• Title/Summary/Keyword: Security Area

Search Result 1,688, Processing Time 0.023 seconds

The Status of the Bring Your Own Device (BYOD) in Saudi Arabia: Dataset

  • Khalid A. Almarhabi;Adel A. Bahaddad;Ahmed M. Alghamdi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.203-209
    • /
    • 2023
  • The paper brings across data that is utilized in the Bring Your Own Device (BYOD) status collected between February and April of 2021 across Saudi Arabia. The data set was collected using questionnaires established through online mechanisms for the respondents. In the questionnaire, personal details included five questions while seven questions addressed the working model of personal mobile devices. Six questions addressed the awareness of employees bring your own device awareness for employees comprised seven questions and two questions addressed the benefits of business achievements. In the identification of suitable respondents for the research, two approaches were applied. The research demanded that the respondents be Saudi Arabian nationals and have attained 18 years. Snowball and purposive techniques were applied in the collection of information from a wide area of Saudi Arabia while employing social media approaches that include the use of WhatsApp and emails in the collection of data. The approach ensured the collection of data from 857 respondents used in the identification of the status as well as issues across the BYOD environment and accompanying solutions. The data was also used in the provision of awareness in the community through short-term courses, cyber security training and awareness programs. The results of the research are therefore applicable to the context of the Saudi Arabian country that is currently facing issues in dealing with the application of personal devices in the work environment.

Malware Detection Using Deep Recurrent Neural Networks with no Random Initialization

  • Amir Namavar Jahromi;Sattar Hashemi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.177-189
    • /
    • 2023
  • Malware detection is an increasingly important operational focus in cyber security, particularly given the fast pace of such threats (e.g., new malware variants introduced every day). There has been great interest in exploring the use of machine learning techniques in automating and enhancing the effectiveness of malware detection and analysis. In this paper, we present a deep recurrent neural network solution as a stacked Long Short-Term Memory (LSTM) with a pre-training as a regularization method to avoid random network initialization. In our proposal, we use global and short dependencies of the inputs. With pre-training, we avoid random initialization and are able to improve the accuracy and robustness of malware threat hunting. The proposed method speeds up the convergence (in comparison to stacked LSTM) by reducing the length of malware OpCode or bytecode sequences. Hence, the complexity of our final method is reduced. This leads to better accuracy, higher Mattews Correlation Coefficients (MCC), and Area Under the Curve (AUC) in comparison to a standard LSTM with similar detection time. Our proposed method can be applied in real-time malware threat hunting, particularly for safety critical systems such as eHealth or Internet of Military of Things where poor convergence of the model could lead to catastrophic consequences. We evaluate the effectiveness of our proposed method on Windows, Ransomware, Internet of Things (IoT), and Android malware datasets using both static and dynamic analysis. For the IoT malware detection, we also present a comparative summary of the performance on an IoT-specific dataset of our proposed method and the standard stacked LSTM method. More specifically, of our proposed method achieves an accuracy of 99.1% in detecting IoT malware samples, with AUC of 0.985, and MCC of 0.95; thus, outperforming standard LSTM based methods in these key metrics.

An Experimental Study on AutoEncoder to Detect Botnet Traffic Using NetFlow-Timewindow Scheme: Revisited (넷플로우-타임윈도우 기반 봇넷 검출을 위한 오토엔코더 실험적 재고찰)

  • Koohong Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.4
    • /
    • pp.687-697
    • /
    • 2023
  • Botnets, whose attack patterns are becoming more sophisticated and diverse, are recognized as one of the most serious cybersecurity threats today. This paper revisits the experimental results of botnet detection using autoencoder, a semi-supervised deep learning model, for UGR and CTU-13 data sets. To prepare the input vectors of autoencoder, we create data points by grouping the NetFlow records into sliding windows based on source IP address and aggregating them to form features. In particular, we discover a simple power-law; that is the number of data points that have some flow-degree is proportional to the number of NetFlow records aggregated in them. Moreover, we show that our power-law fits the real data very well resulting in correlation coefficients of 97% or higher. We also show that this power-law has an impact on the learning of autoencoder and, as a result, influences the performance of botnet detection. Furthermore, we evaluate the performance of autoencoder using the area under the Receiver Operating Characteristic (ROC) curve.

The risk of the Information-oriented society and the role of private security (정보화 사회의 위험적 요소와 민간시큐리티의 역할)

  • Gong, Bae Wan
    • Journal of the Society of Disaster Information
    • /
    • v.8 no.1
    • /
    • pp.1-9
    • /
    • 2012
  • Informatization of society through the computer and the Internet, because large amounts of information production and exchange and new way of communicating is born. Passive way past the one-sided information flows actively interact to evolve in a manner of information producers and information consumers distinction and personal relationships that enhance the online Social Networking Service (SNS) has developed into the social structure of. Thus, the spread of information work closely with the social network structure spark social conflict may act as a factor, and systems and the environment, personal and cultural adaptation of speed to keep up with the rapid development of science and technology as the inability conflict and confusion should lead to even. This paper the characteristics of the information society, with a look at the evolution of social risk factors as the wavelength of information about this look at the role of private security sought to evaluate. Information Society in time and space by shrinking the area of human life that has brought the convenience and simplicity, whereas the non-performance due to the nature of anonymous raises many social side-effects are. This made the preparation of national regulatory measures, but for the protection of personal protection devices in the private sector has not yet been discussed. Way of life and property of the purchaser to protect an individual's private security will have to charge it.

Game-bot detection based on Clustering of asset-varied location coordinates (자산변동 좌표 클러스터링 기반 게임봇 탐지)

  • Song, Hyun Min;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1131-1141
    • /
    • 2015
  • In this paper, we proposed a new approach of machine learning based method for detecting game-bots from normal players in MMORPG by inspecting the player's action log data especially in-game money increasing/decreasing event log data. DBSCAN (Density Based Spatial Clustering of Applications with Noise), an one of density based clustering algorithms, is used to extract the attributes of spatial characteristics of each players such as a number of clusters, a ratio of core points, member points and noise points. Most of all, even game-bot developers know principles of this detection system, they cannot avoid the system because moving a wide area to hunt the monster is very inefficient and unproductive. As the result, game-bots show definite differences from normal players in spatial characteristics such as very low ratio, less than 5%, of noise points while normal player's ratio of noise points is high. In experiments on real action log data of MMORPG, our game-bot detection system shows a good performance with high game-bot detection accuracy.

China's Military Rise and Regional Maritime Security - Its Neighbors' Strategic Calculations and Various Contingencies - (중국의 군사적 부상과 역내 해양안보 - 주변국의 전략적 대비 및 유사를 중심으로 -)

  • Kim, Taeho
    • Strategy21
    • /
    • s.33
    • /
    • pp.113-147
    • /
    • 2014
  • While China's military rise is an issue of growing importance to regional security, it is worthwhile to note that it is not China's military modernization per se, but its capacity to project and sustain power along and beyond its borders--in particular, the possibility to resolve forcefully its outstanding maritime disputes and various contingencies. This essay argues that China's "anti-access capability"--a U.S.-coined term originally developed for a Taiwan contingency--is equally applicable to other major regional cases such as the Spratly disputes and a North Korean contingency. Furthermore, notwithstanding China's continuos efforts to develop and deploy various types and classes of weapons/platforms, it is the Russian systems and technologies that are most capable and thus likely assigned to the highest mission-critical areas. In assessing China's current and likely future military capability as well as their implications for the region, it is necessary to take note of the following: • There exists asymmetry of military capability between China and its weaker neighbors. While the PLAN is weak in several important aspects, for instance, many of its neighbors' navies are weaker still. • Some have argued that China's foreign policy behavior apparently became more "assertive" in 2009-2013, but it is wiser to keep in mind that China has almost always been assertive and aggressive when it comes to what China defines as "sovereignty and territorial issues" as well as its newest "core interests." • On the South China Sea disputes it is the function of U.S. presence in the theater--in the form of overseas bases and the freedom of navigation--and the PLA's own limitations to project and sustain power for an extended period of time that have largely prevented armed. • While Taiwan remains the idee fixe of China's diplomacy and military, it is and will be a tough nut to crack. China's recent creeping attempts for economic integration with Taiwan should be seen in this context. • China and Japan, the two regional heavyweights and traditional rivals, will likely have a bilateral relationship that is replete with difficulties and tension. China's unilateral announcement of its ADIZ in November 2013 as well as the occasional yet persistent disputes with Japan over the Senkaku/Diaoyudao/Diaoyutai islands are only the latest manifestation of this deeper and difficult relationship. • For Korean security it is imperative to take into account the geostrategic and historical factors. On top of the existing military threats from North Korea, the ROK should be able to employ a) hedging strategy, b) "limited defense sufficiency" strategy, and c) rock-solid relations with the United States.

Impact of Personal Health Information Security Awareness on Convenience (개인의료정보보안인식이 편의성에 미치는 영향)

  • Park, Jung-Hong
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.6
    • /
    • pp.600-612
    • /
    • 2017
  • The purpose of the research is that how awareness of importance of personal medical data, laws regarding personal medical data and perception gap regarding information of medical data system may affect usage of hospital convenience between a regular patient who has experienced hospital service and medical professionals. Preceding research analysis was conducted previous on establishing research model; 150 questionnaires to a regular patient and 150 questionnaires for a medical professional, total of 300 questionnaires were gathered for conducting a question investigation. First of all, the research concluded that there are a regular perception differences between a regular patient and medical professional. Moreover, there are perception differences among the different gender, age, and area of residence. Furthermore, medical professionals tend to consider that convenience of hospital usage will be increased if user strengthens recognition of security of personal medical data. Results of hypothesis stress that higher awareness of exposure of personal medical data and medical information system affect decision making convenience for a better usage of hospital. On the other side, awareness of laws related with personal medical information security does not affect decision making convenience of hospital usage and transaction. The results of the research analyzes with proof that strengthening awareness of personal medical data security positively increase convenience of decision making and transactions in selection of provided medical service.

Review on the Cooperative Policing System in Japan (일본의 민경협력치안제도에 대한 고찰 및 시사점)

  • Kim, Gyoo-Sik;Choi, Eung-Ryul
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.29-55
    • /
    • 2013
  • In modern society, citizen's expectation about policing levels have been rising over time and it limited resources of the police to deal with the security services are insufficient. Until now, the state monopoly of the police activity was changing to subject of a variety in cooperation with public security system. The citizens considers community not the destination to police enforce the law but space for effective policing partners. Japanese police focus on cooperation oriented policing to strengthen the police and local residents with crime prevention for a long time. Also, the community through a variety of problem-solving policing activities to identify problems such as anxiety and anguish of the people. The legal basis for cooperative policing activity is that Nagaoka city crime prevention regulation in 1979. In recent years, Tokyo local government legislated the safe town development regulations(東京都安全 安心まちづくり條例) and set up the hot-spot area to promote the safety of public facilities. Cooperative policing not police intervention for crime prevention but national policy for the city reclamation in Japan. Police as well as the Ministry of Land and Transport, Ministry of Justice, Ministry of Education, Prime Minister and all government departments thread safe city, crime prevention, and has been working to make the safe city. Japan's cooperative policing is a system that receives the most attention and greater implications.

  • PDF

A study on Private Investigation System (Detective System) issues and policy alternative (민간조사제도(탐정제도) 쟁점 분석 및 정책적 대안)

  • Noh, Jin Geo;Jeang, Il Hong
    • Convergence Security Journal
    • /
    • v.16 no.6_2
    • /
    • pp.61-71
    • /
    • 2016
  • In this study, Private investigation in South Korea, while gone through so far of politics, the process of social change, a positive feature, without evolve, insufficient growth and security services of the business burden of national judicial institutions, detective industry international of the negative vicious circle, such as the acquisition of drop and expedient information of competitiveness is continuously induced it is a reality. It is, therefore, to the proposal, such as the following. First, it must be able to use the term "detective". Secondly, in order to verify the validity of this system, after introducing the first private sphere, in accordance with the stepwise its necessity, it is desirable to extend the operational range of the public area. Third, to have a country of qualification to private research workers, will be managed directly from the country is ideal. Fourth, we must also seek plan to specialize the designated educational institution as a commissioned education institution to institution with a faculty and facilities that are specialized. Fifth, the National Police Agency must manage and supervise the private investigation business. Sixth, the legislative form to amend the current security law, as a kind of private security, must be introduced by adding a private trillion business. Therefore, in order to complement the limitation of such studies, additional subsequent research has if it is not carried out.

The Korean Peninsula security and Military Strategy of USA and China (미.중의 군사전략과 한반도 안보)

  • Son, Do-Sim
    • Journal of National Security and Military Science
    • /
    • s.4
    • /
    • pp.289-350
    • /
    • 2006
  • The world has been rapidly restructured in an agenda of national security from center of military strength to that of economic strength since the post cold-war era China military leadership-division carried out RMA through learning of a lesson from Gulf war in 1990 -1991 and Iraq war in 2003, thus the leadership-division made an attempt to convert the military system to a technical intensive system. The principle based on RMA of China military is (National defense strategy) drafted by the central military committee 1985 and (Four modernization general principles) 1978. China has introduced Russian high-technological arms and equipment in order to build up the military arms greatly thanks to an economical development, and they take pragmatism line as chinese socialism with their strategy to make secure a position as military powers such as they successfully launched a manned spacecraft and are building an air-craft carrie and soon. USA has a theory of dichotomy whether a country is a cooperator for USA, or not. and also enemy or friend since 9.11terror, thus USA is different from their direction of police. This is because USA stands a position as the superpower of the supremacy hegemony of the world. We must be carefully aware that USA considers as important area for Middle east, West south Asia, Central Asia and Northwest Asia to meet the demands of 2lcentury. Accordingly, the focus of USA's military strategy will be probably concentrated at the above mentioned four areas. On the other hand, USA enjoys such a superpower position due to collapse of USSR which was the past main enemy since the post cold war era. We could give an conclusive example as fact that USA has recurred to unilateralism But USA carry on the military operations to the terror groups at global around by converting thje military strike strategy to pre-emptive strike strategy since9.11 terror, 2001. USA seeks for transformation to the mobile military forces with light-quantity oriented in order to carry on such the military operations and makes progress GPR, And the USA forces in Korea makes progress a military renovation as part of such a military strategy. On the other hand, USA promotes the measures of choose for the countries standing at the crossroads of strategy and carries forward a main scheme of provision for four priority aims that the leaders of a hostile country and mis-country shall be prohibited from use and obtainment of weapons of mass destruction. Accordingly, this treatise found out a significant meaning to have an effect on the national security in the korean peninsula.

  • PDF