and approach to the existing threats. They forgot the fact that security environment reflects social situations. Protection agents should be conscious of the fact that today is different from yesterday. So we have to expect what is not expected when not expected.

  • PDF

A Real-Time and Statistical Visualization Methodology of Cyber Threats Based on IP Addresses (IP 주소 기반 사이버공격 실시간 및 통계적 가시화 방법)

  • Moon, Hyeongwoo;Kwon, Taewoong;Lee, Jun;Ryou, Jaecheol;Song, Jungsuk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.465-479
    • /
    • 2020
  • Regardless of the domestic and foreign governments/companies, SOC (Security Operation Center) has operated 24 hours a day for the entire year to ensure the security for their IT infrastructures. However, almost all SOCs have a critical limitation by nature, caused from heavily depending on the manual analysis of human agents with the text-based monitoring architecture. Even though, in order to overcome the drawback, technologies for a comprehensive visualization against complex cyber threats have been studying, most of them are inappropriate for the security monitoring in large-scale networks. In this paper, to solve the problem, we propose a novel visual approach for intuitive threats monitoring b detecting suspicious IP address, which is an ultimate challenge in cyber security monitoring. The approach particularly makes it possible to detect, trace and analysis of suspicious IPs statistically in real-time manner. As a result, the system implemented by the proposed method is suitably applied and utilized to the real-would environment. Moreover, the usability of the approach is verified by successful detecting and analyzing various attack IPs.

A Study on Countermeasures against North Korea's Cyber Attack (북한 사이버공격에 대한 대응방안에 관한 연구)

  • Jung, Yeong Do;Jeong, Gi Seog
    • Convergence Security Journal
    • /
    • v.16 no.6_1
    • /
    • pp.43-50
    • /
    • 2016
  • As North Korea has a sufficient ability to attack our society's vulnerable computer network, various large-scale cyber attacks are expected to be tried. North Korea's cyber military strength is known a world-class level. The number of its cyber agents is increasing consistently. Recently North Korea's cyber attack has been made regardless of trick and target. But up to now North Korea's cyber attack is more of an exploration than a real attack. Its purpose was to check how fast Korea found a problem and recovered from it. In future, cyber attack that damages substantially is highly probable. In case of an attack against national infrastructure like traffic, financial and energy services, the extent of the damage will be great beyond imagination. In this paper, characteristics of recent North Korea's cyber attack is addressed in depth and countermeasures such as the enactment of cyber terror prevention law, simulation training enforcement, private and public cooperation system construction, cyber security infrastructure expansion, etc. are proposed.

Intrusion detection agents on the wireless network design (무선네트워크 상에서의 침입탐지 에이전트 설계)

  • Yun, Dong Sic
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.59-70
    • /
    • 2013
  • Along with the rapid development of the wireless network (Wireless Network) technology for secure wireless communications, security problems have emerged as an important issue. In order to operate the wireless network intrusion detection system detects the agent installed on each wireless node should be. Ad-hoc network structures scattered in the AP over a wireless network without the node is a structure that makes it possible to communicate to connect. Intrusion detection agent to be installed on the node, and the corresponding energy consumption occurs when the survival time is reduced. On a node that can monitor a lot of traffic in order to increase the effect of intrusion detection, an intrusion detection agent should be placed. Therefore, in this paper, by taking advantage of the structure of Ad-hoc wireless network, considering the maximum living time of the network, while at the same time, the effectiveness of intrusion detection and intrusion detection by proposing a plan for installing the agent. Also improve the system performance by reducing the network load on each network, a system designed for data aggregation to reduce data redundancy, network energy consumption by reducing.