• Title/Summary/Keyword: Security Area

Search Result 1,688, Processing Time 0.027 seconds

A lightweight detection mechanism of control flow modification for IoT devices (IoT 기기를 위한 경량의 소프트웨어 제어 변조 탐지 기법)

  • Pak, Dohyun;Lee, JongHyup
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1449-1453
    • /
    • 2015
  • Constrained IoT devices cannot achieve full coverage of software attestation even though the integrity of software is critical. The limited modification attacks on control flow of software aim at the shadow area uncovered in software attestation processes. In this paper, we propose a light-weight protection system that detects modification by injecting markers to program code.

RN-ECC Based Fuzzy Vault for Protecting Fingerprint Templates

  • Lee, Dae-Jong;Shin, Yong-Nyuo;Park, Seon-Hong;Chun, Myung-Geun
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.11 no.4
    • /
    • pp.286-292
    • /
    • 2011
  • Biometrics systems are used in a wide range of areas, including the area of crime prevention, due to their unique characteristics. However, serious problems can occur if biometric information is disclosed to an unauthorized user. To address these issues, this paper proposes a real valued fuzzy vault method, which adopts a real number error correction code to implement a fuzzy vault scheme for protecting fingerprint temples. The proposed method provides the benefit of allowing the private key value to be changed at any time, unlike biometric template such as a fingerprint, which is not easily renewable even if its security has been breached. The validity of the proposed method is verified for fingerprint verification.

Evaluation Tool for Analyzing Method of the Information System (정보시스템 위험분석 평가도구)

  • Kim, Kang;Cho, Kyoung-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.773-777
    • /
    • 2007
  • Very various infusion by development of systems that is based on network is spread. Therefore, Evaluation Tool has been an active research area to reduce the risk from intrusion. On this thesis, during threat assesment, we have planned possible an equal-weight applied assesment and considering the characteristics of the organization an assesment which security factor's weight is variably applied to, and respective organizations to examine its security by itself in order to support the easy findings of the vulnerabilities on the management point of view, and to show the advices to practice.

  • PDF

Design and Implementation of Web-based Electronic Bidding System using XML (웹 기반의 XML을 활용한 전자 입찰 시스템의 설계 및 구현)

  • 윤선희
    • The Journal of Information Systems
    • /
    • v.10 no.1
    • /
    • pp.127-146
    • /
    • 2001
  • The area of business applications in the internet are extended enormously in result of fast development of computing and communication technologies, increase of internet use, and use of intranet/extranet in enterprise information system. Widely spread the use of the internet, there are various applications for Business to Business (B to B) or Business to Customer(B to C) model that are based on the intranet or extranet. This paper designed and implemented the Web-based Electronic Bidding System for Business to Business (B to B) model. The technical issues of electronic bidding system in the internet are involved in the connection between web client and server, electronic data interchange for the contract document, and security solution during the bidding and contracting processes. The web-based electronic bidding system in this paper is implemented using Java applet and servlet as a connection interface for web client and server, XML/EDI-based documents for a bid and a contract, and bidding server and notary server for enhancing the security using PKI(Public Key Infrastructure)-based public key cryptography, digital signature and Certification Authority(CA).

  • PDF

Design of Grid Network Management System using LDAP Authentication (LDAP 인증을 이용한 그리드 네트워크 관리 시스템의 설계)

  • 노민기;하지아;안성진
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.179-187
    • /
    • 2002
  • Grid is a infrastructure to connect heterogeneous resources that are scattered over areas with high-speed network and to cooperate with each other. To carry out Grid application, first, network resources should be managed, since the network has to be safe and reliable. GMA suggests an effective architecture for monitoring of resources that are scattered over a wide area. In this paper, basing on GMA, Grid network management system based on web for practical and general network management is designed. Grid network management system has to operate and connect various distributed management system. Using LDAP authentication, as one access system, Grid network management system maintain stability.

  • PDF

A Study on Memory Hacking Prevention System in Windows Environment (윈도우 환경에서의 메모리 해킹 방지 시스템 연구)

  • Kim, Yo-Sik;Yun, Young-Tae;Park, Sang-Seo
    • Convergence Security Journal
    • /
    • v.5 no.3
    • /
    • pp.75-86
    • /
    • 2005
  • Recently, illegal manipulation and forgery threats on computer softwares are increasing due to the advances in reverse engineering techniques. Furthermore someone who has concerns about these area can crack the software by using the open-to-public simple tools on the internet. The software companies are struggling to defend their own softwares against threats, while the crackers are continuing to crack the softwares. In this paper, we first establish the generic software threat model and, analyze and experiment on the software cracks, before suggest a memory hacking prevention system in Microsoft Windows environment.

  • PDF

정보보호 국제표준화 동향 및 향후 전망

  • Oh, Heung-Ryong;Youm, Heung-Youl
    • Review of KIISC
    • /
    • v.17 no.6
    • /
    • pp.93-105
    • /
    • 2007
  • 정보보호 분야의 국제표준화는 각 기술들의 특성 및 사용자들의 관점 등을 고려하여, 다양한 국제표준화기구에서 국제 표준개발 및 관련 연구가 이루어지고 있다. 즉, ITU-T SG17에서는 전기통신(Telecommunication) 관점에서 정보보호 응용기술들에 대한 국제표준화가 추진되고 있으며, ISO/IEC JTC1/SC27(정보보호), SC37(바이오인식)에서는 정보보호 원천 기술들에 대한 국제표준화와 IETF Security Area에서는 인터넷 서비스의 품질 보장 및 향상된 인터넷 환경 구축을 위해 실제적 구현 관점에서 국제표준화를 추진하고 있다. 또한, 아시아 지역에서는 각 국가 간에 정보보호 표준화 활동에 대한 정보공유 및 국제표준화 기구들에 대한 공동 대응을 위해 ASTAP, RAISS 포럼, CJK SWIS 등의 소규모 표준화 활동들이 이루어지고 있다. 본 논문에서는 대표적인 국제표준화 기구에서 이루어지고 있는 정보보호 표준화 현황 및 주요 이슈들에 대해 소개하고, 향후 추진방향 등을 제시하여, 국내에서 국제표준화기구에 활동하고자 하는 전문가들에 유용한 자료로 활용하고자 한다.

Design and Implementation of User authentication and Roaming Schemes in public WLAN environments (WLAN 서비스에서 사용자 인증과 로밍방식의 설계)

  • Kim, Dong-Ok;Kang, Dong-Jin
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.208-210
    • /
    • 2009
  • Currently, Wireless LAN(WLAN) service is widely deployed to provide high speed wireless Internet access through the mobile stations such as notebook and PDA. To provide enhanced security and user access control in the public WLAN area, WLAN access points should have the capability of IEEE 802.1x-based user authentication and authorization functionality. In this paper, we provide a brief understanding of IEEE 802.1x standards and related protocols like EAPOL(Extended Authentication Protocol Over LAN), EAP, RADIUS and describe how the IEEE 802.1x is designed and implemented in our embedded linux-based WLAN AP which is named i-WiNG. (Intelligent Wireless Internet Gateway). For the network security and user authenti -cation purposes, a supplicant who wants to access Internet should be authorized to access the AP port using the EAPOL.

  • PDF

Enhanced Network Intrusion Detection using Deep Convolutional Neural Networks

  • Naseer, Sheraz;Saleem, Yasir
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.10
    • /
    • pp.5159-5178
    • /
    • 2018
  • Network Intrusion detection is a rapidly growing field of information security due to its importance for modern IT infrastructure. Many supervised and unsupervised learning techniques have been devised by researchers from discipline of machine learning and data mining to achieve reliable detection of anomalies. In this paper, a deep convolutional neural network (DCNN) based intrusion detection system (IDS) is proposed, implemented and analyzed. Deep CNN core of proposed IDS is fine-tuned using Randomized search over configuration space. Proposed system is trained and tested on NSLKDD training and testing datasets using GPU. Performance comparisons of proposed DCNN model are provided with other classifiers using well-known metrics including Receiver operating characteristics (RoC) curve, Area under RoC curve (AuC), accuracy, precision-recall curve and mean average precision (mAP). The experimental results of proposed DCNN based IDS shows promising results for real world application in anomaly detection systems.

U.S. FUEL CYCLE TECHNOLOGIES R&D PROGRAM FOR NEXT GENERATION NUCLEAR MATERIALS MANAGEMENT

  • Miller, M.C.;Vega, D.A.
    • Nuclear Engineering and Technology
    • /
    • v.45 no.6
    • /
    • pp.803-810
    • /
    • 2013
  • The U.S. Department of Energy's Fuel Cycle Technologies R&D program under the Office of Nuclear Energy is working to advance technologies to enhance both the existing and future fuel cycles. One thrust area is in developing enabling technologies for next generation nuclear materials management under the Materials Protection, Accounting and Control Technologies (MPACT) Campaign where advanced instrumentation, analysis and assessment methods, and security approaches are being developed under a framework of Safeguards and Security by Design. An overview of the MPACT campaign's activities and recent accomplishments is presented along with future plans.